• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 63
  • 21
  • 21
  • 17
  • 15
  • 15
  • 7
  • 4
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 196
  • 44
  • 30
  • 29
  • 26
  • 26
  • 26
  • 23
  • 21
  • 19
  • 17
  • 16
  • 15
  • 15
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

PDF - Ein überflüssiges Format?

Köbe, Rolf 18 September 1998 (has links) (PDF)
Vortrag UNIX-Stammtisch 05/98
2

SCALABLE TEST GENERATION FOR PATH DELAY FAULTS

Flanigan, Edward 01 January 2009 (has links)
Modern day IC design has drawn a lot of attention towards the path delay fault model (PDF) [1], which targets delay defects that affect the timing characteristics of a circuit. Due to the exponential number of paths in modern circuits a subset of critical paths are chosen for testing purposes [2]. Path intensive circuits contain a large number of critical paths whose delays affect the performance of the circuit. This dissertation presents three techniques to improve test generation for path delay faults. The first technique presented in this dissertation avoids testing unnecessary paths by using arithmetic operations. This second technique shows how to compact many faults into a single test application, thus saving valuable test application time. The third technique demonstrates how to generate tests under modern day scan architectures. Experimental results demonstrate the effectiveness of the proposed techniques.
3

Formularmanagement

Riedel, Wolfgang 22 August 2003 (has links)
Der Artikel stellt dar, wie Formulare für Beantragungs- und Verwaltungszwecke in elektronischer Form nutzerfreundlich gestaltet und angeboten werden können.
4

Driver Behaviour Clustering Using Discrete PDFs and Modified Markov Algorithm

Kartashev, K., Doikin, Aleksandr, Campean, Felician, Uglanov, A., Abdullatif, Amr R.A., Zhang, Q., Angiolini, E. 10 December 2021 (has links)
No / This paper presents a novel approach for probabilistic clustering, motivated by a real-world problem of modelling driving behaviour. The main aim is to establish clusters of drivers with similar journey behaviour, based on a large sample of historic journeys data. The proposed approach is to establish similarity between driving behaviours by using the Kullback-Leibler and Jensen-Shannon divergence metrics based on empirical multi-dimensional probability density functions. A graph-clustering algorithm is proposed based on modifications of the Markov Cluster algorithm. The paper provides a complete mathematical formulation, details of the algorithms and their implementation in Python, and case study validation based on real-world data.
5

Nástroj pro transformace dokumentů PDF / Tool for PDF Document Transformation

Šústek, Ladislav January 2008 (has links)
Result of my diploma work is library for Java programming language. Which transform PDF to XHTML files using by open source library PDFBox and FONTBox. Final XHTML file is made by CSS style which allows its easier modification. Library extracts text, images and graphic objects from PDF.
6

DETECTING PDF JAVASCRIPT MALWARE USING CLONE DETECTION

Karademir, SARUHAN 02 October 2013 (has links)
One common vector of malware is JavaScript in Adobe Acrobat (PDF) files. In this thesis, we investigate using near-miss clone detectors to find this malware. We start by collecting a set of PDF files containing JavaScript malware and a set with clean JavaScript from the VirusTotal repository. We use the NiCad clone detector to find the classes of clones in a small subset of the malicious PDF files. We evaluate how clone classes can be used to find similar malicious files in the rest of the malicious collection while avoiding files in the benign collection. Our results show that a 10% subset training set produced 75% detection of previously known malware with 0% false positives. We also used the NiCad as a pattern matcher for reflexive calls common in JavaScript malware. Our results show a 57% detection of malicious collection with no false positives. When the two experiments’ results are combined, the total coverage of malware rises to 85% and maintains 100% precision. The results are heavily affected by the third-party PDF to JavaScript extractor used. When only successfully extracted PDFs are considered, recall increases to 99% and precision remains at 100%. / Thesis (Master, Electrical & Computer Engineering) -- Queen's University, 2013-09-30 11:50:15.156
7

PDF Eagle : A PDF viewer in Qt

Gustavsson, Lukas January 2012 (has links)
To keep up in the rapidly changing market for smart mobile phones, newways of consuming information is needed. In this master thesis project aPortable Document Format (PDF) viewer with more features than existingPDF viewers for Symbian^3 was developed, called PDF Eagle. PDF Eaglewas implemented using the Qt framework, allowing it to be easily ported todierent platforms. PDF documents have a rich structure and to be fullycompatible with the standard and at the same time responsive enough to berun on a mobile platform is a formidable technical challenge. This reportdescribes the issues that had to be resolved all the way to a functioning "app"that was marketed on the Nokia market in October 2011 with a great success.Among the technical challenges was a way to correctly render coloured objectsin PDFs. A gradient is a way to colour an area in a PDF le. Results of testsshowed that PDF Eagle is more capable of handling gradients, shadows andencrypted PDF les compared to other mobile PDF viewers. The conclusion ofthis report is that PDF Eagle is on par with or outmatches other PDF viewerson the targeted platform. This work also shows the feasibility of incrementallydownloading the pages of a PDF le which provides a better user experienceby faster viewing.
8

Adobe Acrobat fuer Windows

Wunderlich, Jan 07 May 1997 (has links)
Diese Arbeit beschaeftigt sich mit dem Softwarepaket Adobe Acrobat fuer Windows 3.xx. Die ersten Kapitel geben eine Uebersicht ueber die Komponenten Reader, Exchange und Distiller. Dabei werden alle angebotenen Funktionen und Moeglichkeiten dieser Komponenten erlaeutert. Weiterhin erfolgt eine Gegenueberstellung der Formatbeschreibungen PDF und Postscript. Abschliessend habe ich die gebotenen Moeglichkeiten des Softwarepaketes untersucht und bewertet. Zur Untermalung meiner Ergebnisse wurden im Rahmen meiner Studienarbeit zwei Beispieldokumente erarbeitet. Alle erstellten Dokumente sind als Postscript-Dateien erhaeltlich.
9

Iterative receivers for interference cancellation and suppression in wireless communications

Veselinovic, N. (Nenad) 29 November 2004 (has links)
Abstract The performance of conventional receivers for wireless communications may severely deteriorate in the presence of unaccounted interference. The effectiveness of methods for mitigating these effects greatly depends on the knowledge that is available about the interference and signal-of-interest (SOI), therefore making the design of robust receivers a great challenge. This thesis focuses on receiver structures for channel coded systems that exploit different levels of knowledge about the SOI and interference in an iterative fashion. This achieves both robustness and overall performance improvement compared to non-iterative receivers. Code division multiple access (CDMA) and spatial division multiple access (SDMA) systems are considered. The overlay of a turbo coded direct-sequence spread-spectrum (DS-SS) system and strong digitally modulated tone interference is studied. An iterative receiver, which is capable of blind cancellation of both wideband and narrowband interference is proposed based on the adaptive self-reconfigurable -filter scheme. Asymptotic performance analysis of the iterative receiver shows that significant iteration gains are possible if the signal-to-interference-plus-noise-ratio (SINR) is relatively large and the processing gain (PG) of the SOI is relatively small. Robust diversity detection in turbo-coded DS-SS system with statistically modeled interference is studied. A non-parametric type-based iterative receiver that estimates the probability density function (PDF) of interference-plus-noise is proposed. Its performance is shown to be rather robust to the number of interferers and their distances from the victim receiver and very similar to the performance of a clairvoyant receiver. Amazingly, this is achievable with no prior knowledge about the interference parameters. Furthermore, iteration gain is shown to significantly reduce the length of the pilot sequence needed for the PDF estimation. A family of iterative minimum-mean-squared-error (MMSE) and maximum-likelihood (ML) receivers for convolutionally and space-time coded SDMA systems is proposed. Joint iterative multiuser-detection (MUD), equalization and interference suppression are proposed to jointly combat co-channel interference (CCI), inter-symbol-interference (ISI) and unknown CCI (UCCI) in broadband single-carrier systems. It is shown that both in convolutional and space-time coded systems the ISI and CCI interference can be completely eliminated if UCCI is absent. This is achievable with a number of receive antennas equal to the number of users of interest and not to the total number of transmit antennas. In case UCCI is present, the effectiveness of CCI and ISI cancellation and UCCI suppression depends on the effective degrees of freedom of the receiver. Receiver robustness can be significantly preserved by using hybrid MMSE/ML detection for the signals of interest, or by using estimation of the PDF of the UCCI-plus-noise. A low complexity hybrid MMSE/ML iterative receiver for SDMA is proposed. It is shown that its performance is not significantly degraded compared to the optimal ML receiver. Its sensitivity to spatial correlation and a timing offset is assessed by using field measurement data. It was shown that the hybrid MMSE/ML receiver is robust against spatial correlation. The sensitivity to the timing offset is significantly reduced if the receiver performs UCCI suppression.
10

Länkade 3D-modeller för ökad förståelse mellan konstruktörer och byggnadsarbetare

Johansson, Christian January 2020 (has links)
Det kommer hela tiden ut nya verktyg och arbetssätt till byggbranschen, men det är inte alltid säkert att dessa behövs eller är gynnsamma att använda. Användandet av 3D-modeller och BIM i byggbranschen har undersökts relativt mycket, men relativt få studier har gjorts för nya alternativa användningsområden av branschens befintliga 3D-verktyg. Detta examensarbete går ut på att undersöka om 3D-modeller för specifika områden i ett projekt kan vara ett intressant komplement till traditionella 2D-ritningar för att öka förståelse för den som läser ritningen. Tekniken som användes var Tech Soft 3D:s applikation 3D PDF Reader som gör det möjligt att läsa 3D-PDF:er direkt i en mobil eller surfplatta, men modellerna går också att nyttja på en dator om man vill det. De yrkesgrupper som studeras är byggnadsarbetare och konstruktörer samt kommunikationen däremellan.   För att utreda 3D-PDF:ernas användningsområde gjordes en kvalitativ studie med semistrukturerade intervjuer. Det fördes intervjuer med tre byggnadsarbetare och tre konstruktörer. Under intervjuerna fick deltagarna testa tekniken med tre olika 3D-modeller för att skapa en uppfattning om hur tekniken skulle kunna användas i olika projekt. En litteraturstudie gjordes också för att samla in kunskap att jämföra och analysera med resultatet från intervjuerna.   Respondenterna tyckte att 3D-modellerna vara lättare att förstå och smidiga att använda. Vid hög komplexitet kan det t.o.m. vara lättare att redovisa med 3D-modeller än med 2D-ritningar. Dock ansåg konstruktörerna att det kan finnas en risk att dessa 3D-PDF:er glöms bort att uppdateras, eftersom de är fristående. Dessa 3D-PDF:erna anses ha potential att bidra till en mer effektiv process för de som anammar verktyget, men med hänsyn till den bl a juridiska risken kommer de mest troligt inte användas som en handling, utan som ett komplement till 2D-ritninngarna för att enklare skapa en uppfattning om situationen i fråga.

Page generated in 0.0117 seconds