Rozprawy doktorskie na temat „Identification”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Identification”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Pryke, Sean Patrick. "Multiple independent identification decisions, a method of calibrating eyewitness identifications". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/NQ63445.pdf.
Pełny tekst źródłaBalaniuk, Remis. "Identification structurelle". Phd thesis, Grenoble INPG, 1996. http://tel.archives-ouvertes.fr/tel-00004974.
Pełny tekst źródłaBalaniuk, Remis. "Identification structurelle". Phd thesis, Grenoble INPG, 1996. https://theses.hal.science/tel-00004974.
Pełny tekst źródłaWood, Nathan D. "Mystic Identifications: Reading Kenneth Burke and “Non-identification” through Asian American Rhetoric". BYU ScholarsArchive, 2020. https://scholarsarchive.byu.edu/etd/8482.
Pełny tekst źródłaBrunot, Mathieu. "Identification of rigid industrial robots - A system identification perspective". Phd thesis, Toulouse, INPT, 2017. http://oatao.univ-toulouse.fr/20776/1/BRUNOT_Mathieu_20776.pdf.
Pełny tekst źródłaAvanzi, Lorenzo <1975>. "Dual Identification: When Identification in Organizational Contexts Can Harm". Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1575/1/TESI_DOTTORATO_ULTIMA_CON_INDICEok.pdf.
Pełny tekst źródłaAvanzi, Lorenzo <1975>. "Dual Identification: When Identification in Organizational Contexts Can Harm". Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2009. http://amsdottorato.unibo.it/1575/.
Pełny tekst źródłaCoymak, Ahmet. "Associations Of Religious Identification, Secular Identification, Perceived Discrimination, And Political Trust With Ethnic And Societal (national) Identification". Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610734/index.pdf.
Pełny tekst źródłastructure. Supporting hypothesis stemming from Social Identity Theory and Optimal Distinctiveness Theory, political trust and perceived discrimination have roles of mediation in the relationship ethnic and societal identification, by contrast with secular and religious identities in the relationship. Results were discussed for their implications to politic context of the Turkey.
Pozzulo, Joanna D. "Increasing the identification accuracy of child eyewitnesses with identification procedures". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0004/NQ27850.pdf.
Pełny tekst źródłaPourmohammad-Namvar, Mehrzad. "Interaction entre identification et commande : identification pour la commande robuste". Grenoble INPG, 2001. http://www.theses.fr/2001INPG0004.
Pełny tekst źródłaXing, Shutao. "Structural Identification and Damage Identification using Output-Only Vibration Measurements". DigitalCommons@USU, 2011. https://digitalcommons.usu.edu/etd/1067.
Pełny tekst źródłaPrandina, Marco. "Spatial damping identification". Thesis, University of Liverpool, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.533930.
Pełny tekst źródłaZai, Salar. "Identification of micrococci". Thesis, University of Bradford, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.292645.
Pełny tekst źródłaNguyên, Thiên-Lôc 1978. "National identification systems". Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/87367.
Pełny tekst źródłaHlushchenko, V. O., I. I. Kolodochka i A. O. Miroshnychenko. "Identification of motion". Thesis, Сумський державний університет, 2012. http://essuir.sumdu.edu.ua/handle/123456789/28692.
Pełny tekst źródłaHlushchenko, V. O., I. I. Kolodochka i A. O. Miroshnychenko. "Identification of motion". Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/26037.
Pełny tekst źródłaSinyanska, A., i A. Klushnik. "Presenting for identification". Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/26092.
Pełny tekst źródłaZiegler, Edward H. "Nonlinear system identification /". Online version of thesis, 1994. http://hdl.handle.net/1850/11583.
Pełny tekst źródłaDwyer, Edward J. "Word Identification Strategies". Digital Commons @ East Tennessee State University, 2018. https://dc.etsu.edu/etsu-works/3417.
Pełny tekst źródłaDwyer, Edward J. "Word Identification Strategies". Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etsu-works/3419.
Pełny tekst źródłaMoody, Sarah Jean. "Automated Data Type Identification And Localization Using Statistical Analysis Data Identification". DigitalCommons@USU, 2008. https://digitalcommons.usu.edu/etd/9.
Pełny tekst źródłaToner-MacLean, Sally. "Emotional ramifications of adoption reunion : is there a predictable pattern of response?" Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=78193.
Pełny tekst źródła何耀祥 i Yiu-cheung Timothy Ho. "Biotyping in Penicillium marneffei". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B31969732.
Pełny tekst źródłaSmith, Shelley Elizabeth. "How Does Sport Team Identification Compare to Identification with Other Social Institutions?" TopSCHOLAR®, 2009. http://digitalcommons.wku.edu/theses/122.
Pełny tekst źródłaChoi, Eric M. "The modeling and system identification of the Dynamics Identification and Control Experiment". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp04/mq29363.pdf.
Pełny tekst źródłaCampos, Maria João Magalhães Pereira. "Identity in eHealth - from the reality of physical identification to digital identification". Master's thesis, Faculdade de Medicina da Universidade do Porto, 2010. http://hdl.handle.net/10216/62148.
Pełny tekst źródłaMustard, H. L. "Identification with stigmatised groups : does group identification lead to poor self-esteem?" Thesis, University College London (University of London), 2013. http://discovery.ucl.ac.uk/1407498/.
Pełny tekst źródłaCampos, Maria João Magalhães Pereira. "Identity in eHealth - from the reality of physical identification to digital identification". Dissertação, Faculdade de Medicina da Universidade do Porto, 2010. http://hdl.handle.net/10216/62148.
Pełny tekst źródłaUssia, Alessia. "Input identification, footbridge control and non-linear identification of a MR damper". Doctoral thesis, Università degli studi di Trento, 2014. https://hdl.handle.net/11572/368187.
Pełny tekst źródłaUssia, Alessia. "Input identification, footbridge control and non-linear identification of a MR damper". Doctoral thesis, University of Trento, 2014. http://eprints-phd.biblio.unitn.it/1318/1/thesis_Ussia.pdf.
Pełny tekst źródłaLittle, Jane Kathryn. "The acquisition of gender stereotype component links". Thesis, University of British Columbia, 1988. http://hdl.handle.net/2429/28105.
Pełny tekst źródłaEducation, Faculty of
Educational and Counselling Psychology, and Special Education (ECPS), Department of
Graduate
Estrada, Luis M. "Party identification in Mexico /". Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC IP addresses, 2005. http://wwwlib.umi.com/cr/ucsd/fullcit?p3185927.
Pełny tekst źródłaHelt, Michael F. "Vegetation identification with Lidar". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FHelt.pdf.
Pełny tekst źródłaJohnson, Richard. "Frequency domain structural identification". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA312408.
Pełny tekst źródłaBäumer, Lars. "Identification in prediction theory". [S.l. : s.n.], 2000. http://deposit.ddb.de/cgi-bin/dokserv?idn=959725504.
Pełny tekst źródłaEllmauthaler, Andreas, i Eric Wernsperger. "Biometric Identification of Mice". Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1135.
Pełny tekst źródłaThe identification of laboratory mice has been an important issue in pharmaceutical applications ever since tests have been performed on animals. As biometric identification has become an increasingly important issue over the past decade, attempts are underway to replace traditional identification methods, which are mostly invasive and limited in code space. This thesis discusses a project that aims at identifying mice by biometrically examining the blood vessel patterns in their ears.
In the proposed algorithm, firstly, the blood vessel structure within the obtained images got enhanced before segmenting the image in blood vessel and non-blood vessel portions. In the next step a sufficient amount of unique feature points got extracted from the segmented image. The obtained feature points were afterwards used for the actual identification procedure.
Out of 20 mice, 18 could be identified successfully using the proposed algorithm.
Brusewitz, Oskar. "Identification: Problem or opportunity?" Thesis, Högskolan i Halmstad, Sektionen för lärarutbildning (LUT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-19905.
Pełny tekst źródłaZhao, Hongdu. "Identification of redundant faults". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0012/MQ28468.pdf.
Pełny tekst źródłaMao, Qian. "Clusters Identification: Asymmetrical Case". Thesis, Uppsala universitet, Informationssystem, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-208328.
Pełny tekst źródłaWangpattanasirikul, Suthipong. "Port-based system identification". Thesis, Massachusetts Institute of Technology, 1996. http://hdl.handle.net/1721.1/39769.
Pełny tekst źródłaKim, Brian A. (Brian Andrew) 1979. "Multi-source human identification". Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29662.
Pełny tekst źródłaIncludes bibliographical references (p. 59-60).
In this thesis, a multi-source system for human identification is developed. The system uses three sources: face classifier, height classifier, and color classifier. In the process of developing this system, classifier combination and the integration of classifer outputs over sequences of data points were studied in detail. The method of classifier combination used relies on weighing classifiers based on the Maximum Likelihood estimation of class probabilities. The integration of classifer outputs, which is termed "temporal integration" in this thesis, has been developed to take advantage of the information implicitly contained in data correlated through time. In all experiments performed, temporal integration has improved classification, up to 40% in some cases. Meanwhile, the method of temporally integrating the outputs of multiple classifiers fused using our classifier weighting method outperforms all individual classifiers in the system.
by Brian A. Kim.
M.Eng.
Chen, Chun-Cheng Richard 1977. "Automated cardiovascular system identification". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/81537.
Pełny tekst źródłaIncludes bibliographical references (p. 64-65).
by Chun-Cheng Chen.
S.B.and M.Eng.
Andrews, Isaiah Smith. "Essays in weak identification". Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90118.
Pełny tekst źródłaCataloged from PDF version of thesis.
Includes bibliographical references (pages 219-228).
Economic researchers and policymakers need reliable tools both to estimate economic relationships and to measure the uncertainty surrounding their estimates. Unfortunately, economic data sometimes contains limited information useful for estimating relationships of interest. In such cases, the statistical techniques commonly used in applied economics can break down and fail to accurately reflect the level of uncertainty present in the data. If they rely on such tools, researchers and policymakers may come away with serious misconceptions about the precision and reliability of their estimates. Econometricians refer to models where the lack of information in the data causes common statistical techniques to break down as weakly identified. In this thesis, I examine several questions relating to weak identification. In the first chapter, I introduce the class of conditional linear combination tests. These tests control size under weak identification and have a number of optimality properties in a conditional problem. I suggest using minimax regret conditional linear combination tests and propose a computationally tractable class of tests that plug in an estimator for a nuisance parameter. In the second chapter, I consider the problem of detecting weak identification. When weak identification is a concern researchers frequently calculate confidence sets in two steps, first assessing the strength of identification and then deciding whether to use an identification-robust confidence set. Two-step procedures of this sort may generate highly misleading confidence sets, and I demonstrate that two-step confidence sets based on the first stage F-statistic can have extremely poor coverage in linear instrumental variables models with heteroskedastic errors. I introduce a simple approach to detecting weak identification and constructing two-step confidence sets which controls coverage distortions. In the third chapter, joint with Anna Mikusheva, we consider minimum distance statistics and show that in a broad class of models the problem of testing under weak identification is closely related to the problem of testing a "curved null" in a finite-sample Gaussian model. Using the curvature of the model, we develop new finite-sample bounds on the distribution of minimum-distance statistics, which we show can be used to detect weak identification and to construct tests robust to weak identification.
by Isaiah Smith Andrews.
Ph. D.
Fei, Ran. "Pedestrian detection and identification". Thesis, Imperial College London, 2014. http://hdl.handle.net/10044/1/24902.
Pełny tekst źródłaBennia, Abdelhak. "Mimo systems parameters identification". Thesis, Virginia Tech, 1986. http://hdl.handle.net/10919/41579.
Pełny tekst źródłaIn this thesis, a presentation of a new canonical representation of multi-input multioutput systems is given. The new characterization covers the full range of practical situations in linear systems according to the structural properties and model of the perturbations which are known. Its direct link to ARMA processes as well as to classical state space representation ls also given.
The importance of the new representation lies in the fact that all unknown parameters and state variables appear linearly multlplied by either external variables (inputs and outputs) that appear in the data record, or by matrices that are only composed of ieroes and ones. This property enables us to perform a joint state and parameters estimation. Moreover, if the noises are gaussian and their statistics are known, an on-line algorithm that involves a standard dlscrete-time time-varying Kalman filter is proposed and used successfully in the estimation of unknown parameters for simulated examples.
Master of Science
Berdai͏̈, Abdellatif. "Identification de mélanges gaussiens". Toulouse 3, 1994. http://www.theses.fr/1994TOU30190.
Pełny tekst źródłaProschailo, A., i S. Poltavets. "Personal identification. Fingerprint recognition". Thesis, Видавництво СумДУ, 2012. http://essuir.sumdu.edu.ua/handle/123456789/26024.
Pełny tekst źródłaBrandt, Hjertstedt Eleonor. "Cybercrime Using Electronical Identification". Thesis, Malmö universitet, Fakulteten för hälsa och samhälle (HS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-26561.
Pełny tekst źródłaThis thesis investigates the threats against electronical identification, more specifically the danger that comes with the device BankID in Sweden. Today BankID is widely used but electronical identification also comes with certain security risks regarding identity related crimes. In Sweden, the crime type which increased the most last year 2018 measured in reported crimes was fraud mainly committed through information technology. This thesis therefore aim to investigate what the safety risks are using electronical identification, such as BankID and how the police force and Swedish Economic Crime Authority combat cybercrimes in this area. The result show that the main security risk with BankID is the customers that can be deceived. Perpetrators use different methods to get access to another individuals BankID. Regarding how the police force and Swedish Economic Crime Authority combat crimes against electronical identification, the result is partly defective due to that the Swedish Economic Crime Authority not being represented in this thesis. However, from the police perspective, they investigate fraud regarding BankID as all other crimes but it has in general a lower priority within the authority. The police cooperate with different actors and help both with development of the product security and inform customers about safety and risks regarding BankID.
Jaber, Mohamad. "Internet traffic profiling identification". Nice, 2011. http://www.theses.fr/2011NICE4085.
Pełny tekst źródłaThe evolution of the Internet in the last few year has been characterized by dramatic changes in the way users behave, interact and utilize the network. This was accompanied by the introduction of new categories of applications such as network games and peer-to-peer services. One of the most important challenges for network administrators and ISPs is then becoming the identification of Internet traffic applications in order to protect their resources from unwanted traffic and to prioritize some major applications. Statistical methods are preferred to port-based ones and deep packet inspection since they donât rely on the port number and they also work for encrypted traffic. Theses methods combine the statistical analysis of the application packet flow parameters, such as packet size and inter-packet time, with machine learning techniques. However, the majority of these statistical methods cannot identify flows early and require reaching the end of flows before taking any decision which is considered as too late for network administrators ; indeed they do not provide means to stop an Internet flow or to give it a special quality of service early in its lifetime. Another important challenge for network administrators is to detect and diagnose key network changes as a long-term congestion, a rerouting, a link failure or any other even causing a shift in network delays. In the literature there is a huge amount of anomaly detection methods but most of them require exhaustive measurements to function properly. Reducing the load of network-wide monitoring is always a vital need for network administrators. In this thesis we present several contributions around Internet traffic identification and network-wide anomaly detection. In the first part we present three methods we have developed in order to identify accurately and on the fly the Internet traffic. The first method is a new online iterative probabilistic method that identifies applications quickly and accurately by only using the size of the first N packets. The second method enhances the first one with the inter-packet time in order to identify Internet traffic, this has required the introduction of a model to isolate the noise due to network conditions and to extract the time generated by the applications themselves. Our third method is a new online method for traffic classification that combines the statistical and host-based approaches in order to construct a robust and precise method for early Internet traffic identification. We use the packet size as the main feature for the classification and we benefit from the traffic profile of the host (i. E. Which application and how much) to decide in favour of this or that application. In the second part of this thesis, we aboard the problem of network-wide anomaly detection. We start by making a study about the stability of Internet coordinate systems (especially Vivaldi). In a first stage we confirm the fact that Vivaldi coordinates are most of the time correlated with each other pointing to a stable cluster of nodes seen from inside the network. In a second stage, we present a new clustering algorithm based on the data mining Hierarchical Grouping method to identify this cluster of stable nodes. Finally, we highlight the utility of such finding with and application that tracks changes in network delays. By changing artificially the network delays in different scenarios, we show that these changes are easily reflected by this body of stable nodes, hence allowing to obtain a global picture about the stability of the underlying network without the need for exhaustive delay measurements
Oliveira, Marco Alexandre Rodrigues. "Object identification within images". Master's thesis, Universidade de Aveiro, 2009. http://hdl.handle.net/10773/2142.
Pełny tekst źródłaO aumento de conteúdo digital armazenado em bases de dados é acompanhado por uma elevada importância atribuída à disponibilização de métodos eficientes para a sua pesquisa. No caso da pesquisa de imagens, esta é, normalmente, realizada através de “keywords”, o que, nem sempre garante resultados satisfatórios, uma vez que as “imagens estão para além das palavras”. Para melhorar este tema é necessário avaliar o conteúdo de cada imagem. Este trabalho propõem-se a divulgar um sistema que, inicialmente, de todas as imagens presentes numa base de dados, obtenha um conjunto de elevada qualidade para posterior processamento. Este método baseia-se na analise do histograma de cada imagem e respectiva distribuição dos contornos de cada objecto presente na mesma. A este conjunto de imagens obtido, para cada instância, são extraídas características que a identifiquem. Este passo, baseia-se na segmentação de imagens e classificação de características através de uma rede neuronal. Para testar a eficiência do método apresentado nesta tese, é feita a comparação entre as características de cada imagem com as restantes, e respectiva devolução de uma lista de imagens, ordenada por ordem decrescente de semelhança. Os nossos resultados provam que o nosso sistema pode produzir melhores resultados do que alguns sistemas existentes. ABSTRACT: The rise of digital content stored in large databases increased the importance of efficient algorithms for information retrieval. These algorithms are, usually, based on keywords which, for image retrieval, do not work properly, since “images are beyond words”. In order to improve image retrieval it is necessary to analyze the contents of each image. This work proposes a system that, firstly, will get a subset of high quality images from the entire database, which will help in further processing. This first method is based in the histogram and edge analysis. In a next method, for each element of the image set obtained, features are extracted. These features will identify each image in the database. In this step, an image segmentation technique and a classification with a neural network are used. This feature extraction process is tested doing comparison between each image features and all the target ones. Each image is associated with a list of images ordered by a similarity level, which allows us to conclude that our system produces better results than some other systems available.