• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 548
  • 153
  • 134
  • 124
  • 77
  • 42
  • 34
  • 23
  • 17
  • 15
  • 13
  • 8
  • 6
  • 6
  • 5
  • Tagged with
  • 1483
  • 239
  • 207
  • 133
  • 119
  • 101
  • 97
  • 91
  • 90
  • 86
  • 85
  • 77
  • 66
  • 64
  • 61
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
541

Nonlinear manipulation and analysis of large DNA datasets

Cui, Meiying, Zhao, Xueping, Reddavide, Francesco V., Patino Gaillez, Michelle, Heiden, Stephan, Mannocci, Luca, Thompson, Michael, Zhang, Yixin 05 March 2024 (has links)
Information processing functions are essential for organisms to perceive and react to their complex environment, and for humans to analyze and rationalize them. While our brain is extraordinary at processing complex information, winner-take-all, as a type of biased competition is one of the simplest models of lateral inhibition and competition among biological neurons. It has been implemented as DNAbased neural networks, for example, to mimic pattern recognition. However, the utility of DNA-based computation in information processing for real biotechnological applications remains to be demonstrated. In this paper, a biased competitionmethod for nonlinear manipulation and analysis ofmixtures of DNA sequences was developed. Unlike conventional biological experiments, selected species were not directly subjected to analysis. Instead, parallel computation among a myriad of different DNA sequences was carried out to reduce the information entropy. The method could be used for various oligonucleotideencoded libraries, as we have demonstrated its application in decoding and data analysis for selection experiments with DNA-encoded chemical libraries against protein targets.
542

Using a Deep Generative Model to Generate and Manipulate 3D Object Representation / Att använda en djup generativ modell för att skapa och manipulera 3D-objektrepresentation.

Hu, Yu January 2023 (has links)
The increasing importance of 3D data in various domains, such as computer vision, robotics, medical analysis, augmented reality, and virtual reality, has gained giant research interest in generating 3D data using deep generative models. The challenging problem is how to build generative models to synthesize diverse and realistic 3D objects representations, while having controllability for manipulating the shape attributes of 3D objects. This thesis explores the use of 3D Generative Adversarial Networks (GANs) for generation of 3D indoor objects shapes represented by point clouds, with a focus on shape editing tasks. Leveraging insights from 2D semantic face editing, the thesis proposes extending the InterFaceGAN framework to 3D GAN model for discovering the relationship between latent codes and semantic attributes of generated shapes. In the end, we successfully perform controllable shape editing by manipulating the latent code of GAN. / Den ökande betydelsen av 3D-data inom olika områden, såsom datorseende, robotik, medicinsk analys, förstärkt verklighet och virtuell verklighet, har väckt stort forskningsintresse för att generera 3D-data med hjälp av djupa generativa modeller. Det utmanande problemet är hur man bygger generativa modeller för att syntetisera varierande och realistiska 3Dobjektrepresentationer samtidigt som man har kontroll över att manipulera formattributen hos 3D-objekt. Denna avhandling utforskar användningen av 3D Generative Adversarial Networks (GANs) för generering av 3Dinomhusobjektformer representerade av punktmoln, med fokus på formredigeringsuppgifter. Genom att dra nytta av insikter från 2D-semantisk ansiktsredigering föreslår avhandlingen att utvidga InterFaceGAN-ramverket till en 3D GAN-modell för att upptäcka förhållandet mellan latenta koder och semantiska egenskaper hos genererade former. I slutändan genomför vi framgångsrikt kontrollerad formredigering genom att manipulera den latenta koden hos GAN.
543

Atomistic interactions in STM atom manipulation

Deshpande, Aparna 13 April 2007 (has links)
No description available.
544

Att påverka utan att märkas – om EU:s reglering av AI-driven subliminal teknik / To influence without being noticed – concerning the European Union regulation of subliminal techniques deployed by AI systems

Victor, Ellen January 2024 (has links)
In the EU proposal for a regulation laying down harmonised rules on artificial intelligence (AIA), article 5.1.a forbids the use of AI systems deploying subliminal techniques. As the meaning of the term subliminal techniques lacks a definition in the proposal, the intended meaning of the phrase requires interpretation to clarify the scope of this prohibition. Using a method based on the legal reasoning of the European Court of Justice, the meaning of the expression subliminal techniques is interpreted based on arguments from a grammatical, contextual, teleological and historical standpoint. After reviewing EU documents concerning the proposal as well as the current versions of AIA, it becomes clear that the intended meaning of subliminal techniques is broader than the ordinary meaning of this phrase. Although subliminal stimuli are generally described as stimuli that are beyond human perception, the presence of a binary threshold of perception is not fully supported by brain imaging research. From the descriptions of subliminal techniques in documents regarding AIA, as well as in formulations present in different versions of the proposal, there is support for interpreting the legislators intent as adhering to this non-binary view of subliminal techniques. Instead of strictly focusing on a perceptual threshold the determination of whether an AI deployed technique is regarded as a subliminal technique focuses on whether the technique in some sense targets human perception, as well as the degree to which this technique infringes on human autonomy.
545

The dialectical nature of social networking / Mark Jacob Amiradakis

Amiradakis, Mark Jacob January 2015 (has links)
This study aims to provide a critical assessment of social networking sites along with the underlying form of rationality propelling such technological innovations. The hypothesis of this study is rooted in the firm conviction that while social networking sites can be regarded as impressive technological achievements, and while there are certainly an array of benefits that can be associated with them, they nevertheless can be perceived as a hegemonic force which surreptitiously undermines the autonomy and freedom of the modern individual. In order to corroborate and augment such an assertion, this study relies primarily on the critical works of Adorno and Horkheimer (1997); Bauman (2003; 2007 & 2013) and Foucault (1977) in order to both investigate and critically evaluate the everyday assumptions typically associated with a technologically enlightened society, techno-scientific rationality and the recent emergence of technological tools such as social networking services. Based upon the findings that have emerged throughout the course of this investigation, it becomes clear to see that there is indeed a dialectical tension inherent to the nature of the various social networking technologies as they currently operate within the 21st century. Such a discovery is primarily based upon the fact that while social networking technologies do inherently possess emancipatory potentialities for the modern individual, they have nevertheless failed to actualise such potentialities due to the following reasons: 1) Social networking technologies have managed to propagate and entrench a powerful sentiment of technological determinism within modern society along with a highly corrosive form of instrumentalized rationality to which all individuals are now required to acquiesce; 2) Such technologies are paradoxically abrogating the possibility of meaningful interpersonal contiguity due to the fact they have managed to commodify the technological culture associated with a digital form of interaction/communication along with the individual making use of such technologies; and 3) In their current format, social networking services are allowing for the objectification, manipulation and exploitation of the online subject to take place in order to pursue and promote an instrumentalized strategy of marketing surveillance and capital accumulation. / MA (Philosophy), North-West University, Potchefstroom Campus, 2015
546

Bitstream specialisation for dynamic reconfiguration of real-time applications / Ronnie Rikus le Roux

Le Roux, Ronnie Rikus January 2015 (has links)
The focus of this thesis is on specialising the configuration of a field-programmable gate array (FPGA) to allow dynamic reconfiguration of real-time applications. The dynamic reconfiguration of an application has numerous advantages, but due to the overhead introduced by this process, it is only advantageous if the execution time exceeds reconfiguration time. This implies that dynamic reconfiguration is more suited to quasi-static applications, and real-time applications are therefore typically not reconfigured. A method proposed in the literature to ameliorate the overhead from the configuration process is to use a block-RAM (BRAM) based, hardware-controlled reconfiguration architecture, eliminating the need for a processor bus by storing the configuration in localised memory. The drawback of this architecture is the limited size of the BRAM, implying only a subset of configurations can be stored. The work presented in this thesis aim to address this size limitation by proposing a specialiser capable of adapting the configuration stored in the BRAM to represent different sets of hardware. This is done by directly manipulating the bits in the configuration using passive hardware. This not only allows the configuration to be specialised practically immediately, but also allows this specialiser to be device independent. By incorporating this specialiser into the BRAM-based architecture, this study sets out to establish that it is possible to reduce the overhead of the reconfiguration process to such an extent that dynamic reconfiguration can be used for real-time applications. Since the composition of the configuration is not publicly available, a method had to be found to parse and analyse the configuration in order to map the configuration space of the device. The approach used was to compare numerous different configurations and mapping the differences. By analysing these differences, it was found that there is a logical relationship between the slice coordinates and the configuration space of the device. The encoding of the lookup tables was also determined from their initialisation parameters. This allows the configuration of any lookup table to be changed by simply changing the corresponding bits in the configuration. Using this proposed reconfiguration architecture, a distributed multiply-accumulate was reconi figured and its functional density measured. The reason for selecting this specific application is because the multiply-accumulate instruction can be found at the heart of many real-time applications. If the functional density of the reconfigured application is comparable to those of its static equivalent, a strong case can be made for real-time reconfiguration in general. Functional density is an indication of the composite benefits dynamic reconfiguration obtains above its static generic counterpart. Due to the overhead of the reconfiguration process, the functional density of reconfigured applications is traditionally significantly lower than those of static applications. If the functional density of the reconfigured application can rival those of the static equivalent, the overhead from the reconfiguration process becomes negligible. Using this metric, the functional density of the distributed multiply-accumulate was compared for different reconfiguration implementations. It was found that the reconfiguration architecture proposed in this thesis yields a significant improvement over other reconfiguration methods. In fact, the functional density of this method rivalled that of its static equivalent, implying that it is possible to dynamically reconfigure a real-time application. It was also found that the proposed architecture reduces specialisation and reconfiguration time to such an extent that it is possible complete the reconfiguration process within strict time constraints. Even though the proposed method is only capable of reconfiguring the LUTs of a real-time application, this is the first step towards allowing full reconfiguration of applications with dynamic characteristics. The first contribution this thesis makes is a novel method to parse and analyse the configuration of a XilinxR VirtexR -5 FPGA. It also successfully maps the configuration space to the configuration data. Even though this method is applied to a specific device, it is device independent and can easily be applied to any other FPGA. The second contribution comes from using the information obtained from this analysis to design and implement a configuration specialiser, capable of adapting lookup tables in real time. Lastly, the third contribution combines this specialiser with the BRAM-based architecture to allow the reconfiguration of applications typically not reconfigured. / PhD (Computer and Electronic Engineering), North-West University, Potchefstroom Campus, 2015
547

The dialectical nature of social networking / Mark Jacob Amiradakis

Amiradakis, Mark Jacob January 2015 (has links)
This study aims to provide a critical assessment of social networking sites along with the underlying form of rationality propelling such technological innovations. The hypothesis of this study is rooted in the firm conviction that while social networking sites can be regarded as impressive technological achievements, and while there are certainly an array of benefits that can be associated with them, they nevertheless can be perceived as a hegemonic force which surreptitiously undermines the autonomy and freedom of the modern individual. In order to corroborate and augment such an assertion, this study relies primarily on the critical works of Adorno and Horkheimer (1997); Bauman (2003; 2007 & 2013) and Foucault (1977) in order to both investigate and critically evaluate the everyday assumptions typically associated with a technologically enlightened society, techno-scientific rationality and the recent emergence of technological tools such as social networking services. Based upon the findings that have emerged throughout the course of this investigation, it becomes clear to see that there is indeed a dialectical tension inherent to the nature of the various social networking technologies as they currently operate within the 21st century. Such a discovery is primarily based upon the fact that while social networking technologies do inherently possess emancipatory potentialities for the modern individual, they have nevertheless failed to actualise such potentialities due to the following reasons: 1) Social networking technologies have managed to propagate and entrench a powerful sentiment of technological determinism within modern society along with a highly corrosive form of instrumentalized rationality to which all individuals are now required to acquiesce; 2) Such technologies are paradoxically abrogating the possibility of meaningful interpersonal contiguity due to the fact they have managed to commodify the technological culture associated with a digital form of interaction/communication along with the individual making use of such technologies; and 3) In their current format, social networking services are allowing for the objectification, manipulation and exploitation of the online subject to take place in order to pursue and promote an instrumentalized strategy of marketing surveillance and capital accumulation. / MA (Philosophy), North-West University, Potchefstroom Campus, 2015
548

Bitstream specialisation for dynamic reconfiguration of real-time applications / Ronnie Rikus le Roux

Le Roux, Ronnie Rikus January 2015 (has links)
The focus of this thesis is on specialising the configuration of a field-programmable gate array (FPGA) to allow dynamic reconfiguration of real-time applications. The dynamic reconfiguration of an application has numerous advantages, but due to the overhead introduced by this process, it is only advantageous if the execution time exceeds reconfiguration time. This implies that dynamic reconfiguration is more suited to quasi-static applications, and real-time applications are therefore typically not reconfigured. A method proposed in the literature to ameliorate the overhead from the configuration process is to use a block-RAM (BRAM) based, hardware-controlled reconfiguration architecture, eliminating the need for a processor bus by storing the configuration in localised memory. The drawback of this architecture is the limited size of the BRAM, implying only a subset of configurations can be stored. The work presented in this thesis aim to address this size limitation by proposing a specialiser capable of adapting the configuration stored in the BRAM to represent different sets of hardware. This is done by directly manipulating the bits in the configuration using passive hardware. This not only allows the configuration to be specialised practically immediately, but also allows this specialiser to be device independent. By incorporating this specialiser into the BRAM-based architecture, this study sets out to establish that it is possible to reduce the overhead of the reconfiguration process to such an extent that dynamic reconfiguration can be used for real-time applications. Since the composition of the configuration is not publicly available, a method had to be found to parse and analyse the configuration in order to map the configuration space of the device. The approach used was to compare numerous different configurations and mapping the differences. By analysing these differences, it was found that there is a logical relationship between the slice coordinates and the configuration space of the device. The encoding of the lookup tables was also determined from their initialisation parameters. This allows the configuration of any lookup table to be changed by simply changing the corresponding bits in the configuration. Using this proposed reconfiguration architecture, a distributed multiply-accumulate was reconi figured and its functional density measured. The reason for selecting this specific application is because the multiply-accumulate instruction can be found at the heart of many real-time applications. If the functional density of the reconfigured application is comparable to those of its static equivalent, a strong case can be made for real-time reconfiguration in general. Functional density is an indication of the composite benefits dynamic reconfiguration obtains above its static generic counterpart. Due to the overhead of the reconfiguration process, the functional density of reconfigured applications is traditionally significantly lower than those of static applications. If the functional density of the reconfigured application can rival those of the static equivalent, the overhead from the reconfiguration process becomes negligible. Using this metric, the functional density of the distributed multiply-accumulate was compared for different reconfiguration implementations. It was found that the reconfiguration architecture proposed in this thesis yields a significant improvement over other reconfiguration methods. In fact, the functional density of this method rivalled that of its static equivalent, implying that it is possible to dynamically reconfigure a real-time application. It was also found that the proposed architecture reduces specialisation and reconfiguration time to such an extent that it is possible complete the reconfiguration process within strict time constraints. Even though the proposed method is only capable of reconfiguring the LUTs of a real-time application, this is the first step towards allowing full reconfiguration of applications with dynamic characteristics. The first contribution this thesis makes is a novel method to parse and analyse the configuration of a XilinxR VirtexR -5 FPGA. It also successfully maps the configuration space to the configuration data. Even though this method is applied to a specific device, it is device independent and can easily be applied to any other FPGA. The second contribution comes from using the information obtained from this analysis to design and implement a configuration specialiser, capable of adapting lookup tables in real time. Lastly, the third contribution combines this specialiser with the BRAM-based architecture to allow the reconfiguration of applications typically not reconfigured. / PhD (Computer and Electronic Engineering), North-West University, Potchefstroom Campus, 2015
549

The effect of differing clinical settings on chiropractic patients suffering from mechanical low back pain

Richardson, Grant Walter January 2007 (has links)
Thesis (M.Tech.: Chiropractic)-Dept. of Chiropractic, Durban University of Technology, 2007 xviii, 140 leaves / Each healing encounter, and every treatment, has specific and non-specific treatment effects. Non – specific effects, or placebo effects, are the benefits felt by the patients because of the nature of the healing encounter. Although difficult to quantify and control, a number of authors recognize that the non-specific component of management has an additive effect on the overall clinical outcome. It has been reported that due to the physical interaction and social nature of chiropractic, there is a strong non-specific component in the management process, but to what extent it facilitates in the healing encounter is unknown. It has also been shown that spinal manipulation has a clinical effect which exceeds that of placebo; therefore it is possible for its effect to be muted or amplified, depending on the presence or absence of non-specific effects. For the above reasons this study was conducted in an attempt to map the size of the non-specific effect in the healing encounter by manipulating the practice setting in which the patients were treated.
550

An investigation into the effect of a high velocity low amplitude manipulation on core muscle strength in patients with chronic mechanical lower back pain

Uys, Lizette January 2006 (has links)
Thesis (M.Tech.:Chiropractic)-Dept. of Chiropractic, Durban Institute of Technology, 2006 xvii, 148 leaves, Annexures A-L / Brunarski (1984) says that philosophically and historically, chiropractic has been uniquely orientated toward an emphasis on preventative care and health maintenance with a mechanistic and hands-on model for treatment. Instead of reductionism, chiropractors focus on holism, non-invasiveness and the sharing of the responsibilities for healing between doctor and patient. As stated in a Canadian report by Manga et al. (1993), lower back pain is a ubiquitous problem and there are many epidemiological and statistical studies documenting the high incidence and prevalence of lower back pain (Manga et al., 1993). Evans and Oldreive (2000) revealed in a study of the transversus abdominis that low back pain patients had reduced endurance of the transverses abdominis and that its protective ability was decreased. In addition, it was noted that wasting and inhibition of the other core stabiliser and co-contractor, multifidus, was present (Hides et al.,1994), both of which have been linked to the presence of low back pain (Evans and Oldreive, 2000 and Hides et al., 1994). Thus, it stands to reason that manipulation, as an effective treatment for low back pain (Di Fabio, 1992), could be effective in restoring the strength and endurance of the core stability muscles. This is theoretically supported by the fact that a restriction in motion and pain due to mechanical derangement in the low back can be effectively treated by manipulation (Sandoz, 1976; Korr (Leach, 1994); Herzog et al., 1999; Homewood, 1979; Vernon and Mrozek, 2005 and Wyke (Leach, 1994)). Homewood (1979) described that a subluxation may interfere with the nerve supply and result in a decrease in muscular activity. He hypothesized that removal of the subluxation could restore: normal physiological processes, increase muscle activity and; improve functional ability and normalize the torque ratios (Herzog et al., 1999; Korr (Leach, 1994); Nansel et al., 1993 and Rebechini-Zasadny et al., 1981). In terms of an intervention, Rebechini-Zasadny et al. (1981) and Naidoo (2002) demonstrated and inferred that manipulation to the cervical spine could affect the muscular activity supplied by those levels. They, however, suggested further studies of manipulation-induced peripheral changes in the muscles are needed, due to unaccounted for variables and small sample sizes in their respective studies This research aims to address the questions posed by the above literature, hence by investigating a high velocity low amplitude manipulation as a possible added intervention for improving local core stabilizer muscle strength, a management protocol for the chronic mechanical lower back pain could be developed.

Page generated in 0.1087 seconds