• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1918
  • 598
  • 576
  • 417
  • 240
  • 177
  • 57
  • 54
  • 42
  • 26
  • 26
  • 25
  • 24
  • 23
  • 20
  • Tagged with
  • 4807
  • 533
  • 503
  • 497
  • 429
  • 421
  • 376
  • 362
  • 354
  • 345
  • 340
  • 336
  • 320
  • 318
  • 317
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

Rhapsody on small processor platforms

Andersson, Per-Oskar January 2008 (has links)
Rhapsody is a Model-Driven Development (MDD) tool for embedded and real-time system design. The purpose of this thesis is to determine if Rhapsody can be used for software development on small processor platforms such as the Atmel AVR. Rhapsody is normally used on platforms running an operating system. Therefore certain adaptations are needed in order to use it on platforms without an operating system. These adaptations and their affect on the usability of the tool, advantages and disadvantages are all studied while porting AVR-software to Rhapsody on one of CC Systems products, the robust on-board computer CC Pilot XL II. / Rhapsody är ett verktyg för modelldriven utveckling och design av inbyggda system och realtidssystem. Syftet med detta examensarbete är att undersöka om Rhapsody kan användas för att utveckla mjukvara till små processorplattformar som Atmel’s AVR. Då Rhapsody normalt används till plattformar med ett operativsystem behöver vissa modifieringar göras för att möjliggöra utveckling mot plattformar utan operativsystem. Dessa modifieringar, deras för och nackdelar samt påverkan på utvecklingsprocessen undersöks medan AVR-mjukvara porteras till Rhapsody. Mjukvaran som porteras är en del av styrsystemet till en av CC Systems produkter: CC Pilot XL II, en robust fordonsdator.
332

The bilingual assessment of cognitive abilities in French and English

Lacroix, Serge 11 1900 (has links)
In this study the role that language plays in the expression of intelligence, bilingualism, and the process of assessing selected cognitive abilities was explored. The primary purpose of the study was to determine if individuals who are allowed to move from one language to another when they provide responses to test items produce results that are different than those obtained by bilingual examinees assessed in one language only. The results indicate that the Experimental Group obtained significantly higher results than the Control Group on all the tests and subtests used. The Experimental Group code-switched more frequently and the examiners only code-switched with that group. The frequency of the code-switching behaviours explains, in great part, all the differences noted in the results as very few other sources of differences were identified, even when groups were compared on sex, first language and relative proficiency in French and in English.
333

JQuery - a tool for combining query results and a framework for building code perspectives

Markle, Lloyd 11 1900 (has links)
In this dissertation we identify two problems with current integrated development environments (IDEs) and present JQuery as a tool to address these issues. The first problem is that IDE views answer low level questions and do not provide a mechanism to combine results to answer complex higher level questions. Even relatively simple questions force the developers to mentally combine results from different views. The second problem is that IDEs do not provide an easy way to create perspectives on project specific concerns such as naming conventions or annotations. Most IDEs do offer support for creating custom perspectives but the effort required to create a perspective is considerably more than the benefit a custom perspective provides. JQuery is an Eclipse plugin which generates code views using an expressive query language. We have redesigned JQuery to support a number of new user interface (UI) features and add a more flexible architecture with better support for extending the UI. To address the first problem, we have added multiple views to JQuery where each view supports drag and drop of results, selection linking, and regular expression search. These features enable a user to combine results from different views to answer more complex higher level questions. To address the second problem, we can leverage the fact that JQuery is built on an expressive query language. Through this query language we are able to define project specific concerns such as naming conventions or annotations and then create views and perspectives for these concerns through the JQuery UI.
334

The Operational Code of the Liberation Tigers of Tamil Eelam

2013 July 1900 (has links)
The Tamil Tigers were one of the most organized, focused, and influential organizations in Asian politics during the last three decades. Throughout the existence of the organization, the goal of the LTTE was to establish a separate Tamil state – Tamil Eelam - comprising the Northern and Eastern parts of Sri Lanka where Tamil-speaking populations were dense. The Sri Lankan civil war, which ended in May of 2009, claimed tens of thousands of lives, displaced hundreds of thousands of residents, and impeded the economic well-being of Sri Lanka. This thesis employs the operational code analysis as a way to better understand the character, behaviour, and norms of the Liberation Tigers of Tamil Eelam. An additional purpose of this thesis is to test the utility of this model in the case of a terrorist organization such as the LTTE. The Operational Code Analysis framework was premiered by Nathan Leites in his two-part study of the Bolshevik Party, and was subsequently revived and re-imagined by a number of academics. The iteration of the Operational Code framework used in this thesis is a qualitative analysis which is comprised of ten questions: five ‘philosophical’ and five ‘instrumental’. This examination reveals that while this model has much to offer in analyzing this terrorist organization, it is in some ways a flawed method of exposition. However, the model produces unexpected insights about the stated beliefs of the LTTE.
335

Empirical Studies of Code Clone Genealogies

BARBOUR, LILIANE JEANNE 31 January 2012 (has links)
Two identical or similar code fragments form a clone pair. Previous studies have identified cloning as a risky practice. Therefore, a developer needs to be aware of any clone pairs so as to properly propagate any changes between clones. A clone pair experiences many changes during the creation and maintenance of software systems. A change can either maintain or remove the similarity between clones in a clone pair. If a change maintains the similarity between clones, the clone pair is left in a consistent state. However, if a change makes the clones no longer similar, the clone pair is left in an inconsistent state. The set of states and changes experienced by clone pairs over time form an evolution history known as a clone genealogy. In this thesis, we provide a formal definition of clone genealogies, and perform two case studies to examine clone genealogies. In the first study, we examine clone genealogies to identify fault-prone “patterns” of states and changes. We also build prediction models using clone metrics from one snapshot and compare them to models that include historical evolutionary information about code clones. We examine three long-lived software systems and identify clones using Simian and CCFinder clone detection tools. The results show that there is a relationship between the size of the clone and the time interval between changes and fault-proneness of a clone pair. Additionally, we show that adding evolutionary information increases the precision, recall, and F-Measure of fault prediction models by up to 26%. In our second study, we define 8 types of late propagation and compare them to other forms of clone evolution. Our results not only verify that late propagation is more harmful to software systems, but also establish that some specific cases of late propagations are more harmful than others. Specifically, two cases are most risky: (1) when a clone experiences inconsistent changes and then a re-synchronizing change without any modification to the other clone in a clone pair; and (2) when two clones undergo an inconsistent modification followed by a re-synchronizing change that modifies both the clones in a clone pair. / Thesis (Master, Electrical & Computer Engineering) -- Queen's University, 2012-01-31 11:39:10.503
336

Code optimization and detection of script conflicts in video games

Yang, Yi Unknown Date
No description available.
337

A case study of the use of recent English borrowings and code-switching in advertisements in two Swedish lifestyle magazines / En fallstudie över användandet av nya engelska låneord och kodväxling i reklamannonser i två svenska livsstilstidningar

Lenhult, Anna January 2014 (has links)
This study is about English borrowings and code-switching in advertisements in the two Swedish lifestyle magazines Amelia and King. The investigation shows that recent English borrowings were found in 41% of the advertisements in Amelia and in 10% of the advertisements in King. English intra-sentential code-switching appeared in 27% of the advertisements in Amelia but in only 8% in King. About half the advertisements in both magazines contained inter-sentential code-switching. Total code-switching was represented in one advertisement in Amelia and in eighteen in King. The two magazines differed a lot regarding the appearance of recent borrowings and code-switching in their different product categories and only shared the product category alcoholic beverages, which had the highest percentage of code-switching in both magazines. The main difference between Amelia and King was that in Amelia the amount of borrowings and code-switching was much higher than in King, but on the other hand Amelia only contained one advertisement exclusively in English, while in King they were eighteen. Another difference was that Swedish was more common in Amelia while English was more frequently used in King, both mixed with Swedish but also in advertisements where English was used entirely. / Den här undersökningen handlar om förekomsten av nya engelska låneord och kodväxling i reklamannonser i de två svenska livsstilstidningarna Amelia och King. Undersökningen visar att nya engelska låneord fanns i 41% av reklamannonserna i Amelia och i 10% av reklamannonserna i King. Engelsk intrasentinell kodväxling hittades i 27% av reklamannonserna i Amelia men bara i 8% av de i King. Ungefär hälften av reklamannonserna i båda tidningarna innehöll intersentinell kodväxling. Total kodväxling, dvs. annonser där all text var på engelska, förekom i en reklamannons i Amelia och arton i King. De två tidningarna skiljde sig mycket från varandra när det gällde antal engelska lånord och kodväxling i de produktkategorier som annonserades och hade bara en produktkategori gemensamt, alkoholhaltiga drycker, som hade högst andel i förekomst av kodväxling. Den största skillnaden mellan Amelia och King var att Amelia innehöll många fler låneord och kodväxlingar än King, samtidigt som Amelia innehöll endast en reklamannons som var helt på engelska medan King innehöll arton. En annan skillnad är att svenska var vanligare i Amelia medan engelska var vanligare i King, både blandad med svenska och i annonser med enbart engelska.
338

Blind iterative multiuser detection for error coded CDMA systems.

Van Niekerk, Brett. January 2005 (has links)
Mobile communications have developed since the radio communications that were in use 50 years ago. With the advent of GSM, mobile communications was brought to the average citizen. More recently, COMA technology has provided the user with higher data rates and more reliable service, and it is apparent that it is the future of wireless communication. With the introduction of 3G technology in South Africa, it is becoming clear that it is the solution to the country's wireless communication requirements. The 3G and next-generation technologies could provide reliable communications to areas where it has proven difficult to operate and maintain communications effectively, such as rural locations. It is therefore important that the se technologies continue to be researched in order to enhance their capabilities to provide a solution to the wireless needs of the local and global community. Whilst COMA is proving to be a reliable communications technology, it is still susceptible to the effects of the near-far problem and multiple-access interference. A number of multiuser detectors have been proposed in literature that attempt to mitigate the effects of multiple-access interference. A notable detector is the blind MOE detector, which requires only the desired user 's spreading sequence , and it exhibits performance approximating that of other linear multiuser detectors. Another promising class of multiuser detector operate using an iterative principle and have a joint multiuser detection and error-correcting coding scheme. The aim of this research is to develop a blind iterative detector with FEC coding as a potential solution to the need for a detector that can mitigate the effects of interfering users operating on the channel. The proposed detector has the benefits of both the blind and iterative schemes: it only requires the knowledge of the desired user ' s signature, and it has integrated error-correcting abilities. The simulation results presented in this dissertation show that the proposed detector exhibits superior performance over the blind MOE detector for various channel conditions. An overview of spread-spectrum technologies is presented, and the operation of OS-COMA is described in more detail. A history and overview of existing COMA standards is also given . The need for multiuser detection is explained, and a description and comparison of various detection methods that have appeared in literature is given. An introduction to error coding is given , with convolutional code s, the turbo coding concept and method s of iterative detection are described in more detail and compared, as iterat ive decoding is fundamental to the operation of an iterative COMA detector. An overview of iterative multiuser detection is given , and selected iterative methods are described in more detail. A blind iterative detector is proposed and analysed. Simulation results for the propo sed detector, and a comparison to the blind MOE detector is presented, showing performance characteristics and the effects of various channel parameters on performance. From these results it can be seen that the proposed detector exhibits a superior performance compared to that of the blind MOE detector for various channel conditions. The dissertation is concluded, and possible future directions of research are given. / Thesis (M.Sc.Eng.)-University of KwaZulu-Natal, Durban, 2005.
339

Applying the Canadian Association of Social Workers Code of Ethics in uniquely-situated northern geographical locations: are there factors in practice environments that impact adherence to the 2005 code?

Wilson Marques, Louise 16 September 2010 (has links)
The purpose of this study was to explore social work practitioner familiarity with and interpretation of the 2005 Canadian Association of Social Workers (CASW) Code of Ethics (“Code”) to determine whether specific sections of the existing Code enable social work practitioners to deliver ethical service in uniquely-situated geographical locations in northern Manitoba. A qualitative research style with exploratory methodology was employed in this study. In-person interviews were conducted with six social workers who have practiced in a northern Manitoba setting for at least three years post- graduation. Once given the opportunity to read and interpret the 2005 Code, five of six respondents reported that the intent of the Code is reflective of their practice, an apparent contradiction between how they described their understanding of the intent of the Code versus their practice realities. All reported that dual roles and potential conflicts of interest are very difficult to avoid when practicing social work in the North. Other key findings indicate that the study participants believe that social workers in the North: are not familiar with the 2005 Code; have a lack of education, knowledge, discussion and accessibility in this Code, and find there is a lack of application of this Code in practice environments. The emergence of the Manitoba College of Social Workers (MCSW), through legislation, will require that all practicing social workers adhere to the 2005 Code of Ethics. All six participants reported factors in northern, rural, remote and isolated environments that affect his/her ability to adhere to the 2005 Code. When social workers are required to register to use the title of Social Worker, the MCSW will be in a position to recognize the environmental factors of practicing in northern, rural, remote and isolated environments. MCSW may choose to consider that, where social workers are required to adhere to the 2005 Code, it may not be feasible in northern, rural, remote and isolated practice areas due to specific factors that have been identified throughout this study. In future studies, consideration and flexibility on behalf of the Psychology/Sociology Research Ethics Board (PSREB) may be necessary in order to ensure that research subjects are protected versus the need to understand, through research, the realities of social work practice. Secondly, researchers interested in expanding or replicating the findings of this study may choose to consider the disclosure and provision of the interview questions prior to the actual interviews. Additionally, future research to review ethical practice in the social work profession would facilitate a broader understanding of whether all social workers practice under existing requirements set out in current MIRSW by-laws and, in the future, provincial legislation that is applicable to every social worker in Manitoba. This study was limited to six participants. Broader research to more fully investigate the practical realities of applying the 2005 Code in northern environments could inform how the new legislation is implemented.
340

Resource management techniques for CDMA cellular systems

Kim, John Yongchae 05 1900 (has links)
No description available.

Page generated in 0.076 seconds