• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 43
  • 26
  • 19
  • 9
  • 5
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 138
  • 17
  • 15
  • 14
  • 13
  • 11
  • 11
  • 11
  • 10
  • 10
  • 10
  • 9
  • 9
  • 9
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Structural development of the Dun Mountain Ophiolite Belt in the Permian, Bryneira range, Western Otago, New Zealand.

Adamson, Thomas Keeley January 2008 (has links)
The deformed Permian Dun Mountain Ophiolite Belt (DMOB) forms the basement of the Dun Mountain-Maitai terrane and is traceable through the entire length of New Zealand. The DMOB contains a variably serpentinised mantle portion and a crustal portion containing gabbros, dolerites, cross cutting dikes and extrusives, together they are similar to oceanic crust. The initial crustal portion, however, is atypical when compared to other ophiolites, being thin and lacking a sheeted dike complex, but has well spaced inclined intrusive sheets and sills. At least four post-Permian deformation periods affect the DMOB; collision and rotation during emplacement of the DMOB on the Gondwana margin, compression during Mesozoic orogenies, extensional deformation during the Gondwana break-up and transpressive deformation related to the modern plate boundary through New Zealand. Structural work in the Northern Bryneira Range focused on well preserved outcrops to investigate crustal growth and contemporaneous deformation during the Permian. Structural evidence of Permian deformation was determined by examination of pseudostratigraphy, structures constrainable to the Permian, and the geometric relationships with the overlying Maitai sedimentary sequence. Crosscutting by intrusive phases was used to determine a chronological order of crustal growth and deformation episodes. It was concluded that all deformation was extensional and that two major phases of magmatism were separated by a period of deformation and were followed by ongoing syn-sedimentary deformation during the deposition of the Maitai Group. After removal of Mesozoic rotation, the resulting orientations of paleo-horizontal markers and diverse orientations of intrusive sheets were analysed. Two hypothesises were tested to assess the origin of inclined intrusive sheets: a) that the diverse orientations were the result of tectonic rotation coeval with the intrusion of dikes. b) that primary orientations of the sheets had been diverse. Results show that the sheets were intruded with diverse orientations, probably related to variation in the principle horizontal stress over time. Further rotation of the assemblage of sheets occurred during the last stages of magmatism and during the subsequent period of sedimentation. The last stage probably relates to large scale normal faulting during the development of the sedimentary basin. iii
22

Eléments finis stochastiques : approches intrusive et non intrusive pour des analyses de fiabilité

Berveiller, Marc 18 October 2005 (has links) (PDF)
La méthode des éléments finis stochastiques (MEFS) a été développée pour modéliser l'aléa sous la forme de variables aléatoires de type quelconque dans le cadre de la mécanique linéaire élastique. Elle consiste à écrire les composantes de la réponse aléatoire du système sous la forme d'une série polynomiale de variables aléatoires (baptisée chaos polynomial), dont les coefficients sont obtenus par une méthode de type Galerkin. Le champ d'application de cette méthode étant limité, de nouvelles méthodes, dites non intrusives, permettant le calcul du développement de la réponse dans la base du chaos polynomial ont été recherchées.<br />Les méthodes MEFS et non intrusive ont été testées et comparées sur des exemples de mécanique élastique linéaire. Enfin les approches non intrusives ont été utilisées dans un cas de mécanique de la rupture non linéaire.
23

Non-Intrusive Computing

Chen, Hao January 2008 (has links)
Pervasive computing is an important trend today. It concerns devices and services in a smart space that interact with users in a simple, natural, and harmonious way. Many problems in this domain have been studied from different perspectives in various projects. However, one important characteristic of pervasive computing, which is how to make it non-intrusive so that users can focus on their tasks, has received little formal attention. Nowadays, many computing entities including smart devices, and software components, are involved in our daily lives, and users need to deal with them as well as with other people. Besides, people are easy to reach with multiple devices. We believe there should be a systematic way to help users avoid intrusive ones. We propose a model for posing and answering two questions: will an interaction intrude on its receiver if delivered, and given that the interaction is deliverable, how can it be delivered effectively and not too overtly? With this model, the intrusion problem is analyzed and the essential factors are identified. A quantitative approach is used, so that factors have quantitative values for comparison and computation. We also apply context to refine them in order to achieve better results. We then illustrate how to materialize the model and build a system whose design is inspired by the Jabber framework that includes a collection of standards, technologies, and projects for instant messaging. The discussion is at a general level that does not depend on Jabber. However, by choosing Jabber in implementation, we reuse existing software and technologies, and benefit from Jabber/XMPP standardization, its low entry barrier for application developers, and its rich community support. The main contributions of our work are two-fold. First, we propose a model for intrusiveness in pervasive computing. Second, we address the problem at the system level by designing and realizing it. We also make use of standardized instant-messaging technologies, more precisely Jabber, in the system instantiation to reuse existing software, making the system more flexible and extensible.
24

Non-Intrusive Computing

Chen, Hao January 2008 (has links)
Pervasive computing is an important trend today. It concerns devices and services in a smart space that interact with users in a simple, natural, and harmonious way. Many problems in this domain have been studied from different perspectives in various projects. However, one important characteristic of pervasive computing, which is how to make it non-intrusive so that users can focus on their tasks, has received little formal attention. Nowadays, many computing entities including smart devices, and software components, are involved in our daily lives, and users need to deal with them as well as with other people. Besides, people are easy to reach with multiple devices. We believe there should be a systematic way to help users avoid intrusive ones. We propose a model for posing and answering two questions: will an interaction intrude on its receiver if delivered, and given that the interaction is deliverable, how can it be delivered effectively and not too overtly? With this model, the intrusion problem is analyzed and the essential factors are identified. A quantitative approach is used, so that factors have quantitative values for comparison and computation. We also apply context to refine them in order to achieve better results. We then illustrate how to materialize the model and build a system whose design is inspired by the Jabber framework that includes a collection of standards, technologies, and projects for instant messaging. The discussion is at a general level that does not depend on Jabber. However, by choosing Jabber in implementation, we reuse existing software and technologies, and benefit from Jabber/XMPP standardization, its low entry barrier for application developers, and its rich community support. The main contributions of our work are two-fold. First, we propose a model for intrusiveness in pervasive computing. Second, we address the problem at the system level by designing and realizing it. We also make use of standardized instant-messaging technologies, more precisely Jabber, in the system instantiation to reuse existing software, making the system more flexible and extensible.
25

Profiles of Everyday Thought Suppression

Ie, Amanda Yen Lin 06 June 2014 (has links)
The present research assessed whether levels of depression, anxiety and worry, obsessive-compulsive distress, and psychopathy were differentially related to distinct thought suppression profiles. As a means to achieving this goal, the Profiles of Everyday Thought Suppression (PETS) scale was constructed to measure the frequencies with which various target thoughts are suppressed. The PETS scale demonstrated good internal consistency and test-retest reliability, and scores were positively correlated with the general tendency to experience intrusions, the general tendency to suppress thoughts, neuroticism, and health complaints. Although the proportions of time people suppress thoughts was positively associated with the frequencies with which the thoughts are experienced, the strength of the associations differed across thought contents, suggesting that not all frequently experienced thoughts are invariably subject to suppression attempts. The frequency with which thoughts are generally suppressed was positively associated with overall levels of subclinical psychopathology experienced during the past month. When comparing across the various thought categories, results from multiple analytic strategies converged to suggest that specific subclinical psychopathological states are associated with particular sets of thoughts that are frequently suppressed. / Psychology
26

Igneous and hydrothermal minerals and textures in the offshore Canterbury Basin.

Newman, Rowena Jane January 2015 (has links)
The Canterbury Basin is located on a passive margin on the east coast of the South Island, developed by the rifting of the New Zealand continental fragment from Antarctica in the Late Cretaceous. Well cuttings produced during petroleum exploration in the offshore Canterbury Basin have been examined for secondary minerals and textures. Minerals and textures have been identified primarily from optical examination in reflected light, with a particular focus on producing high-resolution images. Additional identifications are made using thin sections, SEM, XRD and XRF analysis. The focus of this study is the Clipper-1 well in the Clipper sub-basin as it contains the most abundant mineralisation and covers the full depth of the Canterbury Basin sedimentary sequence. Examination of cuttings from this well has revealed intrusive igneous carbonates and native metals including iron, aluminium and copper. The trace element concentrations in the igneous carbonates indicates they are derived from crustal material. Textures indicating fluidisation and recrystallisation of sedimentary material are also present. The proposed mechanism for producing these unusual mineral assemblages is a late Pliocene or younger mafic intrusion into the schist basement of the Canterbury Basin. The igneous carbonates are inferred to be derived from melting of carbonates in the schist. The native metals have been produced from melt due to highly reducing conditions produced by interaction of the intrusion with coal and limestone. The combination of native metals and igneous carbonates with a conspicuous absence of typical silicate igneous rocks is inferred to represent a new type of intrusive environment that has not previously been described in the scientific literature.
27

Axisymmetric internal solitary waves launched by river plumes

McMillan, Justine M. Unknown Date
No description available.
28

Développement d'une procédure non intrusive basée sur la propagation des ondes élastiques pour l'évaluation de l'état des structures en béton enfouies du réseau de distribution d'hydro-Québec

Tremblay, Simon-Pierre January 2013 (has links)
Particulièrement en milieu urbain, il est maintenant commun de retrouver de nombreuses infrastructures enfouies sous terres afin d'en minimiser l'impact social et environnemental. À titre d'exemple, en 2008, la proportion de nouveaux clients alimentés par le réseau souterrain d'Hydro-Québec a atteint près de 30 % (Hydro-Québec, 2011). Bien que les structures souterraines soient à l'abri de certaines intempéries auxquels celles en surface sont soumises, elles se trouvent néanmoins souvent dans un environnement favorisant leurs dégradations au fils du temps. Vu l'impact que ces structures ont sur le bon déroulement des activités quotidiennes de millions de personnes, il est primordial que ces structures soient en tout temps fonctionnelles afin d'assurer le bien-être et la sécurité du public qui est souvent dépendante de ces structures. Cependant, l'invisibilité de ces structures depuis la surface du sol peut parfois causer de nombreux problèmes lorsque vient le temps de les inspecter. En effet, les méthodes d'inspections actuellement utilisées sont souvent inadéquates et couteuses particulièrement en milieu urbain. C'est pourquoi l'IREQ (Institue de Recherche d'Hydro-Québec), en partenariat avec l'Université de Sherbrooke visent à développer une nouvelle méthode d'inspection non intrusive et réalisable depuis la surface du sol permettant d'évaluer l'intégrité structurelle des structures souterraines. Cette nouvelle méthode d'inspection est basée sur la propagation des ondes élastiques dans le sol émises depuis une source d'impact mécanique. Ce mémoire de maîtrise présente donc cette nouvelle méthode d'inspection élaborée à partir des résultats obtenus à 1'aide de simulations numériques puis testée et améliorée à la suite d'essais réalisés sur six différentes structures souterraines construites sur le site de l'IREQ. Dans le but vérifier la précision de la méthode proposée, l'état de dégradation exacte de ces six structures souterraines n'est connu que par Hydro-Québec. À la lumière des résultats obtenus à la suite de l'inspection de ces 6 structures souterraines, il fut possible d'établir l'état de chacune de ces structures de béton. Les conclusions établies à l'aide de la méthode proposée qu'en à l'état de ces structures furent ensuite présentées à Hydro-Québec qui en conclu que la méthode proposée a le potentiel d'identifier de façon préliminaire l'état de dégradation de ces 6 structures.
29

Axisymmetric internal solitary waves launched by river plumes

McMillan, Justine M. 06 1900 (has links)
The generation and evolution of internal solitary waves by intrusive gravity currents and river plumes are examined in an axisymmetric geometry by way of theory, experiments and numerical simulations. Full depth lock-release experiments and simulations demonstrate that vertically symmetric intrusions propagating into a two-layer fluid with an interface of finite thickness can launch a mode-2 double humped solitary wave. The wave then surrounds the intrusion head and carries it outwards at a constant speed. The properties of the wave's speed and shape are shown to agree well with a Korteweg-de Vries theory that is derived heuristically on the basis of energy conservation. The numerical code is also adapted to oceanographic scales in an attempt to simulate the interaction between the ocean and a river plume emanating from the mouth of the Columbia River. Despite several approximations, the fundamental dynamics of the wave generation process are captured by the model.
30

Structural development of the Dun Mountain Ophiolite Belt in the Permian, Bryneira range, Western Otago, New Zealand.

Adamson, Thomas Keeley January 2008 (has links)
The deformed Permian Dun Mountain Ophiolite Belt (DMOB) forms the basement of the Dun Mountain-Maitai terrane and is traceable through the entire length of New Zealand. The DMOB contains a variably serpentinised mantle portion and a crustal portion containing gabbros, dolerites, cross cutting dikes and extrusives, together they are similar to oceanic crust. The initial crustal portion, however, is atypical when compared to other ophiolites, being thin and lacking a sheeted dike complex, but has well spaced inclined intrusive sheets and sills. At least four post-Permian deformation periods affect the DMOB; collision and rotation during emplacement of the DMOB on the Gondwana margin, compression during Mesozoic orogenies, extensional deformation during the Gondwana break-up and transpressive deformation related to the modern plate boundary through New Zealand. Structural work in the Northern Bryneira Range focused on well preserved outcrops to investigate crustal growth and contemporaneous deformation during the Permian. Structural evidence of Permian deformation was determined by examination of pseudostratigraphy, structures constrainable to the Permian, and the geometric relationships with the overlying Maitai sedimentary sequence. Crosscutting by intrusive phases was used to determine a chronological order of crustal growth and deformation episodes. It was concluded that all deformation was extensional and that two major phases of magmatism were separated by a period of deformation and were followed by ongoing syn-sedimentary deformation during the deposition of the Maitai Group. After removal of Mesozoic rotation, the resulting orientations of paleo-horizontal markers and diverse orientations of intrusive sheets were analysed. Two hypothesises were tested to assess the origin of inclined intrusive sheets: a) that the diverse orientations were the result of tectonic rotation coeval with the intrusion of dikes. b) that primary orientations of the sheets had been diverse. Results show that the sheets were intruded with diverse orientations, probably related to variation in the principle horizontal stress over time. Further rotation of the assemblage of sheets occurred during the last stages of magmatism and during the subsequent period of sedimentation. The last stage probably relates to large scale normal faulting during the development of the sedimentary basin. iii

Page generated in 0.0514 seconds