• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 503
  • 73
  • 40
  • 28
  • 12
  • 12
  • 11
  • 11
  • 11
  • 11
  • 9
  • 8
  • 6
  • 6
  • 5
  • Tagged with
  • 929
  • 321
  • 212
  • 157
  • 93
  • 91
  • 87
  • 85
  • 69
  • 69
  • 64
  • 64
  • 53
  • 52
  • 51
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
521

Inquiry into J.S. Bach’s method of reworking in his composition of the concerto for keyboard, flute and violin, BWV 1044, and its chronology

Douglas, David James 11 1900 (has links)
Bach's Concerto for Keyboard, Flute, and Violin with Orchestra in A minor, BWV 1044, is a very interesting and unprecedented case of Bach reworking pre-existing keyboard works into three concerto movements. There are several examples of Bach carrying out the reverse process with his keyboard arrangements of Vivaldi, and other composers' concertos, but the reworking of the Prelude and Fugue in A minor, BWV 894, into the outer movements of BWV 1044, and the second movement of the Organ Sonata in F major, BWV 527, into the middle movement, appears to be unique among Bach's compositional activity. This study will explore in some detail how Bach transforms these solo keyboard pieces into a three movement concerto for three concertino instruments and ripieno. As is the case with most of Bach's instrumental works, the question of where BWV 1044 fits within the chronology of Bach's works is unclear. This paper will attempt a reliable date of composition for this concerto by combining a variety of methods including source study and comparative formal analysis.
522

Mutation-based testing of buffer overflows, SQL injections, and format string bugs

Shahriar, Hossain 20 August 2008 (has links)
Testing is an indispensable mechanism for assuring software quality. One of the key issues in testing is to obtain a test data set that is able to effectively test an implementation. An adequate test data set consists of test cases that can expose faults in a software implementation. Mutation-based testing can be employed to obtain adequate test data sets, and numerous mutation operators have been proposed to date to measure the adequacy of test data sets that reveal functional faults. However, implementations that pass functionality tests are still vulnerable to malicious attacks. Despite the rigorous use of various existing testing techniques, many vulnerabilities are discovered after the deployment of software implementations, such as buffer overflows (BOF), SQL injections, and format string bugs (FSB). Successful exploitations of these vulnerabilities may result in severe consequences such as denial of services, application state corruptions, and information leakage. Many approaches have been proposed to detect these vulnerabilities. Unfortunately, very few approaches address the issue of testing implementations against vulnerabilities. Moreover, these approaches do not provide an indication whether a test data set is adequate for vulnerability testing or not. We believe that bringing the idea of traditional functional test adequacy to vulnerability testing can help address the issue of test adequacy. In this thesis, we apply the idea of mutation-based adequate testing to perform vulnerability testing of buffer overflows, SQL injections, and format string bugs. We propose mutation operators to force the generation of adequate test data sets for these vulnerabilities. The operators mutate source code to inject the vulnerabilities in the library function calls and unsafe implementation language elements. The mutants generated by the operators are killed by test cases that expose these vulnerabilities. We propose distinguishing or killing criteria for mutants that consider varying symptoms of exploitations. Three prototype tools are developed to automatically generate mutants and perform mutation analysis with input test cases and the effectiveness of the proposed operators is evaluated on several open source programs containing known vulnerabilities. The results indicate that the proposed operators are effective for testing the vulnerabilities, and the mutation-based vulnerability testing process ensures the quality of the applications against these vulnerabilities. / Thesis (Master, Computing) -- Queen's University, 2008-08-18 13:53:04.036
523

Availability of constituents' semantic representations during the processing of opaque and transparent compound words

Marchak, Kristan Unknown Date
No description available.
524

Dromde Mik en Drom i Nat...

Hostman, Anna 09 January 2014 (has links)
Composed entirely of runes, the 14th century manuscript Codex Runicus is comprised of 101 sheets and contains historical documents such as "Kings until Erik Menved" and "Boundaries between Denmark and Sweden." The end of the codex contains the oldest surviving Nordic music fragment with lyrical text "Drømde mik en drøm i nat um silki ok ærlik pæl" which translates as [I] dreamt me a dream last night of silk and lovely cloth. This melody, alongside three Norwegian folk slåttar written for fiddle, Fjellbekken (The Mountain Stream), Fjøllrosa (The Mountain Rose), and Syrgjefuen (The Bird of Sorrow), is used to generate the pitch material for this composition for string orchestra, english horn and french horn. The piece is contrapuntal in nature. A large portion of the work is formed from essentially five groups or layers of melody that comfortably co-exist towards, as well as away from, each other, their independent natures being most evident in the first half of the piece. Additionally, there are fluctuations within each group itself, for examples, forms of imitation, slippage, change in register, variation in playing technique, and micro-displays of rhythmic independence set against more heterophonic textures (Considerable use of rhythmic embellishment is derived from the ornamental style found in harding fiddle slåttar). Such micro-fluctuations further distinguish the texture-intentional orchestration of each group. Although the use of layered melody forms the framework for the entire composition, there is continual exploration of its possibilities through various parameters such as density vs. transparency, and continuation vs. fragmentation.
525

Dromde Mik en Drom i Nat...

Hostman, Anna 09 January 2014 (has links)
Composed entirely of runes, the 14th century manuscript Codex Runicus is comprised of 101 sheets and contains historical documents such as "Kings until Erik Menved" and "Boundaries between Denmark and Sweden." The end of the codex contains the oldest surviving Nordic music fragment with lyrical text "Drømde mik en drøm i nat um silki ok ærlik pæl" which translates as [I] dreamt me a dream last night of silk and lovely cloth. This melody, alongside three Norwegian folk slåttar written for fiddle, Fjellbekken (The Mountain Stream), Fjøllrosa (The Mountain Rose), and Syrgjefuen (The Bird of Sorrow), is used to generate the pitch material for this composition for string orchestra, english horn and french horn. The piece is contrapuntal in nature. A large portion of the work is formed from essentially five groups or layers of melody that comfortably co-exist towards, as well as away from, each other, their independent natures being most evident in the first half of the piece. Additionally, there are fluctuations within each group itself, for examples, forms of imitation, slippage, change in register, variation in playing technique, and micro-displays of rhythmic independence set against more heterophonic textures (Considerable use of rhythmic embellishment is derived from the ornamental style found in harding fiddle slåttar). Such micro-fluctuations further distinguish the texture-intentional orchestration of each group. Although the use of layered melody forms the framework for the entire composition, there is continual exploration of its possibilities through various parameters such as density vs. transparency, and continuation vs. fragmentation.
526

Investigation of Spin-Independent CP Violation in Neutron and Nuclear Radiative β Decays

He, Daheng 01 January 2013 (has links)
CP violation is an important condition to explain the preponderance of baryons in our universe, yet the available CP violation in the Standard Model (SM) via the so-called Cabibbo-Kobayashi-Maskawa mechanism seems to not provide enough CP violation. Thus searching for new sources of CP violation is one of the central tasks of modern physics. In this thesis, we focus on a new possible source of CP violation which generates triple-product correlations in momenta which can appear in neutron and nuclear radiative β decay. We show that at low energies such a CP violating correlation may arise from the exotic coupling of nucleon, photon and neutrino that was proposed by Harvey, Hill, and Hill (HHH). One specialty of such an exotic HHH coupling is that it does not generate the well-known CP-violating terms such as ``D-term'', ``R-term'', and neutron electric dipole moment, in which particle's spins play critical role. We show that such a new HHH-induced CP violating effect is proportional to the imaginary part of c5gv, where gv is the vector coupling constant in neutron and nuclear β decay, and c5 is the phenomenological coupling constant that appears in chiral perturbation theory at O(M-2) with M referring to the nucleon or nuclear mass. We consider a possible non-Abelian hidden sector model, which is beyond the SM and may yield a nontrivial Im(c5). The available bounds on both Im(c5) and Im(gv) are considered, and a better limit on Im(c5) can come from a direct measurement in radiative beta decay. We calculate the competitive effect that arises from the general parameterization of the weak interaction that was proposed by Lee and Yang in 1956. We also show that in the proposed measurements, the CP-violating effect can be mimicked by the SM via final-state interactions (FSI). For a better determination of the bound of Im(c5), we consider the FSI-induced mimicking effect in full detail in O(α) as well as in leading recoil order. To face ongoing precision measurements of neutron radiative β decay of up to 1% relative error, we sharpen our calculations of the CP conserving pieces of neutron radiative β decay by considering the largest contributions in O(α2): the final-state Coulomb corrections as well as the contributions from two-photon radiation.
527

Text Clustering with String Kernels in R

Karatzoglou, Alexandros, Feinerer, Ingo January 2006 (has links) (PDF)
We present a package which provides a general framework, including tools and algorithms, for text mining in R using the S4 class system. Using this package and the kernlab R package we explore the use of kernel methods for clustering (e.g., kernel k-means and spectral clustering) on a set of text documents, using string kernels. We compare these methods to a more traditional clustering technique like k-means on a bag of word representation of the text and evaluate the viability of kernel-based methods as a text clustering technique. (author's abstract) / Series: Research Report Series / Department of Statistics and Mathematics
528

Numerical analysis of the nonlinear dynamics of a drill-string with uncertainty modeling

Ritto, Thiago 07 April 2010 (has links) (PDF)
This thesis analyzes the nonlinear dynamics of a drill-string including uncertainty modeling. A drill-string is a slender flexible structure that rotates and digs into the rock in search of oil. A mathematical-mechanical model is developed for this structure including fluid-structure interaction, impact, geometrical nonlinearities and bit-rock interaction. After the derivation of the equations of motion, the system is discretized by means of the finite element method and a computer code is developed for the numerical computations using the software MATLAB. The normal modes of the dynamical system in the prestressed configuration are used to construct a reduced order model for the system. To take into account uncertainties, the nonparametric probabilistic approach, which is able to take into account both system-parameter and model uncertainties, is used. The probability density functions related to the random variables are constructed using the maximum entropy principle and the stochastic response of the system is calculated using the Monte Carlo method. A novel approach to take into account model uncertainties in a nonlinear constitutive equation (bit-rock interaction model) is developed using the nonparametric probabilistic approach. To identify the probabilistic model of the bit-rock interaction model, the maximum likelihood method together with a statistical reduction in the frequency domain (using the Principal Component Analysis) is applied. Finally, a robust optimization problem is performed to find the operational parameters of the system that maximizes its performance, respecting the integrity limits of the system, such as fatigue and instability
529

Spins and Giants : Fundamental Excitations in Weakly and  Strongly Coupled ABJM Theory

Ohlsson Sax, Olof January 2011 (has links)
The discovery of integrability on both sides of the duality between planar N=4 super Yang-Mills theory and free type IIB string theory in AdS5 × S5 has lead to great progress in our understanding of the AdS/CFT correspondence. Similar integrable structures also appear in the more recent three-dimensional superconformal N=6 Chern-Simons-matter theory constructed by Aharony, Bergman, Jafferis and Maldacena (ABJM), as well as in its gravity dual, type IIA string theory on AdS4 × CP3. However, new interesting complications arise in the AdS4/CFT3 duality. In the conjectured all-loop Bethe equations by Gromov and Vieira the dispersion relation of the magnons has a non-trivial coupling dependence which is parametrized by a function that is only known to the leading order at weak and strong coupling. In the first part of this thesis I discuss our calculations of the next-to-leading correction to this function at weak coupling. We compute this function from four-loop Feynman diagrams in the SU(2) × SU(2) sector of the ABJM model. As a consistency check we have performed the calculation both in a component formalism and using superspace techniques. At strong coupling the fundamental excitations of the integrable model are the giant magnons. The topic of the second part of this thesis is the spectrum of these giant magnons in CP3. Furthermore, I discuss our analyses of the finite-size corrections beyond the asymptotic Bethe ansatz. At weak coupling we have computed the leading four-loop wrapping diagrams in the ABJM model. At the strong coupling side of the duality I discuss our results for the exponentially suppressed finite-size corrections to the energy of giant magnons.
530

Going Round in Circles : From Sigma Models to Vertex Algebras and Back / Gå runt i cirklar : Från sigmamodeller till vertexalgebror och tillbaka.

Ekstrand, Joel January 2011 (has links)
In this thesis, we investigate sigma models and algebraic structures emerging from a Hamiltonian description of their dynamics, both in a classical and in a quantum setup. More specifically, we derive the phase space structures together with the Hamiltonians for the bosonic two-dimensional non-linear sigma model, and also for the N=1 and N=2 supersymmetric models. A convenient framework for describing these structures are Lie conformal algebras and Poisson vertex algebras. We review these concepts, and show that a Lie conformal algebra gives a weak Courant–Dorfman algebra. We further show that a Poisson vertex algebra generated by fields of conformal weight one and zero are in a one-to-one relationship with Courant–Dorfman algebras. Vertex algebras are shown to be appropriate for describing the quantum dynamics of supersymmetric sigma models. We give two definitions of a vertex algebra, and we show that these definitions are equivalent. The second definition is given in terms of a λ-bracket and a normal ordered product, which makes computations straightforward. We also review the manifestly supersymmetric N=1 SUSY vertex algebra. We also construct sheaves of N=1 and N=2 vertex algebras. We are specifically interested in the sheaf of N=1 vertex algebras referred to as the chiral de Rham complex. We argue that this sheaf can be interpreted as a formal quantization of the N=1 supersymmetric non-linear sigma model. We review different algebras of the chiral de Rham complex that one can associate to different manifolds. In particular, we investigate the case when the manifold is a six-dimensional Calabi–Yau manifold. The chiral de Rham complex then carries two commuting copies of the N=2 superconformal algebra with central charge c=9, as well as the Odake algebra, associated to the holomorphic volume form.

Page generated in 0.0555 seconds