• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 18
  • 14
  • 11
  • 8
  • 6
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 81
  • 20
  • 15
  • 12
  • 11
  • 11
  • 10
  • 10
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

La piraterie dans la Méditerranée antique : représentations et insertion dans les structures économiques / Piracy in the ancient Mediterranean : representations and integration into the structures of the economy

Varenne, Clément 29 June 2013 (has links)
L’objectif de cette thèse est d'envisager la piraterie ancienne dans la longue durée, à la lumière des recherches menées par N. Purcell et P. Horden sur la Méditerranée antique. Elle s’appuie en premier lieu sur une étude des mots grecs et latins liés à la piraterie et de ses représentations dans les sources écrites anciennes. Ce travail est complété par une relecture de l’historiographie moderne qu’il est aussi nécessaire d’analyser dans son contexte historique afin d’écarter toutes les images afférant à notre notion. Alors qu'elle a été jusqu'à présent abordée dans un cadre événementiel, on entend mettre l'accent sur les structures du raid antique, en s'inscrivant dans le long terme. Ainsi, les pirates n'apparaissent plus seulement comme la face négative du commerce maritime, mais comme des agents d'échanges et de production de richesse. L’étude approfondie de deux régions de la Méditerranée (Cilicie, mer des Baléares) permet enfin de mettre en évidence les structures micro-locales et les dynamiques économiques, sociales, territoriales, géopolitiques qui ont permis et entretenu l’activité de prédation. Au terme de cette étude, nous proposons d’analyser la piraterie dans toute sa diversité grâce à une typologie nouvelle : le pirate imaginé, le pirate commerçant et le pirate opportuniste. / The purpose of this doctoral work is to consider ancient piracy over a long period of time, in the new light of the research recently carried out by N. Purcell and P. Horden on the ancient Mediterranean. This dissertation begins with a study of the Greek and Latin words related to piracy, and of the representation of the latter in ancient written sources. This work is completed by a new reading of the modern historiography, which needs to be examined in the light of its own historical context in order to dismiss the images commonly related to the notion of piracy. While piracy has so far been studied from a factual angle, this dissertation aims at focusing on the structures of ancient raid through a long-term perspective. This shift in perspective enables to consider pirates not simply as a negative side of maritime trade, but more deeply as agents of trade and as agents in the production of wealth. Through the in-depth study of two regions of the Mediterranean (Cilicia and the Balearic Sea), I wish to highlight the micro-local structures and the economic, social, territorial and geopolitical trends that enabled and sustained piracy. By the end of this study I wish to analyze piracy in all its diversity thanks to a new classification: the imagined pirate, the trading pirate and the opportunistic pirate.
22

Re-conversion of abandoned architecture: air-raid precaution tunnel.

January 1998 (has links)
Lei Mei Yan Louisa. / "Architecture Department, Chinese University of Hong Kong, Master of Architecture Programme 1997-98, design report." / Includes bibliographical references. / Introduction / Chapter 1.0 --- Background / Chapter 1.1. --- Historical / Chapter 1.2. --- Urban fabric / Chapter 1.3. --- Rural area / Project analysis / Chapter 20.0 --- Subject analysis / Chapter 2.1. --- Physical Conditions / Chapter 2.2. --- Preliminary Geo-technical Assessments of the Potential for Underground Space Development in Hong Kong / Chapter 2.3. --- Geologically / Chapter 2.4. --- Use of underground space in Hong Kong / Chapter 2.5. --- Studies for underground space development / Chapter 2.6. --- Conditions in underground space design / Chapter 2.7. --- Ground Condition / Chapter 2.8. --- Open space allocation in Hong Kong / Chapter 2.8.1. --- Evaluation of deficiencies / Chapter 2.8.2. --- Degradation of public open space / Chapter 2.8.3. --- Decentralized Open space / Chapter 2.8.4. --- Centralized Open space / Chapter 2.8.5. --- Lack of transitional area / Chapter 2.9. --- Hypothesis / Chapter 2.9.1. --- Conceptualization / Chapter 3.0 --- Site / Context analysis / Chapter 3.1. --- Site Criteria / Chapter 3.2. --- Site Analysis (macroscopic consideration) / Chapter 3.3. --- Site constraints (Sai Ying Pun & Sheung Wan) / Chapter 3.4. --- Site potential development (information from Land Development Corporation)- urban renewal strategy / Chapter 3.5. --- Constraints in codes and master plan / Chapter 3.5.1. --- Planning and Site Constraints / Chapter 3.6. --- Historical Background / Chapter 3.6.1. --- History and Records / Chapter 3.6.2. --- Geology of the existing site (King George Memorial Park) / Chapter 4.0 --- Client / users analysis / Chapter 4.1. --- Research organizational / Chapter 4.2. --- Bubble diagrams and spatial arrangement / Chapter 4.3. --- Schedule of Accommodation / Process / Description of the evolution of the final project / Chapter 5.1. --- Essential objectives / Chapter 5.2. --- The underground complex and its nodes / Chapter 5.2.1. --- Exploratory concepts / Chapter 5.2.2. --- Design Strategy and Senarios / Chapter 5.2.3. --- Urban design issues and goals / Chapter 5.2.4. --- Building design issues and goals / Chapter 5.2.5. --- Evolution of the building / Final Project / Chapter 6.1. --- The underground space strategy / Chapter 6.2. --- Underground complex and re-design air-raid precaution tunnels / Chapter 6.3. --- Nodes and urban linkage / Chapter 6.4. --- Lists of drawing files / Conclusion / Appendices / Chapter 8.1. --- Urban underground space design methodology- hypothesis / Chapter 8.2. --- Precedent Studies / Chapter 8.3. --- Bilbliography
23

A NEW GENERATION OF DATA RECORDERS FOR REMOTE SENSING GROUND STATIONS

Kayes, Edwin 11 1900 (has links)
International Telemetering Conference Proceedings / October 30-November 02, 1995 / Riviera Hotel, Las Vegas, Nevada / Magnetic tape is the primary medium used to capture and store unprocessed data from remote sensing satellites. Recent advances in digital cassette recording technology have resulted in the introduction of a range of data recorders which are equally at home working alongside conventional recorders or as part of more advanced data capture strategies. This paper shows how users are taking advantage of the convenience, economy and efficiency of this new generation of cassette-based equipment in a range of practical applications.
24

Prestandaundersökning och återställning av degraderade RAID-system

Carlsson, Marcus, Karlsson, Oscar January 2010 (has links)
<p>Denna B-uppsats tar upp prestanda och återställning mellan två vanligt förekommande mjukvarubaserade RAID-system. Mjukvarubaserad RAID har blivit mer och mer intressant eftersom det är ett billigt och bra sätt att skydda sig mot hårdvarufel på hårddiskar. Tidigare har det inneburit prestandaförluster om man inte har använt en hårdvarubaserad RAID kontroller men med dagens snabba processorer är det inte längre så. Hårddiskar går för eller senare sönder och för ett RAID-system som ska vara igång tjugofyra timmar om dygnet är det viktigt att det även då fungerar med bra prestanda. Denna undersökning visar hur mycket sämre prestandan blir under sådana omständigheter samt hur lång återställningstid man kan förvänta sig på ett datorssystem uppbyggt av delar för hemmabruk. Undersökningen utfördes på två olika typer mjukvarubaserad RAID, ett med mdadm på Ubuntu/Linux och ett med RAID-Z på OpenSolaris. På de systemen mättes läs- och skrivprestanda med programmet bonnie++ som skriver och läser en fil som var dubbelt så stor som primärminnet i datorn. Resultatet visar att prestandan försämras med 36 % när en hårddisk går sönder på ett system med mdadm men med RAID-Z ökar istället prestandan. På ett system med mdadm är återställningstiden för ett degraderat system är ungefär lika lång oavsett hur mycket information som finns lagrad på hårddiskarna. Däremot går det fortare med RAID-Z eftersom den på ett intelligent sätt bara återställer den del av hårddisken som används för lagring av filer.</p><p> </p>
25

R.V. Jones and the birth of scientific intelligence

Goodchild, James Martinson January 2013 (has links)
The history of scientific intelligence – its birth, its importance during the Second World War, and its unique wartime qualities – has relied almost entirely on the memories of its pioneer, R. V. Jones. This thesis constitutes a critique of this history; through scrutiny of Jones’s post-war literature (especially his war memoirs entitled Most Secret War), his archival papers and those of his colleagues and contemporaries, and other mediums he used to promote his account of scientific intelligence. This thesis examines chronologically all of the key events Jones became famous for – the Battle of the Beams, the Bruneval Raid, the Radio War, the Battle of the V-Weapons – and compares Jones’s account of these (and many other) events with contemporary documentation. This thesis provides a rich understanding of the internal machinations within the British wartime air scientific intelligence organisation defined as ADI (Science), and their relationships with the many other political, military and intelligence sections that pursued similar and often closely-linked quests. This thesis importantly connects science and technology with the collection and collation of intelligence, is an analysis of wartime intelligence of a scientific and technical nature, and argues that scientific intelligence was much more than one man’s accomplishments, involved many more individuals and organisations than is perceived, and is much more important to twentieth century history than has been permitted.
26

Improve the Performance and Scalability of RAID-6 Systems Using Erasure Codes

Wu, Chentao 15 November 2012 (has links)
RAID-6 is widely used to tolerate concurrent failures of any two disks to provide a higher level of reliability with the support of erasure codes. Among many implementations, one class of codes called Maximum Distance Separable (MDS) codes aims to offer data protection against disk failures with optimal storage efficiency. Typical MDS codes contain horizontal and vertical codes. However, because of the limitation of horizontal parity or diagonal/anti-diagonal parities used in MDS codes, existing RAID-6 systems suffer several important problems on performance and scalability, such as low write performance, unbalanced I/O, and high migration cost in the scaling process. To address these problems, in this dissertation, we design techniques for high performance and scalable RAID-6 systems. It includes high performance and load balancing erasure codes (H-Code and HDP Code), and Stripe-based Data Migration (SDM) scheme. We also propose a flexible MDS Scaling Framework (MDS-Frame), which can integrate H-Code, HDP Code and SDM scheme together. Detailed evaluation results are also given in this dissertation.
27

Proposta de um ambiente de simulação e aprendizado inteligente para RAID.

Lobato, Daniel Corrêa 25 May 2000 (has links)
O desempenho global dos sistemas computacionais é limitado, geralmente, pelo componente de menor desempenho. Os processadores e a memória principal têm experimentado um aumento de desempenho bem maior que o da memória secundária, como os discos magnéticos. Em 1984, Johnson introduziu o conceito de fragmentação, onde um dado é gravado em uma matriz de discos, de forma que os seus fragmentos podem ser recuperados em paralelo e, por conseqüência, de forma mais rápida. O principal problema da fragmentação é a redução da confiabilidade da matriz pois, a falha de um dos discos torna o dado inacessível. Patterson, Gibson e Katz propuseram, em 1988, 5 formas de armazenar informação redundante na matriz de discos e, dessa forma, aumentar sua confiabilidade. A essas formas foi dado o nome de RAID - Redundant Arrays of Independent Disks. Com o passar do tempo, outras formas de armazenamento de redundância foram criadas, tornando complexa a taxonomia da área. Além disso, alterações de parâmetros na matriz implicam em variações de desempenho nem sempre fáceis de se perceber em um primeiro momento. Com o objetivo de facilitar a compreensão da taxonomia e permitir que sejam feitos experimentos na matriz buscando um melhor desempenho, esta dissertação propõe um ambiente de simulação e aprendizado para RAID, onde o usuário pode interagir com diversos modelos de RAID, ou até criar o seu próprio, para avaliar seu desempenho em várias situações, além de oferecer ao usuário acesso ao conhecimento da área, agindo como um tutor. Esta dissertação apresenta, ainda, um protótipo de um simulador de discos magnéticos que pode ser utilizado como base para o desenvolvimento de um simulador de RAID para ser utilizado pelo ambiente. / The component with the worst performance usually limits the overall performance of a computing system. The performance of processors and main memory has improved faster than the secondary memory, such as magnetic disks. Johnson, in 1984, introduced the concept of fragmentation, in which a data file is written into a disk array, in a way that its stripes can be recovered in parallel and therefore, in a faster way. The main problem with fragmentation is the reduction of the reliability. If one disk fails, all data file becomes inaccessible. Patterson, Gibson and Katz proposed, in 1988, five ways to store redundant information in the array, increasing the reliability, comprising the main RAID (Redundant Array of Independent Disks) configurations. Some other ways to store the redundant information have been proposed over the years, making the RAID taxonomy more complex. Furthermore, changes in the array parameters takes to performance variations that are not always understood. With the purpose of facilitating the comprehension of the taxonomy and allowing the execution of experiments looking forward to improve performance, this MSc Dissertation proposes an Intelligent Simulation and Learning Environment for RAID, where the user can interact with several RAID models, or even create his/her own models, in order to evaluate their performance under different situations. The environment also allows the user to interact with the knowledge of the area, acting as a tutor. This Dissertation also presents a prototype of a magnetic disk simulator, that can be used as the kernel for the development of a RAID simulator to be used by the environment.
28

Räder och svensk doktrin samt reglemente för markoperationer?

Svensson, Magnus January 2009 (has links)
<p>NATO, USA, Storbritannien och Ryssland m.fl. använder sig av stridsuppgiften räd för markstridskrafter och erfarenheter från bl.a. Irakkriget 2003 visar att de kan få stor betydelse. Räder anses överensstämma med manöverteorin, men räder återfinns inte som stridsuppgift för svenska markstridskrafter.</p><p>Denna uppsats analyserar stridsuppgiften räd för markstridskrafter, operationaliserar två indikatorer för räder och med hjälp av dessa undersöks hur räder är förenligt med FM nuvarande doktrin och Reglemente för Markoperationer (RMO).</p><p>Undersökningen visar att räder inte är förenliga med nuvarande doktrin och RMO. Bl.a. så uppfattas det sakna överensstämmelse att avsiktligt inte bibehålla öppna landförbindelser. Däremot är delar av indikatorerna direkt eller indirekt att anse som förenliga.</p> / <p>NATO, USA, Great Britain and Russia are among others using the task raid for ground forces and experiences from e.g. the war in Iraq 2003 have shown that they could have great importance. Raids are considered to correspond to manoeuvre theory, but raids are not to be found as a task for Swedish ground forces.</p><p>This paper is analyzing the task raid for ground forces, developing two indicators for raids and with the help of these examining how raids are compatible with the armed forces present doctrine and field manual for ground operations.</p><p>The investigation shows that raids are not compatible with the present doctrine and field manual for ground operations. E.g. is it considered to disagree not to keep land lines of communications open. Parts of the indicators are however directly or indirectly considered compatible.</p>
29

Räder och svensk doktrin samt reglemente för markoperationer?

Svensson, Magnus January 2009 (has links)
NATO, USA, Storbritannien och Ryssland m.fl. använder sig av stridsuppgiften räd för markstridskrafter och erfarenheter från bl.a. Irakkriget 2003 visar att de kan få stor betydelse. Räder anses överensstämma med manöverteorin, men räder återfinns inte som stridsuppgift för svenska markstridskrafter. Denna uppsats analyserar stridsuppgiften räd för markstridskrafter, operationaliserar två indikatorer för räder och med hjälp av dessa undersöks hur räder är förenligt med FM nuvarande doktrin och Reglemente för Markoperationer (RMO). Undersökningen visar att räder inte är förenliga med nuvarande doktrin och RMO. Bl.a. så uppfattas det sakna överensstämmelse att avsiktligt inte bibehålla öppna landförbindelser. Däremot är delar av indikatorerna direkt eller indirekt att anse som förenliga. / NATO, USA, Great Britain and Russia are among others using the task raid for ground forces and experiences from e.g. the war in Iraq 2003 have shown that they could have great importance. Raids are considered to correspond to manoeuvre theory, but raids are not to be found as a task for Swedish ground forces. This paper is analyzing the task raid for ground forces, developing two indicators for raids and with the help of these examining how raids are compatible with the armed forces present doctrine and field manual for ground operations. The investigation shows that raids are not compatible with the present doctrine and field manual for ground operations. E.g. is it considered to disagree not to keep land lines of communications open. Parts of the indicators are however directly or indirectly considered compatible.
30

The Original View of Reed-Solomon Coding and the Welch-Berlekamp Decoding Algorithm

Mann, Sarah Edge January 2013 (has links)
Reed-Solomon codes are a class of maximum distance separable error correcting codes with known fast error correction algorithms. They have been widely used to assure data integrity for stored data on compact discs, DVDs, and in RAID storage systems, for digital communications channels such as DSL internet connections, and for deep space communications on the Voyager mission. The recent explosion of storage needs for "Big Data'' has generated renewed interest in large storage systems with extended error correction capacity. Reed-Solomon codes have been suggested as one potential solution. This dissertation reviews the theory of Reed-Solomon codes from the perspective taken in Reed and Solomon's original paper on them. It then derives the Welch-Berlekamp algorithm for solving certain polynomial equations, and connects this algorithm to the problem of error correction. The discussion is mathematically rigorous, and provides a complete and consistent discussion of the error correction process. Numerous algorithms for encoding, decoding, erasure recovery, error detection, and error correction are provided and their computational cost is analyzed and discussed thus allowing this dissertation to serve as a manual for engineers interested in implementing Reed-Solomon coding.

Page generated in 0.0635 seconds