• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2563
  • 1073
  • 779
  • 356
  • 271
  • 251
  • 93
  • 66
  • 54
  • 41
  • 37
  • 36
  • 34
  • 34
  • 32
  • Tagged with
  • 6668
  • 870
  • 779
  • 718
  • 638
  • 577
  • 550
  • 545
  • 406
  • 374
  • 354
  • 343
  • 334
  • 294
  • 260
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
681

De l’individualité familiale à l’identification composite : La compréhension de l’expérience de genre des migrant.e.s iranien.ne.s en France / From family individuality to composite identification : Understanding the gender experience of Iranian migrants in France

Khazaei, Tahereh 09 November 2018 (has links)
Cette thèse propose une analyse sociologique compréhensive du travail d’individuation et d’identification de genre des migrant.e.s iranien.ne.s en France et s’inscrit dans la question sociologique plus générale des formes d’adaptation des acteurs à un nouvel environnement social, moral et normatif. C’est particulièrement le cas entre la France et l’Iran en raison des contrastes concernant les identités et les rôles de genre et la sexualité. La thèse a pour objectif de répondre à deux questions. Comment ces personnes migrantes font-elles pour adapter leur travail d’identification de genre forgée en Iran aux nouvelles normes et aux nouveaux attendus propres à une société française, non plus imaginée depuis l’Iran, mais éprouvée socialement ? Symétriquement, quels sont ces attendus et ces normes de genre propres à la société française que doivent découvrir, comprendre et prendre en compte (d’une manière ou d’une autre) ces hommes et ces femmes venus d’Iran ? L’idée qui guide la recherche est que l’appareillage théorique classique (acculturation, intégration, socialisation) ne permet sans doute pas de rendre compte de la dimension composite d’une adaptation au nouvel environnement qui combine à la fois l’adoption de nouvelles normes et pratiques, la conservation de ce qui n’est pas flexible dans l’habitus et/ou les convictions religieuses et la syncrétisation d’une néo-ethnicité irano-française. L’enquête a été réalisée par entretiens et observation au sein des espaces domestiques auprès d’hommes et de femmes ayant été totalement socialisés au sein de la société postrévolutionnaire iranienne et qui, devenus migrants en France, doivent comprendre (en une « ethnologie inversée ») et s’adapter aux normes françaises de féminité par le vêtement, aux interactions entre les hommes et les femmes, et à une sexualité dissociée de la conjugalité, le tout dans un contexte fortement contraint par les stéréotypes négatifs envers les migrants du Sud et les musulmans. Ce travail d’individuation peut se résumer au final par l’articulation sous tension entre deux principales dimensions de leur expérience : une « individualité familiale » issue de leur socialisation en Iran et qui est partie-prenante d’une « identification composite » faite d’un travail continu et réflexif d’ajustement social et subjectif. / This thesis proposes a comprehensive sociological analysis of the work of individuation and gender identification of Iranian migrants in France, as a part of the broader sociological question of the adaptation of actors to a new social, moral and normative environment. This is particularly the case between France and Iran because of the contrasts concerning identities and gender roles and sexuality. The thesis aims to answer two questions. How do these migrant people adapt their gender identification forged in Iran to the new norms and expectations of a French society, no longer imagined from Iran, but socially experimented? Symmetrically, what are these expectations and norms of gender specific to the French society that must discover, understand and take into account (in one way or another) these men and women from Iran? The idea that guides the research is that the classical theoretical apparatus (acculturation, integration, socialization) probably does not allow to account for the composite dimension of an adaptation to the new environment that combines both the adoption of new norms and practices, the preservation of what is not flexible in habitus and / or religious convictions and the syncretization of an Iranian-French neo-ethnicity. The survey was conducted through interviews and observation in domestic spaces with men and women who have been fully socialized in the post-revolutionary Iranian society and who, having become migrants in France, must understand (through an "inverted ethnology" ) and adapt to French norms of femininity through clothing, interactions between men and women and a sexuality divorced from conjugality, all in a context strongly constrained by negative stereotypes towards migrants from the South and Muslims. This work of individuation can be summed up in the end by the tension between two main dimensions of their experience: a "family individuality" stemming from their socialization in Iran, which is a complicated part of a new "composite identification" made through a continuous and reflexive work of social and subjective adjustments.
682

Mobile personal authentication using fingerprint.

January 2004 (has links)
Cheng Po Sum. / Thesis submitted in: July 2003. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 64-67). / Abstracts in English and Chinese. / List of Figures --- p.i / List of Tables --- p.iii / Acknowledgments --- p.iv / 摘要 --- p.v / Thesis Abstract --- p.vi / Chapter 1. --- Mobile Commerce --- p.1 / Chapter 1.1 --- Introduction to Mobile Commerce --- p.1 / Chapter 1.2 --- Mobile commence payment systems --- p.2 / Chapter 1.3 --- Security in mobile commerce --- p.5 / Chapter 2. --- Mobile authentication using Fingerprint --- p.10 / Chapter 2.1 --- Authentication basics --- p.10 / Chapter 2.2 --- Fingerprint basics --- p.12 / Chapter 2.3 --- Fingerprint authentication using mobile device --- p.15 / Chapter 3. --- Design of Mobile Fingerprint Authentication Device --- p.19 / Chapter 3.1 --- Objectives --- p.19 / Chapter 3.2 --- Hardware and software design --- p.21 / Chapter 3.2.1 --- Choice of hardware platform --- p.21 / Chapter 3.3 --- Experiments --- p.25 / Chapter 3.3.1 --- Design methodology I - DSP --- p.25 / Chapter 3.3.1.1 --- Hardware platform --- p.25 / Chapter 3.3.1.2 --- Software platform --- p.26 / Chapter 3.3.1.3 --- Implementation --- p.26 / Chapter 3.3.1.4 --- Experiment and result --- p.27 / Chapter 3.3.2 --- Design methodology II ´ؤ SoC --- p.28 / Chapter 3.3.2.1 --- Hardware components --- p.28 / Chapter 3.3.2.2 --- Software components --- p.29 / Chapter 3.3.2.3 --- Implementation Department of Computer Science and Engineering --- p.29 / Chapter 3.3.2.4 --- Experiment and result --- p.30 / Chapter 3.4 --- Observation --- p.30 / Chapter 4. --- Implementation of the Device --- p.31 / Chapter 4.1 --- Choice of platforms --- p.31 / Chapter 4.2 --- Implementation Details --- p.31 / Chapter 4.2.1 --- Hardware implementation --- p.31 / Chapter 4.2.1.1 --- Atmel FingerChip --- p.32 / Chapter 4.2.1.2 --- Gemplus smart card and reader --- p.33 / Chapter 4.2.2 --- Software implementation --- p.33 / Chapter 4.2.2.1 --- Operating System --- p.33 / Chapter 4.2.2.2 --- File System --- p.33 / Chapter 4.2.2.3 --- Device Driver --- p.35 / Chapter 4.2.2.4 --- Smart card --- p.38 / Chapter 4.2.2.5 --- Fingerprint software --- p.41 / Chapter 4.2.2.6 --- Graphical user interface --- p.41 / Chapter 4.3 --- Results and observations --- p.44 / Chapter 5. --- An Application Example 一 A Penalty Ticket Payment System (PTPS) --- p.47 / Chapter 5.1 --- Requirement --- p.47 / Chapter 5.2 --- Design Principles --- p.48 / Chapter 5.3 --- Implementation --- p.52 / Chapter 5.4 --- Results and Observation --- p.57 / Chapter 6. --- Conclusions and future work --- p.62 / Chapter 7. --- References --- p.64
683

The statistical evaluation of minutiae-based automatic fingerprint verification systems. / CUHK electronic theses & dissertations collection

January 2006 (has links)
Basic technologies for fingerprint feature extraction and matching have been improved to such a stage that they can be embedded into commercial Automatic Fingerprint Verification Systems (AFVSs). However, the reliability of AFVSs has kept attracting concerns from the society since AFVSs do fail occasionally due to difficulties like problematic fingers, changing environments, and malicious attacks. Furthermore, the absence of a solid theoretical foundation for evaluating AFVSs prevents these failures from been predicted and evaluated. Under the traditional empirical AFVS evaluation framework, repeated verification experiments, which can be very time consuming, have to be performed to test whether an update to an AFVS can really lead to an upgrade in its performance. Also, empirical verification results are often unable to provide deeper understanding of AFVSs. To solve these problems, we propose a novel statistical evaluation model for minutiae-based AFVSs based on the understanding of fingerprint minutiae patterns. This model can predict the verification performance metrics as well as their confidence intervals. The analytical power of our evaluation model, which makes it superior to empirical evaluation methods, can assist system developers to upgrade their AFVSs purposefully. Also, our model can facilitate the theoretical analysis of the advantages and disadvantages of various fingerprint verification techniques. We verify our claims through different and extensive experiments. / Chen, Jiansheng. / "November 2006." / Adviser: Yiu-Sang Moon. / Source: Dissertation Abstracts International, Volume: 68-08, Section: B, page: 5343. / Thesis (Ph.D.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (p. 110-122). / Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [200-] System requirements: Adobe Acrobat Reader. Available via World Wide Web. / Abstracts in English and Chinese. / School code: 1307.
684

Construction nationale et néo-ritualisation : analyse anthropologique de la célébration du nouvel an kurde (Newroz) / Nation building and neo-ritualisation : an anthropological analysis of the celebration of the Kurdish New Year (Newroz)

Wallis, Caroline 04 December 2015 (has links)
Construction nationale et néo-ritualisation : analyse anthropologique de la célébration du nouvel an kurde (Newroz).Cette étude traite de la transformation progressive des représentations, des croyances et despratiques associées à la célébration du nouvel an Newroz par le mouvement national kurde enTurquie. La recherche aborde Newroz comme une tradition inventée et explore les fonctionsde cette forme de néo-ritualisation dans la construction de l'identification collective à lanation kurde.La première partie situe l'intégration de cette fête aux origines zoroastriennes dans lerépertoire symbolique du nationalisme ethno-culturel kurde et décrit les fonctions qu'elleassure dans le contexte de recomposition des frontières étatiques du Moyen-Orient post-ottoman. Dans un deuxième temps, la recherche se concentre sur les réaménagementssymboliques subis par la tradition Newroz, suite à l'adoption d'une idéologie marxiste parcertaines factions du mouvement national kurde à partir des années 60. La recherche estcentrée d'une part sur la modification des représentations et croyances associées au nouvel anet d'autre part sur la modification des pratiques associées à sa célébration dans la décennie 90,désormais arènes d'affrontements violents avec les forces de l'ordre. L'étude se concentreensuite sur l'institutionnalisation de la tradition Newroz par deux nationalismes concurrents.Dans un premier temps, la recherche aborde la réintégration de la tradition inventée,désormais orthographiée Nevruz, dans le répertoire symbolique du nationalisme turc endétaillant les fonctions inédites de la tradition (ré) inventée dans ce nouveau contexte. Dansun deuxième temps, la recherche explore les politiques culturelles actuellement menées parles élus du parti pro-kurde légal détenant le pouvoir municipal dans le sud-est de la Turquie etpropose une analyse anthropologique de la célébration contemporaine du nouvel an par lemouvement national kurde en Turquie.L'intérêt théorique principal de cette étude est de reposer la question de la rigidité destraditions inventées en montrant comment une tradition a été soumise à des réaménagementssymboliques au sein d'un mouvement national particulier et en abordant les modalités de sontransfert dans le répertoire symbolique d'un nationalisme concurrent.Mots cléfs : invention de la tradition, néo-ritualisation, nationalisme, identificationscollectives, mobilisation ethno-culturelle kurde en Turquie. / National construction and neo-ritualization: anthropological analysis of the celebration of the Kurdish New Year (Newroz). This study deals with the gradual transformation of representations, beliefs and practices associated with celebration of New Year Newroz by the national Kurdish movement in Turkey. The research looks at Newroz as an invented tradition and explores the functions of this form of neo-ritualization in the construction of collective identifications with the Kurdish nation.Part 1 positions the integration of this festival with Zoroastrian origins in the symbolic repertoire of Kurdish ethno-cultural nationalism and describes the functions it performs in the context of the recomposition of state frontiers in the post-Ottoman Middle East. In the second part, the research focuses on the symbolic redevelopments undergone by the Newroz tradition after adoption of a Marxist ideology by certain factions of the Kurdish national movement starting in the 1960s. The research centres on the one hand on modification of the representations and beliefs associated with the New Year and, on the other, on the modification in practices associated with its celebration in the 1990s, from which point it became the arena of violent clashes with the security forces. The study then focuses on institutionalisation of the Newroz tradition by two competing nationalisms. The research initially focuses on the reintegration of the invented tradition, now written Nevruz, in the symbolic repertoire of Turkish nationalism, by detailing the unprecedented functions of the (re)invented tradition in this new context. In a second phase, the research explores the cultural policies currently implemented by elected members of the legal pro-Kurdish party holding municipal power in the south-east of Turkey and proposes an anthropological analysis of the contemporary New Year celebration by the national Kurdish movement in Turkey.The main theoretical interest of this study is that it resituates the question of the rigidity of invented traditions by showing how a tradition was subjected to symbolic redevelopments within a particular national movement and exploring the ways in which it was transferred into the symbolic repertoire of a competing nationalism.Key words : invention of tradition, neo-ritualization, nationalism, collective identifications, Kurdish ethno-cultural mobilisation in Turkey.
685

Molecular authentication of Chinese medicinal herbs.

January 1997 (has links)
by Ngan Fai Ngor Karenda. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1997. / Includes bibliographical references (leaves 128-134). / Acknowledgements --- p.i / Abstract --- p.ii / Table of Contents --- p.iii / Abbreviations --- p.viii / Chapter Chapter 1 --- Authentication of Chinese Medicinal Herbs / Chapter 1.1 --- Introduction --- p.1 / Chapter 1.2 --- Traditional Identification of Chinese Herbs / Chapter 1.2.1 --- Morphology --- p.3 / Chapter 1.2.2 --- Histology --- p.4 / Chapter 1.2.3 --- Chemical Analysis --- p.4 / Chapter 1.2.4 --- Proteins and Isozymes --- p.6 / Chapter 1.3 --- Molecular Technology in Authentication / Chapter 1.3.1 --- Restriction Fragment Length Polymorphism (RFLP) --- p.6 / Chapter 1.3.2 --- Polymerase Chain Reactions (PCRs) / Chapter 1.3.2.1 --- Random-Primed PCRs --- p.8 / Chapter 1.3.2.2 --- Simple Sequence Repeats --- p.10 / Chapter 1.3.2.3 --- Amplified Fragment Length Polymorphism (AFLP) --- p.11 / Chapter 1.4 --- Objectives and Strategies of the Study --- p.13 / Chapter Chapter 2 --- Materials and Methods / Chapter 2.1 --- Reagents and Buffers / Chapter 2.1.1 --- Buffers for Total DNA Extraction --- p.15 / Chapter 2.1.2 --- Reagents for Agarose Gel Electrophoresis --- p.16 / Chapter 2.1.3 --- Reagents for Polyacrylamide Gel Electrophoresis --- p.17 / Chapter 2.1.4 --- Reagents for Plasmid and Single-Stranded DNA Preparation --- p.17 / Chapter 2.1.5 --- Media for Bacterial Culture --- p.19 / Chapter 2.1.6 --- Reagents for Preparation of Competent Cells --- p.20 / Chapter 2.2 --- DNA Isolation / Chapter 2.2.1 --- Sample Preparation --- p.21 / Chapter 2.2.2 --- Cetyl triethylammonium bromide (CTAB) Extraction --- p.21 / Chapter 2.2.3 --- Cesium Chloride Gradient Ultracentrifugation --- p.21 / Chapter 2.3 --- Phenol/Chloroform Extraction --- p.22 / Chapter 2.4 --- Ethanol Precipitation --- p.23 / Chapter 2.5 --- DNA Concentration/Purity Estimation --- p.23 / Chapter 2.6 --- Random-Primed Polymerase Chain Reactions / Chapter 2.6.1 --- Random Amplified Polymorphic DNA (RAPD) --- p.24 / Chapter 2.6.2 --- Arbitarily-Primed Polymerase Chain Reaction (AP-PCR) --- p.24 / Chapter 2.7 --- rDNA Amplification --- p.24 / Chapter 2.8 --- Agarose Gel Electrophoresis of DNA --- p.25 / Chapter 2.9 --- Purification of rDNA / Chapter 2.9.1 --- from Agarose Gel using Geneclean II Kit (Bio 101 Inc.) --- p.25 / Chapter 2.9.2 --- using Microspin´ёØ Columns --- p.26 / Chapter 2.10 --- Preparation of Escherichia coli Competent Cells --- p.26 / Chapter 2.11 --- Ligation and Transformation of Escherichia coli --- p.27 / Chapter 2.12 --- Isolation of Plasmid DNA --- p.27 / Chapter 2.13 --- Screening of Plasmid DNA by Restriction Digestion --- p.28 / Chapter 2.14 --- Isolation of Plasmid DNA / Chapter 2.14.1 --- Minipreparation of Plasmid using Magic´ёØ Miniprep DNA Purification Kit from Promega --- p.28 / Chapter 2.14.2 --- Megapreparation of Plasmid using Qiagen-tip100 --- p.28 / Chapter 2.15 --- Single-Stranded DNA Preparation / Chapter 2.15.1 --- Transfection --- p.29 / Chapter 2.15.2 --- Single-Stranded DNA Isolation --- p.29 / Chapter 2.16 --- DNA Sequencing / Chapter 2.16.1 --- Plasmid Sequencing using T7 Sequencing Kit --- p.30 / Chapter 2.16.2 --- Cycle Sequencing from PCR Products --- p.30 / Chapter 2.16.3 --- Cycle Sequencing from PCR Products or Plasmid --- p.31 / Chapter 2.16.4 --- DNA Sequencing Electrophoresis --- p.31 / Chapter Chapter 3 --- Studies of Panax Species by Random-Primed PCRs / Chapter 3.1 --- Introduction --- p.34 / Chapter 3.2 --- Materials and Methods / Chapter 3.2.1 --- Plant Materials --- p.39 / Chapter 3.2.2 --- DNA Extraction and Random-Primed PCRs --- p.39 / Chapter 3.2.3 --- Data Analysis --- p.39 / Chapter 3.3 --- Results and Discussion / Chapter 3.3.1 --- DNA Isolation --- p.40 / Chapter 3.3.2 --- DNA Fingerprinting --- p.41 / Chapter 3.3.3 --- Relationship between the Six Panax Species --- p.45 / Chapter Chapter 4 --- Studies of Acorus by Random-Primed PCRs / Chapter 4.1 --- Introduction --- p.48 / Chapter 4.2 --- Materials and Methods / Chapter 4.2.1 --- Plant Materials --- p.49 / Chapter 4.2.2 --- DNA Extraction and Random-Primed PCRs --- p.50 / Chapter 4.3 --- Results and Discussion / Chapter 4.3.1 --- Acorus DNA --- p.50 / Chapter 4.3.2 --- Reproducibility of Random-Primed PCRs --- p.51 / Chapter 4.3.3 --- DNA Fingerprinting --- p.53 / Chapter Chapter 5 --- Studies of Epimedium by Random-Primed PCRs / Chapter 5.1 --- Introduction --- p.70 / Chapter 5.2 --- Materials and Methods / Chapter 5.2.1 --- Plant Materials --- p.71 / Chapter 5.2.2 --- DNA Extraction and Random-Primed PCRs --- p.71 / Chapter 5.3 --- Results and Discussion / Chapter 5.3.1 --- DNA Extraction --- p.71 / Chapter 5.3.2 --- DNA Fingerprinting --- p.72 / Chapter Chapter 6 --- Application of AP-PCR in Commercial Ginseng Products / Chapter 6.1 --- Introduction --- p.90 / Chapter 6.2 --- Materials and Methods / Chapter 6.2.1 --- Materials --- p.91 / Chapter 6.2.2 --- DNA Extraction and Random-Primed PCRs --- p.91 / Chapter 6.2.3. --- Data Analysis --- p.91 / Chapter 6.3 --- Results and Discussion / Chapter 6.3.1 --- DNA Isolation --- p.92 / Chapter 6.3.2 --- AP-PCR Analysis --- p.93 / Chapter Chapter 7 --- Ribosomal DNA as a Marker in Authentication of Panax Species / Chapter 7.1 --- Introduction --- p.99 / Chapter 7.2 --- Materials and Methods / Chapter 7.2.1 --- Plant Materials --- p.100 / Chapter 7.2.2 --- DNA Extraction and rDNA Amplification --- p.101 / Chapter 7.2.3 --- rDNA Sequencing --- p.101 / Chapter 7.2.4 --- Generation of Restriction Fragment Length Polymorphisms / Chapter 7.2.4.1 --- Restriction Digestion of rDNA Fragment --- p.102 / Chapter 7.2.4.2 --- Polyacrylamide Gel Electrophoresis (PAGE) --- p.103 / Chapter 7.2.4.3 --- Silver Staining for Nucleic Acids --- p.103 / Chapter 7.2.5 --- Data Analysis --- p.104 / Chapter 7.3 --- Results and Discussion / Chapter 7.3.1 --- rDNA Amplification and Plasmid Isolation --- p.104 / Chapter 7.3.2 --- rDNA Sequencing / Chapter 7.3.2.1 --- Sequence Comparison between the Six Panax species and the Two Adulterants --- p.107 / Chapter 7.3.3 --- Restriction Fragment Length Polymorphisms / Chapter 7.3.3.1 --- Restriction Profiles between Ginsengs and their Adulterants --- p.113 / Chapter 7.3.3.2 --- Restrciton Profiles of Ginsengs from Different Sources --- p.118 / Chapter 7.3.4 --- Panax Phylogeny --- p.121 / Chapter Chapter 8 --- General Discussion / Chapter 8.1 --- Advantages of Random-Primed PCRs --- p.124 / Chapter 8.2 --- Weaknesses of the Random-Primed PCRs --- p.125 / Chapter 8.3 --- Molecular Markers for Phylogenetic Studies --- p.126 / Chapter 8.4 --- Specific PCR-RFLP Patterns in Authentication --- p.126 / Chapter 8.5 --- Conclusions --- p.127 / References --- p.128 / Appendix --- p.135
686

Déploiement adaptatif d’un réseau de capteurs mobiles pour le suivi d’un phénomène évolutif décrit par des équations aux dérivées partielles. / Adaptive deployment of a mobile sensors network to optimize the monitoring of an evolutionary phenomenon described by partial differential equations.

Vergnaud, Alban 04 December 2015 (has links)
De nos jours la protection de l’environnement et des personnes nécessite le recours à des capteurs permettant de suivre le déplacement de phénomènes mobiles pour prédire et agir sur leur évolution (ex : nuages polluants, incendies,nappe d’hydrocarbures). Ces phénomènes physiques sont souvent modélisables par des équations aux dérivées partielles (EDP) éventuellement non linéaires. La mise au point d'un outil prédictif pour l'aide à la décision nécessite l'évaluation de certains paramètres d'entrée. Dans ces domaines, les capteurs sont en général coûteux et en nombre limité. Toutefois, avec les récentes avancées technologiques il devient envisageable de concevoir des systèmes mobiles peu coûteux et de déployer un groupe de véhicules en réseau dans un certain nombre d'environnements à risque.Le sujet de recherche étudié et présenté dans ce rapport concerne le développement et la validation de stratégies optimales de déplacement d'un ensemble de capteurs pour l'identification paramétrique en ligne des systèmes d' EDP caractérisés par une ou plusieurs sources mobiles. Le travail présenté est destiné à développer une méthodologie complète(théorie, méthodes numériques, plate-forme expérimentale)en vue de réaliser une conception optimale d'expériences dans le cadre de problèmes mal posés non-linéaires associés à l'évaluation de paramètres dans des systèmes décrits par des EDP en génie thermique. / Nowadays the environment and people protection requires the use of sensors in order to monitor the movement of mobile phenomena and to predict and act on their evolution (ex: polluting cloud, fires, oil spill). These physical phenomena are often modelled by nonlinear partial differential equations (PDE). Development of a predictive tool for the decision support requires the assessment of some input parameters. In such a context, sensors were generally expensive. However, recent technological advances have reduced manufacturing costs and it becomes possible to develop low-cost mobile systems and to deploy a group of networked vehicles in potentially risky environments.Research topic studied and presented in this thesis concerns the development and validation of optimal strategies for moving a set of sensors for the parametric identification of PDE systems characterized by one or more mobile heating sources. This work is intended to develop a comprehensive methodology (theory, numerical methods, and experimentation) in order to achieve an optimal design of experiments in the context of nonlinear ill-posed problems related to the evaluation of parameters in systems described by PDE in thermal engineering.
687

Human face image searching system with relevance feedback using sketch

Man, Chun Him 01 January 2005 (has links)
No description available.
688

Identification de paramètres dans la fabrication de matériaux composites / Identification of parameters in the manufacture of composite materials

Nguyen, Phuong Chi 12 April 2011 (has links)
Ce travail est une contribution à l’étude du comportement de certains matériaux composites. Nous formalisons les observations expérimentales du point de vue mathématique, et menons une étude « critique » des différents modèles utilisés pour proposer des techniques génériques d’identification de paramètres dans ce contexte. Le manuscrit se divise en trois chapitres. Le chapitre 1 rappelle les principes élémentaires et le contexte mécanique de cette étude. On y présentera les hypothèses simplificatrices faites par la suite et les modèles de lois de comportement utilisés et testés. Le chapitre 2 est consacré à la modélisation du problème inverse avec utilisation du modèle de Grosberg et à son étude théorique et numérique. Le chapitre 3 reprend la démarche du chapitre précédent avec le modèle de Dahl. Outre la méthode numérique utilisée précédemment, nous utilisons une approche contrôle optimal et présentons des résultats plus rigoureux obtenus avec AMPL. / This work is a contribution to the study of the behavior of some composite materials. We formalize the experimental observations from the mathematical point of view, and are conducting a “critical” study of the various models used to propose generic techniques for parameter identification in this context. The manuscript is divided into three chapters. Chapter 1 recalls the basic principles and mechanics context of this study. It will present the simplifying assumptions made by the following models and behaviour laws that we used and tested. Chapter 2 is devoted to modeling the inverse problem using the model of Grosberg and its theoretical and numerical study. Chapter 3 takes the approach of the previous chapter with the model of Dahl. Besides the numerical method used previously, we use an optimal control approach and present results obtained with more rigorous method and AMPL.
689

Molecular authentication of Chinese herbs derived from Aristolochia.

January 2008 (has links)
Lam, Hilary. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 182-191). / Abstracts in English and Chinese. / ACKNOWLEDGEMENTS --- p.I / ABSTRACT --- p.III / TABLE OF CONTENTS --- p.V / LIST OF FIGURES --- p.X / LIST OF TABLES --- p.XIX / LIST OF ABBREVIATIONS --- p.XXII / Chapter Chapter 1: --- LITERATURE REVIEW --- p.1 / Chapter 1. --- Aristolochia --- p.1 / Chapter 1.1 --- "Aristolochia, as a plant" --- p.1 / Chapter 1.2 --- The chemicals in Aristolochia --- p.1 / Chapter 1.3 --- "Aristolochia, as herbal remedies" --- p.3 / Chapter 1.4 --- The Aristolochia poisoning cases --- p.4 / Chapter 1.5 --- The mechanism of AAs --- p.6 / Chapter 1.6 --- Renaming CHN to AAN --- p.6 / Chapter 1.7 --- Banning Aristolochia herbs --- p.7 / Chapter 1.8 --- The possible cause of ANN --- p.8 / Chapter 1.8.1 --- Misuse of Chinese Medicine --- p.8 / Chapter 1.8.2 --- Substitution --- p.9 / Chapter 1.8.3 --- The complexities of the herbal nomenclature --- p.9 / Chapter 1.8.4 --- Adulteration --- p.11 / Chapter 1.9 --- Methods for authenication --- p.12 / Chapter 1.9.1 --- Traditional methods for authentication --- p.12 / Chapter 1.9.2 --- The advantage of using molecular methods --- p.13 / Chapter 1.9.2.1 --- DNA fingerprinting --- p.13 / Chapter 1.9.2.2 --- DNA sequencing --- p.15 / Chapter 1.10 --- Method selection rationale --- p.15 / Chapter 1.11 --- The need for molecular authentication of six medicinal herbs --- p.17 / Chapter 1.11.1 --- The herb Mutong --- p.17 / Chapter 1.11.1.1 --- The poisoning cases reported --- p.19 / Chapter 1.11.1.2 --- Other authentication studies of Mutong --- p.19 / Chapter 1.11.2 --- The herb Muxiang --- p.20 / Chapter 1.11.2.1 --- Chemical profile --- p.21 / Chapter 1.11.2.2 --- Other authentication studies of Muxiang --- p.21 / Chapter 1.11.3 --- The herb Baiying --- p.22 / Chapter 1.11.3.1 --- The poisoning cases reported --- p.23 / Chapter 1.11.3.2 --- Other authentication studies of Baiying --- p.24 / Chapter 1.11.4 --- The herb Fangj --- p.i 24 / Chapter 1.11.4.1 --- Chemical profile --- p.25 / Chapter 1.11.4.2 --- The poisoning cases reported --- p.26 / Chapter 1.11.5 --- The herb Madouling --- p.26 / Chapter 1.11.6 --- The herb Zhushalian --- p.27 / Chapter 1.12 --- Aristolochia specific markers --- p.28 / Chapter 1.13 --- Significance of the research --- p.29 / Chapter Chapter 2: --- OBJECTIVE --- p.30 / Chapter Chapter 3: --- MATERIALS AND METHODS --- p.31 / Chapter 3.1 --- Samples source --- p.31 / Chapter 3.2 --- Total DNA extraction --- p.39 / Chapter 3.2.1 --- Cetyltriethylammonium bromide extraction --- p.39 / Chapter 3.2.2 --- Commercial kit extraction --- p.40 / Chapter 3.3 --- DNA amplification --- p.42 / Chapter 3.4 --- DNA fingerprinting --- p.43 / Chapter 3.4.1 --- DNA concentration determination --- p.43 / Chapter 3.4.2 --- ISSR fingerprinting --- p.44 / Chapter 3.5 --- Agarose gel electrophoresis --- p.45 / Chapter 3.6 --- Purification of PCR product --- p.46 / Chapter 3.7 --- Cloning of PCR product --- p.47 / Chapter 3.7.1 --- Ligation --- p.47 / Chapter 3.7.2 --- Transformation --- p.48 / Chapter 3.7.3 --- Cell cultivation --- p.48 / Chapter 3.7.4 --- Plasmid extraction --- p.49 / Chapter 3.7.5 --- Insert confirmation --- p.49 / Chapter 3.8 --- DNA sequencing --- p.50 / Chapter 3.8.1 --- Cycle sequencing --- p.50 / Chapter 3.8.2 --- Purification of cycle sequencing product --- p.51 / Chapter 3.8.3 --- DNA analysis --- p.51 / Chapter 3.9 --- Sequence analysis --- p.52 / Chapter Chapter 4: --- AUTHENICATION OF MUTONG --- p.53 / Chapter 4.1 --- Results --- p.53 / Chapter 4.1.1 --- Sequence alignment --- p.54 / Chapter 4.1.1.1 --- trnL-trnF sequences --- p.54 / Chapter 4.1.1.2 --- psbA-trnH sequences --- p.55 / Chapter 4.1.2 --- Percentage similarity analysis --- p.64 / Chapter 4.1.3 --- Dendrogram analysis --- p.67 / Chapter 4.2 --- Discussion --- p.73 / Chapter 4.2.1 --- Evaluation of chloroplast trnL-trnF region in differentiation of Mutong --- p.73 / Chapter 4.2.2 --- Evaluation of chloroplast psbA-trnH region in differentiation of Mutong --- p.74 / Chapter 4.2.3 --- Evaluation of using DNA sequencing in differentiation of Mutong --- p.75 / Chapter 4.3 --- Conclusion --- p.77 / Chapter Chapter 5: --- AUTHENICATION OF MUXIANG --- p.78 / Chapter 5.1 --- Results --- p.78 / Chapter 5.1.1 --- Sequence alignment --- p.79 / Chapter 5.1.1.1 --- trnL-trnF sequences --- p.79 / Chapter 5.1.1.2 --- psbA-trnH sequences --- p.80 / Chapter 5.1.2 --- Percentage similarity analysis --- p.88 / Chapter 5.1.3 --- Dendrogram study --- p.91 / Chapter 5.2 --- Discussion --- p.97 / Chapter 5.2.1 --- Evaluation of chloroplast trnL-trnF region in differentiation of Muxiang --- p.97 / Chapter 5.2.2 --- Evaluation of chloroplast psbA-trnH region in differentiation of Muxiang --- p.99 / Chapter 5.3 --- Conclusion --- p.100 / Chapter Chapter 6: --- AUTHENICATION OF BAIYING --- p.102 / Chapter 6.1 --- Results --- p.102 / Chapter 6.1.1 --- Sequence alignment --- p.103 / Chapter 6.1.2 --- Percentage similarity analysis --- p.107 / Chapter 6.1.3 --- Dendrogram analysis --- p.107 / Chapter 6.2 --- Discussion --- p.109 / Chapter 6.2.1 --- Evaluation of chloroplast psbA-trnH region in differentiation of Solarium and Aristolochia --- p.109 / Chapter 6.2.2 --- Molecular authentication of Baiying --- p.112 / Chapter 6.3 --- Conclusion --- p.113 / Chapter Chapter 7: --- AUTHENICATION OF FANGJI --- p.114 / Chapter 7.1 --- Results --- p.114 / Chapter 7.1.1 --- Sequence alignment --- p.115 / Chapter 7.1.1.1 --- trnL-trnF sequence --- p.115 / Chapter 7.1.1.2 --- psbA-trnH sequence --- p.116 / Chapter 7.1.2 --- Percentage similarity analysis --- p.123 / Chapter 7.1.3 --- Dendrogram study --- p.126 / Chapter 7.2 --- Discussion --- p.132 / Chapter 7.2.1 --- Evaluation of chloroplast trnL-trnF region in differentiation of Fangji --- p.132 / Chapter 7.2.2 --- Evaluation of chloroplast psbA-trnH region in differentiation of Fangji --- p.133 / Chapter 7.3 --- Conclusion --- p.133 / Chapter Chapter 8: --- AUTHENICATION OF MADOULING --- p.135 / Chapter 8.1 --- Results --- p.135 / Chapter 8.1.1 --- Sequence alignment --- p.136 / Chapter 8.1.1.1 --- trnL-trnF sequence --- p.136 / Chapter 8.1.1.2 --- psbA-trnH sequence --- p.136 / Chapter 8.1.2 --- Percentage similarity analysis --- p.143 / Chapter 8.1.3 --- Dendrogram study --- p.146 / Chapter 8.2 --- Discussion --- p.152 / Chapter 8.2.1 --- Evaluation of chloroplast trnL-trnF region in differentiation of Madouling --- p.152 / Chapter 8.2.2 --- Evaluation of chloroplast psbA-trnH region in differentiation of Madouling --- p.153 / Chapter 8.3 --- Conclusion --- p.153 / Chapter Chapter 9: --- AUTHENICATION OF ZHUSHALIAN --- p.155 / Chapter 9.1 --- Results --- p.155 / Chapter 9.1.1 --- Sequence alignment --- p.156 / Chapter 9.1.1.1 --- trnL-trnF sequence --- p.156 / Chapter 9.1.1.2 --- psbA-trnH sequence --- p.157 / Chapter 9.1.2 --- Percentage similarity analysis --- p.157 / Chapter 9.1.3 --- Dendrogram study --- p.162 / Chapter 9.2 --- Discussion --- p.166 / Chapter 9.2.1 --- Evaluation of chloroplast trnL-trnF region in differentiation of Zhushalian --- p.166 / Chapter 9.2.2 --- Evaluation of chloroplast psbA-trnH region in differentiation of Zhushalian --- p.171 / Chapter 9.3 --- Conclusion --- p.171 / Chapter Chapter 10: --- ARISTOLOCHIA SPECIFIC MARKER --- p.172 / Chapter 10.1 --- ISSR fingerprinting --- p.172 / Chapter 10.2 --- Discussion --- p.178 / Chapter Chapter 11: --- CONCLUSION --- p.180 / BIBLIOGRAPHY --- p.182 / APPENDIX - MATERIALS PREPARATION --- p.192
690

Analyse de formes et de textures : application à l'authentification et à la gradation de pièces de monnaies / Shape and texture analysis : application to coin identification and coin grading

Pan, Xingyu 05 June 2018 (has links)
Objets de collection depuis les temps anciens, de nos jours les pièces de monnaie constituent un marché de plus en plus important. L’évaluation par des experts de l’état de conservation des pièces de monnaie, que nous nommons gradation, joue un rôle important pour déterminer leur valeur sur le marché. Dans le but de grader des pièces de monnaie de manière efficace et objective, la société GENI collabore avec le laboratoire LIRIS, afin d’automatiser le processus de gradation à partir de photos de pièces de monnaie.L’objectif principal de cette thèse est de fournir une aide à la gradation des pièces de monnaie à partir des photos de qualité. Le projet est composé de quatre phases : segmentation des monnaies, identification du type monétaire, détection et reconnaissance du millésime et gradation des monnaies.Dans la première phase, la pièce de monnaie est segmentée de sa photo de manière précise à l’aide d’un modèle paramétrique déformable. Ce dernier permet également d’extraire des caractéristiques de la pièce de monnaie telles que sa taille, son nombre de coins, de pans, etc.Lors de la deuxième phase, nous cherchons dans une base de données le type monétaire de référence correspondant à la pièce de monnaie requête à l’aide de scores de similarité basés sur des graphes. Le premier score se base sur des caractéristiques locales des contours en relief, et le second, qui est semi-global, permet de mettre en évidence des différences de motifs.La troisième phase concerne la reconnaissance du millésime. Il s’agit d’un sujet difficile car les caractères, dans ce contexte, ont un premier plan de couleur très similaire à l’arrière-plan. Après avoir localisé la zone du millésime et l’avoir découpée en imagettes de chiffres, nous proposons une méthode de reconnaissance de chiffres à l’aide de caractéristiques « topologiques ».Enfin, concernant la gradation des monnaies, nous proposons une méthode se basant sur une quantification des « éléments inattendus » comme les rayures et les taches. La pièce de monnaie est d’abord recalée sur une monnaie de référence, puis, nous détectons les « éléments inattendus » significatifs sur des zones d’intérêt. Enfin, concernant les « éléments inattendus » ténus difficiles à repérer individuellement, nous détectons les zones granuleuses à l’aide du Deep Learning. Le résultat obtenu par cette méthode, proche de ce que l’expert réalise « à la main », servira d’aide aux numismates. / Coins have been collected and studied since ancient times. Today, coin collection has become a hobby for anyone who wants to participate in. Coin grading is a way of determining the physical condition of a coin to provide an indicator for its market value. For grading coins on a large scale and in a relatively objective way, the GENI company cooperates with the laboratory LIRIS to automate the process by using coin photos.The main objective of this thesis is to grade coins from well-conditioned photos. The project is composed of four steps: coin segmentation from raw photos, monetary type identification, coin date detection and recognition and, coin grading.The first step is to extract coins from raw photos with a high precision. With a deformable geometric model, we segment precisely round coins, many-sided coins, wavy edged coins and holed coins by recognizing their shapes.The second step consists of coin recognition or monetary type identification. We match the query coin to the most identical type reference by using two similarity scores. The first similarity score is based on local features of relief contours. The second similarity score is a semi-global measure that highlights the difference between relief patterns.The third step is to detect and recognize coin dates. However, the fact that such characters have the same color as the background makes traditional optical character recognition methods difficult to apply. After extracting the date zone and cropping it into digit images, we propose a learning-free method to recognize those digits by analyzing their “topological” features.In the last step, the grading process is carried out by quantification of "unexpected elements" such as scratches and dirty marks. The coin to grade is registered to a reference coin. Then, large “unexpected elements” are detected in some regions of interest. However, some “micro-scratches” are difficult to extract individually but all together make a "grainy" surface. To deal with it, we use Deep Learning techniques to classify those grainy zones containing such “micro-scratches”. The result of our system, which is close to the manual expert one, is considered as a useful help for numismatists.

Page generated in 0.514 seconds