• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 314
  • 62
  • 51
  • 48
  • 24
  • 19
  • 12
  • 11
  • 10
  • 5
  • 5
  • 5
  • 4
  • 4
  • 2
  • Tagged with
  • 780
  • 62
  • 57
  • 51
  • 51
  • 47
  • 46
  • 41
  • 40
  • 37
  • 36
  • 35
  • 30
  • 30
  • 30
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
281

Parametric Estimation Of Clutter Autocorrelation Matrix For Ground Moving Target Indication

Kalender, Emre 01 January 2013 (has links) (PDF)
In airborne radar systems with Ground Moving Target Indication (GMTI) mode, it is desired to detect the presence of targets in the interference consisting of noise, ground clutter, and jamming signals. These interference components usually mask the target return signal, such that the detection requires suppression of the interference signals. Space-time adaptive processing is a widely used interference suppression technique which uses temporal and spatial information to eliminate the effects of clutter and jamming and enables the detection of moving targets with small radial velocity. However, adaptive estimation of the interference requires high computation capacity as well as large secondary sample data support. The available secondary range cells may be fewer than required due to non-homogeneity problems and computational capacity of the radar system may not be sufficient for the computations required. In order to reduce the computational load and the required number of secondary data for estimation, parametric methods use a priori information on the structure of the clutter covariance matrix. Space Time Auto-regressive (STAR) filtering, which is a parametric adaptive method, and full parametric model-based approaches for interference suppression are proposed as alternatives to STAP in the literature. In this work, space time auto-regressive filtering and model-based GMTI approaches are investigated. Performance of these approaches are evaluated by both simulated and flight test data and compared with the performance of sample matrix inversion space time adaptive processing.
282

Etude d'un Oscillateur Local agile pour une transmission multi-bandes etréduction des interférences associées

Milevsky, Borislav 18 December 2012 (has links) (PDF)
L'objectif de cette thèse est d'étudier la faisabilité et les performances d'un synthétiseur de fréquences agile pour les transmissions multi-bandes multi-utilisateurs destinées aux systèmes de transmission fournissant un très grand débit tout en répondant aux exigences de faible consommation et d'intégration facile. Dans ce contexte, les solutions classiques de synthétiseur de fréquences ne sont pas applicables et il est nécessaire de développer de nouvelles structures qui génèrent les fréquences centrales en permanence. La commutation d'une fréquence à l'autre peut se faire alors très rapidement par simple modification de la configuration des multiplexeurs. Dans la première partie de ce travail nous nous consacrons à l'analyse d'une telle architecture à fort potentiel. Une partie de sa structure est réalisée en technologie conventionnelle BiCMOS afin de valider sa faisabilité ainsi que le fonctionnement des solutions schématiques développées. Grâce à la caractérisation des composants, une analyse de la structure complète est réalisée. Cependant, la complexité de la structure du synthétiseur proposé fait de sorte qu'il existe pour les fréquences générées un grand nombre de fréquences parasites qui induisent des interférences entre utilisateurs. La réduction de leurs effets sur la transmission est l'objet de la deuxième partie de notre travail. Deux solutions numériques de réduction des interférences sont proposées. Elles permettent de rendre le design de la partie analogique moins contraignant en allégeant le cahier des charges et nous ont ainsi permis de simplifier l'architecture du synthétiseur.
283

Voluntary/involuntary emotional processes and aggressive behavior

Kim, Min Young 02 April 2012 (has links)
This study estimated the association between aggressive behavior and two different types of emotion regulation, one operating on the conscious level with voluntary effort (i.e., suppression) and the other operating on the unconscious level with involuntary effort, or automatically (i.e., repression). Results from a correlation analysis among self-assessed suppression and repression and other-rated aggressive behavior showed that repression is more significantly linked to aggressive behavior than suppression. Further investigation using physiological and neural assessments was performed to determine the critical properties, including cardiac reactivity and neural substrates, of repression related to aggressive behavior. Based on the findings from multiple approaches in assessment, this study suggests that unconscious emotion change inferred from self-assessed repression (in Study 1) and neural activity (in Study 2) more significantly predicts aggressive behavior than personality. Implications for both aggression and emotion research are discussed along with the measurement equivalence issue.
284

Post Citizen United: The Lack of Political Accountability and Rise of Voter Suppression in a Time of Newly Defined Corruption

Fullerton, Hannah S 01 April 2013 (has links)
In 2010, our definition of democracy in America was drastically changed by the Supreme Court case Citizens United v. FEC. The Court ruled that under the First Amendment, corporations have the right to free speech. The decision removed the final ban on corporations, which prohibited corporate money used for direct advocacy. The consequences of this have been tremendous. The decision has allowed for the creation and rise of Super PACs and political active nonprofits. As a result, Super PACs and nonprofits now act as “shadow campaigns”. Outside groups have the ability to engage in voter suppression tactics without politically hurting the candidate. Unlike political candidates, there are no direct ramifications for an outside organization to get caught engaging in voter suppression. They are not held accountable by anyone. The ability to take political action that is independent from the government or campaigns allows for a new form of corruption. Corruption is no longer a coordinated act between corporate money and a candidate, but rather political actions that take place outside the public sphere. Political actions that take place in the private sphere are outside the realm of political accountability. The people stand powerless against private outside organizations.
285

Study of ASA Algorithms

Ardam, Nagaraju January 2010 (has links)
Hearing aid devices are used to help people with hearing impairment. The number of people that requires hearingaid devices are possibly constant over the years, however the number of people that now have access to hearing aiddevices increasing rapidly. The hearing aid devices must be small, consume very little power, and be fairly accurate.Even though it is normally more important for the user that hearing impairment look good (are discrete). Once thehearing aid device prescribed to the user, she/he needs to train and adjust the device to compensate for the individualimpairment.We are within the framework of this project researching on hearing aid devices that can be trained by the hearingimpaired person her-/himself. This project is about finding suitable noise cancellation algorithm for the hearing-aiddevice. We consider several types of algorithms like, microphone array signal processing, Independent ComponentAnalysis (ICA) based on double microphone called Blind Source Separation (BSS) and DRNPE algorithm.We run this current and most sophisticated and robust algorithms in certain noise backgrounds like Cocktail noise,street, public places, train, babble situations to test the efficiency. The BSS algorithm was well in some situation andgave average results in some situations. Where one microphone gave steady results in all situations. The output isgood enough to listen targeted audio.The functionality and performance of the proposed algorithm is evaluated with different non-stationary noisebackgrounds. From the performance results it can be concluded that, by using the proposed algorithm we are able toreduce the noise to certain level. SNR, system delay, minimum error and audio perception are the vital parametersconsidered to evaluate the performance of algorithms. Based on these parameters an algorithm is suggested forheairng-aid. / Hearing-Aid
286

Investigation of Limiters For HPM and UWB Front-door Protection / Undersökning av limitrar för HPM och UWB framvägskopplingsskydd

Nilsson, Tony January 2006 (has links)
An extensive investigation of front-door protection devices i.e. limiters has been made. The thesis work contains both HPM- and UWB-measurements done on various limiters, in order to characterize them. The measurements show that all limiters are not suitable as protection against HPM- and UWB-pulses. The limiters that were found to provide the best protection are limiters based on diode technologies. PIN- and Schottky-diodes generally shows very good performance and they fulfill many parameters that have been set by FOI. To obtain a full protection it is presumably necessary to use two or more limiters in combination, which complement each other. / En omfattande studie av framvägskopplingsskydd, dvs. limiters har gjorts. Examensarbetet innehåller resultat från både HPM- och UWB- mätningar som har gjorts på olika limitrar för att karaktärisera deras prestanda. Av resultaten från mätningarna kan man se att alla limitrar inte passar som skydd mot HPM- och UWB-pulser. De limitrar som tillhandahöll det bästa skyddet var baserade på olika diodtekniker. PIN- och Schottky-dioder visade sig överlag ha väldigt goda prestanda och de uppfyller många av de parametrar som bestämts av FOI. För att få ett heltäckande skydd är det förmodligen nödvändigt att man använder två eller flera limitrar i kombination, som kompletterar varandra.
287

Könsroller och Härskartekniker i Twilight : (re)produktion av patriarkalgenusstrukturer genom smäktande kärlekshistoria?

Hjort, Amanda January 2012 (has links)
This essay aims to describe and problematize gender roles and master suppression techniques in Stephenie Meyer’s Twilight Saga. This is done in order to enable me, in my future profession as a teacher, to start an emancipatory discussion in class where pupils can become conscious of different ways of reading the love story. I will use the following two research questions to fulfil the purpose: 1) investigate which gender roles that appears in the book’s main characters Bella and Edward and 2) which master suppression techniques that colours their relationship. To answer the questions gender theory and ideology-critics are used. Gender theory is first and foremost used to analyse gender roles whereas ideology-critics is a method of reading that highlights the importance of taking the society and thereto connected values in to account. Applying these two theories on the book it becomes clear that the main characters follows traditional gender roles for what is seen as typical feminine and masculine behaviour; Bella is caring, passive, sexually loyal, and addicted and Edward is aggressive, physically strong and fast, stubborn, dominant and protective. Further more, it is also evident that these roles are accompanied by a number of master suppression techniques used by Edward, such as: make Bella invisible and silly, keep information from her, and use of violence and threats. By using the knowledge in a pedagogical fashion pupils can be energized to start critically reflecting about these stereotypical roles and thereby emancipate from them. They will realize that Stephenie Meyer’s Twilight Saga is a re-production of patriarchal gender structure through an emotional love story.
288

Expressive Control and Emotion Perception: the Impact of Expressive Suppression and Mimicry on Sensitivity to Facial Expressions of Emotion

Schneider, Kristin Grace 28 May 2008 (has links)
<p>Recent studies have linked expressive suppression to impairments in interpersonal functioning, but the mechanism underlying this relationship has not been well articulated. One possibility is that the individual who engages in expressive suppression is impaired in perceiving the emotions of others, a critical ability in successful interpersonal functioning. In the current study, participants were presented with a series of photographs of facial expressions that were manipulated so that they appeared to "morph" from neutral into full emotion expressions. As they viewed these images, participants were instructed to identify the expression as quickly as possible, by selecting one of the six emotion labels (happiness, sadness, fear, anger, surprise, and disgust) on the screen. Prior to this task, participants were randomized to one of three groups: instructed to mimic the expressions on the screen, instructed to suppress all emotion expressions, or not given specific instructions on how to control expressions (the control group). The speed with which participants accurately identified emotional expressions (emotion sensitivity) was the primary variable of interest. Overall, participants in the suppression condition were found to be slower to accurately identify emotions, while no statistically-significant differences were found between the mimicry and no-instructions conditions. The decreased emotion sensitivity in the suppression group could not be accounted for by impulsive responding, decreased sensitivity at full expression, or perceived difficulty of task.</p> / Dissertation
289

The Elucidation of the Mechanisms of CD8+ T Cell-Mediated Suppression of Human Immunodeficiency Virus Type 1 Replication

Saunders, Kevin O'Neil January 2010 (has links)
<p>Herein we detail the progress made at understanding the overall process of CD8<super>+</super> T-lymphocyte noncytolytic antiviral response (CNAR). This response is comprised of 3 key components, the virus, the effector cell and the target cell, each of which contribute to noncytolytic suppression. During the course of CNAR, the effector cells express antiviral factors that induce intracellular events in the target cell resulting in host-pathogen interactions that inhibit HIV-1 gene expression. The goal of this work was to clarify each step of the process of noncytolytic suppression. </p><p>The effector cell was examined to understand the regulation of antiviral factors and to construct a profile of the factors expressed during CNAR. CD8<super>+</super> T-lymphocytes from HIV-1 infected individuals express unidentified factors that suppress viral replication by inhibiting HIV-1 gene expression. Understanding the regulation of these antiviral CD8<super>+</super> T cell-derived factors can provide important insights into how to elicit these factors with therapeutic regimens. For a small subset of human genes, histone deacetylases (HDACs) are epigenetic regulators that condense chromatin to repress transcription. We examined the role of epigenetics in modulating the HIV-1 suppressive factors expressed by primary CD8<super>+</super> T cells from subjects naturally controlling virus replication. HIV-1 suppression by CD8<super>+</super> T-lymphocytes from virus controllers was reversed up to 40% by the addition of an HDAC inhibitor. Therefore, histone deacetylation within CD8<super>+</super> T-lymphocytes was necessary for potent suppression of HIV-1 infection.</p><p>Blocking HDACs impairs the ability of CD8<super>+</super> T-lymphocytes to repress HIV-1 transcription, demonstrating the expression of the suppressive factors is regulated by epigenetics. We used this tool to identify the potential antiviral factors that result in decreased noncytolytic suppression. Through real-time PCR analysis of 164 genes we identified 4 genes in primary CD8<super>+</super> T-lymphocytes from a virus controller, and 12 genes in a CD8<super>+</super> T-cell line that were greatly downregulated in response to a HDAC inhibitor. Additionally, we analyzed the chemokine and cytokine profile of these two cell types to characterize what molecules these cells secrete during CNAR. MIP-1 Beta, MIP-1 Alpha, IP-10, and MIG correlated most strongly with the magnitude of CNAR (<italic>p</italic> < 0.0001). </p><p>The response of the target cell to the antiviral factors was analyzed to better understand how CD8<super>+</super> T cell antiviral factors exert suppressive activity on the HIV-1 genome in an infected cell. Noncytolytic suppression was not dependent on epigenetic changes within the target cells, as HDAC1 within the target cell was dispensable, and histone acetylation at the HIV-1 LTR remained unchanged in the presence of CD8+ T-lymphocytes. </p><p>The genetic elements within HIV-1 and the viral protein Tat were investigated to provide insight into resistance to CNAR. Two virus isolates from the same individual with contrasting sensitivities to CNAR were investigated to identify the genetic elements that confer these phenotypes. Sequence analysis of the two isolates identified mutations in the exon splicing silencers (ESS) 2 and 3 in these viruses. ESS2 and 3 are thought to control splicing of HIV-1 Tat, however levels of spliced Tat RNA levels did not differ between the two isolates. The introduction of the ESS2 mutation into a heterologous HIV-1 isolate moderately boosted resistance to CNAR, suggesting a function for the mutation apart from spliced Tat RNA levels. </p><p>In total, a comprehensive analysis of each component of CNAR is discussed here to enhance the overall understanding of the mechanisms of CNAR.</p> / Dissertation
290

Virtual Rear Projection: Improving the User Experience with Multiple Redundant Projectors

Summet, Jay W. 22 August 2007 (has links)
Front projection is an economical method to produce large displays. However, the twin problems of occlusions, which create shadows on the screen, and light projected onto users near the screen, potentially blinding them, makes front projection a poor fit for large upright interactive surfaces. Virtual Rear Projection (VRP) uses multiple redundant front projectors to provide the user experience of using a rear projected display. By using a projector-camera system to mitigate shadows and blinding light, a virtual rear projected display significantly improves upon the user experience of a traditional front projected display, allowing it to replace a rear projected display. In this thesis we characterize the problems caused by shadows and occlusions and develop projection technologies that mitigate shadows and blinding light. We also present a laboratory performance evaluation, and a user evaluation of the technology showing that VRP improves the user experience with respect to traditional front projection.

Page generated in 0.0637 seconds