• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 4
  • 4
  • 2
  • 1
  • 1
  • Tagged with
  • 25
  • 8
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Performance et coordination dans les réseaux radios cognitifs multi-antennes / Performance and coordination in multi-antenna cognitive radio networks

Filippou, Miltiades 11 July 2014 (has links)
Dans cette thèse, nous avons d'abord réalisé une analyse de la performance analytique des deux plus populaires systèmes de la radio cognitif (CR), à savoir les réseaux de radio cognitive (CRN) interweaved et underlay. Il a été montré que numériquement le comportement de chacun des approches CRN examinés est fortement dépendant des paramètres du système de base. En outre, nous avons étudié le problème de taux optimale de recevoir BF et la sélection de l'utilisateur, compte tenu de la liaison montante d'un multi-utilisateur, CRN sans priorité. Comme l'hypothèse d'une information d'état de canal (CSI) réglage, par lequel les chaînes concernées ne seraient que instantanément (resp. statistiquement) connu est, en grande partie, optimiste (resp. pessimiste), nous avons considéré un scénario de CSI mixte. Ensuite, le problème de taux des optimale de transmission BF pour un MISO underlay CRN, en supposant l'existence de CSI mixte, a ensuite été formulée. Se concentrer sur la communication de downlink, l'objectif de la conception du système était la maximisation de la capacité ergodique réalisable du système secondaire, soumis à une contrainte de taux moyen imposée sur la communication primaire. Poursuite de l'enquête du problème de précodage dernier avec la connaissance du canal distribute et mixte, nous avons développé un système de coordination, selon lequel, les émetteurs de coordonner sur la base de statistiques (covariance) des informations de la chaîne mondiale. La stratégie de pré-codage proposé a été montré à surperformer les approches classiques tirés de la littérature. Enfin, dans un cadre CRN priorité, nous avons proposé un algorithme d'affectation des pilotes. / In this thesis, we initially conducted an analytical performance analysis of two of the most popular cognitive radio (CR) schemes, namely the interweaved and the underlay cognitive radio network (CRN) approaches. It was numerically shown that the behavior of each of the examined CRN approaches is highly dependent on basic system parameters. Furthermore, we studied the problem of rate-optimal receive BF and user selection, considering the uplink of a multi-user, unprioritized CRN. As the assumption of a channel state information (CSI) setting, whereby the involved channels would be merely instantaneously (resp. statistically) known is, to a great extent, optimistic (resp. pessimistic), we considered a mixed (combined) CSI scenario. Then, the problem of rate-optimal transmit BF for a MISO underlay CRN, assuming the existence of mixed CSI, was thereafter formulated. Concentrating on downlink communication, the goal of the system’s design was the maximization of the secondary system’s achievable ergodic capacity, subject to an average rate constraint imposed on primary communication. Continuing the investigation of the latter precoding problem with mixed, distributed channel knowledge, we developed a coordination scheme, according to which, the transmitters coordinate on the basis of statistical (covariance) information of the global channel. The proposed precoding strategy was shown to outperform conventional approaches taken from the literature. Finally, within a prioritized CRN framework, we proposed a pilot assignment algorithm.
2

Muti rituals and the biblical portrayal of child sacrifice

Ncala, Jackie N. January 2018 (has links)
The question addressed by this study would be to ask where there is any semantic overlap in the way in which on the one hand child sacrifices functioned in the OT and on the other hand how muti rituals function in contemporary South Africa. Do these different rituals function similarly, or not? In answering this question, this study will first provide a literature overview of how muti murders are described in academic literature and show the complexities of trying to understand African religion and culture. This is achieved by looking at the concept of muti rituals, its meaning, targeted victims (who are usually women and children) and development in history, from sacrifice in war times to sacrifice for material gain. In this section works from cultural anthropology are used to help form a clearer picture of what muti rituals are and how they function within society. The study then moves to how the practice of child sacrifice is portrayed in texts such as Genesis 22:1-19 (the binding of Isaac) and Judges 11:29-40 (Jephthah’s vow). Although many scholars chose to separate the sacrifices of Genesis 22 and Judges 11, this study will show that they should be read together since they share the common theme of burnt-offering. In the comparison it will become clear that both Abraham and Jephthah are fathers of an only child; their child is the single most precious thing they possess. Moreover, both accounts are of an etiological nature. The fact that both narratives are in the canon should be seen as an indication of the important contribution that they make to the theme of sacrifice. In a more general chapter, the concepts of sacrifice and offering are outlined and are both acknowledged as a form of worship. This is followed by an overview of the different types of sacrifices as outlined in the Levitical literature and their different occurrences, focusing on the burnt-offering. Rituals are therefore understood as a communicating and clarifying social reality and establishing it. These patterns are understood with the use of a Mesopotamian inscription about “The death of Gilgamesh” which shows that warfare and killing were necessary to maintain and establish order, prosperity and peace. A comparison between muti rituals and child sacrifice yields more differences than similarities. One of the major similarities is that a blessing is bestowed on the offerer, be it success in business, victory in war or the acquisition of land. The motif of sacrificing one for the greater good seems to be at play. The main difference between muti rituals and child sacrifice is that in muti rituals, the sacrifice is dedicated to ancestors while in child sacrifice they are dedicated to Yahweh. In muti rituals, the victim does not need to be related to the offerer but in both these texts; the victim is the only child, a special possession of the father. / Dissertation (MTh)--University of Pretoria, 2018. / NRF-Freestanding / Old Testament Studies / MTh / Unrestricted
3

One person's culture is another person's crime : a cultural defence in South African law? / Jacques Louis Matthee

Matthee, Jacques Louis January 2014 (has links)
The South African legal system is dualistic in nature with the one part consisting of the Western common law and the other consisting of African customary law. Although these two legal systems enjoy equal recognition, they regularly come into conflict with each other due to their divergent value systems. It is especially within the context of the South African criminal law that this conflict becomes apparent, because an accused's conduct can be viewed as lawful in terms of African customary law, but unlawful in terms of the South African common law. In such cases the accused may attempt to raise a cultural defence by putting forth evidence of his cultural background or values to convince the court that his prima facie unlawful conduct is actually lawful and that he should escape criminal liability. Alternatively, an accused may put forth evidence of his cultural background or values in an attempt to receive a lighter sentence. The question which therefore arises is whether a so-called "cultural defence" exists in the South African criminal law, and if so, what the influence of such a defence on the South African criminal law is. The conflict between African Customary law and the South African common law in the context of the criminal law arises due to the fact that the indigenous belief in witchcraft, (including witch-killings), the indigenous belief in the tokoloshe and the use of muti-medicine (including muti-murders), as well as the phenomenon of "necklacing" and the custom of ukuthwala can result in the commission of various common law crimes. In the case of witch-killings, the perpetrators can be charged with the common law crimes of murder or, if the victim survives, attempted murder, common assault or assault with intent to do grievous bodily harm. Similarly, necklacing, as a method used for killing witches, can also result in the commission of these common law crimes. What is more, the perpetrators of witch-killings can also be charged with the statutory crimes of accusing someone of witchcraft, pointing the victim out as being a witch or wizard or injuring a person based on information received from a traditional healer, or similar person. The indigenous belief in the tokoloshe can lead to the commission of the common law crimes of murder or, if the victim survives, common assault or assault with intent to do grievous bodily harm. The perpetrators of mutimurders can also face charges of murder or attempted murder, if the victim survives. The indigenous custom of ukuthwala can result in the commission of common law crimes such as abduction, kidnapping and common assault, as well as the statutory crime of rape. A perusal of South African case law dealing with the indigenous beliefs and customs above reveals that the accused in such cases have indeed attempted to put forth evidence of their indigenous beliefs or customs to persuade the criminal courts that they should escape criminal liability for a particular crime. In fact, these arguments were raised within the context of the existing common law defences such as private defence, necessity, involuntary conduct and a lack of criminal capacity. However, the South African criminal courts have up till now in general been unwilling to accept arguments of indigenous beliefs and customs to serve as a defence, either alone or within the context of the existing defences above, for the commission of a common law or statutory crime. They have, however, been more willing to accept evidence of an accused's indigenous belief or custom to serve as a mitigating factor during sentencing. The extent to which an accused's cultural background will serve as a mitigating factor will, of course, depend on the facts and circumstances of each case. As a result an accused who is charged with the commission of a culturally motivated crime has no guarantee that his cultural background and values will in fact be considered as a mitigating factor during his criminal trial. It is thus ultimately concluded that a so-called "cultural defence" does not exist in the South African Criminal law. The indigenous beliefs and customs above not only result in the commission of common law or statutory crimes, but also in the infringement of various fundamental human rights in the Constitution. Witch-killings result in the infringement of the constitutional right to life and the right to freedom and security of the person. However, witches and wizards who are persecuted for practising witchcraft are also denied their right to a fair trial entrenched in the Constitution. Similarly, muti-murders and necklacing also result in the infringement of the right to life and the right to freedom and security of the person entrenched in the Constitution. The custom of ukuthwala results in the infringement of the right to equality, the right to freedom and security of the person, the right to live in an environment that is not harmful to health or well-being, the right not to be subjected to slavery, servitude or forced labour, the right to basic education and other constitutional safeguards aimed at protecting children. In light of the constitutional right to freedom of culture and the right to freely participate in a cultural life of one's choosing the question can be asked whether the time has come to formally recognise a cultural defence in the South African criminal law. In this study it is argued that these constitutional rights do not warrant the formal recognition of a cultural defence. Instead, it is recommended that the conflict between African customary law and the South African common law can be resolved by bringing indigenous beliefs and customs in line with the values that underpin the Constitution as the supreme law of South Africa. Of course, this does not mean that the courts should ignore cultural considerations during a criminal trial if and when they arise. In fact, as pointed out in this study, the courts have a constitutional duty to apply African customary law when that law is applicable. It goes without saying that, when an accused attempts to escape criminal liability for his unlawful conduct by raising arguments of his cultural background, African customary law will be applicable and must be considered by the court. This in turn raises the question as to how the criminal courts can ensure that they give enough consideration to the possibility that an accused's criminal conduct was culturally motivated so as to comply with their constitutional mandate referred to above. Although it would be nearly impossible to formulate a perfect or flawless approach according to which a judicial officer can adjudicate criminal matters involving culturally motivated crimes, the author suggests the following practical approach which may provide some guidance to judicial officers in dealing with cases involving culturally motivated crimes: • Step 1: Consider whether the commission of the crime was culturally motivated or not. If it seems as though the accused did not commit a culturally motivated crime, the trial can continue on that basis. If, however, it is evident that the accused indeed committed a culturally motivated crime, step 2 follows. • Step 2: Once it has been determined that the commission of the crime was culturally motivated, the next step is to determine which indigenous belief or custom led to the commission of the crime. Once the relevant indigenous belief or custom has been identified, step 3 follows. • Step 3: When it is clear which indigenous belief or custom led to the accused's commission of the crime, the next step is to determine whether arguments pertaining to that particular indigenous belief or custom may be raised within the context of the existing defences in the South African Criminal law in order to exclude the accused's criminal liability. If an accused relies on one of the existing defences in the South African criminal law, he will have to lay a proper evidential foundation for his defence before the court. In assessing the evidence put forth by the accused, the judicial officer must consider the judgment and reasoning in previous cases dealing with the particular indigenous belief or custom. A judicial officer must also consider the values underpinning the Constitution when conducting such an assessment. If a judicial officer upholds an accused's defence, the accused is acquitted. However, if the judicial officer rejects an accused's defence, the accused must be convicted and step 4 follows. • Step 4: Once an accused has been convicted, a court should consider whether arguments of his cultural background can serve as an extenuating circumstance, mitigating the punishment to be imposed on him. However, the practical approach above merely serves as a suggestion to judicial officers in dealing with culturally motivated crimes and ultimately it will be up to the judiciary to develop both the Western common law and African customary law to resolve the criminal law conflicts between these two legal systems. The research for this study was concluded in November 2013. / LLD, North-West University, Potchefstroom Campus, 2014
4

One person's culture is another person's crime : a cultural defence in South African law? / Jacques Louis Matthee

Matthee, Jacques Louis January 2014 (has links)
The South African legal system is dualistic in nature with the one part consisting of the Western common law and the other consisting of African customary law. Although these two legal systems enjoy equal recognition, they regularly come into conflict with each other due to their divergent value systems. It is especially within the context of the South African criminal law that this conflict becomes apparent, because an accused's conduct can be viewed as lawful in terms of African customary law, but unlawful in terms of the South African common law. In such cases the accused may attempt to raise a cultural defence by putting forth evidence of his cultural background or values to convince the court that his prima facie unlawful conduct is actually lawful and that he should escape criminal liability. Alternatively, an accused may put forth evidence of his cultural background or values in an attempt to receive a lighter sentence. The question which therefore arises is whether a so-called "cultural defence" exists in the South African criminal law, and if so, what the influence of such a defence on the South African criminal law is. The conflict between African Customary law and the South African common law in the context of the criminal law arises due to the fact that the indigenous belief in witchcraft, (including witch-killings), the indigenous belief in the tokoloshe and the use of muti-medicine (including muti-murders), as well as the phenomenon of "necklacing" and the custom of ukuthwala can result in the commission of various common law crimes. In the case of witch-killings, the perpetrators can be charged with the common law crimes of murder or, if the victim survives, attempted murder, common assault or assault with intent to do grievous bodily harm. Similarly, necklacing, as a method used for killing witches, can also result in the commission of these common law crimes. What is more, the perpetrators of witch-killings can also be charged with the statutory crimes of accusing someone of witchcraft, pointing the victim out as being a witch or wizard or injuring a person based on information received from a traditional healer, or similar person. The indigenous belief in the tokoloshe can lead to the commission of the common law crimes of murder or, if the victim survives, common assault or assault with intent to do grievous bodily harm. The perpetrators of mutimurders can also face charges of murder or attempted murder, if the victim survives. The indigenous custom of ukuthwala can result in the commission of common law crimes such as abduction, kidnapping and common assault, as well as the statutory crime of rape. A perusal of South African case law dealing with the indigenous beliefs and customs above reveals that the accused in such cases have indeed attempted to put forth evidence of their indigenous beliefs or customs to persuade the criminal courts that they should escape criminal liability for a particular crime. In fact, these arguments were raised within the context of the existing common law defences such as private defence, necessity, involuntary conduct and a lack of criminal capacity. However, the South African criminal courts have up till now in general been unwilling to accept arguments of indigenous beliefs and customs to serve as a defence, either alone or within the context of the existing defences above, for the commission of a common law or statutory crime. They have, however, been more willing to accept evidence of an accused's indigenous belief or custom to serve as a mitigating factor during sentencing. The extent to which an accused's cultural background will serve as a mitigating factor will, of course, depend on the facts and circumstances of each case. As a result an accused who is charged with the commission of a culturally motivated crime has no guarantee that his cultural background and values will in fact be considered as a mitigating factor during his criminal trial. It is thus ultimately concluded that a so-called "cultural defence" does not exist in the South African Criminal law. The indigenous beliefs and customs above not only result in the commission of common law or statutory crimes, but also in the infringement of various fundamental human rights in the Constitution. Witch-killings result in the infringement of the constitutional right to life and the right to freedom and security of the person. However, witches and wizards who are persecuted for practising witchcraft are also denied their right to a fair trial entrenched in the Constitution. Similarly, muti-murders and necklacing also result in the infringement of the right to life and the right to freedom and security of the person entrenched in the Constitution. The custom of ukuthwala results in the infringement of the right to equality, the right to freedom and security of the person, the right to live in an environment that is not harmful to health or well-being, the right not to be subjected to slavery, servitude or forced labour, the right to basic education and other constitutional safeguards aimed at protecting children. In light of the constitutional right to freedom of culture and the right to freely participate in a cultural life of one's choosing the question can be asked whether the time has come to formally recognise a cultural defence in the South African criminal law. In this study it is argued that these constitutional rights do not warrant the formal recognition of a cultural defence. Instead, it is recommended that the conflict between African customary law and the South African common law can be resolved by bringing indigenous beliefs and customs in line with the values that underpin the Constitution as the supreme law of South Africa. Of course, this does not mean that the courts should ignore cultural considerations during a criminal trial if and when they arise. In fact, as pointed out in this study, the courts have a constitutional duty to apply African customary law when that law is applicable. It goes without saying that, when an accused attempts to escape criminal liability for his unlawful conduct by raising arguments of his cultural background, African customary law will be applicable and must be considered by the court. This in turn raises the question as to how the criminal courts can ensure that they give enough consideration to the possibility that an accused's criminal conduct was culturally motivated so as to comply with their constitutional mandate referred to above. Although it would be nearly impossible to formulate a perfect or flawless approach according to which a judicial officer can adjudicate criminal matters involving culturally motivated crimes, the author suggests the following practical approach which may provide some guidance to judicial officers in dealing with cases involving culturally motivated crimes: • Step 1: Consider whether the commission of the crime was culturally motivated or not. If it seems as though the accused did not commit a culturally motivated crime, the trial can continue on that basis. If, however, it is evident that the accused indeed committed a culturally motivated crime, step 2 follows. • Step 2: Once it has been determined that the commission of the crime was culturally motivated, the next step is to determine which indigenous belief or custom led to the commission of the crime. Once the relevant indigenous belief or custom has been identified, step 3 follows. • Step 3: When it is clear which indigenous belief or custom led to the accused's commission of the crime, the next step is to determine whether arguments pertaining to that particular indigenous belief or custom may be raised within the context of the existing defences in the South African Criminal law in order to exclude the accused's criminal liability. If an accused relies on one of the existing defences in the South African criminal law, he will have to lay a proper evidential foundation for his defence before the court. In assessing the evidence put forth by the accused, the judicial officer must consider the judgment and reasoning in previous cases dealing with the particular indigenous belief or custom. A judicial officer must also consider the values underpinning the Constitution when conducting such an assessment. If a judicial officer upholds an accused's defence, the accused is acquitted. However, if the judicial officer rejects an accused's defence, the accused must be convicted and step 4 follows. • Step 4: Once an accused has been convicted, a court should consider whether arguments of his cultural background can serve as an extenuating circumstance, mitigating the punishment to be imposed on him. However, the practical approach above merely serves as a suggestion to judicial officers in dealing with culturally motivated crimes and ultimately it will be up to the judiciary to develop both the Western common law and African customary law to resolve the criminal law conflicts between these two legal systems. The research for this study was concluded in November 2013. / LLD, North-West University, Potchefstroom Campus, 2014
5

DESIGN OF ALGORITHMS TO ASSOCIATE SENSOR NODES TO FUSION CENTERS USING QUANTIZED MEASUREMENTS

Vudumu, Sarojini January 2023 (has links)
Wireless sensor networks (WSNs) typically consist of a significant number of inexpensive sensor nodes, each of which is powered by a battery or another finite energy source that is difficult to replace because of the environment they are in or the cost of doing so. The applications of WSNs include military surveillance, disaster management, target tracking and monitoring environmental conditions. In order to increase the lifespan of WSNs, energy-efficient sensing and communication approaches for sensor nodes are essential. Recently, there has been an increase in interest in using unmanned aerial vehicles (UAVs) as portable data collectors for ground sensor nodes in WSN. Several approaches to solving effective communication between sensor nodes and the fusion center have been investigated in this thesis. Because processing, sensing range, transmission bandwidth, and energy consumption are always limited, it is beneficial not to use all the information provided at each sensor node in order to prolong its life span and reduce communication costs. In order to address this problem, first, efficient measurement quantization techniques are proposed using a single fusion center and multiple sensors. The dynamic bit distribution is done among all the sensors and within the measurement elements. The problem is then expanded to include multiple fusion centers, and a novel algorithm is proposed to associate sensors to fusion centers. The bandwidth distribution for targets which are being monitored by several sensors is addressed. Additionally, how to use the situation in which the sensors are in the coverage radius of multiple fusion centers in order to share the targets between them is discussed. Finally, performance bounded data collection algorithms are proposed where the necessary accuracy for each target is specified. In order to determine the minimum number of data collectors needed and their initial placement, an algorithm is proposed. When there are fewer fixed data collectors than there are regions to collect the data from, a coverage path planning method is developed. Since the optimal solution requires an enormous computational requirement and not realistic for real-time online implementation, approximate algorithms are proposed for multi-objective integer optimization problems. In order to assess each suggested algorithm's effectiveness, many simulated scenarios are used together with baselines and simple existing methods. / Thesis / Doctor of Philosophy (PhD)
6

Data-Driven Modeling and Model Predictive Control of Semicontinuous Distillation Process

Aenugula, Sakthi Prasanth January 2023 (has links)
Data-driven model predictive control framework of semicontinuous distillation process / Distillation technology is one of the most sought-after operations in the chemical process industries. Countless research has been done in the past to reduce the cost associated with distillation technology. As a result of process intensification, a semicontinuous distillation system is proposed as an alternative for purifying the n-component mixture (n>=3) which has the advantage over both batch and continuous process for low to medium production rates. A traditional distillation setup requires n-1 columns to separate the components to the desired purity. However, a semicontinuous system performs the same task by integrating a distillation column with n-2 middle vessel (storage tank). Consequently, with lower capital cost, the total annualized cost (TAC) per tonne of feed processed is less for a semicontinuous system compared to a traditional setup for low to medium throughput. Yet, the operating cost of a semicontinuous system exceed those of the conventional continuous setup. Semicontinuous system exhibits a non-linear dynamic behavior with a cyclic steady state and has three modes of operation. The main goal of this thesis is to reduce the operating cost per tonne of feed processed which leads to lower TAC per tonne of feed processed using a model predictive control (MPC) scheme compared to the existing PI configuration This work proposes a novel multi-model technique using subspace identification to identify a linear model for each mode of operation without attaining discontinuity. Subsequently, the developed multi-model framework was implemented in a shrinking horizon MPC architecture to reduce the TAC/tonne of feed processed while maintaining the desired product purities at the end of each cycle. The work uses Aspen Plus Dynamics simulation as a test bed to simulate the semicontinuous system and the shrinking horizon MPC scheme is formulated in MATLAB. VBA is used to communicate the inputs from MPC in MATLAB to the process in Aspen Plus Dynamics. / Thesis / Master of Science in Chemical Engineering (MSChE)
7

Reliability Assessment for Complex Systems Using Multi-level, Multi-type Reliability Data and Maximum Likelihood Method

Li, Xiangfei 24 September 2014 (has links)
No description available.
8

Développement d'outils de contrôle et d’analyse pour l'optimisation et la gestion de l'énergie pour système multiénergie / Development monitoring and analysis tools for optimization and energy management for multi-energy system

Mehdary, Adil 03 October 2013 (has links)
Le but de ce travail consiste à concevoir et développer des outils de commande et de contrôle pour des systèmes à structures variables comprenant plusieurs sources d’énergie (photovoltaïque, éolienne…). L’approche proposée vise à développer les modèles appropriés pour la commande et la gestion de chaque partie du système. Les différents modèles tiendront comptes du caractère aléatoire de la production d’énergie issue des différentes sources en présence tout en veillant à assurer une gestion globale optimale. L’intérêt principal d’un tel système est la cohabitation des ressources et du stockage dans le but de sécuriser l’approvisionnement au consommateur. La thèse traite trois phases principales : Une phase de modélisation et de mise en place des commandes, suivies d’une phase de simulation puis une phase de validations et de tests. Ainsi le modèle de chaque sous-système de production a été élaboré en tenant compte des différentes caractéristiques (physique et géométrique) de la source considérée, pour la partie commande et contrôle des approches classiques en automatique ont été appliqué afin d’assurer la maximisation de la production, la stabilité de l’ensemble et le bon fonctionnement du système. Une fois les commandes validées, nous avons procédés à des simulations Hardware In the Loop, en implémentant les stratégies de maximisation d'énergie sur la banc d'essai en temps réel, et ce à l'aide d'une carte DSPACE1104, puis nous avons assemblés les différentes sources d'énergies en les couplant via le programme de gestion d'énergie proposé et mis au point. / The objective of this work is to design and develop tools for monitoring and control systems with variable structures with multiple energy sources (wind, solar, ...). The proposed approach aims to develop appropriate models for the control and management of each part of the system. The different models take into account of the random nature of the production of energy outcome from different available sources, while ensuring optimum overall management of system. The main advantage of this system is the coexistence of resources and storage system in order to secure the supply to the consumer. The thesis deals with three main phases: a phase of modeling and implementation of controls, followed by a simulation phase and a phase of validation and testing. So the model of each subsystem production was developed with consideration of its different characteristics (physical and geometrical), for the control section conventional approaches were applied automatically to ensure the maximization of the production, the stability of the assembly and the functioning of the system. for the part concerning the management and control, conventional approaches in automatic have been applied to ensure the maximization of production, the stability of the overall system and its proper functioning. Once control strategies validated, we have processed in simulations Hardware In the Loop, by implementing strategies to maximize energy on the benchmark in real time, using a DSPACE1104 card, then we assembled the different sources of energy by coupling them through the program of energy management proposed and developed.
9

Nouvelles méthodes de diagnostic, de contrôle et de surveillance de la tuberculose à bacilles sensibles ou multirésistants dans les pays à forte co-infection au VIH : applications en Santé Publique / New methods for diagnosis, control and surveillance of susceptible or multi-drug resistant tuberculosis in countries with high HIV co-infection : public Health applications

Gomgnimbou, Kireopori michel 27 September 2013 (has links)
La tuberculose est une maladie ancienne et ré-émergente qui constitue un véritable problème de santé publique dans le monde. L’émergence de la tuberculose à souches de M. tuberculosis multirésistantes et ultrarésistantes aux antituberculeux en plus de la pandémie du VIH/Sida, représentent un défi majeur dans la lutte contre la tuberculose pour son contrôle et son élimination. Ce contrôle de la tuberculose nécessite des mesures en santé publique et au niveau de l’individu. Ces mesures concernent la disponibilité et l’accessibilité à des tests de diagnostic rapides, des traitements efficaces et des outils de surveillance et de contrôle.Nos travaux concernent la recherche, le développement et la validation de méthodes moléculaires multiplexées, souvent basées sur le polymorphisme des loci CRISPR (Clustered Regularly Interspersed Palindromic Repeats). Elles sont rapides, à haut débit, moins onéreuses et applicables pour la santé publique (transmission de la tuberculose sensible et multirésistante, évaluation des programmes nationaux de tuberculose) mais aussi pour un meilleur diagnostic dans l’intérêt du patient (antibiogramme moléculaire, identification infra-spécifique). C’est ainsi que nous avons développé et validé le spoligoriftyping (méthode de génotypage combiné à la détection moléculaire de la résistance de M. tuberculosis à la rifampicine), le “TB-SPRINT” (Spoligoriftyping plus la détection moléculaire de la résistance à l’isoniazide) et le sous-typage de M. africanum. Ces différentes méthodes, aux performances (sensibilité/spécificité) satisfaisantes (99/100% pour le spoligoriftyping, 95/100% en moyenne pour le “TB-SPRINT”) ont servi à des études d’épidémiologie moléculaire dans des pays comme le Pakistan, le Nigéria et le Brésil. D’autres travaux en cours portent sur le génotypage basé sur les CRISPR d’autres espèces (Salmonella enterica, Legionella pneumophila) et sur des études de génomique comparative. Nos tests, utilisés en routine, replacent le laboratoire au cœur de la lutte anti-tuberculeuse et permettront d’importantes avancées en Santé Publique et Microbiologie médicale et environnementale. / Tuberculosis (TB) remains a major public health concern worldwide despite all the efforts to fight this disease. The emergence of multi drug and extensively drug resistant TB and the pandemic of HIV/AIDS constitute major threats and challenge for the TB control and eradication. TB control requires measures in public health and in individual level as accessibility to tests for early diagnostic, effective treatment and tools for tuberculosis surveillance and control.The goals of this work were research, development and validation of new molecular multiplexed methods based on polymorphism of the CRISPR (Clustered Regularly Interspersed Palindromic Repeats) loci and single nucleotides polymorphisms. These methods are rapid, high throughput, cheap and can be applied both for public health purposes (transmission of susceptible and multi-drug resistant tuberculosis, evaluation of national TB programs) as for interest of TB patient (drug resistance testing, infra-specific identification). Thus we developed spoligoriftyping and “TB-SPRINT” tests that allow genotyping and rifampicin or rifampicin and isoniazide resistance detection. Another test was developed for subtyping of M. africanum. All these methods had high performances (sensitivity/specificity), 99/100% for the spoligoriftyping and about 95/100% for the “TB-SPRINT” and were applied for molecular epidemiology studies of countries as Nigeria, Brazil and Pakistan. Other ongoing work and developments of genotyping methods are the spoligotyping of L. pneumophila and S. enterica and comparative genomics projects.Used in routine, our methods may play key roles in TB control and would allow important advances in Public Health, in medical and environmental Microbiology.
10

An Interconnection Network for a Cache Coherent System on FPGAs

Mirian, Vincent 12 January 2011 (has links)
Field-Programmable Gate Arrays (FPGAs) systems now comprise many processing elements that are processors running software and hardware engines used to accelerate specific functions. To make the programming of such a system simpler, it is easiest to think of a shared-memory environment, much like in current multi-core processor systems. This thesis introduces a novel, shared-memory, cache-coherent infrastructure for heterogeneous systems implemented on FPGAs that can then form the basis of a shared-memory programming model for heterogeneous systems. With simulation results, it is shown that the cache-coherent infrastructure outperforms the infrastructure of Woods [1] with a speedup of 1.10. The thesis explores the various configurations of the cache interconnection network and the benefit of the cache-to-cache cache line data transfer with its impact on main memory access. Finally, the thesis shows the cache-coherent infrastructure has very little overhead when using its cache coherence implementation.

Page generated in 0.0622 seconds