• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 603
  • 285
  • 85
  • 61
  • 40
  • 18
  • 17
  • 16
  • 16
  • 16
  • 15
  • 12
  • 6
  • 5
  • 5
  • Tagged with
  • 1347
  • 236
  • 168
  • 163
  • 140
  • 124
  • 110
  • 109
  • 103
  • 93
  • 90
  • 90
  • 89
  • 82
  • 81
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
321

詞義相似度的社會網路分析研究 / A study on word similarity with social network analysis

溫文喆 Unknown Date (has links)
社會網路分析(social network analysis)將社會關係以網路形式表示,從原本純粹分析社會互動的工具,到近年來被廣泛被應用在社會學、組織研究、資訊科學、生物學、語言學等各種領域,藉由引入數學圖學理論與與日益精進的電腦處理能力,使得社會網路分析能從有別於以往的角度找出個體間行動的規律;而詞義相似度(word similarity)是資訊檢索等技術發展的基礎課題之一,近年來對詞義相似度的量測有許多方法的提出。 本研究針對英語字詞利用社會網路分析這樣的工具,藉由提出不同的網路建構方式,以語料庫為資料來源,設定網路節點與連結關係,以共現網路(co-occurrence networks)為基礎,經由改變產生與篩選的條件,觀察以社會網路分析已有的性質或指標做調整,是否可以對詞義相似度提供另一種量測方式;同時以目前詞義相似度研究上已有同義詞標準評比對前述產生的網路與所計算的性質做驗證,並進一步探討使用社會網路分析在詞義相似度研究上的適用性。
322

Combining Similarity Transformed Equation of Motion Coupled Cluster (STEOM-CC), Vibronic Coupling models, and Spin-Orbit Coupling: Towards a First Principle Description of Intersystem Crossing

Sous, John January 2013 (has links)
Electronic Structure Theory has led to a variety of developments and applications. In the Nooijen group the focus is on the development and use of Coupled Cluster based approaches. Coupled Cluster is a very strong and accurate approach to the quantum mechanical problem. The research results presented in the thesis testify to the Similarity Transformed Equation of Motion Coupled Cluster (STEOM-CC) for being a very accurate and yet computationally inexpensive approach for excited states. This study reveals new features about STEOM and provides promise regarding future improvement in the methodology. STEOM can be used as the first step in the construction of the Vibronic model, which is a strong tool to move to paradigms beyond the Born-Oppenheimer approximation. Spin-Orbit Coupling (SOC) is a very important ingredient required to study relativistic phenomena and its quantum mechanical implementation for many body systems is not straightforward. The most widely used SOC operator in Chemical Physics is the Breit-Pauli operator, which requires employing non-trivial approximations to the Dirac equation to adapt the theory to many body systems. The integration of electronic structure approaches, Vibronic Coupling, and SOC is essential to study the phenomenon of intersystem crossing (transition between spin states) in fine detail. In this thesis a computational benchmark of STEOM is discussed, while the frameworks of Vibronic Coupling and Spin-Orbit Coupling (SOC) are considered on a theoretical level.
323

T bangos kaitos analizė, naudojant modifikuotą slenkančio vidurkio metodą: įvairių laiko eilučių išlyginimo ir panašumo nustatymo būdų palyginimas / T wave alternans analysis using a modified moving average method: a comparison of various time series alignment and similarity detection techniques

Puronaitė, Roma 04 July 2014 (has links)
Šiame darbe analizuotos įvairių laiko eilučių išlyginimo ir panašumo nustatymo metodų pritaikymo galimybės T bangų kaitos (TBK) analizėje, pagerinant Nearing ir Verrier pasiūlytą, modifikuoto slenkančio vidurkio metodą. Pasinaudojant TWA duomenų baze ir generuotais duomenimis surasti labiausiai TBK analizei tinkami išlyginimo ir panašumo vertinimo metodai. TBK, paskaičiuoto naudojant modifikuotą slenkančio vidurkio metodą papildytą TBK analizei tinkamiausiais laiko eilučių išlyginimo ir panašumo nustatymo metodais, tinkamumas širdies ligų diagnostikai patikrintas su duomenimis iš PTB duomenų bazės. Pasiremiant PTB duomenimis rastas galimas biomarkeris širdies ligų diagnostikoje, paskutinių dviejų TBK įverčių, gautų taikant MSVM su atviros pradžios ir pabaigos dinaminio laiko skalės kraipymo su asimetriniu judėjimo šablonu išlyginimą ir panašumą vertinant kaip absoliutinį skirtumą tarp maksimumo taškų, min-max kombinaciją. / T wave alternans (TWA) is a beat-to-beat change in the amplitude or shape of T wave. TWA is one of potential biomarkers for ventricular arrhythmias and can be a sign of serious heart disease. Because there is no gold standard in TWA measuring, modifications of existing methods and new solutions are possible. Modified moving average method, proposed by Nearing and Verrier, is one of mostly used in medical practise, but can give misleading results then T waves is not properly aligned or T wave length and morphology changes because of heart rate variability. It is known, that some ventricular arrhythmias can cause heart rate variability, so this type of error is unwanted, because online TWA measuring can become one of sudden ventricular arrhythmias predictors in the near future. In this work, variuos time series alignment and similarity detection techniques were used to improve TWA measuring and this measure capabilities in heart disease diagnostic were analized. TWA analysis with simulated and real data from ECG databases was performed and potentional biomarker was found by using biomarkers combining method, proposed by Liu, Liu and Halabi. 57.
324

A Middleware for Targeted Marketing in Spontaneous Social Communities

Tian, Zhao 27 September 2012 (has links)
With the proliferation of mobile devices and wireless connectivity technologies, mobile social communities offer novel opportunities for targeted marketing by service or product providers. Unfortunately, marketers are still unable to realize the full potential of these markets due to their inability to effectively target right audiences. This thesis presents a novel middleware for identifying spontaneous social communities (SSCs) of mobile users in ad hoc networks in order to facilitate marketers' advertisements. The contributions of the presented work are two fold; the first is a novel model for SSCs that captures their unique dynamic nature, in terms of community structure and interest in different \textit{hot-topics} over time. These time-varying interests are represented through an inferred \textit{community profile prototype} that reflects dominant characteristics of community members. This prototype is then employed to facilitate the identification of new potential members. The selected community prototypes are also used by marketers to identify the right communities for their services or products promotions. The second contribution of this paper is novel distributed techniques for efficient calculation of the community prototypes and identification of potential community links. In contrast to traditional models of detecting fixed and mobile social networks that rely on pre-existing friendships among its members to predict new ones, the proposed model focuses on measuring the degree of similarity between the new user's profile and the profiles of members of each community in order to predict new users' relationships in the community. The adopted model of SSCs can foster many existing and new socially-aware applications such as recommender systems for social events and tools for collaborative work. It is also an ideal target for business-oriented applications such as short-message-service (SMS) advertisement messages, podcasting news feeds in addition to location/context-aware services. The performance of the proposed work was evaluated using the NetLogo platform where obtained experimental results demonstrate the achieved high degree of stability in the resulting communities in addition to the effectiveness of the proposed middleware in terms of the reduction in the number of routing messages required for advertisements.
325

Investigating the selection of example sentences for unknown target words in ICALL reading texts for L2 German

Segler, Thomas M. January 2007 (has links)
This thesis considers possible criteria for the selection of example sentences for difficult or unknown words in reading texts for students of German as a Second Language (GSL). The examples are intended to be provided within the context of an Intelligent Computer-Aided Language Learning (ICALL) Vocabulary Learning System, where students can choose among several explanation options for difficult words. Some of these options (e.g. glosses) have received a good deal of attention in the ICALL/Second Language (L2) Acquisition literature; in contrast, literature on examples has been the near exclusive province of lexicographers. The selection of examples is explored from an educational, L2 teaching point of view: the thesis is intended as a first exploration of the question of what makes an example helpful to the L2 student from the perspective of L2 teachers. An important motivation for this work is that selecting examples from a dictionary or randomly from a corpus has several drawbacks: first, the number of available dictionary examples is limited; second, the examples fail to take into account the context in which the word was encountered; and third, the rationale and precise principles behind the selection of dictionary examples is usually less than clear. Central to this thesis is the hypothesis that a random selection of example sentences from a suitable corpus can be improved by a guided selection process that takes into account characteristics of helpful examples. This is investigated by an empirical study conducted with teachers of L2 German. The teacher data show that four dimensions are significant criteria amenable to analysis: (a) reduced syntactic complexity, (b) sentence similarity, provision of (c) significant co-occurrences and (d) semantically related words. Models based on these dimensions are developed using logistic regression analysis, and evaluated through two further empirical studies with teachers and students of L2 German. The results of the teacher evaluation are encouraging: for the teacher evaluation, they indicate that, for one of the models, the top-ranked selections perform on the same level as dictionary examples. In addition, the model provides a ranking of potential examples that roughly corresponds to that of experienced teachers of L2 German. The student evaluation confirms and notably improves on the teacher evaluation in that the best-performing model of the teacher evaluation significantly outperforms both random corpus selections and dictionary examples (when a penalty for missing entries is included).
326

Etude expérimentale de jets libres, compressibles ou en présence d'un obstacle / Experimental study of free jets and jets with compressible effects or impinging an obstacle

Dubois, Julien 14 June 2010 (has links)
L’objectif de ces travaux est d’étudier expérimentalement la dispersion d’hydrogène pour évaluer l’impact des fuites chroniques ou accidentelles qui peuvent intervenir en milieu libre ou encombré, à faible ou à forte pression, sur un véhicule fonctionnant avec une pile à combustible. Les fuites étudiées sont assimilées à des jets verticaux, turbulents, axisymétriques, à densité variable, et issus d’orifices cylindriques de 1 à 3 mm de diamètre. Un banc expérimental a été conçu pour étudier ces fuites : l’hydrogène a été remplacé par de l’hélium pour des raisons de sécurité. Il résiste à une pression de 200 bars et permet de positionner un obstacle dans le jet. La technique BOS (Background Oriented Schlieren) a été adaptée aux jets millimétriques et à la présence d’un obstacle. Un soin particulier à été apporté à la mise en place de cette technique. Les résultats obtenus sont en accord avec ceux de la littérature quand il en existe. De nouvelles lois de similitude sont proposées, plus représentatives de la physique des jets : libres subsoniques, libres sousdétendus, et subsoniques en présence d’un obstacle (sphère). À partir de l’analyse de la structure compressible des jets sous-détendus, de nouvelles lois sont aussi proposées pour estimer la position et le diamètre du disque de Mach puis la longueur du cône potentiel. Enfin, deux lois d’estimation du volume et de la masse inflammables de jets libres d’hydrogène sont proposées : elles sont fonction du débit massique de la fuite. / The aim of this work is to experimentally investigate the hydrogen dispersion to evaluate the impact of chronic or accidental leaks that may occur in a free or in a congested environment, from a low or a high pressure tank, on a fuel cell vehicle. The leaks are assimilated to vertical turbulent and axisymmetric jets with variable density. They are issued from cylindrical orifices from 1 to 3 mm diameter. An experimental set-up was designed to investigate the leaks : hydrogen has been replaced by helium for safety reasons. It supports a 200 bar pressure and allows to position an obstacle in the jet flow. The BOS (Background Oriented Schlieren) technique has been adapted to millimeter jets and to the presence of an obstacle. Particular attention has been given to the development of this technique. The results show good agrement with the available litterature data.New similarity laws are proposed, more representative of the flows of : subsonic free jets, under-expanded free jets, and subsonic impinging (a sphere) jets. From the structure analysis of compressible under-expanded free jets, new relations are proposed to estimate the Mach disk position and diameter as well as the potential core length. Finally, two new laws are found from the analysis of flammable volume and flammable mass : they are based on the leak mass flow rate.
327

Adaptive Process Model Matching

Klinkmüller, Christopher 15 May 2017 (has links) (PDF)
Process model matchers automate the detection of activities that represent similar functionality in different models. Thus, they provide support for various tasks related to the management of business processes including model collection management and process design. Yet, prior research primarily demonstrated the matchers’ effectiveness, i.e., the accuracy and the completeness of the results. In this context (i) the size of the empirical data is often small, (ii) all data is used for the matcher development, and (iii) the validity of the design decisions is not studied. As a result, existing matchers yield a varying and typically low effectiveness when applied to different datasets, as among others demonstrated by the process model matching contests in 2013 and 2015. With this in mind, the thesis studies the effectiveness of matchers by separating development from evaluation data and by empirically analyzing the validity and the limitations of design decisions. In particular, the thesis develops matchers that rely on different sources of information. First, the activity labels are considered as natural-language descriptions and the Bag-of-Words Technique is introduced which achieves a high effectiveness in comparison to the state of the art. Second, the Order Preserving Bag-of-Words Technique analyzes temporal dependencies between activities in order to automatically configure the Bag-of-Words Technique and to improve its effectiveness. Third, expert feedback is used to adapt the matchers to the domain characteristics of process model collections. Here, the Adaptive Bag-of-Words Technique is introduced which outperforms the state-of-the-art matchers and the other matchers from this thesis.
328

Malware Analysis and Privacy Policy Enforcement Techniques for Android Applications

Ali-Gombe, Aisha Ibrahim 19 May 2017 (has links)
The rapid increase in mobile malware and deployment of over-privileged applications over the years has been of great concern to the security community. Encroaching on user’s privacy, mobile applications (apps) increasingly exploit various sensitive data on mobile devices. The information gathered by these applications is sufficient to uniquely and accurately profile users and can cause tremendous personal and financial damage. On Android specifically, the security and privacy holes in the operating system and framework code has created a whole new dynamic for malware and privacy exploitation. This research work seeks to develop novel analysis techniques that monitor Android applications for possible unwanted behaviors and then suggest various ways to deal with the privacy leaks associated with them. Current state-of-the-art static malware analysis techniques on Android-focused mainly on detecting known variants without factoring any kind of software obfuscation. The dynamic analysis systems, on the other hand, are heavily dependent on extending the Android OS and/or runtime virtual machine. These methodologies often tied the system to a single Android version and/or kernel making it very difficult to port to a new device. In privacy, accesses to the database system’s objects are not controlled by any security check beyond overly-broad read/write permissions. This flawed model exposes the database contents to abuse by privacy-agnostic apps and malware. This research addresses the problems above in three ways. First, we developed a novel static analysis technique that fingerprints known malware based on three-level similarity matching. It scores similarity as a function of normalized opcode sequences found in sensitive functional modules and application permission requests. Our system has an improved detection ratio over current research tools and top COTS anti-virus products while maintaining a high level of resiliency to both simple and complex obfuscation. Next, we augment the signature-related weaknesses of our static classifier with a hybrid analysis system which incorporates bytecode instrumentation and dynamic runtime monitoring to examine unknown malware samples. Using the concept of Aspect-oriented programming, this technique involves recompiling security checking code into an unknown binary for data flow analysis, resource abuse tracing, and analytics of other suspicious behaviors. Our system logs all the intercepted activities dynamically at runtime without the need for building custom kernels. Finally, we designed a user-level privacy policy enforcement system that gives users more control over their personal data saved in the SQLite database. Using bytecode weaving for query re-writing and enforcing access control, our system forces new policies at the schema, column, and entity levels of databases without rooting or voiding device warranty.
329

2D SPECTRAL SUBTRACTION FOR NOISE SUPPRESSION IN FINGERPRINT IMAGES

Dandu, Sai Venkata Satya Siva Kumar, Kadimisetti, Sujit January 2017 (has links)
Human fingerprints are rich in details called the minutiae, which can be used as identification marks for fingerprint verification. To get the details, the fingerprint capturing techniques are to be improved. Since when we the fingerprint is captured, the noise from outside adds to it. The goal of this thesis is to remove the noise present in the fingerprint image. To achieve a good quality fingerprint image, this noise has to be removed or suppressed and here it is done by using an algorithm or technique called ’Spectral Subtraction’, where the algorithm is based on subtraction of estimated noise spectrum from noisy signal spectrum. The performance of the algorithm is assessed by comparing the original fingerprint image and image obtained after spectral subtraction several parameters like PSNR, SSIM and also for different fingerprints on the database. Finally, performance matching was done using NIST matching software, and the obtained results were presented in the form of Receiver Operating Characteristics (ROC)graphs, using MATLAB, and the experimental results were presented.
330

Návrh efektivní generické molekulární reprezentace / Návrh efektivní generické molekulární reprezentace

Škoda, Petr January 2014 (has links)
The screening of chemical libraries is an important step in the drug discovery process. The existing chemical libraries contain up to millions of compounds. As the screening at such scale is expensive, the virtual screening is often utilized. There exist several variants of virtual screening and ligand- based virtual screening is one of them. It utilizes the similarity of screened chemical compounds to known compounds. Besides the employed similarity measure, another aspect greatly influencing the performance of ligand-based virtual screening is the chosen chemical compound representation. In this thesis, we introduce a fragment-based representation of chemical compounds. Our representation utilizes fragments to represent a compound. Each fragment is represented by its physicochemical descriptors. The representation is highly parameterizable, especially in the area of physicochemical descriptors selection and application. In order to test the performance of our method, we utilized an existing framework for virtual screening benchmarking. The results show that our method is comparable to the best existing approaches and on some datasets it outperforms them.

Page generated in 0.0679 seconds