• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 597
  • 122
  • 105
  • 79
  • 50
  • 31
  • 17
  • 15
  • 15
  • 13
  • 10
  • 9
  • 7
  • 7
  • 6
  • Tagged with
  • 1229
  • 151
  • 92
  • 86
  • 85
  • 85
  • 83
  • 82
  • 75
  • 75
  • 74
  • 70
  • 67
  • 61
  • 61
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

CLUSTER-BASED TERM WEIGHTING AND DOCUMENT RANKING MODELS

Murugesan, Keerthiram 01 January 2011 (has links)
A term weighting scheme measures the importance of a term in a collection. A document ranking model uses these term weights to find the rank or score of a document in a collection. We present a series of cluster-based term weighting and document ranking models based on the TF-IDF and Okapi BM25 models. These term weighting and document ranking models update the inter-cluster and intra-cluster frequency components based on the generated clusters. These inter-cluster and intra-cluster frequency components are used for weighting the importance of a term in addition to the term and document frequency components. In this thesis, we will show how these models outperform the TF-IDF and Okapi BM25 models in document clustering and ranking.
332

Certification Schemes for Sustainable Buildings: Assessment of BREEAM, LEED and LBC from a Strategic Sustainable Development Perspective

Genkov, Atanas, Kudryashova, Alla, Mo, Tianxiang January 2015 (has links)
No description available.
333

Explicit Influence Analysis in Crossover Models

Hao, Chengcheng January 2014 (has links)
This dissertation develops influence diagnostics for crossover models. Mixed linear models and generalised mixed linear models are utilised to investigate continuous and count data from crossover studies, respectively. For both types of models, changes in the maximum likelihood estimates of parameters, particularly in the estimated treatment effect, due to minor perturbations of the observed data, are assessed. The novelty of this dissertation lies in the analytical derivation of influence diagnostics using decompositions of the perturbed mixed models. Consequently, the suggested influence diagnostics, referred to as the delta-beta and variance-ratio influences, provide new findings about how the constructed residuals affect the estimation in terms of different parameters of interest. The delta-beta and variance-ratio influence in three different crossover models are studied in Chapters 5-6, respectively. Chapter 5 analyses the influence of subjects in a two-period continuous crossover model. Possible problems with observation-level perturbations in crossover models are discussed. Chapter 6 extends the approach to higher-order crossover models. Furthermore, not only the individual delta-beta and variance-ratio influences of a subject are derived, but also the joint influences of two subjects from different sequences. Chapters 5-6 show that the delta-beta and variance-ratio influences of a particular parameter are decided by the special linear combination of the constructed residuals. In Chapter 7, explicit delta-beta influence on the estimated treatment effect in the two-period count crossover model is derived. The influence is related to the Pearson residuals of the subject. Graphical tools are developed to visualise information of influence concerning crossover models for both continuous and count data. Illustrative examples are provided in each chapter.
334

Įmonių vidinė komunikacija valdymo struktūroje / Internal communication of organisations in management structure

Tamutytė, Jolanta 17 July 2014 (has links)
Magistro baigiamajame darbe „Įmonių vidinė komunikacija valdymo struktūroje“ analizuojama įmonių vidinė komunikacija ir jos efektyvumo bruožai valdymo struktūroje praktiniu ir teoriniu aspektu, parengiamas bendras evektyvios vidinės komunikacijos proceso ir valdymo struktūros modelis, apimantis visus valdymo struktūros tipus. Teorinėje dalyje yra apžvelgiamos komunikacijos, organizacinės komunikacijos ir vidinės komunikacijos sampratos, funkcijos, tikslai ir uždaviniai. Analizuojami galimi informacijos perdavimo kanalai, organizacinių valdymo struktūrų schemos bei vidinės komunikacijos sąsaja su valdymo struktūra, jos proceso perteikimas / pavaizdavimas valdymo struktūros schemoje. Siekiant pagrindinio tikslo parengti bendrą vidinės komunikacijos proceso ir valdymo struktūros modelį, visų pirma sudaromi teoriniai matricinės, funkcinės ir divizinės valdymo struktūros modeliai. Sudarytuose modeliuose atsispindi literatūroje autorių aprašyti vertikalūs („aukštyn“, „žemyn“) ir horizontalūs komunikacijos srautai bei grįžtamasis ryšys. Siekiat tikslumo ir pagrįstumo, toliau teoriniai modeliai yra tikrinami ir tobulinami praktiniu aspektu. Empirinėje darbo dalyje analizuojamos 30 skirtingų įmonių formaliai patvirtintos valdymo struktūros schemos, grupuojant į pasirinktas analizuoti matricines, funkcines ir divizines valdymo struktūrų grupes. Šios grupės analizuojamos atskirai, remiantis papildoma informacija apie įmonių dydį, darbuotojų skaičių ir veiklą, ieškant... [toliau žr. visą tekstą] / In the final thesis of master degree named “Internal communication of organisations in management structure” the effectiveness of internal communication of organizations in management structure is analyzed from both practical and theoretical side. Also, joint models of effective internal communication process and management structure by types were created. For more information, in the theoretical part of this thesis communication, organizational communication and internal communication definitions, functions, objectives and tasks are over viewed. Also, communication channels, organizational structure models and connections between internal communication and management structure, it‘s process integration inside the scheme of management structure is analyzed. According to the main goal to create the joint model of internal communication process and management structure, firstly theoretical models of matrix, functional and divisional management structures were created. These models show matrix/functional/divisional organizational structure schemes with in literature by authors described horizontal (“upward”, “downward”) and vertical communication flows, also feedback. In order to improve and to substantiate these models there was a decision to check them practically. So, empirical part of this thesis starts with analysis of 30 different randomly selected companies with formally approved schemes of management structure. These schemes were grouped in to 3 groups of... [to full text]
335

Trisluoksnės skirtuminės schemos parabolinei lygčiai su integraline sąlyga spręsti / Tree-layer difference scheme for solution of parabolic equation with integral condition

Zdanytė, Vaida 11 June 2014 (has links)
Magistriniame darbe tiriama trisluoksnė skirtuminė schema parabolinei lygčiai su integraline sąlyga. Aprašomi metodai skaitiniai diferencialinių kraštinių uţdavinių su nelokaliosiomis sąlygomis. Atlikto magistrinio darbo rezultatas papildo iki šiol kitų mokslininkų gautus rezultatus tiriant trisluoksnę skirtuminę schemą. Magistro darbą sudaro: įvadas, uţdavinio formulavimas, 4 pagrindinės dalys, uždavinio sprendimas bei išvados. Įvadiniame skyriuje aptariamas temos aktualumas ir darbo tikslas, nurodomi naudojamo tyrimo metodai. Antrajame skyriuje suformuluojamas diferencialinis ir skirtuminis uždavinys su nelokaliąja integraline sąlyga. Trečiajame skyriuje užrašoma trisluoksnė schema kanoniniu pavidalu. Ketvirtajame skyriuje suvedame trisluoksnę schemą į dvisluoksnę. Penktajame skyriuje pateikiamas neišreikštinių skirtuminių lygčių algoritmas. Šeštajame nagrinėjama išreikštinė trisluoksnė schema bei jos algoritmas. Septintajame skyriuje tiriame matricos spektro struktūrą. Aštuntajame sprendžiamas konkretus uždavinys. Pateikiamos viso darbo bendrosios išvados. / In this master thesis there was investigated difference scheme for parabolic equation with integral condition. Numerical methods for solution differential boundary value problem nonlocal conditions methods investigated. Results of this completed work supplements by other scientists until now received results of investigation of three- layer difference scheme. Master thesis consists of introduction, problem formulation, four main chapter, numerical experiment and conclusions. Introductory chapter discusses relevance of the topic and the goal of this work, specifies methods that were used for this investigation. The second chapter formulates the differential task with nonlocal integral condition. In the third chapter is written a three- layer scheme in canonical form. In the fourth chapter the three-layer scheme reduce to the two-layers scheme. The fifth chapter presens the algorithm of realization of impicit scheme. The sixth chapter presents explicit three-layer scheme. The seventh chapter studies the structure of the matrix spectrum. There are presented all the general conclusions of the work.
336

Hadamard transform coding of television signals : a theoretical investigation of the adaptive coding of Hadamard transformed television signals : the use of computable objective measures for the assessment of local subpicture characteristics in selecting appropriate coders

Morsi, Ibrahim Zakaria January 1980 (has links)
The problem of determining an objective means for assessing local characteristics of television subpictures in a Hadamard transform multicoder scheme is stated and discussed. Detailed investigations of transform domain coefficient statistical characteristics for different test images have been conducted. Both monochrome and colour signals were used, as well as different transform sizes and shapes. " Directing Indexes " are proposed which, depending on the inter-relationships among transform coefficients and groups of coefficients, direct each subpicture to the appropriate coder. Three indexes in the case of monochrome signals are proposed, each with its own computational procedures and application requirements. Necessary modifications and changes for application of some indexes on colour signals are also discussed. The proposed technique of indexing eliminates the necessity of equal distribution of subpictures among 'activity classes', a major disadvantage encountered in present activity index. Coders to be used with each directing index are devised and tested, subject to an arbitrary bit rate of 2 bits per pixel, with satisfactory performance compared with some published results for other techniques.
337

Quantitative Characterization of Pyrene-Labeled Macromolecules in Solution by Global Analysis of Fluorescence Decays

Shaohua, Chen 24 April 2012 (has links)
A series of pyrene end-labeled monodisperse poly(ethylene oxide)s (PEO(X)-Py2 where X represents the number average molecular weight (Mn) of the PEOs and equals 2, 5, 10 and 16.5 K) and one pyrene mono-labeled PEO (PEO(2K)-Py1) were synthesized and characterized in solution using fluorescence. First, the end-to-end cyclization (EEC) of PEO(X)-Py2 was investigated in seven organic solvents with viscosities (η) ranging from 0.32 to 1.92 mPa•s. The classical Birks scheme was used to globally fit the pyrene monomer and excimer fluorescence decays. The fraction of pyrenes that did not form excimer (ffree) was found to increase with increasing η and Mn. This result was contrary to the assumptions made by Birks’ scheme. To account for this, ffree was assumed to represent the fraction of PEO chains other than the monolabeled polymer impurities that cannot accomplish EEC. A fluorescence blob model (FBM) was applied to handle this assumption in the process of excimer formation for the PEO(X)-Py2 samples in solution. The radius of a blob, Rblob, in organic solvents was determined according to the results retrieved from the FBM. To quantitatively account for the existence of pyrene impurity in pyrene-labeled macromolecules, known amounts of PEO(2K)-Py1 were added into a PEO(2K)-Py2 solution and the fluorescence decays were fitted globally according to the Birks scheme and “model free” (MF) analysis to verify the validation of the MF analysis. The MF analysis was then applied to determine the amounts of 1-pyrenebutyric acid (PyBA) that had been added to a solution of pyrene end-labeled fourth generation dendritic hybrid (Py16-G4-PS). The results demonstrated that the contribution from unwanted fluorescent species could be isolated and quantitatively accounted for by fitting the fluorescence decays of the pyrene monomer and excimer globally with the MF analysis. Since the PEO(X)-Py2 samples form hydrophobic pyrene aggregates in aqueous solution, a sequential model (SM) was proposed to characterize the pyrene excimer formation of PEO(X)-Py2 in water at different polymer concentration (CP). The capture distance over which the pyrenyl end-groups experience hydrophobic forces in water was determined by assuming that the end-to-end distances of the PEO(X)-Py2 samples adopt a Gaussian distribution and that the fraction of pyrenes that are aggregated (fE0) determined by the sequential model corresponds to the fraction of PEO(X)-Py2 chains whose end-to-end distance is smaller than the hydrophobic capture distance. Since a surfactant can interact with a hydrophobically modified water-soluble polymer in aqueous solution, the interactions taking place between PEO(X)-Py2 and sodium dodecyl sulfate (SDS) were investigated at a low PEO(X)-Py2 concentration. The pyrene monomer and excimer fluorescence decays of the PEO(X)-Py2 and SDS solutions were acquired at various SDS concentrations and globally fitted according to the MF analysis to retrieve the parameters that described the kinetics of pyrene excimer formation. At high SDS concentrations above the critical micelle concentration (CMC), the pyrene end-groups of the short-chain samples (PEO(2K)-Py2 and PEO(5K)-Py2) were incorporated inside the same micelle and excimer was formed intramolecularly, while most pyrene groups of the long-chain samples (PEO(10K)-Py2 and PEO(16.5K)-Py2) were isolated into different micelles. Lastly, both the rheological properties and fluorescence behavior of a pyrene-labeled hydrophobically-modified alkali-swellable emulsion (Py-HASE) polymer in basic aqueous solution with SDS were studied. Furthermore, a joint experimental setup that combined a rheometer and a steady-state fluorometer was applied to investigate at the molecular level the effect that a shearing force had on the polymeric network. However, despite the dramatic decrease in solution viscosity with increasing shear rate, no change in the fluorescence spectra was detected, suggesting that changes in the polymeric network that affected the balance of intra- versus intermolecular pyrene associations did not impact the process of excimer formation. Together the experiments described in this thesis represent the broadest set of examples found in the scientific literature where information on the dynamics and level of association of pyrene-labeled polymers has been retrieved through the quantitative analysis of the fluorescence decays acquired with pyrene-labeled polymers in solution.
338

Study of compressible turbulent flows in supersonic environment by large-eddy simulation

Genin, Franklin Marie 19 February 2009 (has links)
A Large-Eddy Simulation (LES) methodology adapted to the resolution of high Reynolds number turbulent flows in supersonic conditions was proposed and developed. A novel numerical scheme was designed, that switches from a low-dissipation central scheme for turbulence resolution to a flux difference splitting scheme in regions of discontinuities. Furthermore, a state-of-the-art closure model was extended in order to take compressibility effects and the action of shock / turbulence interaction into account. The proposed method was validated against fundamental studies of high speed flows and shock / turbulence interaction studies. This new LES approach was employed for the study of shock / turbulent shear layer interaction as a mixing-augmentation technique, and highlighted the efficiency in mixing improvement after the interaction, but also the limited spatial extent of this turbulent enhancement. A second practical study was conducted by simulating the injection of a sonic jet normally to a supersonic crossflow. The validity of the simulation was assessed by comparison with experimental data, and the dynamics of the interaction was examined. The sources of vortical structures were identified, with a particular emphasis on the impact of the flow speed onto the vortical evolution.
339

Provable security support for kerberos (and beyond)

Kumar, Virendra 18 May 2012 (has links)
Kerberos is a widely-deployed network authentication protocol that is being considered for standardization. Like other standard protocols, Kerberos is no exception to security flaws and weaknesses, as has been demonstrated in several prior works. Provable security guarantees go a long way in restoring users' faith, thus making a protocol an even stronger candidate for standards. In this thesis, our goal was thus to provide provable security support for Kerberos and other practical protocols. Our contributions are three-fold: We first look at the symmetric encryption schemes employed in the current version 5 of Kerberos. Several recent results have analyzed a significant part of Kerberos v.5 using formal-methods-based approaches, which are meaningful only if the underlying encryption schemes satisfy strong cryptographic notions of privacy and authenticity. However, to our knowledge these schemes were never analyzed and proven to satisfy such notions. This thesis aims to bridge this gap. Our provable security analyses confirm that some of the encryption scheme options in Kerberos v.5 already provide privacy and authenticity, and for the remaining we suggest slight modifications for the same. We next turn our attention to the ways in which the keys and other random strings needed in cryptographic schemes employed by practical protocols are generated. Randomness needs to be carefully generated for the provable security guarantees to hold. We propose an efficient pseudorandom generator (PRG) based on hash functions. The security of our PRG relies on exponential collision-resistance and regularity of the underlying hash function. Our PRG can be used to generate various strings, like session keys, sequence numbers, confounders, etc., which are all suggested to be generated randomly in the Kerberos v.5 specification, but no algorithms are mentioned. Each of the above strings are required to satisfy different properties, all of which are trivially satisfied by the pseudorandom strings output by a PRG. Finally, we look at the problem of revocation associated with two relatively new types of encryption schemes: identity-based encryption (IBE) and attribute-based encryption (ABE). While these encryption schemes are relatively less efficient compared to public-key encryption schemes, they have already been used (and are very likely to be used in future, as well) in many practical protocols due to their attractive features. Any setting, public-key, identity-based, or attribute-based, must provide a means to revoke users from the system. However, unlike public-key encryption, there has been little prior work on studying the revocation mechanisms in an IBE or ABE. We propose new primitives and their efficient and provably secure instantiations, focusing on the revocation problem. We would like to note that even though all the results presented in this thesis are motivated mainly by provable security in practice, only the first bullet above has a direct impact on a practical and widely deployed protocol Kerberos. Our PRG is the most efficient construction among theoretical PRGs, but it may still not be efficient enough to be directly usable in practical protocols. And our results and techniques for revocation in IBE and ABE have found much wider applications in information security, such as mobile social networks, cloud-based secure health records, data outsourcing systems, vehicular ad-hoc networks, etc.
340

Patterns and protocols for agent-oriented software development

Oluyomi, Ayodele O. Unknown Date (has links) (PDF)
Agent-oriented software engineering is faced with challenges that impact on the adoption of agent technology by the wider software engineering community. This is generally due to lack of adequate comprehension of the concepts of agent technology. This thesis is based on the premise that the comprehension of the concepts of and the adoption of agent technology can be improved. Two approaches are explored: the first approach is the analysis and structuring of the interactions in multiagent systems; the second approach is sharing of experiences of what works and what does not in agent-oriented software engineering using software patterns. While analysis of interactions in multiagent systems improves the understanding of the behaviour of multiagent systems, sharing multiagent system development experience improves the understanding of the concepts of agent technology as well as the challenges that face the engineering of multiagent systems. It is therefore believed that interaction analysis and experience sharing can enhance the comprehension of agent technology and hence, the adoption of the technology by the wider community of software practitioners. This thesis addresses the challenges facing agent-oriented software engineering by presenting a dedicated approach for developing agent interaction protocols to guide the interactions in a multiagent system; and a comprehensive framework for classifying, analyzing and describing agent-oriented patterns for the purpose of sharing multiagent systems development experiences.

Page generated in 0.0624 seconds