• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1918
  • 597
  • 576
  • 417
  • 240
  • 177
  • 57
  • 53
  • 40
  • 26
  • 26
  • 25
  • 24
  • 23
  • 20
  • Tagged with
  • 4803
  • 533
  • 503
  • 497
  • 429
  • 421
  • 375
  • 362
  • 354
  • 345
  • 340
  • 336
  • 318
  • 318
  • 316
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
471

DESIGN OF A SOFTWARE RADIO GPS RECEIVER

Zhengxuan, Zhang, Yanhong, Kou, Qishan, Zhang 10 1900 (has links)
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada / The GPS receiver based on software radio technology is a kind of general purpose GPS signal processing platform which makes use of advanced design ideas and advanced design tools nowadays. We used FPGA device and lots of necessary peripherals such as DSP and PCI controller in our design to promote flexibility and practicability effectively. Various fast acquisition means and accurate tracking algorithms could be realized, improved and validated on this platform, besides basic GPS receiver function.
472

Code of Conduct- Ett kraftfullt eller handlöst verktyg? : En fallstudie om tre svenska apoteks arbete med Code of Conduct / Code of Conduct

Skogström, Daniela, Thörn, Louise, Grenstadius, Emilia January 2017 (has links)
Bakgrund och problemdiskussion: Att ta ett hållbarhetsansvar blir allt viktigare för företag. Dagens konsumenter blir allt mer medvetna om den negativa påverkan deras konsumtion ger upphov till. Därmed ställs högre krav på företagen att ta ansvar genom hela försörjningskedjan. Ett verktyg för detta är Code of Conduct. Apoteken verkar inom läkemedelsbranschen, en bransch som karaktäriseras av komplexa försörjningskedjor. Då antalet apoteksaktörer sedan omregleringen år 2009 har ökat, ställer vi oss därmed frågan hur svenska apoteks arbete med Code of Conduct riktat mot leverantörer skiljer sig åt.    Syfte: Syftet med studien är att belysa Code of Conduct mot leverantören ur ett företagsperspektiv. Fokus kommer ligga på att analysera de tre utvalda apotekens arbete med Code of Conduct, gentemot den teoretiska referensramen samt apoteken sinsemellan. Innehållsmässiga skillnader i deras skriftliga Code of Conduct, drivkrafter och hur de arbetar med efterlevnad, är utvalda områden som kommer att studeras. Metod: Studien är en flerfallsstudie av kvalitativ art som antar ett positivistiskt synsätt. Forskningsansatsen är deduktiv med en teoretisk referensram som utgångspunkt till det empiriska materialet. Vidare har det empiriska materialet analyserat med hjälp av mönsterjämförelse. Slutsats: Studien har identifierat att det finns stora likheter i hur de tre utvalda apoteken arbetar med Code of Conduct. Innehållsmässigt är apotekens Code of Conduct i grunden relativt lika, men skiljer sig åt i detaljrikedom. Vad gäller drivkrafterna bakom varför apoteken arbetar med Code of Conduct, är det svårt att identifiera en gemensam anledning. Slutligen har identifierats att samtliga tre apotek arbetar snarlikt med efterlevnad, där de vanligaste tillvägagångssätten är audits och dokumentation.
473

Bobox Runtime Optimization / Bobox Runtime Optimization

Krížik, Lukáš January 2015 (has links)
The goal of this thesis is to create a tool for an optimization of code for the task-based parallel framework called Bobox. The optimizer tool reduces a number of short and long running tasks based on a static code analysis. Some cases of short-running tasks cause an unnecessary scheduling overhead. The Bobox scheduler can schedule a task even though the task does not have all input data. Unless, the scheduler has enough information not to schedule such task. In order to remove such short-running task, the tool analyses its input usage and informs the scheduler. Long-running tasks inhibit a parallel execution in some cases. A bigger task granularity can significantly improve execution times in a parallel environment. In order to remove a long-running task, the tool has to be able to evaluate a runtime code complexity and yield a task execution in the appropriate place. Powered by TCPDF (www.tcpdf.org)
474

Développement d'applications logicielles sûres de fonctionnement : une approche dirigée par la conception / Development of dependable applications : a design-driven approach

Enard, Quentin 06 May 2013 (has links)
Dans de nombreux domaines tels que l’avionique, la médecine ou la domotique, les applications logicielles jouent un rôle de plus en plus important, allant jusqu’à être critique pour leur environnement. Afin de pouvoir faire confiance à ces applications, leur développement est contraint par des exigences de sûreté de fonctionnement. En effet il est nécessaire de démontrer que ces exigences de haut-niveau sont prises en compte tout au long du cycle de développement et que des solutions concrètessont mises en œuvre pour parvenir à les respecter. De telles contraintes rendent le développement d’applications sûres de fonctionnement particulièrement complexe et difficile. Faciliter ce processus appelle à la recherche de nouvelles approches dedéveloppement qui intègrent des concepts de sûreté de fonctionnement et guident les développeurs lors de chacune des étapesnécessaires à la production d’une nouvelle application digne de confiance.Cette thèse propose ainsi de s’appuyer sur une approche dirigée par la conception pour guider le développement des applications sûres de fonctionnement. Cette approche est concrétisée à travers une suite d’outils nommée DiaSuite et offre du support dédié à chaque étape du développement. En particulier, un langage de conception permet de décrire à la fois les aspects fonctionnels et non-fonctionnels des applications en se basant sur un paradigme dédié et en intégrant des concepts de sûreté de fonctionnement tels que le traitement des erreurs. A partir de la description d’une application, du support est généré pour guider les phases d’implémentation et de vérification. En effet, la génération d’un framework de programmation dédié permet de guider l’implémentation tandis que la génération d’un modèle formel permet de guider la vérification statique de l’application et qu’un support de simulation permet de faciliter les tests. Cette approche est évaluée grâce à des cas d’études réalisés dans les domaines de l’avionique et de l’informatique ubiquitaire. / In many domains such as avionics, medecine or home automation, software applications play an increasingly important rolethat can even be critical for their environment. In order to trust these applications, their development is contrained by dependability requirements. Indeed, it is necessary to demonstrate that these high-level requirements are taken into account throughout the development cycle and concrete solutions are implemented to achieve compliance. Such constraints make the development of dependable applications particularly complex and difficult. Easing this process calls for the research of new development approaches that integrate dependability concepts and guide the developers during each step of the development of trustworthy applications.This thesis proposes to leverage a design-driven approach to guide the development of dependable applications. This approachis materialized through a tool-suite called DiaSuite and offers dedicated support for each stage of the development. Inparticular, a design language is used to describe both functional and non-functional applications. This language is based on adedicated paradigm and integrates dependability concepts such as error handling. From the description of an application, development support is generated to guide the implementation and verification stages. Indeed, the generation of a dedicated programming framework allows to guide the implementation while the generation of a formal model allows to guide the static verification and simulation support eases the testing. This approach is evaluated through case studies conducted in the domains of avionics and pervasive computing.
475

La codification française comme référence pour le législateur vietnamien / French codification - the reference for Vietnamese lawmakers

Nguyễn, Ngọc Vũ 25 November 2013 (has links)
La codification, qui a plus de 4000 ans d’histoire, vise à assurer la sécurité juridique tout en exigeant une forte volonté politique. Il s’agit d’une technique juridique qui a connu plusieurs âges d’or, et également des périodes moins propices, voire de régression. Elle découle de multiples enjeux techniques, sociaux et politiques. On distingue de nombreux types de codification. Ils mobilisent deux principales méthodes, la codification-modification et la codification-compilation. Les acteurs de la codification, ses étapes ainsi que la composition du code sont des processus importants pour caractériser la technique mobilisée. Cette recherche présente l’expérience française en la matière. Son ambition est de fournir un cadre de référence au législateur vietnamien en vue d’améliorer le système juridique de ce pays. / Codification is a more than 4000-year old process aiming to assure juridical security while requiring strong political back-up. This judicial technique has been through several golden ages as well as periods of less favorable development. Codification has produced numerous technical, social and political outcomes through a large number of different approaches. Codification-modification and codification-compilation are two major methods in codification. Techniques also differ in relation to stakeholders involved, stages in codification as well as code structure. This research is an analysis of France’s experience in those fields. It aims to produce a reference framework to lawmakers in Vietnam in view of improving the national legal framework.
476

Implementability of distributed systems described with scenarios / Implémentabilité de systèmes distribués décrits à l'aide de scénarios

Abdallah, Rouwaida 16 July 2013 (has links)
Les systèmes distribués sont au cœur de nombreuses applications modernes (réseaux sociaux, services web, etc.). Cependant, les développeurs sont confrontés à de nombreux défis dans l’implémentation des systèmes distribués, notamment les comportements erronés à éviter et qui sont causées par la concurrence entre les entités de ce système. La génération automatique de code à partir des exigences des systèmes distribués reste un vieux rêve. Dans cette thèse, nous considérons la génération automatique d'un squelette de code portant sur les interactions entre les différentes entités d'un système distribué. Cela nous permet d'éviter les comportements erronés causés par la concurrence. Ensuite, ce squelette peut être complété par l'ajout et le débogage du code qui décrit les actions locales qui se passent sur chaque entité indépendamment de ses interactions avec les autres entités. / Distributed systems lie at the heart of many modern applications (social networks, web services, etc.). However, developers face many challenges in implementing distributed systems. The major one we focus on is avoiding the erroneous behaviors, that do not appear in the requirements of the distributed system, and that are caused by the concurrency between the entities of this system. The automatic code generation from requirements of distributed systems remains an old dream. In this thesis, we consider the automatic generation of a skeleton of code covering the interactions between the entities of a distributed system. This allows us to avoid the erroneous behaviors caused by the concurrency. Then, in a later step, this skeleton can be completed by adding and debugging the code that describes the local actions happening on each entity independently from its interactions with the other entities. The automatic generation that we consider is from a scenario-based specification that formally describes the interactions within informal requirements of a distributed system. We choose High-level Message Sequence Charts (HMSCs for short) as a scenario-based specification for the many advantages that they present: namely the clear graphical and textual representations, and the formal semantics. The code generation from HMSCs requires an intermediate step, called “Synthesis” which is their transformation into an abstract machine model that describes the local views of the interactions by each entity (A machine representing an entity defines sequences of messages sending and reception). Then, from the abstract machine model, the skeleton’s code generation becomes an easy task. A very intuitive abstract machine model for the synthesis of HMSCs is the Communicating Finite State Machine (CFSMs). However, the synthesis from HMSCs into CFSMs may produce programs with more behaviors than described in the specifications in general. We thus restrict then our specifications to a sub-class of HMSCs named "local HMSC". We show that for any local HMSC, behaviors can be preserved by addition of communication controllers that intercept messages to add stamping information before resending them. We then propose a new technique that we named "localization" to transform an arbitrary HMSC specification into a local HMSC, hence allowing correct synthesis. We show that this transformation can be automated as a constraint optimization problem. The impact of modifications brought to the original specification can be minimized with respect to a cost function. Finally, we have implemented the synthesis and the localization approaches into an existing tool named SOFAT. We have, in addition, implemented to SOFAT the automatic code generation of a Promela code and a JAVA code for REST based web services from HMSCs.
477

Study of the evolution of legislation on offences relating to religion in British India and their implications in contemporary Pakistan

Nazir, Farhana Anthony January 2014 (has links)
The offence of blasphemy and its implications is one of the critical issues in Pakistan today. This research examines the historical setting and gradual amendment of blasphemy laws and their impact on religious communities in Pakistan. The law of blasphemy belongs to two historical periods. First, the era when the country was under military rule by the British during the colonial period: they originally framed Chapter XV of Offences Relating to Religion of the Indian Penal Code (IPC) in 1860. Secondly, its application in an independent subcontinent gradually moved from its original intention in Pakistan after 1947. In 1980s Pakistan, both the intentions of this law and its penalties were significantly altered, becoming the law which people now known as the law of blasphemy. Since the law was amended, it has made people in all religious communities, particularly minorities, critically vulnerable to malicious or unfounded accusation and has been interpreted and applied to varying effects. This historical review shows how Pakistan, though claiming to be secular and to protect all religions and communities, has actually become an exclusively Islamic country. Amending Chapter XV of Offences Relating to Religion was one of the important steps to Islamise Pakistan. This research considers a range of legal, political and constitutional questions concerning the law of blasphemy and religious communities both in pre and post-colonial periods, exploring how the law and religious communities have been and are affected by politics and legislation. In so doing, it will appraise politically significant religious laws, values and activities.
478

Développement prouvé de composants formels pour un générateur de code embarqué critique pré-qualifié / Proved Development of Formal Components for a Pre-Qualified Critical Embedded Code Generator

Izerrouken, Nassima 06 July 2011 (has links)
Nous nous intéressons au développement prouvé de composants formels pour un générateur de code pré-qualifié. Ce dernier produit un code séquentiel (C et Ada) pour des modèles d'entrée qui combinent les flots de données et de contrôle et qui présentent des possibilités d'exécution concurrente (Simulink/Stateflow et Scicos). Le développement prouvé permet de réduire le coût des tests et d'augmenter l'assurance des outils développés avec cette approche vis-à-vis de la qualification. Les phases de spécification, de développement et de vérification des outils développés sont effectuées avec l'assistant de preuve Coq. Ce dernier permet d'extraire le contenu calculatoire des composants en préservant les propriétés prouvées en Coq. Ce code extrait est ensuite intégré dans une chaîne complète de développement (chaîne de GeneAuto). Nous présentons un cadre formel, inspiré de l'analyse statique, qui s'appuie sur la sémantique abstraite et qui est instanciable sur plusieurs composants du générateur de code. Nous nous basons sur les ensembles partiellement ordonnés et sur le calcul de point fixe pour définir le cadre et effectuer les différentes analyses des composants du générateur de code. Ce cadre formel comporte toutes les preuves communes aux composants et indépendantes des analyses effectuées. Deux composants sont étudiés : l'ordonnanceur et le typeur des modèles d'entrée. / We are interested in the proved development of formal components for a pre-qualified code generator. This produces a sequential code (C and Ada) for input models that combine data and control flows, with potential concurrent execution (Simulink/Stateflow and Scicos). The proved development reduces test cost and increases insurance of components developed with this approach regarding the qualification. Phases of specification, development and verification of the developed components are done with the Coq proof assistant. This allows to extract the computational content of the components preserving the properties proved in Coq. The extracted code is then integrated into the complete development tool-chain (GeneAuto tool-chain). We present a formal framework, inspired from static analysis, based on the abstract semantics which is instantiable to several components of the code generator. We rely on partially ordered sets and fixed-point to define de formal framework and to perform the various analysis of components of the code generator. This formal framework includes all proofs common to the components and independent from the performed analyses. Two components are studied : the scheduler and the type checker of input models.
479

Ethnographie des conflits domestiques en Kabylie : injures, commérages, malédictions / Ethnography of domestic conflicts in Kabylia : insults, gossip, maledictions

Khichane, Samia 05 December 2018 (has links)
En Kabylie, société de tradition patriarcale à domination masculine, les femmes ont recouru pendant des siècles à une multitude de pratiques détournées, décrites dans la littérature comme des « contre-pouvoirs » (Lacoste-Dujardin, 1985, 2008). À travers nombre de processus, elles semblent avoir de tout temps défié l’autorité dominante par le recours à des pratiques magiques, par une adaptation aux normes et valeurs de la société, mais surtout par la subtilité et la maîtrise de l’art de la parole. L’injure féminine, en tant qu’acte de langage, fait également partie des stratégies qu’utilisent les femmes kabyles afin d’exercer leur pouvoir de manière indirecte sur la société dominante, autrement dit, sur les hommes.La plupart des recherches qui se sont penchées sur la question de l’injure en Kabylie ont été menées par des anthropologues qui l’abordent dans son aspect ritualisé (Aït-Ferroukh, 1999 ; Rabia, 1988) ou par des linguistes dont les réflexions portent essentiellement sur le critère sémantique envisagé en rapport avec la vision du monde et la société (Mebtouche-Nejai 2012). Dans la perspective anthropologique qui m’intéresse, l’injure sera appréhendée comme un ensemble d’actes sociaux porteurs de conséquences (Laforêt et Vincent, 2004), plutôt que comme une catégorie de parole dépréciative, d’où la nécessité de prendre en compte sa valeur pragmatique dans la dimension du tort causé ou subi ou effet injure (Larguèche 1983, 1993, 2004, 2009) qui est nécessaire à sa compréhension.En m’appuyant sur les spécificités typologiques de l’injure féminine, je tenterai de montrer, dans une optique essentiellement pragmatique, comment dans une société à domination masculine où la parole est codifiée, l’injure, en tant que transgression langagière, permet aux femmes d’exercer leur pouvoir de manière indirecte. L’examen de ces procédés permettra de cerner les enjeux du pouvoir féminin et de voir dans quelle mesure l’injure peut être utilisée comme contre-pouvoir. / In Kabylia, a society with a male-domination patriarchal tradition, women have employed for many centuries a set of indirect practices, defined in the literature as « counter-powers » (Lacoste-Dujardin, 1985, 2008). Through several processes, they looked as they have always defied the dominant authority by exercising magical practices, adapting to the norms and values of society, but also, by their mastery and subtle use of the art of speech. Female term of abuse, as an act of language, is one of the strategies used by kabyle women to exert their power in an indirect manner on the dominant society, constituted by the men.Most of the research work that focused on the issue of insults in Kabylia has been conducted by anthropologists who analyzed it in its ritualized aspect (Aït-Ferroukh, 1999, Rabia, 1988) or by linguists whose reflections were conducted essentially on the semantic criterion in relation with the worldview and society (Mebtouche-Nejai, 2012). In the anthropological perspective that interests me, the insult will be apprehended as a set of social acts with consequences (Laforêt and Vincent, 2004), rather than as a category of deprecating speech, hence the need to take into account its pragmatic value in the dimension of the harm caused or suffered or the insulting effect (Larguèche, 1983, 1993, 2004, 2009) which is necessary for its comprehension.Based on the typological specifics of female insults, I will try to show, from an essentially pragmatic perspective, in a male-dominating society where the speech is codified, how the insult, as a linguistic transgression, allows women to exert their power indirectly. Examining these processes will help to identify the stakes of feminine power and to see at what extent the insult can be used as a counter-power.
480

Code-mixing in Hong Kong Cantonese-English bilinguals: constraints and processes.

January 1992 (has links)
Brian Chan Hok-shing. / Thesis (M.A.)--Chinese University of Hong Kong, 1992. / Includes bibliographical references. / Abstract / Acknowledgements / Chapter 1. --- Introduction / Chapter 1.1 --- "Defining ""Code´ؤmixing""" / Chapter 1.2 --- Code-mixing in Hong Kong / Chapter 1.3 --- Aims and Objectives / Chapter 2. --- Syntactic Constraints on CM / Chapter 2.1 --- Language-universal constraints / Chapter 2.1.1 --- The Free Morpheme constraint / Chapter 2.1.2 --- The Equivalence constraint / Chapter 2.1.3 --- The Government constraint / Chapter 2.1.4 --- The Matrix Code Principle / Chapter 2.1.5 --- The Dual Structure Principle / Chapter 2.2 --- Language´ؤspecific constraints / Chapter 2.2.1 --- """Closed-Class"" word constraint" / Chapter 2.2.2 --- "The ""fragment"" constraint" / Chapter 2.2.3 --- "The ""innermost"" constituent constraint" / Chapter 3. --- A Linguistic Description of Cantonese -English code- mixing / Chapter 3.1 --- Data / Chapter 3.2 --- The major patterns and the minor patterns / Chapter 3.3 --- The major patterns: single word cases / Chapter 3.3.1 --- Verb-mixing / Chapter 3.3.2 --- Noun-mixing / Chapter 3.3.3 --- Adjective or adverb-mixing / Chapter 3.3.4 --- Preposition or conjunction-mixing / Chapter 3.4 --- The minor patterns: fragments / Chapter 3.4.1 --- Form and structure / Chapter 3.4.2 --- Cantonese fragments under English phrase structure / Chapter 4. --- Critique of the major constraints and principles / Chapter 4.1 --- The Free Morpheme constraint / Chapter 4.2 --- The Equivalence constraint / Chapter 4.3 --- The Government constraint / Chapter 4.4 --- The Matrix Code principle / Chapter 4.5 --- The Dual Structure principle / Chapter 5. --- Revised constraints / Chapter 5.1 --- The Category Equivalence constraint / Chapter 5.1.1 --- Generalizations from the patterns / Chapter 5.1.2 --- Rationale of the Category Equivalence constraint / Chapter 5.1.3 --- Categorical non-equivalence / Chapter 5.1.4 --- Insufficiency / Chapter 5.2 --- The Bound Morpheme constraint / Chapter 5.3 --- The Specifier constraint / Chapter 6. --- Processes / Chapter 6.1 --- Previous Models / Chapter 6.1.1 --- The Equivalence model / Chapter 6.1.2 --- The Matrix Code model / Chapter 6.1.3 --- The Dual Structure model / Chapter 6.2 --- A revised model / Chapter 6.2.1 --- Assumptions / Chapter 6.2.1.1 --- The Distinction between the matrix code (MC) and the embedded code (EC) / Chapter 6.2.1.2 --- Interface between MC grammar and EC lexicon / Chapter 6.2.1.3 --- "Interface between EC lexicon, EC grammar and MC grammar" / Chapter 6.2.1.4 --- Other interfaces not activated / Chapter 6.3 --- Constraints revisited / Chapter 7. --- The Case of Nonce Borrowing / Chapter 7.1 --- Definitions / Chapter 7.2 --- Objections / Notes / Chapter Appendix: --- A Database of Cantonese-English Code´ؤmixing / Bibliography

Page generated in 0.0632 seconds