• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 110
  • 27
  • 25
  • 23
  • 17
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 239
  • 31
  • 29
  • 27
  • 26
  • 21
  • 21
  • 20
  • 20
  • 20
  • 20
  • 19
  • 19
  • 17
  • 17
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Commissioning of the Trigger module for the 12 GeV era experiment E12-06-114 at JLab

Israel, Norman S. January 2014 (has links)
No description available.
2

CMS Trigger strategies for the selection of MSSM Higgs bosons using electron tau-jet decay modes

van der Aa, Olivier 07 February 2005 (has links)
The thesis work concentrated on the developments of selection strategies for the observation of MSSM Higgs bosons in the context of the CMS experiment. The thesis shows, by an example with a MSSM (Minimal Supersymmetric Standard Model) Higgs decaying into two tau, how to define the trigger strategy. The method can be applied for any final state.
3

Searches for Massive Highly Ionising Particles at the ATLAS Experiment and in Polar Volcanic Rocks, and Performance Studies of the First Level ATLAS Trigger System

Bendtz, Katarina January 2016 (has links)
The Standard Model (SM) of particle physics describes the elementary particles and their interactions. Despite passing a number of high precision falsification tests, it is argued that the SM suffers from a number of shortcomings. Many Beyond the Standard Model (BSM) theories have therefore been postulated. Exotic highly ionising particles such as magnetic monopoles and Highly Electrically Charged Objects (HECOs), with masses at or above the TeV-scale, are predicted in many of these theories. Monopoles arise naturally in grand unification theories. Proposed candidates for HECOs are Q-balls, strangelets and micro-black hole remnants. The Large Hadron Collider (LHC) at CERN is the world's largest and most powerful particle accelerator, colliding protons at centre-of-mass energies up to 13 TeV. One of the main purposes of the LHC is to search for particles beyond the SM. The research presented in this thesis comprises a search for magnetic monopoles and HECOs at one of the largest of the LHC detectors, the ATLAS detector. In addition, studies were made on the performance of the ATLAS trigger system, which is responsible for making the initial online selection of interesting proton-proton events. The search for monopoles and HECOs at ATLAS was conducted using a customized trigger and selection variables optimized for the non-standard particle signature in ATLAS. The dataset corresponds to an integrated luminosity of 7.0 fb^{-1} and the centre-of-mass energy was 8 TeV. No events were observed and upper limits on production cross-sections were set for monopoles and HECOs of mass 200-2500 GeV and charge in the range $0.5-2.0$ g_D, where g_D is the Dirac charge, and 10 - 60 e, respectively. Magnetic monopoles were also sought in polar volcanic rock using a SQUID magnetometer at ETH, Zürich. No candidates were found leading to limits on the monopole density in polar igneous rocks of 9.8 * 10^{-5}/gram.
4

Flexor tendon injuries of the hand: Chris Hani Baragwanath academic hospital patient demographics

Bismilla, Shaaheen January 2017 (has links)
Degree of Master of Medicine in Orthopaedic surgery Department of Orthopaedics Faculty of Health Sciences University of Witwatersrand / The hand is an intricate and important body appendage which plays a vital role in our activities of daily living. Flexor tendon injuries to the hand make up a large amount of patients seen at hospitals all over the world. Hand injuries are quite common and contribute to approximately 28% of injuries to the human body. A prospective study was conducted, with patients who had sustained flexor tendon hand injuries. The patients who presented to Chris Hani Baragwanath Academic Hospital from 02 March 2015 to 29 July 2015 were included in the study. The aim of this study was to document and identify the causes (mechanism of injury) and demographic details of patients presenting with flexor tendon injuries at Chris Hani Baragwanath Academic Hospital hands unit. There were 96 patients in the study, with 80 being right hand dominant and 16 being left hand dominant. Zones II and zones III were the most common flexor zones affected (27 each). There was also a significant amount of zone V injuries (23). Zone IV was the least common zone affected (5). The results also showed that the most common injury to flexor tendons of the hands occurred in young adult males, the majority of whom were unemployed. This disproves our hypothesis, as it was hypothesised that most injuries would occur in the work place. This study was undertaken in an attempt to reduce the incidence and frequency of hand injuries in our community, by assessing the common causes and patient particulars of flexor tendon injuries. This information can now be used to teach awareness which now can be used in the work place. / MT2017
5

CMS Trigger strategies for the selection of MSSM Higgs bosons using electron tau-jet decay modes

van der Aa, Olivier 07 February 2005 (has links)
The thesis work concentrated on the developments of selection strategies for the observation of MSSM Higgs bosons in the context of the CMS experiment. The thesis shows, by an example with a MSSM (Minimal Supersymmetric Standard Model) Higgs decaying into two tau, how to define the trigger strategy. The method can be applied for any final state.
6

Distributed trigger counting algorithms

Casas, Juan Manual, 1978- 21 February 2011 (has links)
A distributed system consists of a set of N processor nodes and a finite set of communication channels. It is frequently described as a directed graph in which each vertex represents a processor node and the edges represent the communication channels. A global snapshot of a distributed system consists of the local states of all the processor nodes and all of the in-transit messages of a distributed computation. This is meaningful as it corresponds to the global state where all the local states and communication channels of all the processor nodes in the system are recorded simultaneously. A classic example where snapshots are utilized is in the scenario of some failure where the system can restart from the last global snapshot. This is an important application of global snapshot algorithms as it forms the basis for fault-tolerance in distributed programs and aids in serviceability as a distributed program debugging mechanism. Another important application includes checkpointing and monitoring systems where a set of continuous global snapshots are employed to detect when a certain number of triggers have been received by the system. When the distributed system is scaled in terms of an increase in the number of processor nodes and an increase in the number of expected triggers the message complexity increases and impacts the total overhead for the communication and computation of the global snapshot algorithm. In such a large distributed system, an optimal algorithm is vital so that the distributed application program that is employing the snapshots does not suffer from performance degradation as the size of the distributed system continues to grow over time. We are interested in global snapshot algorithms that offer lower bound message complexity and lower bound MaxLoad messages for large values of N processor nodes and large values of W expected triggers. In this report we study and simulate the Centralized, Grid based, Tree Based, and LayeredRand global snapshot algorithms then evaluate the algorithms for total number of messages (sent and received) and MaxLoad messages (sent and received) for the trigger counting problem in distributed computing. The report concludes with simulation results that compare the performance of the algorithms with respect to the total number of messages and MaxLoad messages required by each algorithm to detect when the number of W triggers have been delivered to the distributed system. / text
7

Switching behavior – Varför byter unga konsumenter mobiloperatör?

Boyner, Anton, Göterfelt, Sebastian January 2015 (has links)
No description available.
8

A measurement of the beauty cross section in #pi#'--nucleon interactions at 26GeV centre of mass energy

Batten, Jeremy Connock January 1996 (has links)
No description available.
9

Functional and Physical Interaction between the Trigger Factor Folding Chaperone and the ClpXP Degradation System

Ologbenla, Adedeji 09 December 2013 (has links)
Molecular chaperones and proteases help maintain protein homeostasis in the cell. While chaperones assist in the folding of polypeptide chains to their native state, proteases degrade misfolded or unfolded proteins and also help regulate protein levels. While mapping chaperone interaction networks, we found that tig (trigger factor chaperone gene), clpP and clpX genes co-localize next to each other on the genome of most examined bacteria. This led us to hypothesize that trigger factor (TF) chaperone and ClpXP protease might interact functionally. TF is a ribosome-associated chaperone that co-translationally folds polypeptide chains. ClpXP is a proteolytic complex that degrades a wide range of substrate proteins. We observed that TF enhanced the rate of the ClpXP degradation of the λO phage protein in vitro and in vivo. TF was also found to enhance the degradation of ribosome-stalled λO thus suggesting the existence of co-translational protein degradation in E. coli.
10

KauNet Triggers

Hall, Tomas, Midestad, Andreas January 2010 (has links)
<p>An important aspect of development and research in the field of computer networking systems is evaluation. Through evaluation, performance and behavior of software and protocols over a network can be determined. A network emulator is one of several tools available to accomplish this.</p><p>In this thesis, the network emulator Dummynet is described, as well as its extension KauNet. KauNet extends Dummynet by introducing pattern-driven emulation. A pattern defines specific points at which to apply a certain computer network characteristic or behavior. The use of patterns allow an increased control and repeatability of an emulation. Repeating a test with an identical configuration and the same pattern will yield identical results.</p><p>The goal of the project was to add a new functionality to KauNet. The new functionality consists of a notification system capable of passing information from KauNet to external observers. By adding this new functionality, emulation statistics can be available for the observers immediately when occurring. Another example of information that can be forwarded, is simulated cross-layer information. For KauNet to know when and what information to send, a new type of pattern has been created, called trigger pattern. Trigger patterns behave similarly to the existing patterns, sharing the same structure and processing in KauNet. Through the use of trigger patterns, events may be raised at specific points. The notification system may then be used to pass the event information.</p><p>This thesis describes the evaluation, design and implementation of the trigger patterns and notification system in KauNet. Finally, it concludes with a verification of the new trigger functionality in a usage example.</p><p> </p>

Page generated in 0.0231 seconds