Spelling suggestions: "subject:"core,""
291 |
A case study of child-directed speech (CDS) a Cantonese child living in Australia /Wong, Shuk-wai, Connie Waikiki, January 2006 (has links)
Thesis (M. A.)--University of Hong Kong, 2006. / Title proper from title frame. Also available in printed format.
|
292 |
Code InspectionKrishnamoorthy, Shyaamkumaar January 2009 (has links)
<p>Real time systems, used in most of the day-to-day applications, require time critical exection of tasks. Worst Case Execution Time Analysis (WCET) is performed to ensure the upper bound on the time they can take to execute. This work aims to perform a static analysis of the industry standard code segments to provide valuable information to aid in choosing the right apporach towards WCET analysis. Any code segment can be analyzed syntactically, to gain some insights to the effects that a particular coding syntax format may have. With focus on the functions and looping statements, vaulable information regarding the code segments inspected can be obtained. For this purpose, the code segments from CC systems, Vasteras , were inspected. Scope graphs generated by SWEET, the Swedish Execution Time tool were used extensively to aid this work. It was found that syntactical analysis could be performed effectively for the code segments that were analysed as a part of this task.</p>
|
293 |
Att vara tvåspråkig : En studie av gymnasieelever med turkisk bakgrund och deras syn på att vara tvåspråkigArisoy, Fatma January 2009 (has links)
<p>The purpose of the thesis is to see how Turkish students understand their bilingualism. I have tried to explain bilingualism as a phenomenon and give an insight in national steering documents on the basis of different concepts used by researchers.</p><p>The method consists of qualitative interviews with standardized character. Five upper-secondary school students participated and independently discussed the answers.</p><p>The result from the interviews is the participators view on bilingualism. The answers were varying. I have got the answer of my question through the interviews and researches. The result is also connected to relevant theories.</p>
|
294 |
Code optimization and detection of script conflicts in video gamesYang, Yi 11 1900 (has links)
Scripting languages have gained popularity in video games for specifying the interactive content in a story. Game designers do not necessarily possess programming skills and often demand code-generating tools that can transform textual or graphical descriptions of interactions into scripts interpreted by the game engine. However, in event-based games, this code generation process may lead to potential inefficiencies and conflicts if there are multiple independent sources generating scripts for the same event. This thesis presents solutions to both perils: transformations to eliminate redundancies in the generated scripts and an advisory tool to provide assistance in detecting unintended conflicts. By incorporating traditional compiler techniques with an original code-redundancy-elimination approach, the code transformation is able to reduce code size by 25% on scripts and 14% on compiled byte-codes. With the proposed alternative view, the advisory tool is suitable for offering aid to expose potential script conflicts.
|
295 |
Interference cancellation for shot-code DS-CDMA in the presence of channel fadingDutta, Amit K. 21 August 1997 (has links)
Interference from other adjacent users in wireless applications is a major problem
in direct-sequence code-division multiple-access (DS-CDMA). This is also known as the
near-far problem where a strong signal from one user interferes with other users. The
current approach to deal with the near-far problem in DS-CDMA systems is to use strict
transmitter power control. An alternative approach is to use near-far resistant receivers.
The practical near-far resistance receiver structure is the adaptive decorrelating detectors
since it avoids complex matrix inversion.
The existing CDMA standard known as IS-95 uses a long signature code
sequence. However for simplicity, the adaptive multi-user receiver uses short signature
code sequence. The problem is that adaptive receivers lose near-far resistance as the
number of users increases in the system. This thesis describes a novel method of multistage
decision feedback cancellation (DFC) scheme immune from the near-far problem.
The performance of the new DFC structure is constructed using three different adaptive
algorithms: the least mean squared (LMS), the recursive least squared (RLS) and the
linearly constraint constant modulus (LCCM) adaptive algorithms. It is found that LMS
adaptive algorithm provides the best result considering its simple hardware complexity.
It is also found that the LMS adaptive receiver along with the DFC structure provides a
better bit synchronization capability to the over all system. Since the receiver is near-far
resistant, the LMS adaptive receiver along with the decision feedback cancellation
structure also performs better in the presence of Rayleigh fading. / Graduation date: 1998
|
296 |
Joint convolutional and orthogonal decoding of interleaved-data frames for IS-95 CDMA communicationsRabinowitz, David 29 February 1996 (has links)
IS-95, an interim standard proposed for future digital personal communications
systems, uses two levels of encoding of digital data for error control and compatibility
with code-division multiple access (CDMA) transmission. The data is first
convolutionally encoded and the resulting symbols are interleaved and then groups are
encoded as orthogonal Walsh sequences. Decoding these two separate encodings is
traditionally done in separate sequential steps. By combining the decoding and applying
feedback of the final decision of the second level of decoding to the first level decoder
it is possible to reduce the error rate of the decoder.
Each Walsh sequence encodes six non-adjacent symbols of the convolutional code.
The receiver computes an estimate of the probability that each of the sixty-four possible
Walsh sequences has been sent, and uses this estimate as an estimate for each of the
convolution symbols which specified the Walsh sequence. Since the convolution symbols
are non-adjacent, it is likely that the actual value of some of the earlier symbols will have
been determined by the final decoder before later symbols specifying the same Walsh
sequence are used by the convolution decoder. The knowledge of the values of these
symbols can be used to adjust the probability estimates for that Walsh sequence,
improving the likelihood that future convolutional symbols will be correctly decoded.
Specific metrics for estimating probabilities that each convolutional symbol was
sent were tested with and without the proposed feedback, and error rates were estimated
based on extensive computer simulations. It was found that applying feedback does
improve error rates. Analytical methods were also applied to help explain the effects. / Graduation date: 1996
|
297 |
Code InspectionKrishnamoorthy, Shyaamkumaar January 2009 (has links)
Real time systems, used in most of the day-to-day applications, require time critical exection of tasks. Worst Case Execution Time Analysis (WCET) is performed to ensure the upper bound on the time they can take to execute. This work aims to perform a static analysis of the industry standard code segments to provide valuable information to aid in choosing the right apporach towards WCET analysis. Any code segment can be analyzed syntactically, to gain some insights to the effects that a particular coding syntax format may have. With focus on the functions and looping statements, vaulable information regarding the code segments inspected can be obtained. For this purpose, the code segments from CC systems, Vasteras , were inspected. Scope graphs generated by SWEET, the Swedish Execution Time tool were used extensively to aid this work. It was found that syntactical analysis could be performed effectively for the code segments that were analysed as a part of this task.
|
298 |
Language and Identity: Bilingual Code-switching in Spanish-English InterviewsVelasquez, Maria Cecilia 01 January 2011 (has links)
The relationship in a bilingual conversation between language choice and identity has been the subject of research in different disciplines such as sociolinguistics, psycholinguistics, and second language acquisition among others. The purpose of this research was to understand why and how language alternation occurs in bilingual interviews and its potential connection with identity. The data analyzed was from interviews from Proyecto Latino@, a previous research on Latin@ high school students’ experiences in schools and their academic engagement and/or disengagement. Participants’ narratives of their experiences indicated that code-switching is a result and a process of cultural adaptation. Code-switching in this research presented ways in which participants re-created their own concept of identity. Bilinguals of the Proyecto Latin@ portrayed a multiple identities construction –Spanish- English – when code-switching.
|
299 |
Language and Identity: Bilingual Code-switching in Spanish-English InterviewsVelasquez, Maria Cecilia 01 January 2011 (has links)
The relationship in a bilingual conversation between language choice and identity has been the subject of research in different disciplines such as sociolinguistics, psycholinguistics, and second language acquisition among others. The purpose of this research was to understand why and how language alternation occurs in bilingual interviews and its potential connection with identity. The data analyzed was from interviews from Proyecto Latino@, a previous research on Latin@ high school students’ experiences in schools and their academic engagement and/or disengagement. Participants’ narratives of their experiences indicated that code-switching is a result and a process of cultural adaptation. Code-switching in this research presented ways in which participants re-created their own concept of identity. Bilinguals of the Proyecto Latin@ portrayed a multiple identities construction –Spanish- English – when code-switching.
|
300 |
Manipulation de code et avant-garde : pour une littérature hackéeLegault, Jean-François 01 1900 (has links) (PDF)
Dans le cyberespace, les distinctions entre les différentes acceptions du mot code deviennent poreuses : le code juridique cède le pas au code informatique dans son rôle coercitif, le code informatique possède la même étoffe qu'un code secret pour l'utilisateur moyen, etc. L'hypothèse principale de ce mémoire est qu'on doit laisser de côté la représentation traditionnelle du hackeur en tant que pirate informatique pour n'adopter que la stricte définition suivante : le hackeur est un manipulateur de code, quel que soit ce code. Selon André Belleau, « l'institution [...] agit comme le code des codes. » En conséquence, il devient possible de considérer les mouvements d'avant-garde du siècle dernier comme des hackeurs d'avant l'heure puisqu' ils ont relevé le pari qu'en contestant et en renouvelant les codes esthétiques institutionnels, ils transformeraient dans la foulée les codes politiques de leur société. À la suite de l'analyse des multiples manifestes produits par le hackeur au cours de son histoire, on peut rétrospectivement émanciper sa praxis hors de l'étroite sphère informatique où on l'avait relégué pour lui faire investir l'ensemble des champs de l'activité humaine. Prospectivement, on peut affirmer que si le transvasement de l'institution culturelle vers le cyberespace s'effectue sur un mode conflictuel, c'est en raison d'une difficulté pour le code institutionnel de s'amalgamer au code informatique. Là où l'avant-garde artistique au sens traditionnel s'essouffle, le hackeur prend le pas et produit quantité d'œuvres qui procèdent de la manipulation d'un code et ce faisant, mettent en tension des enjeux spécifiques à ce code. On pourrait par exemple considérer les œuvres distribuées sous licence Creative Commons comme un hack du langage juridique utilisé pour formuler le droit d'auteur, lequel hack remet en question la relation institutionnalisée entre l'éditeur et l'auteur. Le repliement du code de la langue sur le code du langage de programmation dans le poégramme, ou poème-programme, pourra par ailleurs constituer la preuve que l'informatique n'est pas qu'un véhicule d'expression artistique, au contraire qu'on y trouve en son cœur l'Art et la Beauté.
______________________________________________________________________________
MOTS-CLÉS DE L’AUTEUR : avant-garde, code, cyberespace, hackeur, Internet, institution, manifeste, ordinateur
|
Page generated in 0.045 seconds