• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 131
  • 43
  • 16
  • 13
  • 11
  • 6
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 2
  • 2
  • Tagged with
  • 289
  • 28
  • 25
  • 23
  • 22
  • 18
  • 17
  • 16
  • 16
  • 16
  • 15
  • 15
  • 14
  • 13
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
211

Recursive Blocked Algorithms, Data Structures, and High-Performance Software for Solving Linear Systems and Matrix Equations

Jonsson, Isak January 2003 (has links)
This thesis deals with the development of efficient and reliable algorithms and library software for factorizing matrices and solving matrix equations on high-performance computer systems. The architectures of today's computers consist of multiple processors, each with multiple functional units. The memory systems are hierarchical with several levels, each having different speed and size. The practical peak performance of a system is reached only by considering all of these characteristics. One portable method for achieving good system utilization is to express a linear algebra problem in terms of level 3 BLAS (Basic Linear Algebra Subprogram) transformations. The most important operation is GEMM (GEneral Matrix Multiply), which typically defines the practical peak performance of a computer system. There are efficient GEMM implementations available for almost any platform, thus an algorithm using this operation is highly portable. The dissertation focuses on how recursion can be applied to solve linear algebra problems. Recursive linear algebra algorithms have the potential to automatically match the size of subproblems to the different memory hierarchies, leading to much better utilization of the memory system. Furthermore, recursive algorithms expose level 3 BLAS operations, and reveal task parallelism. The first paper handles the Cholesky factorization for matrices stored in packed format. Our algorithm uses a recursive packed matrix data layout that enables the use of high-performance matrix--matrix multiplication, in contrast to the standard packed format. The resulting library routine requires half the memory of full storage, yet the performance is better than for full storage routines. Paper two and tree introduce recursive blocked algorithms for solving triangular Sylvester-type matrix equations. For these problems, recursion together with superscalar kernels produce new algorithms that give 10-fold speedups compared to existing routines in the SLICOT and LAPACK libraries. We show that our recursive algorithms also have a significant impact on the execution time of solving unreduced problems and when used in condition estimation. By recursively splitting several problem dimensions simultaneously, parallel algorithms for shared memory systems are obtained. The fourth paper introduces a library---RECSY---consisting of a set of routines implemented in Fortran 90 using the ideas presented in paper two and three. Using performance monitoring tools, the last paper evaluates the possible gain in using different matrix blocking layouts and the impact of superscalar kernels in the RECSY library.
212

40 kap. 12 § Inkomstskattelagen : En rättslig analys av lagrummet

Olsson, Christoffer January 2012 (has links)
Enligt huvudregeln i svensk skatterätt ska företag som tidigare år redovisat underskott dra av underskottet det följande beskattningsåret. Till huvudregeln följer begränsningar i avdragsrätten, vilka aktualiseras först vid ägarförändringar. En begränsningsregel som har fått mycket uppmärksamhet är den som följer av 40 kap. 12 § Inkomstskattelag 1999:1229 (IL). Paragrafen infördes ursprungligen för att begränsa handel med underskottsföretag. Handel med underskottsföretag anses av lagstiftaren kunna ge negativa samhällsekonomiska konsekvenser. När flera personer gemensamt förvärvat det bestämmande inflytandet i ett underskottsföretag kan 40 kap. 12 § IL utlösa en beloppsspärr. Denna beloppsspärr innebär att vissa delar av ett underskott kan falla bort och på så vis inte utnyttjas mot ett framtida överskott. Uppmärksamheten som riktats mot lagrummet består huvudsakligen av kritik mot ordalydelsens otydlighet. Skatteverket har i en skrivelse till regeringen uttryckt att 40 kap. 12 § är omöjlig att följa och tillämpa. Paragrafens uppbyggnad och lydelse är komplicerad och på flera områden lämnas det öppet för alternativa tolkningar. Med hjälp av förarbeten kan man göra välgrundade antaganden i hur lagrummet ska förstås, men det föreligger fortfarande flera obesvarade frågor. I framställningen tydliggörs att bestämmelserna i 40 kap. 12 § IL har långtgående omfattning vilket kan utlösa beloppsspärren i situationer som förmodligen inte var avsett.   Det konstateras att det föreligger en diskrepans mellan lydelsen av lagrummet och motivuttalandena i propositionen. Slutsatsen av denna framställning är att 40 kap. 12 § IL måste reformeras för att bättre kunna tillämpas i skattelagstiftningen. / According to the principal rule in Swedish tax law, companies that in previous years reported deficit of the fiscal year have to reduce the deficit the following fiscal year. The principle rule are followed by some restrictions, which activates first when ownership changes. A specific restriction rule that has received much attention is chapter 40 § 12 income tax law 1999:1229 (IL). The clause was introduced originally to restrict trade with deficit enterprises. Trade with deficit enterprises is considered by the legislator to give negative socio-economic consequences. When several persons together obtain control of a deficit company activates an amount blocking. This amount blocking means that certain parts of a deficit may cease and not be used against a future surpluses. The attention directed towards chapter 40 § 12 IL consists mainly of criticism against the wording of the paragraph. The Swedish tax agency has, in a letter to the Government expressed that chapter 40 § 12 is impossible to follow and apply. The structure and wording is complex and in many areas lefts opened for alternative interpretations. The source of law provides some help of which it is possible to make informed assumptions of the meaning of the paragraph, but there are still many unanswered questions. This essay clarifies that the provisions of chapter 40 § 12 IL has an extensive coverage which could trigger an amount blocking in situations that probably wasn't intended. It is found that there is a discrepancy between the wording of chapter 40 § 12 IL and the intentions of the paragraph. The conclusion of this essay is that chapter 40 § 12 IL must be reformed in order to improve the application of the tax legislation.
213

Biological And Chemical Sludge Filtration

Yukseler, Hande 01 July 2007 (has links) (PDF)
Up to date, sludge filterability has been characterized by the Ruth&rsquo / s classical filtration theory and quantified by the well-known parameter specific cake resistance (SCR). However, the complexity of the actual phenomenon is clearly underestimated by the classical filtration theory and SCR is often not satisfactory in describing filterability. Although many scientific studies were conducted for a better analysis and understanding of the filtration theory, still a practically applicable solution to replace the classical theory for a better description of filterability has not been proposed yet. In the present study, blocking filtration laws proposed by Hermans and Bred&eacute / e, dating back to 1936, which have been extensively used in the membrane literature for the analysis of fouling phenomenon and the multiphase filtration theory developed by Willis and Tosun (1980) highlighting the importance of the cake-septum interface in determining the overall filtration rate have been adopted for the analysis of filterability of sludge systems. Firstly, the inadequacy of the classical filtration theory in characterizing the filterability of real sludge systems and also the lack of the currently used methodology in simulating filtration operation was highlighted. Secondly, to better understand the effect of slurry characteristics and operational conditions on filtration, model slurries of spherical and incompressible Meliodent particles were formed. Finally, a methodology was developed with the gathered filtration data to assess the filterability of the sludge systems by both theories. The results clearly show that both approaches were superior to the classical approach in terms of characterizing the filterability of sludge systems. While blocking laws yielded a slurry specific characterization parameter to replace the commonly used SCR, the multiphase theory provided a better understanding of the physical reality of the overall process.
214

Junction Barrier Schottky Rectifiers in Silicon Carbide

Dahlquist, Fanny January 2002 (has links)
No description available.
215

Reliability and security of vector routing protocols

Li, Yan, doctor of computer science 01 June 2011 (has links)
As the Internet becomes the ubiquitous infrastructure for various applications, demands on the reliability, availability and security of routing protocols in the Internet are becoming more stringent. Unfortunately, failures are still common in the daily operation of a network. Service disruption for even a short time can seriously affect the quality of real-time applications, such as VoIP and video on demand applications. Moreover, critical business and government applications require routing protocols to be robust against malicious attacks, such as denial of Service attacks. This dissertation proposes three techniques to address some reliability and security concerns in intra-domain (distance vector) routing protocols and inter-domain (path vector) routing protocols. The first technique addresses the problem of service disruption that arises from sudden link failures in distance vector routing protocols. We consider two types of link failures: single link failures and shared risk link group failures. For single link failures, we propose an IP fast reroute mechanism to reroute packets around the failed links. This fast reroute mechanism is the first that does not require complete knowledge of the network topology and does not require changing of the original routing protocol. This mechanism proactively computes a set of relay nodes that can be used to tunnel the rerouted packets immediately after the detection of a link or node failure. The mechanism includes an algorithm for a node to automatically identify itself as a candidate relay node for a reroute link and notify the source node of the reroute link of its candidacy. The source node can then decide the validity of a candidate relay node. The mechanism also includes an algorithm to suppress redundant notification messages. We then extend our IP fast reroute mechanism for single link failures to accommodate shared risk link group failures. We achieve this goal by introducing one more bit information. Through simulations, I show that the proposed mechanisms succeed in rerouting around failed links about 100% of the time, with the length of the reroute path being comparable to the length of the re-converged shortest path. The second technique addresses the problem that arises from allowing any node to route data packets to any other node in the network (and consequently allow any adversary node to launch DoS attacks against other nodes in the network). To solve this problem, we propose a blocking option to allow a node u to block a specified set of nodes and prevent each of them from sending or forwarding packets to node u. The blocking option intends to discard violating packets near the adversary nodes that generated them rather than near their ultimate destinations. We then discuss unintentionally blocked nodes, called blind nodes and extend the routing protocols to allow each node to communicate with its blind nodes via some special nodes called joint nodes. Finally, I show, through extensive simulation, that the average number of blind nodes is close to zero when the average number of blocked nodes is small. The third technique addresses the problem that arises when a set of malicious ASes in the Internet collude to hijack an IP prefix from its legitimate owner in BGP. (Note that none of previous proposals for protecting BGP against IP prefix hijacking is effective when malicious ASes can collude.) To solve this problem, we propose an extension of BGP in which each listed AS in an advertised route supplies a certified full list of all its peers. Then I present an optimization where each AS in an advertised route supplies only a balanced peer list, that is much smaller than its full peer list. Using real Internet topology data, I demonstrate that the average, and largest, balanced peer list is 92% smaller than the corresponding full peer list. Furthermore, in order to handle the dynamics of the Internet topology, we propose algorithms on how to issue certificates to reflect the latest changes of the Internet topology graph. Although the results in this dissertation are presented in the context of distance vector and path vector routing protocols, many of these results can be extended to link state routing protocols as well. / text
216

Resource Management In Cellular Communication Networks With Subscriber Profile Prediction

Yilmaz, Nusrat 01 July 2005 (has links) (PDF)
In this study, a dynamic resource management and subscriber profile prediction scheme for mobile communication systems is presented. The aim is to achieve a high level of QoS for both handoff calls and new calls, while at the same time to improve the utilization of wireless network resources. The simultaneous satisfaction of these two actually conflicting interests will be thanks to two major key features. First, it will be due to the individual subscriber profile based prior information about handoff reservation requests that are provided by the mobile terminals. This information is based on the cell transition probabilities calculated by the mobile itself using collected information during past operations. Second, it will be due to a two-way approach implemented in the resource management processes. The two-way approach controls both the amount of reserved radio channels and the new call admission in a dynamic way, depending on the subscriber mobility and network traffic conditions.
217

Site blocking effects on adsorbed polyacrylamide conformation

Brotherson, Brett Andrew 06 November 2007 (has links)
The use of polymers as flocculating additives is a common practice in many manufacturing environments. However, exactly how these polymers interact with surfaces is relatively unknown. One specific topic which is thought to be very important to flocculation is an adsorbed polymer's conformation. Substantial amounts of previous work, mainly using simulations, have been performed to elucidate the theory surrounding adsorbed polymer conformations. Yet, there is little experimental work which directly verifies current theory. In order to optimize the use of polymer flocculants in industrial applications, a better understanding of an adsorbed polymer's conformation on a surface beyond theoretical simulations is necessary. This work looks specifically at site blocking, which has a broad impact on flocculation, adsorption, and surface modification, and investigated its effects on the resulting adsorbed polymer conformation. Experimental methods which would allow direct determination of adsorbed polymer conformational details and be comparable with previous experimental results were first determined or developed. Characterization of an adsorbed polymer's conformation was then evaluated using dynamic light scattering, a currently accepted experimental technique to examine this. This commonly used technique was performed to allow the comparison of this works results with past literature. Next, a new technique using atomic force microscopy was developed, building on previous experimental techniques, to allow the direct determination of an adsorbed polymer's loop lengths. This method also was able to quantify changes in the length of adsorbed polymer tails. Finally, mesoscopic simulation was attempted using dissipative particle dynamics. In order to determine more information about an adsorbed polymer's conformation, three different environmental factors were analyzed: an adsorbed polymer on a surface in water, an adsorbed polymer on a surface in aqueous solutions of varying ionic strength, and an adsorbed polymer on a surface functionalized with site blocking additives. This work investigated these scenarios using a low charge density high molecular weight cationic polyacrylamide. Three different substrates, for polymer adsorption were analyzed: mica, anionic latex, and glass. It was determined that, similar to previous studies, the adsorbed polymer layer thickness in water is relatively small even for high molecular weight polymers, on the order of tens of nanometers. The loop length distribution of a single polymer, experimentally verified for the first time, revealed a broad span of loop lengths as high as 1.5 microns. However, the bulk of the distribution was found between 40 and 260 nanometers. For the first time, previous theoretical predictions regarding the salt effect on adsorbed polymer conformation were confirmed experimentally. It was determined that the adsorbed polymer layer thickness expanded with increasing ionic strength of the solvent. Using atomic force microscopy, it was determined that the adsorbed polymer loop lengths and tail lengths increased with increasing ionic strength, supporting the results found using dynamic light scattering. The effect of the addition of site blocking additives on a single polymer's conformation was investigated for the first time. It was determined that the addition of site blocking additives caused strikingly similar results as the addition of salt to the medium. The changes in an adsorbed polymer's loop lengths was found to be inconsistent and minimal. However, the changes in an adsorbed polymer's free tail length was found to increase with increasing site blocking additive levels. These results were obtained using either PDADMAC or cationic nanosilica as site blocking additives.
218

Recurrent spontaneous abortion : a clinical, immunological and genetic study /

Jablonowska, Barbara. January 2003 (has links) (PDF)
Diss. (sammanfattning) Linköping : Univ., 2003. / Härtill 4 uppsatser.
219

Opportunities for Collaborative Planning in South Africa? : An analysis of the practice 're-blocking' by the South African SDI Alliance in Cape Town

Heyer, Antje January 2015 (has links)
This Master thesis is written in the field of collaborative planning aiming to challenge the collaborative approach on it applicability, especially in the context of the Global South. As a case study it looks on the urban poor community participatory practice, the so called 're-blocking' in Cape Town – an example of insitu informal settlement upgrading. It questions not only to what extent re-blocking displays a successful approach of collaborative planing but also whether it can lead to more inclusive cities in South Africa. The field data was gained through qualitative semi-structured interviews, observations and an analysis of national housing policy documents. The findings evaluate re-blocking as a successful example of collaborative planning in the sense that local communities are truly involved in the process and have a lot of decision making power. Also, re- blocking can be replicable to other cities in South Africa. Yet it faces several risks in community mobilisation and communication and can only be operated on a small scale. Therefore, the thesis concludes that re-blocking itself may not lead to inclusive cities, however as an example of community participation it may change the mindset of the South African society and (local) government towards informal community inclusion.
220

Efeito da estimulação tetânica, prévia à  calibração, no início de ação e tempos de recuperação do bloqueio neuromuscular em pacientes pediátricos / Effect of tetanic stimulation, prior to calibration, on the onset of action and recovery times of neuromuscular blockade in pediatric patients

Ricardo Vieira Carlos 04 December 2017 (has links)
Introdução e objetivos: a monitorização neuromuscular objetiva é prática médica baseada em evidências e deve ser empregada rotineiramente quando do uso de fármacos bloqueadores neuromusculares. Entretanto, pesquisas relacionadas a esta monitorização em pacientes pediátricos não estão vastamente documentadas como nos adultos. Em pesquisa clínica, o monitor neuromuscular deve apresentar resposta estável (menor que 5% de variação na altura de T1) por um período de dois a cinco minutos antes da administração do bloqueador neuromuscular. O tempo necessário para se alcançar esta estabilidade na resposta pode variar, mas pode ser encurtado por meio da aplicação de um estímulo tetânico por cinco segundos. Aventouse a hipótese de que a aplicação de estímulo tetânico antes da calibração poderia levar a diferenças nos parâmetros de início de ação e nos tempos de recuperação. O objetivo primário deste estudo foi comparar o tempo de início de ação e os tempos de recuperação após dose única de rocurônio 0,6 mg/kg seguido de recuperação espontânea, entre dois grupos de pacientes com sequências diferentes para a calibração (com e sem o uso de estímulo tetânico). Os objetivos secundários foram a avaliação da altura inicial e final de T1, tempo para se obter estabilidade da altura de T1 e os seguintes ajustes do monitor neuromuscular: corrente elétrica e sensibilidade. Método: consentimento informado dos responsáveis, foram incluídos no estudo 50 pacientes, estado físico 1 ou 2, de dois a 11 anos, agendados para cirurgias abdominais e/ou perineais com tempo cirúrgico estimado superior a 60 minutos. Os pacientes (25 por grupo) foram submetidos a anestesia intravenosa e alocados randomicamente para receber estímulo tetânico (grupo T) ou não (grupo C), antes da calibração do monitor. Após a calibração do monitor, a modalidade sequência de quatro estímulos foi iniciada e mantida em intervalo de 15 segundos. Resultados: não houve diferença significativa no início de ação (C: 57,5±16,9 versus T: 58,3±31,2 s; p=0,917). O tempo normalizado para as relações da sequência de quatro estímulos 0,7, 0,8 e 0,9 diferiram significativamente entre os grupos (C: 40,1 ± 7,9 versus T: 34,8±10 min; p=0,047, C: 43,8±9,4 versus T: 37,4±11 min; p=0,045 e C: 49,9±12,2 versus T: 41,7±13,1 min; p=0,026, respectivamente). O tempo necessário para a estabilização da altura de T1 não mostrou diferença estatística entre os grupos (C: 195±203 versus T: 116±81,6 s; p=0,093). Os valores de altura inicial de T1 mostraram diferença significativa entre os grupos (C: 98 versus T: 82,7%; p < 0,001). Os valores de altura final de T1 também mostraram diferença significante entre os grupos (C: 95,3 versus T: 69,3%; p < 0,001). Conclusões: o estímulo tetânico encurtou o tempo normalizado das relações da sequência de quatro estímulos 0,7, 0,8 e 0,9. As alturas inicial e final de T1 foram menores no grupo tétano. Não houve diferença estatística entre os grupos relativo ao tempo necessário para estabilização da altura de T1. Os ajustes do monitor (corrente elétrica e sensibilidade) não apresentaram diferenças entre os gruposEffect of tetanic stimulation, prior to calibration, on the onset of action and recovery times of neuromuscular blockade in pediatric patients / Background and objective: objective neuromuscular monitoring is evidence-based medical practice and should be routinely used when using neuromuscular blocking drugs. However, research related to this monitoring in pediatric patients is not widely documented as in adults. In clinical research, the neuromuscular monitor should have a stable response (less than 5% change in T1 height) for a period of two to five minutes before administration of the neuromuscular block agent. The time required to achieve this stability in response may vary, but may be shortened by the application of a tetanic stimulus for 5 seconds. It was hypothesized that the application of tetanic stimulus prior to calibration could lead to differences in the parameters of onset of action and recovery times. The primary outcome of this study was to compare time to onset and recovery times after single dose rocuronium 0.6 mg.kg-1 followed by spontaneous recovery between two groups of patients with different sequences for calibration (with and without use of tetanic stimulus). The secondary outcomes were the evaluation of the initial and final T1 height, time to obtain stability of T1 height and the following neuromuscular monitor settings: electric current and sensitivity. Methods: after approval by the Institutional Ethics Committee and obtaining the informed consent of those responsible for the patient, were included in the study 50 patients, physical status 1 or 2, from 2 to 11 years, scheduled for abdominal and/or perineal surgeries with estimated surgical time greater than 60 minutes. Patients (25 per group) underwent intravenous anesthesia and were allocated randomly to receive tetanus stimulation (group T) or not (group C) prior to calibration of the monitor. After calibration of the monitor, train-of-four mode was initiated and maintained at interval of 15 seconds. Results: there was no significant difference in onset of action (C: 57,5±16,9 versus T: 58,3±31,2 s; p=0,917). The train-of-four normalized times 0.7, 0.8 and 0.9 differed significantly between the groups (C: 40,1±7,9 versus T: 34,8±10 min; p=0,047, C: 43,8±9,4 versus T: 37,4±11 min; p=0,045 and C: 49,9±12,2 versus T: 41,7±13,1 min; p=0,026, respectively). The time required to stabilize the T1 height did not show statistical difference between the groups (C: 195±203 versus T: 116±81,6 s; p=0,093), The initial values of T1 height showed a significant difference between the groups (C: 98 versus T: 82,7%; p < 0,001). The final T1 height values also showed a significant difference between the groups (C: 95,3 versus T: 69,3%; p < 0,001). Conclusions: the tetanic stimulus shortened the normalized time of the fourstimulus sequence ratios 0.7, 0.8, and 0.9. The initial and final T1 heights were lower in the tetanus group. There was no statistical difference between the groups regarding the time required to stabilize the T1 height. The monitor settings (electric current and sensitivity) did not show differences between groups. Trial registration: Clinicaltrials.gov identifier: NCT0249867

Page generated in 0.1212 seconds