331 |
Heterogeneous Wireless Transmitter Placement with Multiple Constraints Based on the Variable-Length Multiobjective Genetic AlgorithmHuang, Cheng-Kai 20 November 2008 (has links)
In this thesis we have proposed a variable-length multiobjective genetic algorithm to solve heterogeneous wireless transmitter placement with multiple constraints. Among many factors that may affect the result of placement, we focus on four major requirements, coverage, cost, data rate demand, and overlap. In the proposed algorithm we release the need for the upper bound number of transmitters that is a major constraint in the existing methods and achieve better wireless transmitter placement while considering the transmitter position and design requirement simultaneously.
In experiments, we use the free space propagation model, the large scale propagation model which considers the shadowing effect, and the extended Hata-Okumura model to predict the path loss in a real two dimensional indoor environment, and an outdoor environment and even a real three dimensional outdoor environment. Experimental results show that the proposed algorithm can find many feasible solutions for all test cases under four objectives.
|
332 |
WH-INDEFINITES IN CHINESE AND THEIR STATUSSu, Chun-feng 27 August 2009 (has links)
Wh-indefinites in Chinese have received great attention and discussion in the literature. This thesis investigates the status of Chinese wh-indefinites and their behaviors in the so-called donkey sentence. A typical example of wh-indefinite will be like the following:
(4) Ta bu xiang zai shuo shenme le
he not want again say what LE
¡¥He does not want to say anything again.¡¦
¥L¤£·Q¦A»¡¤°»ò¤F¡C
In this thesis, accounts of wh-indefinites as variables, polarity items and quantifiers from Huang (1982), Li (1992), Cheng (1991, 1994) and Lin (1996, 1998) are provided and this thesis discusses the problems each account presents. Countering Li¡¦s (1992) work, this work argue that wh-indefinite like zenmeyang ¡¦how¡¦ and weishenme ¡¥why¡¦ cannot be directly treated as variables since they feature variables only if they appear after an auxiliary (under which situation they will express purpose or method) in a donkey sentence according to Tsai (1999, 2000), see the following examples:
(5) a. Akiu hui wei (le) shenme cizhi wo jiu hui wei (le) shenme cizhi¡@
Akiu will for LE what resign I then will for LE what resign
¡¥If Akiu will resign for the purpose x, I will then also resign for the purpose x.¡¦
ªüQ·|¬°¡]¤F¡^¤°»òÃ㾡A§Ú´N·|¬°¡]¤F¡^¤°»òÃ㾡C
b. *Akiu wei (le) shenme hui cizhi wo jiu wei (le) shenme hui cizhi
Akiu for LE what will resign I then will LE what will resign
Intended ¡¥If Akiu will resign because of the reason x, I will then also resign because of the reason x.
*ªüQ¬°¤F¤°»ò·|Ã㾡A§Ú´N¬°¤F¤°»ò·|Ã㾡C
(Tsai¡¦s 2000, 15 glossed and translated by the author)
Avoiding treating wh-indefinites as variables, we may treat them as quantifiers according to Huang¡¦s observation. But Huang¡¦s (1982) quantifier account of wh-indefinites is also rejected because I observe that wh-indefinites do not exhibit island sensitivity. Then we are led to another treatment: treating wh-indefinites as polarity items because they are sensitive to polarity environment. Aside from the sensitivity to polarity environment, Lin¡¦s (1996) work argues that wh-indefinites are licensed as polarity items if the sentence is subject to NEEC- non-entailment of existence condition. NEEC tells us that if (part of) a sentence does not have the existential import of object; wh-words can be licensed as wh-indefinites. This faces challenge because there are cases presupposing existential import yet the wh-indefinite is licensed.
In chapter 3, two types of donkey sentences are identified in Cheng and Huang¡¦s (1996) work and are accounted with different approaches-Unselective Binding and E-type analysis. Though accepting their viewpoint generally, Lin (1996) makes a distinction between one-case and multi-case reading and opens the possibility of universal interpretation in ruguo-conditionals. Later I introduce Indirect binding approach to account both types of donkey sentences. Indirect Binding argues that some quantified expression plays the role as associating the indefinite with the anaphoric element in donkey sentences:
(6) [Everyone who ti keeps a dogj]i like itj.
The example here captures the very basic idea of Indirect Binding: the chunk of expression, which has the indefinite a dog in its scope, c-commands the pronoun it and hence relates it to the indefinite. I extend it to the analysis of Chinese donkey sentences and discover that although Indirect Binding does not target at a particular status, the condition that the indirect binder must c-command the indefinite seems to suggest that c-commanding is the way of licensing a wh-indefinite, which echoes Li¡¦s and Cheng¡¦s analyses.
In Chapter 4, I introduce wh-indefinites in Japanese and Korean respectively and conclude that quantificational force comes from the environment but not from wh-indefinites themselves, countering Huang (1982). Finally, I suggest that licensing a wh-word as a wh-indefinite is through being c-commanded by the relevant operators. It is so because of Li¡¦s and Cheng¡¦s observation of wh-indefinites licensing and also of a condition in Indirect Binding that indirect binders must c-command the indefinite in order to have it as in its scope, as I have mentioned. This thesis then provides a viewpoint that perhaps, wh-indefinites can be treated uniformly as polarity items considering that Indirect Binding approach explains their behavior in donkey sentences. This thesis also opens the door for analyzing wh-indefinites in donkey sentences under Indirect Binding in other languages.
Keywords¡G Wh-indefinite, polarity item, variable, quantifier, donkey phenomenon, Indirect Binding
|
333 |
The Study of the Medical Aesthetic Market Effected the Strategic Decision of the Purchasing Behavior for ConsumersWu, Shen-chung 25 August 2009 (has links)
Taiwan National Health Insurance system by strictly controlling the total amount of health care, the combination of "Medical" and " cosmeic profession " of two Medical cosmeceutical business, medical institutions have been regarded as the most worthy of our efforts to the develop ment of one of the items at their own expense. In the past, Dermatological clinics and Plastic surgery specialist had the advantages of medical profession;"However, without strict legal restrictions, many medical cosmeceutical have mushroomed rapidly of the setting up, making the medical market is fiercely competitive.
In this study, Kaohsiung area for more than 18 years of age to study the population of the research parent body, in the consumer behavior theory and the basis of related literature, the use of EBM model structure, using purposive sampling survey method,Issued a total of 400 questionnaires were obtained 375 valid samples,
survey data will be analyzed through statistical methods to explore the demographic variables of consumers, the medical knowledge of beauty, consumer characteristics, the purchase decision-making, purchase of consumer behavior analysis, and differences between single-factor analysis of variables, found that the majority Kaohsiung area women, unmarried women and young mature women,Service industry or business people, college education, monthly income of 2 - 4 million is to become the mainstream of medical cosmetic treatment; accept satisfactory cosmetic medical treatment have 78% will come back to hospital for treatment or to introduce relatives and friends therapy; no accepted medical cosmetic experience in the survey of 184 people, 167 people will consider accepting a medical cosmeic treatment, these are exciting message.
This study was designed to explore the consumer demand for medical cosmetic treatments, in the hope of providing for medical cosmetic in the foreseeable future in the marketing strategy formulation and marketing of develop the reference, Blue Ocean strategic thinking in order t o find out the value and innovation in medical cosmetic business model, offering consumers value for money and high quality medical cosmetic, to find their own market position, and avoid vicious competition, and create consumer demand and expansion of medical cosmetic market.
|
334 |
The Influence of Employee Work Attitudes in Variable Pay, Risk Preferences and Pay SatisfactionWang, Peng-su 03 September 2009 (has links)
Abstract
A well designed salary system can influence employee¡¦s work motivation and will reflect on their work performance. It would not be difficult to understand, based on the theory of expectancy, a linkage between reward and performance will motivate employee to work harder, and from which to create good performance and in turn to receive better rewards. That is to say a business which adopts an incentive reward system to motivate employee will receive better performance from them in a consistent manner and the end result is to improve the performance of the organization.
In the past, there have been many researches on influence of salary system on pay satisfaction and working attitude of employee, but few has studied differences in individual risk preference which can interfere with pay satisfaction and to explore differences in risk preference of employee, the effect of variable pay on pay satisfaction and working attitudes.
Through empirical analyses, it was found that:
1. In an organization, an implementation of variable pay system will affect pay satisfaction. As salary links more closely with performance, employee¡¦s pay satisfaction increases.
2. The impact of variable pay on pay satisfaction is not influenced by individual risk preference. Due to differences in salary system to motivate employee, in the business this study concludes if employee is unaware of risk or incentive that is structured in the salary system, then there will be not interaction between difference in risk preference and variable pay system, and will also have no impact on salary satisfaction.
3. Pay satisfaction will have an effect on work attitude of employee. The higher the pay satisfaction, the stronger the organization commitment and job involvement by the employee.
4. Through pay satisfaction, variable pay will indirectly affect employee¡¦s work attitude. A reflection on organizational commitment and job involvement due to salary variable as a result of performance change in part must pass through the intermediate effect of pay satisfaction.
Keywords: variable pay, risk preferences, pay satisfaction, organizational commitment, job involvement
|
335 |
Studies of a Variable Voltage PEM Fuel Cell StackSu, You-Min 13 October 2009 (has links)
In this paper a proton exchange membrane fuel cell (called PEMFC)
stack was developed to power or charge 3C products without any voltage
transformer. PEMFC stacks made with traditional bipolar plates to
generate a high voltage are usually by accumulating multiple single fuel
cells together. The design with traditional heavy and large bipolar plates
is inconvenient for 3C products to generate a high voltage in a finite
volume. To solve this problem, a heterogeneous carbon fiber bunch
unipolar plate is adopted to replace traditional bipolar plates, and a
special membrane electrode assembly (called MEA) with multiple sets of
banded electrodes is used to replace a traditional MEA that is made with
only a set electrodes. With this new design, the fuel cell voltage can
easily increase in a layer. The designed stack can provide multiple
voltages and currents by proper series and/or parallel connections.
The variable voltage 16-cell fuel cell is composed of 4-layer
4-banded type MEAs and 5 heterogeneous carbon fiber bunch bipolar
plates. The 16-cell stack is divided into 4 sets. Each set of 4 series
connection cell is arranged in a line in 4 different layers. The 4-cell sets
can connect by series/parallel on the two ends of the stack. The total
volume of the 16-cell stack is 385cm3 and its weight is 365g. The new
design can power or charge certain 3C products directly.
If 2 sets of 4-cell fuel cells are connected in series, the stack can
provide 2A at 3.6V. With the above 2 sets of 2*4-cell connected in
parallel, the stack can provide 3.5A at 3.6V. If the 4 sets of 4-cell are all
connected in series, the stack can provide 1.8 A at 7.2V. These voltages
and currents derived from these stacks can power or charge a mobile
phone, a photo camera and a video camera directly. If a higher voltage or
current are needed, two or more 16-cell stacks can be connected in series
XI
or parallel. Then notebooks or any other 3C products in which higher
power are needed can be driven.
|
336 |
Development and application of high voltage dielectric spectroscopy for diagnosis of medium voltage XLPE cablesWerelius, Peter January 2001 (has links)
<p>When polymer power cables were introduced into mediumvoltage applications in the late 1960s, the degradationphenomenon later referred to as<i>water treeing</i>was still unknown. However, this changedwithin a relatively short space of time. Just 5-10 years afterthese first polymer applications, faults began to appear thatcould be attributed to the new phenomenon-water treeing. Sincethen, cable manufacturers have been improving their designsgradually, and cables produced today are assumed to have muchlower susceptibility to water trees. However, water treeing isstill assumed to be the most important degradation process inthese applications.</p><p>There are huge amounts of polymer cable installations thatare degraded by water trees. Since many of these cables areinstalled in the same grid nets, one cable fault oftengenerates another. If two or more cables fail at the same time,the consequences can be extensive. A non-destructive diagnosticmethod makes it possible to assess cables and take action priorto failures.</p><p>This thesis presents the results of research work on thedevelopment of a measurement technique and diagnostic methodfor the assessment of medium voltage XLPE cables in the field.The method used is called high voltage dielectric spectroscopy,and involves the measurement of capacitance and loss as afunction of frequency at high voltages. The method is used in ashort frequency range of approximately one decade in thelow-frequency region (normally from 1 down to 0.1 Hz). Thevoltage levels used initially are all below the service-voltagelevel. If the cable is assessed to be free from water trees, aslightly increased voltage can be used.</p><p>Based on dielectric-spectroscopy measurements, specificwater-tree analysis and breakdown tests, a set of measurementprocedures and criteria that take into account differences incable designs has been proposed for the assessment of mediumvoltage XLPE cables. The characteristic responses of XLPEcables (in both non and water-tree-deteriorated cases) make itpossible to separate the cable response from the influence ofaccessories. Field experience shows thatwater-tree-deteriorated cables with relatively low breakdownstrengths can remain in service for many years.</p><p><b>Keywords:</b>dielectric spectroscopy, high voltage,variable frequency, diagnostics, non-destructive diagnostics,cables, medium voltage, polymer, XLPE, water trees, watertreeing</p>
|
337 |
A commutative hypercomplex calculus with applications to special relativity /Davenport, Clyde M. January 1900 (has links)
Texte remanié de: Thesis--University of Tennessee, 1978. / Bibliogr. p. 207-209.
|
338 |
New modeling techniques for power electronics based systems with application to switched reluctance drives /Essah, David N. January 1999 (has links)
Thesis (Ph. D.)--University of Missouri-Columbia, 1999. / Typescript. Vita. Includes bibliographical references (leaves 55-56). Also available on the Internet.
|
339 |
New modeling techniques for power electronics based systems with application to switched reluctance drivesEssah, David N. January 1999 (has links)
Thesis (Ph. D.)--University of Missouri-Columbia, 1999. / Typescript. Vita. Includes bibliographical references (leaves 55-56). Also available on the Internet.
|
340 |
Security of Non-Volatile Memories - Attack Models, Analyses, and Counter-MeasuresJang, Jae-Won 01 January 2015 (has links)
The unprecedented demand for performance in the latest technologies will ultimately require changes in the way we design cache. Emerging high density embedded memories such as Spin-Transfer Torque Random Access Memory (STTRAM) have emerged as a possible candidate for universal memory due to its high speed, low power, non-volatility, and low cost. Although attractive, STTRAM is susceptible to contactless tampering through malicious exposure to magnetic field with the intention to steal or modify the bitcell content. In this thesis, we explore various attack techniques on STTRAM and then propose a novel array-based sensor to detect the polarity and magnitude of such attacks and then propose two design techniques to mitigate the attack. With our research, we have been able to successfully implement and accurately detect an attack while providing sufficient compensation window (few ns to ~100 us) to enable proactive protection measures. Finally, we show that variable-strength ECC can adapt correction capability to tolerate failures with various strength of an attack.
|
Page generated in 0.0607 seconds