• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 61
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 107
  • 32
  • 14
  • 13
  • 12
  • 12
  • 11
  • 10
  • 10
  • 9
  • 9
  • 9
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Structural Analysis of an Aluminum Pedestrian Bridge in conformity to AASHTO Specifications for Highway Bridges & The Aluminum Association Design Manual

Ortiz-Morgado, Ramon 05 October 2006 (has links)
No description available.
12

Harmonic Syntax in Delius's Late Period Chamber Music (1905 - 1930)

Yie, Hyoun-Kyoung 15 April 2008 (has links)
No description available.
13

Expanded tonality in three early piano works of Béla Bartók (1881-1945)

Brukman, Jeffrey James 11 1900 (has links)
Bart6k's own expanded tonal ("supradiatonic") pronouncements reveal that his music, notwithstanding tonally camouflaging surface details, clearly had a tonal foundation which in many respects is a reaction to the emerging atonalism of Schonberg. Analysis of three piano works (1908 - 1916) reveal that Bart6k's tonal language embraced intuitively the expanded tonal idiom. The harmonic resources Bart6k employed to obscure tonicisation embrace double-degree constructions, quartal formations, chords of addition and omission and other irregular constructions. Diatonic tonal pillars are evident in pedal points, tonic triads and dominant to tonic root movement. Through an application of the Riemann function theory expanded by Hartmann's supposition of fully-chromaticised scales tonal syntax (especially secondphase Strauss cadences or closes) becomes apparent within an expanded tonal product. The analyses conclude that Bart6k's inimitable "sound-world" is a twentieth-century manifestation of traditional tonality's primary tenets. / Musicology / M.Mus.
14

Implementation of Chord-based Peer-to-Peer SIP Internet Telephony System

Chang, Shu-pang 26 July 2010 (has links)
With the development of Internet, more and more people believe that the future telecommunication network will be constructed based on IP technology. Session Initiation Protocol (SIP), which has advantages of simple entrainment method, good scalability and open protocols, is the main research topic on Voice-over-IP (VoIP). Although the client-server architecture currently used by SIP is simple and easy to maintain, it has limitation wherein service quality needs to rely on server performance. To improve this, the Internet Engineering Task Force (IETF) has created a draft to discuss the application of P2P (Peer-to-Peer) architecture in SIP, and we hope that the draft can help to provide good SIP service quality on P2P architecture, such as good fault tolerance and transmission performance. Our research is based on Chord architecture and aims to make P2P SIP architecture in an embedded User Agent. For the SIP internet telephone feature, we adjusts Chord algorithm to meet SIP internet telephone requirements. Furthermore, the adjustment to Chord makes it more applicable to the environment that users continuously join or leave, so that the revised Chord can be implemented with SIP protocol to achieve the P2P SIP goal.
15

A dynamic hashing approach to supporting load balance in P2P systems

Li, Sih-ning 19 June 2006 (has links)
In a P2P (Peer-to-Peer) system, every user node, i.e., the peer, may dynamically join and leave the system. In general, peers can exchange information and contribute portions of their resources to the community in a P2P system. They are treated functionally identical. Therefore, it is very important to efficiently locate the peer that stores a particular data item and make the system load balance in P2P systems. Chord is a structured P2P system which has a ring architecture, where a structured P2P system means that peers maintain information about what resources neighbor peers offer. It provides support for just one operation: to assign the data key to the peer by hashing. Therefore, we can efficiently locate the peer that stores a particular data key. However, in the Chord system, most of data keys may be assigned to the same peer by using the static hashing scheme, which results in the case that the load of the system not be balanced. Therefore, in this thesis, we propose a strategy which uses the dynamic hashing scheme to locate the data key based on the Chord architecture, and to maintain the load balance. A dynamic hashing allows the address space allocated to the file to be increased and reduced without reorganizing the whole file. The basic idea of a dynamic hashing approach is to split the current overflow bucket into two new buckets by using the next level hashing function without reorganizing the other buckets, and our proposed strategy uses such an approach. In our strategy, we use two data structures for a peer, one stores the data hashed to the current peer and the other one stores the data from its predecessor. When an overflow occurs in the bucket after insertion of a data key, we use the one hashing function to split data keys stored in the data bucket. If the capacity of the current peer is larger than that of its successor, we forward some data keys to the successor. Similarly, we also consider the case of an underflow occurs in the bucket after deletion of a data key. Therefore, the unbalanced condition of the load (even distribution of items to nodes) of the system can be improved based on our strategy. From our simulation results, we show that the load of the P2P system based on our strategy is much more balanced than that used in the Chord system, when there are few peers and a lot of data keys in the P2P system. We also show that the load based on our strategy is still more balanced than that used in the Chord system, when the data distribution becomes skew.
16

Strengthening T-Joints of Rectangular Hollow Steel Sections Using Through-Wall Bolts and Externally Bonded FRP Plates

Aguilera, JOSE Jr 28 September 2012 (has links)
T-joints are common in beam-column connections of steel frames, vierendeel girders and at mid-span of N-trusses. Strengthening the members of these structures increases the demand on the joints, which may require joint strengthening. This thesis examines different strengthening techniques of T-joints of RHS members. In Phase I, the effectiveness of through-wall steel bolts is examined. This is accomplished by controlling the web outward buckling of the chord under the brace axial load. The study examined the effect of the number and pattern of bolts, as well as the web height-to-wall thickness (h/t) ratio of the chord, on strengthening effectiveness. Rectangular 203x76x(3.09, 4.5, and 5.92) mm chord members were tested. The 8 mm diameter steel bolts varied from a single bolt to 15 bolts of various distributions. The joint strength increased by 3.1%, 6.2%, and 29% for chords with (h/t) of 34, 45, and 65, respectively. The number and distribution of bolts had little effect on their effectiveness. In Phase II, similar T-joint specimens were strengthened using adhesively bonded GFRP plates, 9.5 mm thick, of different configurations, and 2 mm thick high-modulus CFRP plates of equivalent stiffness. It was shown that strength gain increases significantly, from 9% to 38%, as (h/t) ratio of the HSS chord increases from 34 to 65. In thin-walled HSS (h/t = 65), retrofitting provided significant gains in strength but not in ductility. In thick-walled HSS (h/t = 34), retrofitting provided little strength gain, but enhanced ductility, especially with properly bonded plates extending on the brace. Generally, plates fractured under local bending or delaminated within plate layers while bond was fully intact. In Phase III, selected configurations of the two retrofitting methods were used in additional T-joints with chord (h/t) ratio of 65, to study their effectiveness in presence of axial compression load in the chord. Two sustained load levels were induced in the chord, representing 45% and 80% of its full axial capacity. The transverse brace load was then gradually increased to failure. The through-wall steel bolts increased the joint capacity by 13% to 25%, depending on the chord’s axial load level, while the bonded GFRP plate increased the capacity by 38 to 46%. / Thesis (Master, Civil Engineering) -- Queen's University, 2012-09-28 12:40:44.479
17

Relaxing Routing Table to Alleviate Dynamism in P2P Systems

Fang, Hui, Hsu, Wen Jing, Rudolph, Larry 01 1900 (has links)
In dynamic P2P networks, nodes join and depart from the system frequently, which partially damages the predefined P2P structure, and impairs the system performance such as basic lookup functionality. Therefore stabilization process has to be done to restore the logical topology. This paper presents an approach to relax the requirement on routing tables to provide provably better stability than fixed structured P2P systems. We propose a relaxed Chord that keeps the O(logN) number of hops for greedy lookup, but it requires less stabilization overhead. It allows a tradeoff between lookup efficiency and structure flexibility without adding any overhead to the system. In the relaxed routing structure, each routing entry ("finger") of the node is allowed to vary within a set of values. Each node only needs to keep a certain number of fingers that point to nodes in its anchor set. This relaxation reduces the burden of state management of the node. The relaxed routing scheme provides an alternative structure other than randomized P2P and deterministic P2P, by relaxing on finger selection. It provides good flexibility and therefore extends the system functioning time. / Singapore-MIT Alliance (SMA)
18

Expanded tonality in three early piano works of Béla Bartók (1881-1945)

Brukman, Jeffrey James 11 1900 (has links)
Bart6k's own expanded tonal ("supradiatonic") pronouncements reveal that his music, notwithstanding tonally camouflaging surface details, clearly had a tonal foundation which in many respects is a reaction to the emerging atonalism of Schonberg. Analysis of three piano works (1908 - 1916) reveal that Bart6k's tonal language embraced intuitively the expanded tonal idiom. The harmonic resources Bart6k employed to obscure tonicisation embrace double-degree constructions, quartal formations, chords of addition and omission and other irregular constructions. Diatonic tonal pillars are evident in pedal points, tonic triads and dominant to tonic root movement. Through an application of the Riemann function theory expanded by Hartmann's supposition of fully-chromaticised scales tonal syntax (especially secondphase Strauss cadences or closes) becomes apparent within an expanded tonal product. The analyses conclude that Bart6k's inimitable "sound-world" is a twentieth-century manifestation of traditional tonality's primary tenets. / Musicology / M.Mus.
19

Secure Routing in Structured P2P Overlay : Simulating Secure Routing on Chord DHT

Kassahun, Mebratu January 2015 (has links)
Fully distributed systems offer the highest level of freedom for the users. For this reason, in today’s Internet, it is recorded that more than 50% of the packets moving in and out belong to this type of network. Huge networks of this kind are built on the top of DHTs, which follow a more structured communication compared to the other small peer-to-peer networks. Although nature always favors freedom and independ-ence, security issues force consumers to set up their network in a cen-trally controlled manner. One of security threats posed on such net-works is lookup attacks. A lookup attacks are kind of attacks which targets on disrupting the healthy routing process of the DHTs. Even though the freedom of peer-to-peer networks comes at the cost of securi-ty, it is quite attainable to make the network more secure, especially, it is quite achievable to gain performance on this level of attack according to the experiments carried out in this thesis. The secure routing techniques introduced have been found to outperform those without the techniques under investigation. The simulation performed for default Chord overly and the modified Chord, yielded interesting results, for dropper nodes, random lookup routs and colluding sub-ring attacks.
20

A Theory of Orthography and the Fundamental Bass for the Late Oeuvre of Scriabin

Tomasacci, David Nelson 24 July 2013 (has links)
No description available.

Page generated in 0.0534 seconds