• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 684
  • 252
  • 79
  • 57
  • 42
  • 37
  • 30
  • 26
  • 25
  • 14
  • 9
  • 8
  • 7
  • 7
  • 7
  • Tagged with
  • 1504
  • 1030
  • 249
  • 238
  • 223
  • 215
  • 195
  • 185
  • 167
  • 163
  • 151
  • 124
  • 123
  • 122
  • 111
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
251

Analysis of a Combined GLONASS/Compass-I Navigation Algorithm

Peng, Song, Xiao-yu, Chen, Jian-zhong, Qi 10 1900 (has links)
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada / Compass-I system is China has built satellite navigation system. It's a kind of regional position system according to the double-star position principle. Commonly, Compass-I system need adopt active position, in the paper several passive position methods are put forward. A combination navigation mode based on GLONASS and Compass-I passive navigation is proposed in this paper. The differences of coordinates and time systems between those two navigation systems are analyzed. User position is calculated by least squares method. Combination Navigation Algorithm can improve visible satellite constellation structure and positioning precision so as to ensure the reliability and continuity of positioning result.
252

European Union Dairy Policy and the Least Developed Countries : Case Study - Africa

Woolgar, Chris January 2010 (has links)
Agricultural policy within the European Union (EU) is but one of the founding pillars upon which unification was developed. Negotiated out of a post-war Europe, the Common Agricultural Policy (CAP) emphasized the protection of the domestic market, through government subsidies and payment programmes, artificially raising the price of domestic products while restricting access for the foreign agricultural producers. The objective of this paper is to explore the link between the agricultural decisions made by the EU and the effects on citizens in the Least Developed Countries (LDC). To develop a comprehensive understanding of the issue at hand a review of the existing literature will be necessary, as well as an analysis of the available quantitative data. The findings revealed that the CAP is but one factor that impacts development of agriculture in LDC’s, many other factors, such as international and bi-lateral trade agreements, government institutions, and political lobbying also influence the outcome.
253

Three essays on hypotheses testing involving inequality constraints

Hsu, Yu-Chin, 1978- 21 September 2010 (has links)
The focus of this research is on hypotheses testing involving inequality constraints. In the first chapter of this dissertation, we propose Kolmogorov-Smirnov type tests for stochastic dominance relations between the potential outcomes of a binary treatment under the unconfoundedness assumption. Our stochastic dominance tests compare every point of the cumulative distribution functions (CDF), so they can fully utilize all information in the distributions. For first order stochastic dominance, the test statistic is defined as the supremum of the difference of two inverse-probability-weighting estimators for the CDFs of the potential outcomes. The critical values are approximated based on a simulation method. We show that our test has good size properties and is consistent in the sense that it can detect any violation of the null hypothesis asymptotically. First order stochastic dominance tests in the treated subpopulation, and higher order stochastic dominance tests in the whole population and among the treated are shown to share the same properties. The tests are applied to evaluate the effect of a job training program on incomes, and we find that job training has a positive effect on real earnings. Finally, we extend our tests to cases in which the unconfoundedness assumption does not hold. On the other hand, there has been a considerable amount of attention paid to testing inequality restrictions using Wald type tests. As noted by Wolak (1991), there are certain situations where it is difficult to obtain tests with correct size even asymptotically. These situations occur when the variance-covariance matrix of the functions in the constraints depends on the unknown parameters as would be the case in nonlinear models. This dependence on the unknown parameters makes it computationally difficult to find the least favorable configuration (LFC) which can be used to bound the size of the test. In the second chapter of this dissertation, we extend Hansen's (2005) superior predictive ability (SPA) test to testing hypotheses involving general inequality constraints in which the variance-covariance matrix can be dependent on the unknown parameters. For our test we are able to obtain correct size asymptotically plus test consistency without requiring knowledge of the LFC. Also the test can be applied to a wider class of problems than considered in Wolak (1991). In the last chapter, we construct new Kolmogorov-Smirnov tests for stochastic dominance of any pre-specified order without resorting to the LFC to improve the power of Barrett and Donald's (2003) tests. To do this, we first show that under the null hypothesis if the objects being compared at a given income level are not equal, then the objects at this given income level will have no effect on the null distribution. Second, we extend Hansen's (2005) recentering method to a continuum of inequality constraints and construct a recentering function that will converge to the underlying parameter function uniformly asymptotically under the null hypothesis. We treat the recentering function as a true underlying parameter function and add it to the simulated Brownian bridge processes to simulate the critical values. We show that our tests can control the size asymptotically and are consistent. We also show that by avoiding the LFC, our tests are less conservative and more powerful than Barrett and Donald's (2003). Monte Carlo simulations support our results. We also examine the performances of our tests in an empirical example. / text
254

Security and privacy in perceptual computing

Jana, Suman 18 September 2014 (has links)
Perceptual, "context-aware" applications that observe their environment and interact with users via cameras and other sensors are becoming ubiquitous on personal computers, mobile phones, gaming platforms, household robots, and augmented-reality devices. This dissertation's main thesis is that perceptual applications present several new classes of security and privacy risks to both their users and the bystanders. Existing perceptual platforms are often completely inadequate for mitigating these risks. For example, we show that the augmented reality browsers, a class of popular perceptual platforms, contain numerous inherent security and privacy flaws. The key insight of this dissertation is that perceptual platforms can provide stronger security and privacy guarantees by controlling the interfaces they expose to the applications. We explore three different approaches that perceptual platforms can use to minimize the risks of perceptual computing: (i) redesigning the perceptual platform interfaces to provide a fine-grained permission system that allows least-privileged application development; (ii) leveraging existing perceptual interfaces to enforce access control on perceptual data, apply algorithmic privacy transforms to reduce the amount of sensitive content sent to the applications, and enable the users to audit/control the amount of perceptual data that reaches each application; and (iii) monitoring the applications' usage of perceptual interfaces to find anomalous high-risk cases. To demonstrate the efficacy of our approaches, first, we build a prototype perceptual platform that supports fine-grained privileges by redesigning the perceptual interfaces. We show that such a platform not only allows creation of least-privileged perceptual applications but also can improve performance by minimizing the overheads of executing multiple concurrent applications. Next, we build DARKLY, a security and privacy-aware perceptual platform that leverages existing perceptual interfaces to deploy several different security and privacy protection mechanisms: access control, algorithmic privacy transforms, and user audit. We find that DARKLY can run most existing perceptual applications with minimal changes while still providing strong security and privacy protection. Finally, We introduce peer group analysis, a new technique that detects anomalous high-risk perceptual interface usages by creating peer groups with software providing similar functionality and comparing each application's perceptual interface usages against those of its peers. We demonstrate that such peer groups can be created by leveraging information already available in software markets like textual descriptions and categories of applications, list of related applications, etc. Such automated detection of high-risk applications is essential for creating a safer perceptual ecosystem as it helps the users in identifying and installing safer applications with any desired functionality and encourages the application developers to follow the principle of least privilege. / text
255

Linear transceivers for MIMO relays

Shang, Cheng Yu Andy January 2014 (has links)
Relays can be used in wireless communication systems to provide cell coverage extension, reduce coverage holes and increase throughput. Full duplex (FD) relays, which transmit and receive in the same time slot, can have a higher transmission rate compared with half duplex (HD) relays. However, FD relays suffer from self interference (SI) problems, which are caused by the transmitted relay signal being received by the relay receiver. This can reduce the performance of FD relays. In the literature, the SI channel is commonly nulled and removed as it simplifies the problem considerably. In practice, complete nulling is impossible due to channel estimation errors. Therefore, in this thesis, we consider the leakage of the SI from the FD relay. Our goal is to reduce the SI and increase the signal to noise ratio (SNR) of the relay system. Hence, we propose different precoder and weight vector designs. These designs may increase the end to end (e2e) signal to interference and noise ratio (SINR) at the destination. Here, a precoder is multiplied to a signal before transmission and a weight vector is multiplied to the received signal after reception. Initially, we consider an academic example where it uses a two path FD multiple input and multiple output (MIMO) system. The analysis of the SINR with the implementation of precoders and weight vectors shows that the SI component has the same underlying signal as the source signal when a relay processing delay is not being considered. Hence, to simulate the SI problem more realistically, we alter our relay design and focus on a one path FD MIMO relay system with a relay processing delay. For the implementation of precoders and weight vectors, choosing the optimal scheme is numerically challenging. Thus, we design the precoders and weight vectors using ad-hoc and near-optimal schemes. The ad-hoc schemes for the precoders are singular value decomposition (SVD), minimising the signal to leakage plus noise ratio (SLNR) using the Rayleigh Ritz (RR) method and zero forcing (ZF). The ad-hoc schemes for the weight vectors are SVD, minimum mean squared error (MMSE) and ZF. The near-optimal scheme uses an iterative RR method to compute the source precoder and destination weight vector and the relay precoder and weight vector are computed using the ad-hoc methods which provide the best performance. The average power and the instantaneous power normalisations are the two methods to constrain the relay precoder power. The average power normalisation method uses a novel closed form covariance matrix with an optimisation approach to constrain the relay precoder. This closed form covariance matrix is mathematically derived using matrix vectorization techniques. For the instantaneous power normalisation method, the constraint process does not require an optimisation approach. However, using this method the e2e SINR is difficult to calculate, therefore we use symbol error rate (SER) as a measure of performance. The results from the different precoder and weight vector designs suggest that reducing the SI using the relay weight vector instead of the relay precoder results in a higher e2e SINR. Consequently, to increase the e2e SINR, performing complicated processing at the relay receiver is more effective than at the relay transmitter.
256

台灣地區基金績效持續性之影響因素分析 / The Determining Factors of Mutual Fund’s Performance Persistence in Taiwan

黃鴻鈞 Unknown Date (has links)
共同基金是由投資信託公司向大眾募集資金,再轉投資到股票、債券、不動產等標的上,最後再分配投資收益的的一種工具。從自有共同基金開始至今已超越百年,而台灣地區方面,目前也是全民理財不可或缺的一項標的。 共同基金雖號稱是懶人投資,不用花費大量心思。但實際上,天下沒有白吃的午餐,投資人仍需投注精力了解趨勢,並從中挑選適當的標的。但儘管有許多理財專家提出經驗談,就一般投資大眾而言,如何挑選共同基金仍是具有挑戰性的工作。  為協助投資人以現有資訊,找出適當的投資標的,因此利用投信公會公布的資料,將基金依照Jensen值進行區分為大於零及小於零兩個群組,再以最小平方法探討兩個群組中,影響各種類型基金績效持續性的因素,以期能利用簡單的資訊,找出值得長期投資的標的。
257

ADVERTISING EFFECTIVENESS ON INTERNATIONAL TOURISM DEMAND IN ÅRE – AN ECONOMETRIC ANALYSIS

Kronenberg, Kai January 2013 (has links)
The objective of this study is to estimate advertising effects on international tourismdemand for the leading Swedish winter destination, Åre. The increasing share of foreigninbound tourists in this destination region creates a strong interest by shareholders toidentify the factors responsible for this trend. According to traditional micro-economictheory, economic factors, such as income and price, are considered as main determinantsfor tourism demand (Song and Witt 2000). However, according to advertising theories(Comanor and Wilson, 1974) and previous tourism research (Bhagwat and Debruine, 2008;Divisekera and Kulendran, 2006), this study additionally focuses on the brand awarenessof Åre as perceived by international tourists. More concretely, advertising theoriesdistinguish between the brand and the information function of advertising (Nelson, 1974).The former function follows the idea that advertising increases the level of productdifferentiation to build up a base of loyal customers. By contrast, the information functionimplies that advertising primarily provides information about products in order to increasethe market transparency. Accordingly, in order to estimate the impact of advertisingexpenditures for off- and online channels as well as promotional activities, furtherexplanatory variables, e.g. mega events, are considered in this study (Salman, 2003; Songet al., 2010). By applying ordinary least square (OLS) methods, demand elasticitycoefficients are estimated for each of the sending countries Norway, Finland, Russia,Denmark and the UK. Results show that advertising is the main significant driver oftourism demand from the UK, Russia and Finland, while a comparably weak advertisingleverage can be shown for Denmark and Norway. Interestingly, in contrast to microeconomictheories tested in previous research, income and tourism price levels reveal asbeing less significant drivers for demand in all analysed tourism markets. In turn, theresults provide evidence that the increased usage of online channels most significantlyaffects consumers’ buying behaviour. Finally, with respect to brand image perception,results reveal that the destination of Åre is perceived as a brand by tourists from Denmark.Moreover, for customers from the countries Norway and Finland, Åre indicates a weakbrand perception, while tourists from Russia and the UK don’t perceive Åre as a brand atall. The results gained by this research conducted at the level of the tourism destinationprovide useful hints about the factors influencing travel behaviour of tourists from maininternational markets. The study supports destination managers to appropriately adjustmarketing campaigns according to the predominant level of brand perception in respectivesending countries. / KK-Foundation project ‘Engineering the Knowledge Destination’ (no. 20100260; Stockholm, Sweden).
258

Archeologinių duomenų analizė. Sukimo ašies radimas / Analysis of archaeological data. estimation of the axis of rotation

Misiukevičius, Ramūnas 30 June 2014 (has links)
Pasaulyje sparčiai besivystančios informacinės technologijos (IT) neaplenkia ir archeologijos mokslo. Vis dažniau archeologai naudoja įvairias kompiuterines programas ne tik archeologinės medžiagos dokumentavimui, vaizdavimui ar rekonstrukcijai, bet ir žmonių veiklos, buities, gyvenimo aplinkos rekonstrukcijai ar modeliavimui. Šis uždavinys reikalauja atlikti kelių etapų analizę ir išsiaiškinti radinių kilmę, tipą, originalumą ir paskirtį. Turint šią informaciją, galime daug sužinoti apie žmonių, kurie naudojosi tais daiktais žinias, turėtus įrankius, papročius, emigraciją ir daug kitos informacijos. Žinių kiekis apie senovę priklauso nuo radinių ir mūsų gebėjimų juos analizuoti. Šiame darbe yra pristatomas vienas iš puodų šukių analizės metodų - sukimo ašies radimas. Tai yra pirmasis ir esminis tokio tipo radinių analizės etapas, nes nuo jo rezultatų priklauso kitos radinio analizės - profilio linijos radimas, simetriškumo tikrinimas, segmantacijos realizavimas, objektų tipologija, rekonstrukcija ir galiausiai - žmonių gyvenimo analizė. Klaidos šiame etape turi lemiamos reikšmės kitiems analizės etapams, o gautos žinios gali suklaidinti tiriant senovės žmonių kultūrą ir jų paplitimą bei migraciją. Darbe yra aptariami sukimo ašies radimo metodai, jų privalumai ir trūkumai, pateikiami pavyzdžiai. / The world is rapidly developing information technology (IT) exist in archaeological science. Increasingly, archaeologists use various computer programs not only for documentation of archaeological material, or the depiction of reconstruction, but human activity, lifestyle, environmental reconstruction and modeling. This task requires a multi-step analysis of the findings and to clarify the origin of the type of originality and purpose. With this information, we can learn a lot about the people who used the objects of knowledge at the tools, customs, emigration, and much other information. Amount of knowledge about ancient artifacts and depends on our ability to analyze them. This paper has presented one of the pottery shards of methods of analysis – estimation of the axis of rotation. This is the first of its kind and an essential step in the analysis finds, because it captures the results of another analysis - Finding the profile lines, symmetry checks, realization of segmentation, object typology, reconstruction, and finally - an analysis of people's lives. Errors at this stage is critical for other steps in the analysis and the knowledge generated is likely to mislead the investigation of ancient human cultures and their distribution and migration. The paper discusses the rotation axis of the detection methods, their advantages and disadvantages, are examples.
259

Post-manoeuvre and online parameter estimation for manned and unmanned aircraft

Jameson, Pierre-Daniel January 2013 (has links)
Parameterised analytical models that describe the trimmed inflight behaviour of classical aircraft have been studied and are widely accepted by the flight dynamics community. Therefore, the primary role of aircraft parameter estimation is to quantify the parameter values which make up the models and define the physical relationship of the air vehicle with respect to its local environment. Nevertheless, a priori empirical predictions dependent on aircraft design parameters also exist, and these provide a useful means of generating preliminary values predicting the aircraft behaviour at the design stage. However, at present the only feasible means that exist to actually prove and validate these parameter values remains to extract them through physical experimentation either in a wind-tunnel or from a flight test. With the advancement of UAVs, and in particular smaller UAVs (less than 1m span) the ability to fly the full scale vehicle and generate flight test data presents an exciting opportunity. Furthermore, UAV testing lends itself well to the ability to perform rapid prototyping with the use of COTS equipment. Real-time system identification was first used to monitor highly unstable aircraft behaviour in non-linear flight regimes, while expanding the operational flight envelope. Recent development has focused on creating self-healing control systems, such as adaptive re-configurable control laws to provide robustness against airframe damage, control surface failures or inflight icing. In the case of UAVs real-time identification, would facilitate rapid prototyping especially in low-cost projects with their constrained development time. In a small UAV scenario, flight trials could potentialy be focused towards dynamic model validation, with the prior verification step done using the simulation environment. Furthermore, the ability to check the estimated derivatives while the aircraft is flying would enable detection of poor data readings due to deficient excitation manoeuvres or atmospheric turbulence. Subsequently, appropriate action could then be taken while all the equipment and personnel are in place. This thesis describes the development of algorithms in order to perform online system identification for UAVs which require minimal analyst intervention. Issues pertinent to UAV applications were: the type of excitation manoeuvers needed and the necessary instrumentation required to record air-data. Throughout the research, algorithm development was undertaken using an in-house Simulink© model of the Aerosonde UAV which provided a rapid and flexible means of generating simulated data for analysis. In addition, the algorithms were further tested with real flight test data that was acquired from the Cranfield University Jestream-31 aircraft G-NFLA during its routine operation as a flying classroom. Two estimation methods were principally considered, the maximum likelihood and least squares estimators, with the aforementioned found to be best suited to the proposed requirements. In time-domain analysis reconstruction of the velocity state derivatives ˙W and ˙V needed for the SPPO and DR modes respectively, provided more statistically reliable parameter estimates without the need of a α- or β- vane. By formulating the least squares method in the frequency domain, data issues regarding the removal of bias and trim offsets could be more easily addressed while obtaining timely and reliable parameter estimates. Finally, the importance of using an appropriate input to excite the UAV dynamics allowing the vehicle to show its characteristics must be stressed.
260

An investigation into the experience of meeting the special educational needs of pupils in shift primary schools in Jamaica

Sherwood, Donna M. January 2010 (has links)
School days are organised on a whole day and or a shift basis in different countries. When the school day is arranged on double shift basis, two sets of pupil attend the same school in a given day. This thesis is based on a phenomenological research which examined how the education of pupils with special educational needs (SEN) was addressed in shift primary schools in Jamaica. A case study was undertaken with a view of understanding the day-to-day experiences of the issues of how shift primary schools constructed and managed the SEN of pupils and sought to understand the ‘why’ in operation. In addition, a survey (using questionnaires) was carried out in 10 shift primary schools (including the case) in several parishes of the island which targeted administrators (n=26) and teachers (n=205) to further explore some of the issues which were picked up on in the case study such as understandings of the concept of SEN, the challenges they encountered in their attempts to cater for pupils‟ SEN and how pupils‟ SEN impacted on the school system. An interview was also conducted with an official from the Ministry of Education (MOE) which investigated the philosophical orientation which guides the education of pupils with SEN and the how they are catered for in Jamaican schools. Grounded Theory, ably assisted by the tool of Thematic Analysis, was used to explore this complex research context to help to unpack dilemmas and tensions which existed. One of the major insights gained from the data is that the Jamaican primary shift school context is ‘resource famished whilst being simultaneously ‘SEN dense’. The main research findings revealed that the shift system and its resultant time constraint were major inhibitors to the effective meeting of pupils‟ SEN. The complexity and challenges of this educational context were further exacerbated by factors such as limited understanding of the concept of SEN, inadequate resources in general and more so with specific focus on catering for pupils with SEN, low teacher efficacy for meeting pupils‟ SEN, large classes and inadequate parental support. Administrators reported concern for impact of pupils‟ SEN on their schools in ways such as lowering examination passes and the overall performance of schools. One of the main concerns of teachers was how pupils‟ SEN disrupted lessons and how this impacted on other learners without SEN. In addition, the most commonly manifested SEN of pupils were reading and behavioural difficulties. The role of the Guidance Counsellor was re-defined as the main school personnel for the management of pupils’ SEN in shift primary schools. From the point of view of the MOE the practice and provision for pupils with SEN were governed by the concept of ‘Least Restrictive Environment’ and not the current concept of inclusion that is in wide usage in the field of special education. Importantly, not only were schools experiencing difficulties in satisfactorily providing resources for the meeting pupils‟ SEN, but this is also experienced at the level of the MOE. The chief implications highlighted based on of the research findings was the dire need for the reconstruction of teacher training in Jamaica with a specific aim of equipping teachers to effectively cater for pupils‟ SEN and the dire need for legislation to safeguard the education of pupils with SEN. In addition, recommendations were made to promote improvements of pupils with SEN in general and particularly those being educated in shift primary schools. Finally, several suggestions for future research were put forward.

Page generated in 0.0416 seconds