• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 176
  • 64
  • 23
  • 21
  • 20
  • 13
  • 11
  • 11
  • 6
  • 6
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 417
  • 47
  • 40
  • 32
  • 32
  • 26
  • 25
  • 24
  • 23
  • 22
  • 22
  • 21
  • 20
  • 19
  • 19
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

Messverfahren zur Bestimmung der Partikelanzahlkonzentration in Umweltaerosolen

Hillemann, Lars 25 September 2013 (has links) (PDF)
Die natürliche Umgebungsluft enthält Aerosolpartikel, deren Größe von wenigen Nanometern bis zu einigen Mikrometern reicht. Insbesondere anthropogenen ultrafeinen Partikeln, die kleiner als 100 nm sind, werden negative Wirkungen auf die menschliche Gesundheit zugeschrieben. Die gravimetrische Messung der Partikelmassekonzentration erfasst ultrafeine Partikel nur ungenügend, da die Masse dieser Partikel sehr gering ist. Deutlich empfindlicher gelingt die Quantifizierung ultrafeiner Partikel durch die Messung der Partikelanzahlkonzentration. Die Arbeit beschreibt ein Verfahren zur Messung der Anzahlkonzentration von Partikeln in Umweltaerosolen. Es verknüpft die elektrische Aufladung der Partikel mit deren Klassierung im elektrischen Feld und ihre Mengenbestimmung anhand der elektrischen Ladung. Mittels des entwickelten Sensormodells gelingt die Verbindung der gemessenen Rohdaten mit der Anzahlgrößenverteilung der Partikel durch eine Kernfunktion in einer Fredholmschen Integralgleichung erster Art. Zur Dateninversion wird diese Gleichung in diskreter Form als lineares Gleichungssystem genutzt. Dessen Koeffizienten bilden die Kernmatrix, welche mit einer neu entwickelten Methode experimentell bestimmt wird. Vergleichsmessungen zeigen eine gute Übereinstimmung des Verfahrens mit Referenzverfahren der Aerosolmesstechnik und unterstreichen die Eignung des Verfahrens zur Partikelquantifizierung in Umweltmessnetzen.
182

Connecting a DE2 board with a 5-6k interface board containing an ADC for digital data transmission

Keller, Markus January 2011 (has links)
The goal of this bachelor thesis work was to establish a cable connection between an analogue interface board, containing a 16 bit analogue to digital converter, and a DE2 board in order to allow for digital data transmission between the two boards. The DE2 board includes an FPGA which was configured to contain a Nios II softcore microprocessor for handling the tasks of reading and saving the 16 bit digital words transmitted over the cable as well as controlling the analogue to digital converter on the interface board. During the project work various tasks had to be fulfilled which included soldering the cable for parallel transmission of the 16 bit digital data words and the control signals between the boards as well as adjusting the analogue interface board with the correct voltage supplies and jumper settings. Furthermore the hardware circuit insidethe FPGA had to be configured and the program running on the Nios II processor had to be written in C language.
183

Privacy Perceptions of Visual Sensing Devices: Effects of Users' Ability and Type of Sensing Device

Caine, Kelly E. 17 July 2006 (has links)
Homes that can collaborate with their residents rather than simply provide shelter are becoming a reality. These homes such as Georgia Techs Aware Home and MITs house_n can potentially provide support to their residents. Because aging adults may be faced with increasing mental and/or physical limitation(s) they may stand to benefit, in particular, from supports provided by these homes if they utilize the technologies they offer. However, the advanced technology in these aware homes often makes use of sensing devices that capture some kind of image-based information. Image-based information capture has previously been shown to elicit privacy concerns among users, and even lead to disuse of the system. The purpose of this study was to explore the privacy concerns that older adults had about a home equipped with visual sensing devices. Using a scenario-based structured interview approach I investigated how the type of images the home captures as well as the physical and mental health of the residents of the home affected privacy concerns as well as perceived benefits. In addition, responses to non-scenario-based open ended structured interview questions were used to gain an understanding of the characteristics of the influential variables. Results suggest that although most older adults express some concerns about using a visual sensing device in their home, the potential benefits of having such a device in specific circumstances outweigh their concerns. These findings have implications in privacy and technology acceptance theory as well as for designers of home based visual monitoring systems.
184

Studies on the monitor and management of sergestid shrimp¡]Sergia lucens¡^resource in Tung-Kang, Taiwan.

Jiang, Yu-ning 25 June 2010 (has links)
The catch of Sergestid (Sergia lucens) shrimp is one of notable self-managed fishery in Taiwan. In 1992, Tung-Kang fishery association has assembled ship owners for a sale and marketing sector within the local fishery association which is a organization to regulate and manipulate relevant to the fishing guideline and fund management. Up to now, no adjustment has been made on the catch limit under the fishing guideline. Although there is some improvement on such species catch. The result however shows still problem of fishery management resulting from high density of fishing. To better monitor the Sergestid shrimp fishery, this study aims to collect the Sergestid shrimp sample monthly from November, 2006 to December, 2007, for measuring the body length and weight of shrimp. The monitoring data appears that monthly mature female and Sergestid shrimp ratio are as low as 20% during April-June of 2007 and 36.01% in June of 2007 among the monitoring period. After reviewing a correlation between monthly mature female and Sergestid shrimp, the female is heavier than male shrimp at same length. When applying body length into FiSAT ¢º to calculate female and male coefficients, the VBGF (Von Bertalanffy Growth Function) growth coefficient (K) is 0.67 and 0.92 respectively; Limit body long (L¡Û) is 43.47mm and 40.29mm respectively; Total mortality coefficient (Z) is 2.97 and 3.57 respectively; the Fishing mortality coefficient (F) is 1.96 and 2.3 and rate of exploitation (E) is 0.66 and 0.64 respectively. The estimate resource of female can be deduced from above data, for example, annual catches is 562.4 tons in 2007. The estimates resources of female is 1995.5¡Ñ106 per tail; male is 925.0¡Ñ106 per tail; total female and male is 2,920.5¡Ñ106 per tail. In addition to the earlier result of research, this study concludes that the peak season of spawning around marine water of western Taiwan occurs from December to next February and July, which does not correspond to the forbidden period from June to October under the fishing regulation. Thus, two forbidden periods in December to next February and June to August are necessary to avoid the spawning from over fishing. The study also found that the current size of fishing gear such as outer codend in 28.9mm and cover codend in 21.2mm are smaller than size at the first maturity for female in 26.19mm and the L50 for total female and male in 31.88mm. This implied that the size of outer codend and cover codend may catch immature shrimp, which is not bigger enough for spawning. In order to avoid the catch of immature female shrimp, the size of fishing gear should be reset at bigger size. Further studies is needed for the size of fishing gear correction. Finally, the resulting fishing mortality coefficient calculated from FiSAT is 2.10 that the resources of Sergestid shrimp are approximately 2,920.5¡Ñ106 per tail. This shows down trend of stock over time. This suggests that the fishing guideline should reinforce to limit the number of fishing boat and harvest. Another suggestion is to limit the number of fishing per boat daily or adopt fishing boat rotation without reducing the amount of fishing boat. If the shrimp fishery population remain no significant improvement, the implementation of a long-term fishing boat reduction and the total allowance per catch regulation are the useful policy. These measures shall be employed to raise the value of Sergestid shrimp, in order to increasing the income of fisherman and also to achieving the sustainable development of Sergestid shrimp.
185

The Relationship Between Narrative Strategies And Meaning In William Golding

Cirakli, Mustafa Zeki 01 March 2010 (has links) (PDF)
This dissertation attempts to investigate the relationship between certain narrative strategies and meaning(s), and presents a narratological analysis of Golding&rsquo / s three novels. It primarily refers to the terminology offered by Genette and Rimmon-Kenan and, considering the mode of narration (voice) and the mode of focalization (mood), it tries to unearth narrative elements in narrative fiction. This dissertation argues that the implied author employs narrative agents and strategies of perspectivisation in order to affect, manipulate, determine or change the meaning(s), and that storytelling authority can be violated or balanced by monitority of perceiving. In The Inheritors, the implied author plays with shifting perspective to portray the other from within / in Pincher Martin, s/he explores temporality and timelessness to reveal post-mortem individual consciousness / unconsciousness, and in Free Fall, s/he produces a first-person retrospective narration where the protagonist deals with the act of story-telling and attempts to reconstruct his identity through manipulating subnarratives and perspectives.
186

IC Design and Implementation of Fast Bipolar Inner Product Processor and Analog to Digital Converter

Hsueh, Ya-Hsin 20 June 2000 (has links)
This thesis is composed of three independent parts, which are respectively focused on three different applications. 1. A Circuit Design of Fast Bipolar Inner Product Processor for Neural Associative Memory Networks¡G A novel and high-speed realization of the bipolar-valued inner product processor for associative memory networks is presented. The proposed design is verified to speed up the inner product computation compared with prior works. 2. An Area-Saving 8-bit A/D Converter Using A Binary Search Scheme¡G A fast and area-saving analog-to-digital converter using DFFs and a digital-to-analog converter is proposed. This design provides a reasonably fast solution for the embedded ADC with the area penalty growing linearly with the data length. 3. A Smart Battery Monitor Emulator System¡G An efficient smart battery monitor emulator system is designed by using the bq2018 IC of Benchmarq company. This system is aimed to improve the battery monitoring efficiency such that the exact remaining power and time of the battery can be estimated.
187

A Study on the Management of the Outsourcing System of Telecommunication

Cheng, Yu-Hsiang 30 July 2002 (has links)
How to promote the competitive potential of business is the most important target presently. Being the new competitive era has come; the traditional human resource management model can¡¦t meet the new challenge in 21 century. The human resource management system in business has faced the new evolution for this new age. Under such a complex competitive environment, the competitive power of business depends on the proper utility of the human resource management type. ¡§Keeping the core specialty, leaving behind the others¡¨ was regarded as the strategy of business to keep profit base. Outsourcing system is regarded as the way to meet the strategic target, cost reduction, customer satisfied improvement, and other performance improvement. Being more flexible for company running, and the managers can concentrate themselves on the core specialty ability. However it can¡¦t be denied that outsourcing system exhibit some risks and some problems. It takes so much attention not only to create the largest profit for customer as well as to guarantee the abidance of contract regulation but also to promote the performance quality. The problem from the mechanism of outsourcing management will be induced when there are communication difficulty between company and outsourcer. The subject of this study is the Chunghwa Telecom Co., Ltd. The outsourcing was regarded as the strategic tool to promote the competitive potential. The key issue that outsourcer performed the management mechanism. Such as the management of contract type, the management of monitoring all the procedure, the management of evaluation to the efficiency, was also studied. In order to run this outsourcing system well, the human resource management in outsourcer was also researched. The analysis of the data revealed the following main conclusions: 1. Most interviewees agreed that the major reason for outsourcing system is the strategic target. The secondary reason was reducing and controlling the cost. The most important factor which are considered is promoting the competitive potential for this company. The outsourcing will not last for a long time by only considering this one factor of cost. 2.Some problems could be induced by the vicious competition between other outsourcing companies and could make the bad influence to the company, such as jerry-build in the pipe construction. The deficiency of professional knowledge of monitoring human resource was the most important factors for the success of outsourcing system in this company. The human resource with engineering management knowledge should be trained and educated for last term to get enough professional ability to execute the engineering efficiently. 3.More than 50% interviewees in this company agreed that the general task should be kept to ensure the working right for personnel in this company. The most personnel had the opposite attitude for ¡§the importance of outsourcing system for the personal service is increasing day by day¡¨. However, facing the privatization era, the manager should realize how to improve proper human resource utility and arrangement in organ structure. And how to promote the producing power of internal personnel instead of the outsourcing system and push the internal personnel to retire. 4. The quality of the telecommunication is the most important factor that affected the customer right. As known by internal personnel and the customers¡¦ view of piping problem is owing to that pipe always damaged by the digging engineering. It came from that working units are too negligent to check scene and to confirm the location in map. 5. As with the human resource management of outsourcing system, we focus on not only the requirements of engineering quality but also the health and safety of labors and the control management of environments, especially the noise and air pollution. By the result of this study, some suggestions are proposed. To construct more effective outsourcing management mechanism under the abidance of the ¡§regulation of government purchase.¡¨ The contract activation mechanism should be performed to maintain the cooperative relationship with outsourcers in long term.
188

A Principled Approach to Policy Composition for Runtime Enforcement Mechanisms

Carter, Zachary Negual 01 January 2012 (has links)
Runtime enforcement mechanisms are an important and well-employed method for ensuring an execution only exhibits acceptable behavior, as dictated by a security policy. Wherever interaction occurs between two or more parties that do not completely trust each other, it is most often the case that a runtime enforcement mechanism is between them in some form, monitoring the exchange. Considering the ubiquity of such scenarios in the computing world, there has been an increased effort to build formal models of runtime monitors that closely capture their capabilities so that their effectiveness can be analysed more precisely. While models have grown more faithful to their real-life counterparts, is- sues concerning complexity and manageability (a common concern for software engineers) of centralized policies remains to be fully addressed. The goal of this thesis is to provide a principled approach to policy construction that is modular, intuitive, and backed by formal methods. This thesis introduces a class of policy combinators adequate for use with runtime en- forcement policies and analyses a particular instance of them called Static Committee Com- binators (SCCs). SCCs present a model of policy composition where combinators act as committees that vote on events passing through the monitor. They were conceptualized in collaboration with Jay Ligatti and Daniel Lomsak. The general class of combinators are called Static Decision Combinators (SDCs), which share key features with SCCs such as allowing combinators to respond with alternative events when polled, in addition to re- sponding with grants or denials. SDCs treat the base-level policies they compose as black boxes, which helps decouple the system of combinators from the underlying policy model. The base policies could be modelled by automata but the combinators would not maintain their own state, being "static". This allows them to be easily defined and understood using truth tables, as well as analysed using logic tools. In addition to an analysis of SDCs and SCCs, we provide useful examples and a reusable combinator library.
189

A general nuclear smuggling threat scenario analysis platform

Thoreson, Gregory George, 1985- 19 October 2011 (has links)
A hypothetical smuggling of material suitable for a nuclear weapon is known as a threat scenario. There is a considerable effort by the U.S. government to reduce this threat by placing radiation detectors at key interdiction points around the world. These detectors provide deterrence and defense against smuggling attempts by scanning vehicles, ships, and pedestrians for threat objects. Formulating deployment strategies for these detectors within the global transportation network requires an understanding of the complex interactions between the attributes of a smuggler and the detection systems. These strategies are rooted in the continued development of novel detection systems and alarm algorithms. Radiation transport simulation provides a means for characterizing detection system response to threat scenarios. However, this task is computationally expensive with existing radiation transport codes. Furthermore, the degrees of freedom in smuggler and threat scenario attributes create a large, constantly evolving problem space. Previous research has demonstrated that decomposing the scenario into independently simulated components using Green's functions can simulate photon detector signals with coarse energy resolution. This dissertation presents a general form of this approach, applicable to a wide range of threat scenarios through physics enhancements and numerical treatments for high energy resolution photon transport, neutron transport, and time dependent transport. While each Green's function implicitly captures the full transport phase-space within each component, these new methods ensure that this information is preserved between components. As a result, detector signals produced from full forward transport simulations can be replicated within 20% while requiring multiple orders of magnitude less computation time. This capability is presented as a general threat scenario simulation platform which can efficiently model a large problem space while preserving the full radiation transport phase-space. / text
190

DESERVE: A FRAMEWORK FOR DETECTING PROGRAM SECURITY VULNERABILITY EXPLOITATIONS

MOHOSINA, AMATUL 20 September 2011 (has links)
It is difficult to develop a program that is completely free from vulnerabilities. Despite the applications of many approaches to secure programs, vulnerability exploitations occur in real world in large numbers. Exploitations of vulnerabilities may corrupt memory spaces and program states, lead to denial of services and authorization bypassing, provide attackers the access to authorization information, and leak sensitive information. Monitoring at the program code level can be a way of vulnerability exploitation detection at runtime. In this work, we propose a monitor embedding framework DESERVE (a framework for DEtecting program SEcuRity Vulnerability Exploitations). DESERVE identifies exploitable statements from source code based on static backward slicing and embeds necessary code to detect attacks. During the deployment stage, the enhanced programs execute exploitable statements in a separate test environment. Unlike traditional monitors that extract and store program state information to compare with vulnerable free program states to detect exploitation, our approach does not need to save state information. Moreover, the slicing technique allows us to avoid the tracking of fine grained level of information about runtime program environments such as input flow and memory state. We implement DESERVE for detecting buffer overflow, SQL injection, and cross-site scripting attacks. We evaluate our approach for real world programs implemented in C and PHP languages. The results show that the approach can detect some of the well-known attacks. Moreover, the approach imposes negligible runtime overhead. / Thesis (Master, Electrical & Computer Engineering) -- Queen's University, 2011-09-19 19:04:28.423

Page generated in 0.0302 seconds