Rozprawy doktorskie na temat „Access”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Access”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Conocimiento, Dirección de Gestión del. "Guía de acceso para Access Engineering". McGraw-Hill, 2021. http://hdl.handle.net/10757/655256.
Pełny tekst źródłaConocimiento, Dirección de Gestión del. "Guía de acceso para Access Medicine". McGraw-Hill, 2021. http://hdl.handle.net/10757/655257.
Pełny tekst źródłaConocimiento, Dirección de Gestión del. "Guía de acceso para Access Physiotherapy". McGraw-Hill, 2021. http://hdl.handle.net/10757/655258.
Pełny tekst źródłaSILVESTRE, BRUNO OLIVEIRA. "INTERINSTITUTIONAL ACCESS: AUTHENTICATION AND ACCESS CONTROL". PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=6619@1.
Pełny tekst źródłaO uso de computação distribuída vem expandindo seu escopo, saindo de aplicações em redes locais para aplicações envolvendo diversas instituições. Em termos de segurança, essa expansão introduz desafios em identificar usuários oriundos das diferentes organizações e definir seus direitos de acesso a determinado recurso. Abordagens comuns adotam a replicação do cadastro dos usuários pelas diversas instituições ou o compartilhamente de uma mesma identidade por um conjunto de usuários. Entretanto, essas estratégias apresentam deficiências, demandando, por exemplo, maior esforço de gerência por parte dos administradores e até esbarrando em políticas de privacidade. Neste trabalho propomos uma arquitetura que utiliza o conceito de papéis para a autenticação e o controle de acesso entre diferentes instituições. Baseado em uma relação de confiança entre as organizações, a arquitetura permite que os usuários sejam autenticados na instituições onde estão afiliados e utiliza o papel por eles desempenhados para controlar o acesso aos recursos disponibilizados pelas demais organizações.
Distributed computing has been expanding its scope from local area network applications to wide-area applications, involving different organizations. This expansion implies in several new security challenges, such as the identification of users originating from different organizations and the definition of their access rights. Commom aproaches involve replicating user data in several institutions or sharing identities among sets of users. However, these approaches have several limitations, sucj as the increased management effort of administrators or problems with privacy policies. This work proposes a framework for inter-institucional authentication. The framework is based on the concepts of RBAC (role-based access control) and of trust between organizations.
Atkins, Derek A. (Derek Allan). "Media Bank--access and access control". Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/61086.
Pełny tekst źródłaByrnes, Collin DeMeere. "Access". This title; PDF viewer required Home page for entire collection, 2007. http://archives.udmercy.edu:8080/dspace/handle/10429/9.
Pełny tekst źródłaHoppenstand, Gregory S. "Secure access control with high access precision/". Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23386.
Pełny tekst źródłaGOMES, CARMEN ANTUNES. "RANDON ACCESS WITH NOTIFICATION: MULTIPLE ACCESS PROTOCOLS". PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1993. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9396@1.
Pełny tekst źródłaEste trabalho propõe e analisa uma versão de um protocolo híbrido de acesso aleatório com notificação, desenvolvido para redes VSAT ( Very Small Aperture Terminal) onde se busca uma combinação do baixo tempo de resposta de protocolos do tipo RA-TDMA (Random Access-Time Division Multiple Access) . No protocolo aqui estudado as transmissões são feitas em uma primeira tentativa através de um esquema RA-TDMA e no caso de ocorrência de colisão, os pacotes envolvidos são retransmitidos através de um esquema DA-TDMA. As notificações de transmissões são feitas pelas estações VSAT, através de um canal de sinalização, onde é atribuído a cada uma delas um segmento de tempo, aqui referido como slot de tempo, de posição fixa dentro de cada quadro. O desempenho do protocolo é analisado utilizando a técnica de Análise no Ponto de Equilíbrio (EPA), sendo considerados como medida de desempenho os parâmetros retardo médio de mensagem, vazão e taxa de rejeição de pacotes. São consideradas mensagens de um pacote e mensagens de tamanho variável. Comparações com outros protocolos contendo buffer ou não, também analisados utilizando a técnica EPA, são realizadas. Resultados de simulação encontrados na literatura de dois outros protocolos são também apresentados.
A version of a random access with notification, multiple access protocol developed for VSAT networks is considered. This hybrid protocol combines the low response delay of RA- TDMA contention protocols with the efficiency and stability of DA-TDMA type protocols. In the considered protocol a message generated by a VSAT station is transmitted, in a first attempt, using a RA-TDMA type of scheme. If a collision occurs in this first transmission of the message the collided packets are retransmitted through a Demand Assignment (DA)-TDMA type of access. When a remote station transmits its message in a RA-TDMA contention mode it notifies the central hub using a separate TDMA channel in which a fixed position time slot is reserved to each station within a frame. The performance of the protocol is evaluated in terms of throughput, expected delay and packet rejection rate by means of the so called Equiilibrium Point Analysis (EPA). Single and multi-packet messages, with a random number of packets, are considered in the performance analysis. Comparisons with other hybrid protocols, which were also evaluated in the literature by means of the EPA technique or through simulation results, are presented.
Brown, Trevor Junior. "Time division multiple access/code division multiple access for the optical local access network". Thesis, Manchester Metropolitan University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243716.
Pełny tekst źródłaKottahachchi, Buddhika. "ACCESS : Access Controls for Cooperatively Enabled Smart Spaces". Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32101.
Pełny tekst źródłaThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (leaves 75-79).
Traditionally, access control mechanisms have been static in nature, requiring explicit intervention in order to change their behavior. However, since security requirements can be expected to change frequently and rapidly in ubiquitous computing environments, access control mechanisms that can react to the context in which they are applied are desirable. With this in mind, we have created ACCESS (Access Controls for Cooperatively Enabled Smart Spaces); a framework for enabling dynamic, role-based and context-aware access control mechanisms in ubiquitous computing applications.
by Buddhika Kottahachchi.
M.Eng.
Näder, Johannes. "Open Access". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2015. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-160760.
Pełny tekst źródłaConocimiento, Dirección de Gestión del. "Access Engineering". McGraw-Hill, 2004. http://hdl.handle.net/10757/655256.
Pełny tekst źródłaConocimiento, Dirección de Gestión del. "Access Medicine". McGraw-Hill, 2004. http://hdl.handle.net/10757/655257.
Pełny tekst źródłaConocimiento, Dirección de Gestión del. "Access Physiotherapy". McGraw-Hill, 2004. http://hdl.handle.net/10757/655258.
Pełny tekst źródłaRenfro, Garry D. "Present Access". Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etd/2112.
Pełny tekst źródłaAdams, Stephanie Kathryn. "Disability, access and design : a study of wheelchair access". Thesis, Bournemouth University, 2006. http://eprints.bournemouth.ac.uk/17784/.
Pełny tekst źródłaDe, ObaldiÌa Lee Galileo E. "Multiple access techniques for emerging broadband wireless access networks". Thesis, University of York, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.403800.
Pełny tekst źródłaMcMurry, Benjamin L. "Self-Access Centers: Maximizing Learners' Access to Center Resources". Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd966.pdf.
Pełny tekst źródłaHelberger, Natali. "Controlling access to content regulating conditional access in digital broadcasting /". [S.l. : Amsterdam : s.n.] ; Universiteit van Amsterdam [Host], 2005. http://dare.uva.nl/document/78324.
Pełny tekst źródłaVoigt, Janina. "Access contracts : a dynamic approach to object-oriented access protection". Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708888.
Pełny tekst źródłaBove, Jens. "Open Access 2.0". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2009. http://nbn-resolving.de/urn:nbn:de:bsz:14-ds-1237556606026-59807.
Pełny tekst źródłaMay, Brian 1975. "Scalable access control". Monash University, School of Computer Science and Software, 2001. http://arrow.monash.edu.au/hdl/1959.1/8043.
Pełny tekst źródłaHungin, A. Pali S. "Open access gastroscopy". Thesis, University of Newcastle Upon Tyne, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.295539.
Pełny tekst źródłaSalow, Bernhard 1988. "Access and anticipation". Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/101524.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (pages 119-126).
Can we always tell, just through reflection, what we should believe? That is the question of access, the central disagreement between epistemic internalists and externalists, and the focus of the dissertation. Chapter 1 gives an argument for access, connecting it with the question of whether we can intentionally bias our own investigations to favour desirable hypotheses. I argue that we can't: since we have to take any known biases into account when evaluating the evidence obtained, attempts to bias our inquiries will be self-undermining. Surprisingly, this explanation fails for agents who anticipate violating access; and such agents can in fact intentionally bias their investigations. Since this possibility remains counterintuitive when we focus on alleged counterexamples to access, this is a serious problem for externalism. Chapters 2 and 3 offer a solution to this problem and related, more familiar, ones. Chapter 2 lays some technical foundations, by investigating iterated knowledge in David Lewis's contextualist theory of knowledge. I show that his account has the surprising consequence that agents cannot attend to "negative access failures", cases in which someone fails to know something without knowing that they fail to know it. Whilst this prediction is prima facie unattractive, I show how it can be defended. Chapter 3 uses this Lewisian treatment of negative access failures to solve our problems for externalism. For I show that these problems arise not from maintaining that, in some situations, agents are unable to tell what they should believe, but rather from maintaining that rational agents can sometimes suspect that they are currently in such a situation or anticipate that they will be in such a situation in the future. Externalists can reject this stronger thesis. To explain how, I sketch a theory of evidence which integrates the Lewisian treatment of negative access failures to predict that agents always have to think that they can tell what they should believe, even though this isn't always true. By rejecting access, but maintaining that agents can never anticipate violating it, this theory reconciles the most attractive features of externalism and internalism.
by Bernhard Salow.
Ph. D. in Linguistics
Steh, Stephen R. "Unauthorized Access Crimes". Youngstown State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Pełny tekst źródłaDrugge, Lundström Eric, i Kristoffer Agmalm. "Serverrum / SD-Access". Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-86325.
Pełny tekst źródłaSteh, Stephen. "Unauthorized access crimes /". Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1254939817.
Pełny tekst źródłade, la Motte L. "Professional Access Control". Thesis, Honours thesis, University of Tasmania, 2004. https://eprints.utas.edu.au/118/1/front_Thesis.pdf.
Pełny tekst źródłaHo, Adrian K., i Charles W. Bailey. "Open Access Webliography". Emerald, 2005. http://hdl.handle.net/10150/105538.
Pełny tekst źródłaBailey, Charles W. "Open Access Bibliography". Association of Research Libraries, 2005. http://hdl.handle.net/10150/106437.
Pełny tekst źródłaWeishaupt, Karin. "Open-Access-Zeitschriften". Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2009. http://dx.doi.org/10.18452/15959.
Pełny tekst źródłaAlthough open access has been discussed intensively for some years, it is far away from being practised to a degree that would meet the actual technical standard. Only 0.8 % of all journals produced in Germany or 2 % of all German scientific journals are in open access. The problem to be overcome is the lack of acceptance by authors. As result of a survey among about 1000 persons who have already published at least one article in an open access journal, measures are suggested how acceptance can be improved. Considering the varying status open access has reached, differences between possible measures in the discliplines prove to be less distinctive as expected. The core question rather is which are the aims of the authors publishing in open access journals. Knowing their aims, measures to enhance acceptance can be derived. The highest barriere for open access is the established system of evaluating scientific research. Accross all disciplines the most important practise is peer reviewing of articles, in sciences and medicine the impact factor is of special importance. This is why the acceptance of open access journals without impact factor is low even if these journals may be characterized by high quality. Therefore the system of evaluation should be reviewed critically, and the impact factor might be substituted by other methods that take into account the specific qualities of modern forms of publications. An international comparison shows that open access does not only support the developing countries in their academic development. Rather, these countries offer considerable activities and achievements that can serve as models for the rest of the world and provide incitations for the improvement of the situation in Germany. This taken as a fact, we should not speak of less developed countries that need support, but rather of one world in which all countries are partners who can learn from each other.
Robbin, Alice, i Martin David. "SIPP ACCESS: Information tools improve access to national longitudinal panel surveys". Reference and Adult Services Division (RASD) of the American Library Association, 1988. http://hdl.handle.net/10150/105545.
Pełny tekst źródłaBailey, Charles W. "The Spectrum of E-Journal Access Policies: Open to Restricted Access". DigitalKoans, 2005. http://hdl.handle.net/10150/105875.
Pełny tekst źródłaMagnussen, Gaute, i Stig Stavik. "Access Control in Heterogenous Health Care Systems : A comparison of Role Based Access Control Versus Decision Based Access Control". Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2006. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9295.
Pełny tekst źródłaRole based access control (RBAC) is widely used in health care systems today. Some of the biggest systems in use at Norwegian hospitals utilizes role based integration. The basic concept of RBAC is that users are assigned to roles, permissions are assigned to roles and users acquire permissions by being members of roles. An alternative approach to the role based access distribution, is that information should be available only to those who are taking active part in a patients treatment. This approach is called decision based access control (DBAC). While some RBAC implementations grant access to a groups of people by ward, DBAC ensures that access to relevant parts of the patients medical record is given for treatment purposes regardless of which department the health care worker belongs to. Until now the granularity which the legal framework describes has been difficult to follow. The practical approach has been to grant access to entire wards or organizational units in which the patient currently resides. Due to the protection of personal privacy, it is not acceptable that any medical record is available to every clinician at all times. The most important reason to implement DBAC where RBAC exists today, is to get an access control model that is more dynamic. The users should have the access they need to perform their job at all times, but not more access than needed. With RBAC, practice has shown that it is very hard to make dynamic access rules when properties such as time and tasks of an employees work change. This study reveals that pretty much all security measures in the RBAC systems can be overridden by the use of emergency access features. These features are used extensively in everyday work at the hospitals, and thereby creates a security risk. At the same time conformance with the legal framework is not maintained. Two scenarios are simulated in a fictional RBAC and DBAC environment in this report. The results of the simulation show that a complete audit of the logs containing access right enhancements in the RBAC environment is unfeasible at a large hospital, and even checking a few percent of the entries is also a very large job. Changing from RBAC to DBAC would probably affect this situation to the better. Some economical advantages are also pointed out. If a change is made, a considerable amount of time that is used by health care workers to unblock access to information they need in their everyday work will be saved.
Espinazo, Pagán Javier. "Un repositorio de modelos para acceso escalable : A model repository for scalable access". Doctoral thesis, Universidad de Murcia, 2013. http://hdl.handle.net/10803/127305.
Pełny tekst źródłaThe work presented in this thesis tackles the problems of model persistence and querying in the field of Model-Driven Engineering. Model persistence is the service that provides the storage of in-memory models into persistent media such as data bases. Model querying is the processo of searching a model fro a set of elements that satisfy a given condition. To overcome the limitations of XMI-based persistence, model repositories are emerging as persistence solutions for large models, providing remote access to them. In this thesis, we present Morsa, a model repository focused on scalability and integration. Morever, Morsa provides the MorsaQL model querying language, which has been designed with the goals of usability, safeness and efficiency. Finally, in order to study the state of the art of the areas of model persistence and model querying and gain the knowledge we needed to develop our own solutions, we have studied and compare the different approaches to both areas. Goals The main goal of this thesis is the creation of a model repository for managing large models with a special emphasys on scalability and transparent integration. This repository offers two basic services: (i) model persistence, which provides means to handle large models, and (ii) model querying, which allows a client to obtain elements from a model that is stored in the repository. Another goal of this thesis is the study of the state of art of the areas of model persistence and model querying, comparing the existing solutions and defining a set of dimensions that can be used to characterize both areas. Methodology The development of Morsa began with a stage dedicated to the study of the state of the art of model persistence in order to evaluate the existing approaches and define the dimensions that characterize this area. Once this study was completed, the requirements were elicited, with special focus on client scalability and transparent integration. Afterwards, the design, implementation and test of Morsa were performed; for the evaluation of the repository, a comparison between it and CDO, the most widely used repository, was done, demonstrating the greater efficiency of Morsa. The creation of MorsaQL was tackled once the development of Morsa was finished. To do this, a study of the state of the art of model querying was performed, eliciting the main requirements of efficiency, usability and safeness. After the design, implementation and test of MorsaQL, its evaluation was performed by comparing it against the main model querying approaches currently available, resulting in MorsaQL being the most efficient and suitable. Conclusions The development of Morsa and MorsaQL, as well as the study of the state of the art, have given us a profound knowledge on the problematics of model persistence and querying. Moreover, the evaluation of Morsa and MorsaQL and their comparison against the main existing solutions provide an added value in the form of recommendations for which solutions to use depending on some given needs. Finally, the knowledge we have adquired has allowed us to define some research guidelines that would be beneficial to explore in order to achieve a greater alignment between the different Model Driven Engineering technologies.
Cuillier, David. "Access attitudes : measuring and conceptualizing support for press access to government records". Online access for everyone, 2006. http://www.dissertations.wsu.edu/Dissertations/Spring2006/d%5Fcuillier%5F041906.pdf.
Pełny tekst źródłaJensen, Torstein, i Knut Halvor Larsen. "Developing Patient Controlled Access : An Access Control Model for Personal Health Records". Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9597.
Pełny tekst źródłaThe health and social care sector has a continuous growth in the use of information technology. With more and more information about the patient stored in different systems by different health care actors, information sharing is a key to better treatment. The introduction of the personal health record aims at making this treatment process easier. In addition to being able to share information to others, the patients can also take a more active part in their treatment by communicating with participants through the system. As the personal health record is owned and controlled by the patient with assistance from health care actors, one of the keys to success lies in how the patient can control the access to the record. In this master's thesis we have developed an access control model for the personal health record in a Norwegian setting. The development is based on different studies of existing similar solutions and literature. Some of the topics we present are re-introduced from an earlier project. Interviews with potential users have also been a valuable and important source for ideas and inspiration, especially due to the fact that the access control model sets high demands on user-friendliness. As part of the access control model we have also suggested a set of key roles for the personal health record. Through a conceptual implementation we have further shown that the access control model can be implemented. Three different solutions that show the conceptual implementation in the Indivo personal health record have been suggested, using the Extensible Access Control Markup Language as the foundation.
Haider, Jutta. "Open access and closed discourses : constructing open access as a 'development' issue". Thesis, City University London, 2008. http://openaccess.city.ac.uk/8589/.
Pełny tekst źródłaZhang, Xiushan. "L2 cache replacement based on inter-access time per access count prediction". Diss., Online access via UMI:, 2009.
Znajdź pełny tekst źródłaHu, Wendong. "Medium access control protocols for cognitive radio based dynamics spectrum access networks". Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1580792591&sid=28&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Pełny tekst źródłaWillinsky, John. "The Access Principle: The Case for Open Access to Research and Scholarship". Cambridge, Mass.: MIT Press, 2006. http://hdl.handle.net/10150/106529.
Pełny tekst źródłaWohlfarth, Dagmar, i Tobias Rothe. "1000 x Open access". Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2007. http://nbn-resolving.de/urn:nbn:de:swb:14-1191935304231-19766.
Pełny tekst źródłaSchmidt, Ronald. "Distributed Access Control System". Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100336.
Pełny tekst źródłaCharvandeh, Jenny. "Location aware web access". Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91492.
Pełny tekst źródłaTillgång till information varsomhelst och vilken tid som helst är en viktig utkom av modern rörliga kommunikations systems. Alltmera har användarens terminal kännedom om användarens plats. Informationen om platsen kan vara lite eller omfattande. Tillgång till information om platsen gör det möjligt att skapa platsmedvetna tjänster. I den här master thesis presenterar och utvärderar jag ett system för plats medvetna web användning. Användaren klickar på en punkt på en karta (för att inrätta en virtuell lokalisering genom att använda tidigare installerat applikationer), sedan deras HTTP GET request för en URL utvidgas med information om användarens position eller deras virtuella (verkliga) lokalisering. En platsmedveten web query har skapats så att information om plats som latitude och longitude läggs till denna web query. Sedan en web server använder denna information för att generera dynamiska web sidor.
Knight, G. S. "Scenario-based access control". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0021/NQ54421.pdf.
Pełny tekst źródłaAlkahtani, Saad Ahmed. "Children's access to medicines". Thesis, University of Nottingham, 2013. http://eprints.nottingham.ac.uk/13425/.
Pełny tekst źródłaLang, Ulrich. "Access policies for middleware". Thesis, University of Cambridge, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.619792.
Pełny tekst źródłaLukefahr, Joseph W. "Service-oriented access control". Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43948.
Pełny tekst źródłaAs networks grow in complexity and data breaches become more costly, network administrators need better tools to help design networks that provide service-level availability while restricting unauthorized access. Current research, specifically in declarative network management, has sought to address this problem but fails to bridge the gap between service-level requirements and low-level configuration directives. We introduce service-oriented access control, an approach that frames the problem in terms of maintaining service-level paths between users and applications. We show its use in several scenarios involving tactical networks typically seen in the military’s field artillery community.
Finean, Robert J. "Satellite access in FPLMTS". Thesis, University of Surrey, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.321039.
Pełny tekst źródłaLee, Stephen James S. M. Massachusetts Institute of Technology. "Adaptive electricity access planning". Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/117878.
Pełny tekst źródłaThesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2018.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 139-149).
About 1.1 billion people worldwide lack access to electricity and an additional 1 billion have unreliable access. The social ramifications of this problem are noteworthy because access to electric power has the potential to transform societies. While admirable efforts are underway, there is general consensus that progress is falling far short of what is needed to reach international electricity access goals. In light of such deficiencies, it is arguable that systems-level experimentation and innovation is required if we are to achieve universal electricity access in the next one to two decades. With the advancement of technology, new opportunities are emerging that can potentially change the game. Machine learning methods and detailed technoeconomic models for planning comprise one set of technologies that hold significant promise for accelerating access. This thesis builds upon recent work towards the development of more intelligent decision support systems for electrification planning. Progress towards automated and scalable software systems for the extraction of building footprints from satellite imagery are presented. In addition, a novel model for probabilistic data fusion and other machine learning methods are compared for electrification status estimation. Inference tools such as these allow for the cost-effective provision of granular data required by techno-economic models. We also acknowledge that the technologies we detail should not be developed in a vacuum. Given that electrification is a complex endeavor involving numerous social and technical factors, careful consideration must be given to human, policy, and regulatory concerns during the planning process. We notice how uncertainty abounds in these activities and propose "adaptive electricity access planning" as a new model-assisted framework for the explicit consideration of uncertainty in large-scale planning. This work aspires to provide valuable perspective on the importance of uncertainty in planning as these endeavors continue to evolve.
by Stephen James Lee.
S.M. in Technology and Policy
S.M.