• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 349
  • 134
  • 38
  • 33
  • 32
  • 31
  • 16
  • 12
  • 11
  • 10
  • 8
  • 6
  • 6
  • 5
  • 4
  • Tagged with
  • 779
  • 122
  • 88
  • 86
  • 84
  • 73
  • 65
  • 58
  • 52
  • 51
  • 51
  • 50
  • 44
  • 41
  • 40
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
241

Predictive Maintenance of Construction Equipment using Log Data : A Data- centric Approach

Kotriwala, Bazil Muzaffar January 2021 (has links)
Construction equipment manufacturers want to reduce the downtime of their equipment by moving from the typical reactive maintenance to a predictive maintenance approach. They would like to define a method to predict the failure of the construction equipment ahead of time by leveraging the real- world data that is being logged by their vehicles. This data is logged as general event data and specific sensor data belonging to different components of the vehicle. For the scope of this study, the focus is on articulated hauler vehicles with engine as the specific component under observation. In the study, extensive time and resources are spent on preparing both the real- world data sources and coming up with methods such that both data sources are ready for predictive maintenance and can also be merged together. The prepared data is used to build respective remaining useful life machine learning models which classify whether there will be a failure in the next x days. These models are built using data from two different approaches namely, lead data shift and resampling approach respectively. Three different experiments are carried out for both of these approaches using three different combinations of data namely event log only, engine sensor log only, event and sensor log combined. All these experiments have an increasing look ahead window size of how far into the future we would like to predict the failure. The results of these experiments are evaluated in relation to which is the best approach, data combination, and window size to foresee engine failures. The model performance is primarily distinguished by the F- Score and Area under Precision- Recall Curve. / Tillverkare av anläggningsutrustning vill minska stilleståndstiden för sin utrustning genom att övergå från det typiska reaktiva underhållet till ett förebyggande underhåll. De vill definiera en metod för att förutse fel på byggutrustningen i förväg genom att utnyttja de verkliga data som loggas av fordonen. Dessa data loggas som allmänna händelsedata och specifika sensordata som tillhör olika komponenter i fordonet. I den här studien ligger fokus på ledade dragfordon med motorn som den specifika komponent som observeras. I studien läggs mycket tid och resurser på att förbereda båda datakällorna i den verkliga världen och att ta fram metoder så att båda datakällorna är redo för förebyggande underhåll och kan slås samman. De förberedda uppgifterna används för att bygga maskininlärnings modeller för återstående livslängd som klassificerar om det kommer att ske ett fel inom de närmaste x dagarna. Modellerna byggs upp med hjälp av data från två olika metoder, nämligen lead data shift och resampling approach. Tre olika experiment utförs för båda dessa metoder med tre olika kombinationer av data, nämligen endast händelselogg, endast motorsensorlogg och kombinerad händelselogg och sensorlogg. Alla dessa experiment har en ökande fönsterstorlek för hur långt in i framtiden vi vill förutsäga felet. Resultaten av dessa experiment utvärderas med avseende på vilket tillvägagångssätt, vilken datakombination och vilken fönsterstorlek som är bäst för att förutse motorhaverier. Modellens prestanda bedöms i första hand med hjälp av F- poäng och arean under Precision- Recall- kurvan.
242

A study of the seismic response modification factor for log shear walls

Kessler, Samantha January 1900 (has links)
Master of Science / Department of Architectural Engineering and Construction Science / Sutton F. Stephens / Log construction is becoming increasingly popular throughout the U.S. Currently, seismic coefficients are not provided in model building codes for the design of the log shear walls as a lateral force resisting system for seismic forces. Current design practice is to use a response modification coefficient, R, of around 4.5. Several tests by other researchers on log shear walls showed strong energy dissipation and good lateral strength with stability after high displacements. This behavior of the log shear wall system is evidence that a higher R could possibly be used in design. The purpose of this study was to establish a response modification factor for single story log shear walls based on available shear wall tests using the definition of R provided in ATC-19. This research did not conduct testing according to the protocol and methodology of ATC-63. This work contains a history of the development of seismic design provisions in the U.S. and the evolution of the response modification coefficient. Common log construction practices are reviewed, with reference to ICC 400- Standard on Design and Construction of Log Structures. Using data provided by other researchers from physical testing and computer modeling of various types of log shear walls, an R of 6.0 is proposed based on the provisions of ATC-19. Finally, recommendations for further research to fully understand the behavior of the log shear wall system, including possible archetypes required by the methodology set forth in ATC-63, are provided.
243

信用風險評估方法之研究 : Log-linear models運用於西藥零售商之實證研究

李文福, LI, WEN-FU Unknown Date (has links)
第一章 緒論 第一節 研究背景 第二節 研究問題 第三節 研究目的 第四節 名詞定義及研究範圍 第二章 評估信用風險之文獻參考 第三章 研究設計 第一節 研究架構與變數 第二節 抽樣設計 第三節 資料分析方法 第四章 資料分析與研究結果 第一節 企業主持人執業資格、經驗、地緣關係與信用風險之關係。 第二節 各項特質對信用風險之預測能力。 第五章 結論與建議 附錄 Log-Iknear Models 統計技術簡介。
244

從搜尋引擎查詢紀錄中學習Ontology / Ontology Learning from Query Logs of Search Engines

陳茂富 Unknown Date (has links)
Ontology可用來組織、管理與分享知識,Ontology Engineering是一種建構Ontology的過程,建構的過程中,多數的工作需要人費時費力地去完成,因此利用機器來輔助Ontology Engineering成了一門重要的課題。使用Knowledge Discovery的方法協助Ontology Engineering建構Ontology的過程,稱為Ontology Learning,本論文中提出的Ontology Learning方法為分析使用者在搜尋引擎下關鍵字查詢時的行為,加上利用與查詢關鍵字有關的網頁資訊,以輔助建構Ontology。本論文中的Ontology由使用者所查詢的關鍵字組成,我們要learning的,則是這些關鍵字彼此之間的關係,其中有上義詞、下義詞與同義詞等等,因此,自動尋找關鍵字彼此之間的關係以輔助建構Ontology,即為我們提出本論文的目的。除此之外,本論文亦實作了完整的Ontology Learning系統,從一開始使用者查詢記錄的蒐集,關鍵字擷取與分析,關鍵字之間的關係判定,直到最後Ontology的產生,都將由系統自動完成。 / Ontology can be used to organize, manage and share knowledge. Ontology Engineering is the process of constructing Ontology. However, it’s usually a time-consuming and error-prone task. Thus, utilizing methods of Knowledge Discovery to help Ontology Engineering is called Ontology Learning. In this thesis, Ontology Learning process is done by using those pages related query terms and analyzing the querying behavior of users on search engines. The Ontology is organized by user query terms and relations among them. These relations we define are hyperonomy, hyponomy, synonymy and et al. Our goal of this thesis is to automatically learn the correct relations among these query terms. Besides, we implemented the complete system platform for Ontology Learning. The system can automatically collect logs, extract and analyze query keywords, and produce the final Ontology.
245

Tree-Ring Dating of Two Log Buildings in Central Texas, USA

Fairchild-Parks, James A., Harlan, Thomas P. January 1992 (has links)
Tree-ring dating was used to develop construction scenarios for two log structures, the Draper and the Fuller buildings. in the Edwards Plateau region of Texas. The Draper building was constructed in 1902-3, and added onto in 1906. The dating of the Fuller building is less certain, but the structure probably was built in the 1860s or 1870s.
246

An insider misuse threat detection and prediction language

Magklaras, Georgios Vasilios January 2012 (has links)
Numerous studies indicate that amongst the various types of security threats, the problem of insider misuse of IT systems can have serious consequences for the health of computing infrastructures. Although incidents of external origin are also dangerous, the insider IT misuse problem is difficult to address for a number of reasons. A fundamental reason that makes the problem mitigation difficult relates to the level of trust legitimate users possess inside the organization. The trust factor makes it difficult to detect threats originating from the actions and credentials of individual users. An equally important difficulty in the process of mitigating insider IT threats is based on the variability of the problem. The nature of Insider IT misuse varies amongst organizations. Hence, the problem of expressing what constitutes a threat, as well as the process of detecting and predicting it are non trivial tasks that add up to the multi- factorial nature of insider IT misuse. This thesis is concerned with the process of systematizing the specification of insider threats, focusing on their system-level detection and prediction. The design of suitable user audit mechanisms and semantics form a Domain Specific Language to detect and predict insider misuse incidents. As a result, the thesis proposes in detail ways to construct standardized descriptions (signatures) of insider threat incidents, as means of aiding researchers and IT system experts mitigate the problem of insider IT misuse. The produced audit engine (LUARM – Logging User Actions in Relational Mode) and the Insider Threat Prediction and Specification Language (ITPSL) are two utilities that can be added to the IT insider misuse mitigation arsenal. LUARM is a novel audit engine designed specifically to address the needs of monitoring insider actions. These needs cannot be met by traditional open source audit utilities. ITPSL is an XML based markup that can standardize the description of incidents and threats and thus make use of the LUARM audit data. Its novelty lies on the fact that it can be used to detect as well as predict instances of threats, a task that has not been achieved to this date by a domain specific language to address threats. The research project evaluated the produced language using a cyber-misuse experiment approach derived from real world misuse incident data. The results of the experiment showed that the ITPSL and its associated audit engine LUARM provide a good foundation for insider threat specification and prediction. Some language deficiencies relate to the fact that the insider threat specification process requires a good knowledge of the software applications used in a computer system. As the language is easily expandable, future developments to improve the language towards this direction are suggested.
247

Smooth exceptional del Pezzo surfaces

Wilson, Andrew January 2010 (has links)
For a Fano variety V with at most Kawamata log terminal (klt) singularities and a finite group G acting bi-regularly on V , we say that V is G-exceptional (resp., G-weakly-exceptional) if the log pair (V,∆) is klt (resp., log canonical) for all G-invariant effective Q-divisors ∆ numerically equivalent to the anti-canonical divisor of V. Such G-exceptional klt Fano varieties V are conjectured to lie in finitely many families by Shokurov ([Sho00, Pro01]). The only cases for which the conjecture is known to hold true are when the dimension of V is one, two, or V is isomorphic to n-dimensional projective space for some n. For the latter, it can be shown that G must be primitive—which implies, in particular, that there exist only finitely many such G (up to conjugation) by a theorem of Jordan ([Pro00]). Smooth G-weakly-exceptional Fano varieties play an important role in non-rationality problems in birational geometry. From the work of Demailly (see [CS08, Appendix A]) it follows that Tian’s αG-invariant for such varieties is no smaller than one, and by a theorem of Tian such varieties admit G-invariant Kähler-Einstein metrics. Moreover, for a smooth G-exceptional Fano variety and given any G-invariant Kähler formin the first Chern class, the Kähler-Ricci iteration converges exponentially fast to the Kähler form associated to a Kähler- Einsteinmetric in the C∞(V)-topology. The termexceptional is inherited from singularity theory, to which this study enjoys strong links. We classify two-dimensional smooth G-exceptional Fano varieties (del Pezzo surfaces) and provide a partial list of all G-exceptional and G-weakly-exceptional pairs (S,G), where S is a smooth del Pezzo surface and G is a finite group of automorphisms of S. Our classification confirms many conjectures on two-dimensional smooth exceptional Fano varieties.
248

Exploring everyday functioning in older adults with chronic pain : new insights with new technology

Wilson, Gemma January 2014 (has links)
Chronic pain is a widespread problem, especially in the older population, and can affect various aspects of daily living. At a time when it has been acknowledged that the population is increasingly ageing, research regarding the effects of chronic pain on the daily living of older adults is essential. Furthermore, the development of innovative technology is changing the way that much research is being conducted, and can lead to the retrieval of novel information, using a fresh approach. The adoption of this technology in the field of chronic pain research has the potential to examine various aspects of the daily living of older adults living with chronic pain using a different approach to previous research. This study is underpinned by a Critical Realist ontology and Hermeneutic epistemology and follows a Generic Qualitative Research methodology (Caelli, et al., 2003). The aim of the study was not to generalise the findings but to gather a deep theoretical description of the outcomes and offer an explanation of these findings based on an analysis of the multiple research methods used within the study. This study had two main aims and was split into two sections according to the aims. Firstly, Part A of this study aimed to explore a range of day-to-day patterns and experiences of functioning in older adults suffering from chronic pain. Part B aimed to explore the usability, acceptance and experience of the technology used to measure functioning as part of the first aim of this study. Part B also aimed to look at the practicalities the participants were faced with when using the technology. A mixed methods design was used for Part A in which 15 older adults (65+) living with chronic pain (pain >3 months) took part in an in-depth study lasting seven days. As well as the 15 core participants that took part in the study, two older adults (65+) without chronic pain and two younger adults (<65) with chronic pain took part in the study in order to provide some insight into the effects of either pain, or age, on functioning. Part A used four data collection techniques to gather data upon the daily functioning of older adults with chronic pain; the Daily Reconstruction Method diary (Kahneman, Krueger, Schkade, Schwarz, Stone, 2004), the Sensecam (also known as the Vicon Revue, Vicon©), the LifeShirt (Vivometrics Inc) and a semi-structured interview. However, although the LifeShirt was validated, as part of this PhD, and used throughout the study, the gathered data was not analysed due to multiple problems with the data. The Daily Reconstruction Method, Sensecam and the semi-structured interview were each analysed separately before the results of the Daily Reconstruction Method and Sensecam were integrated into the themes derived from the semi-structured interviews. The integrated results led to the development of two themes, each with sub-themes; ‘effect on daily living’ and ‘managing pain and functioning’. The themes from Part A highlighted the way in which pain affected functioning and the modifications to daily functioning as a result of chronic pain. The way in which individuals perceived the management of their own pain and functioning, as well as strategies and assistive devices to manage pain and functioning were also discussed. This study has furthered current knowledge due to the idiographic nature of the study, as well as multiple, novel, data collection tools used, adding additional details to how tasks have been modified, reduced, or terminated. Part B of this study used the Unified Theory of Acceptance and Use of Technology (UTAUT, Venkatesh, et al., 2003), the Flow-State Scale (Jackson & Marsh, 1996) and semi-structured interviews to explore participants’ use of both the Sensecam and LifeShirt. The questionnaires and interviews were carried out with all of the individuals that carried out Part A of this research. From the semi-structured interviews two main themes were reported, each with sub-themes; ‘expectations and experiences’ and ‘awareness of equipment’. Two concepts developed from the themes within Part B that were specific to the participants’ experiences of wearing wearable technology in this study, as opposed to ‘typical’ non-wearable technology; specifically, the importance of design and the importance of others. Both of these overarching concepts affected the expectations of the technology, the experiences of using the technology, as well as the awareness of the technology during use. Furthermore, both concepts will remain and are long-lasting, despite the development of the technology in this field, but there are specific details that are contemporary and are specific to either the Sensecam or the LifeShirt as used in this study.
249

Factores relacionados a la violencia física, sexual y psicológica o emocional en mujeres violentadas por sus parejas de la base ENDES 2015, aplicando el modelo log-lineal para datos cualitativos

Sanchez Ramos, Guisella Johanna January 2016 (has links)
Determina los factores relacionados significativamente con la violencia física, sexual y psicológica o emocional en las mujeres violentadas por sus parejas. Utiliza la técnica de modelos log lineales. Obtiene que la violencia física está relacionada con el tipo de residencia, el estado civil actual y si la esposa gana más dinero que el esposo, para la violencia sexual se asocian el grupo de edad, nivel educativo, estado civil del esposo o conyugue y el tipo de residencia, y para la violencia psicológica se asocian el nivel educativo, estado civil del esposo o conyugue y el tipo de residencia; por último la violencia emocional, violencia sexual, violencia física, se relacionan con si el padre golpeo a la madre de la esposa y el grupo de edad. / Trabajo de suficiencia profesional
250

Theoretical Studies on Perfluorinated Acids of Environmental Significance

Hidalgo-Puertas, Abdel 04 September 2015 (has links)
A new approach for predicting octanol-water partition coefficients (Log P) of linear perfluorinated compounds, making use of the limited experimental data available, previous observations and the consistent similarities observed between the experimental and calculated (with electronic structure methods and using EPI suite) slopes of the linear plots of Log P values with the number of carbon atoms (N = 2 to 11) is described here. Eight families of linear organic compounds were investigated: carboxylic acids, perfluorinated carboxylic acids, sulfonic acids and perfluorinated sulfonic acids, together with their corresponding conjugate bases. To the best of our knowledge, this work reports the first application of density functional theory methods to the calculation of Log P values of perfluorinated compounds. A second part of the thesis, describes the study of the thermodynamic stability of the PFOA family of 39 structural isomers with the M06-2X, LC-ωPBE, B97D and B3LYP functionals and with the PM6 method. The PM6 results closely resemble the M06-2X results for neutral PFOAs, but greatly disagree regarding anions. The four functionals applied behave similarly from a qualitative point of view, but quantitatively speaking, the LC-ωPBE and B97D results are between the M06-2X and B3LYP stability results. M06-2X ranks highly substituted isomers as more stable than did B3LYP, and ranks less-branched isomers quite low in relative stability compared to B3LYP. Various similarities with a former PFOSs study applying the M06-2X and B3LYP functionals have been identified. The degree of branching within structural isomers cannot always be precisely determined, and is not the only aspect that determines thermodynamic stability; the pattern of substitution seems to also play a significant role. / Graduate

Page generated in 0.0321 seconds