• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 120
  • 8
  • 8
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 158
  • 81
  • 80
  • 79
  • 57
  • 53
  • 45
  • 44
  • 33
  • 31
  • 18
  • 16
  • 16
  • 15
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Relationship between dimensions and charateristics of family and school adjustment of form one students in Shatin /

Tang Poon, Shun-lin, Polly. January 1992 (has links)
Thesis (M. Soc. Sc.)--University of Hong Kong, 1992.
142

Transport system and retail activities : shopping centres in Hong Kong /

Tsang, Sau-kam, Karmen. January 1998 (has links)
Thesis (M. Hous. M.)--University of Hong Kong, 1999. / Includes bibliographical references.
143

Transport system and retail activities shopping centres in Hong Kong /

Tsang, Sau-kam, Karmen. January 1998 (has links)
Thesis (M.Hous.M.)--University of Hong Kong, 1999. / Includes bibliographical references. Also available in print.
144

Relationship between dimensions and charateristics of family and school adjustment of form one students in Shatin

Tang Poon, Shun-lin, Polly. January 1992 (has links)
Thesis (M.Soc.Sc.)--University of Hong Kong, 1992. / Also available in print.
145

Akcelerace vektorových a krytografických operací na platformě x86-64 / Acceleration of Vector and Cryptographic Operations on x86-64 Platform

Šlenker, Samuel January 2017 (has links)
The aim of this thesis was to study and subsequently process a comparison of older and newer SIMD processing units of modern microprocessors on the x86-64 platform. The thesis provides an overview of the fastest computations of vector operations with matrices and vectors, including corresponding source codes. Furthermore, the thesis is focused on authenticated encryption, specifically on block cipher AES operating in Galois Counter Mode, and on a discussion of possibilities of instruction sets for cryptographic support.
146

Contrast between two Japanese images, two identities : comparison of Sayonara, Zai-jian and My Diary of Japanomania

Lin, Cheng-Ying, 1973- January 2006 (has links)
No description available.
147

Multi-Agent Trajectory Planning for Nonholonomic UAVs

Maass, Oscar, Vallgren, Theodor January 2024 (has links)
The rising interest in autonomous systems has emphasized the significance of effective path and motion planning, particularly in coordinating multiple Unmanned Areal Vehicles (UAVs) in missions. An important research field is the problem of Multi-Agent Path Finding (MAPF), in which the objective is to find collision-free paths for multiple agents simultaneously. Various algorithms, categorized into optimal, bounded sub-optimal, and unbounded sub-optimal solvers, have been investigated in order to address MAPF problems. However, recent attention has shifted towards MAPF with kinematic constraints, particularly focusing on nonholonomic agents like cars and fixed-wing UAVs. These nonholonomic agents, distinguished by their motion constraints, require specialized methods for trajectory planning.  To investigate the potential of MAPF with nonholonomic agents, two MAPF algorithms have been implemented, incorporating the kinematic constraints of a fixed-wing UAV. The first algorithm is a UAV-like Conflict-Based Search (CBS) algorithm, belonging to the optimal MAPF solver class, and is based on a Car-like CBS algorithm. The second algorithm is a Prioritized Planner, belonging to the search-based MAPF solver class. Both algorithms utilize a common single-agent search algorithm, the Spatiotemporal Hybrid A* (SHA*), which has been enhanced to incorporate a kinematic bicycle model. This enhancement allows for a greater variety of motions, creates feasible paths for fixed-wing UAVs, and enables control over acceleration and steering rates. A comparison of the two MAPF algorithms was conducted for three different map instances. Furthermore, the use of weighted heuristics, resampling and distance-based priority have been implemented and simulated with the Prioritized Planner. Additionally, two methods of simultaneous arrival have been implemented using the UAV-like CBS, where agents have a fixed time of arrival and a variable time of arrival. The results from the simulations confirm the trade-offs between both MAPF algorithms concerning solution quality, success rate and runtime. The UAV-like CBS is capable of finding solutions of higher quality, while the Prioritized Planner is faster at finding solutions and more efficient for an increasing number of agents. However, the performance of the two algorithms varied significantly, depending on the scenario. The thesis concludes that both algorithms can be utilized for MAPF with nonholonomic fixed-wing UAVs, and that the UAV-like CBS is the best choice for a lower amount of agents, while the Prioritized Planner is preferable for a higher amount of agents. The priority of the agents has been shown to be important, and by allowing resampling, the success rate of the Prioritized Planner can be increased significantly. Additionally, simultaneous arrival at the goal position can be achieved optimally for the UAV-like CBS by solving the problem backwards.
148

License Management for EBITool

Krznaric, Anton January 2013 (has links)
This degree project deals with license management for EBITool. It´s about providing protection and monitoring for a Java Application via a license server, and the construction of it. An analysis that discusses the approach and other possible courses of action is also included. Additionally, it covers a discussion of a prototype implementation of the model solution from the analysis. The prototype is a Java EE application that deploys to JBoss AS7. It´s developed using the JBoss Developer Studio 5.0.0, an Eclipse IDE with JBoss Tools preinstalled. It exposes web services to Java Applications through SOAP via JAX-WS. Using Hibernate, the web service Enterprise Java Beans get access to a PostgreSQL 9.1 database via entity classes mapped to the database through the Java Persistence API.
149

Fault Tolerant Cryptographic Primitives for Space Applications

Juliato, Marcio January 2011 (has links)
Spacecrafts are extensively used by public and private sectors to support a variety of services. Considering the cost and the strategic importance of these spacecrafts, there has been an increasing demand to utilize strong cryptographic primitives to assure their security. Moreover, it is of utmost importance to consider fault tolerance in their designs due to the harsh environment found in space, while keeping low area and power consumption. The problem of recovering spacecrafts from failures or attacks, and bringing them back to an operational and safe state is crucial for reliability. Despite the recent interest in incorporating on-board security, there is limited research in this area. This research proposes a trusted hardware module approach for recovering the spacecrafts subsystems and their cryptographic capabilities after an attack or a major failure has happened. The proposed fault tolerant trusted modules are capable of performing platform restoration as well as recovering the cryptographic capabilities of the spacecraft. This research also proposes efficient fault tolerant architectures for the secure hash (SHA-2) and message authentication code (HMAC) algorithms. The proposed architectures are the first in the literature to detect and correct errors by using Hamming codes to protect the main registers. Furthermore, a quantitative analysis of the probability of failure of the proposed fault tolerance mechanisms is introduced. Based upon an extensive set of experimental results along with probability of failure analysis, it was possible to show that the proposed fault tolerant scheme based on information redundancy leads to a better implementation and provides better SEU resistance than the traditional Triple Modular Redundancy (TMR). The fault tolerant cryptographic primitives introduced in this research are of crucial importance for the implementation of on-board security in spacecrafts.
150

Traffic in Hong Kong new towns

Chan, Hok-kan, Eric., 陳學勤. January 2001 (has links)
published_or_final_version / Transport Policy and Planning / Master / Master of Arts in Transport Policy and Planning

Page generated in 0.0461 seconds