Дисертації з теми "Context control"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Context control".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Belotti, Rudi. "SOPHIE: context modelling and control." Zürich : ETH, Eidgenössische Technische Hochschule Zürich, Global Information Systems Group, 2004. http://e-collection.ethbib.ethz.ch/show?type=dipl&nr=126.
Повний текст джерелаVetter, Philipp. "Context estimation in sensorimotor control." Thesis, University College London (University of London), 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368950.
Повний текст джерелаAlmutairi, Abdulgader. "Context-aware and adaptive usage control model." Thesis, De Montfort University, 2013. http://hdl.handle.net/2086/9592.
Повний текст джерелаWang, Kaining. "Context-based coalition access control for ubiquitous computing." Thesis, University of Ottawa (Canada), 2006. http://hdl.handle.net/10393/27193.
Повний текст джерелаSaleem, Ahmad Nadeem. "Control, conflict, and motivation in socio-cultural context." Thesis, Middlesex University, 1998. http://eprints.mdx.ac.uk/8019/.
Повний текст джерелаAhmed, Ali Ahmed Ali. "Context-aware access control in ubiquitous computing (CRAAC)." Thesis, University of Manchester, 2010. https://www.research.manchester.ac.uk/portal/en/theses/contextaware-access-control-in-ubiquitous-computing-craac(1eaa4390-7062-4af5-8aa5-d645d91fa547).html.
Повний текст джерелаNguyen, Tammy. "Context-aware access control in pervasive computing environments." Online access for everyone, 2005. http://www.dissertations.wsu.edu/Thesis/Summer2005/t%5Fnguyen%5F061005.pdf.
Повний текст джерелаAwwad, Tarek. "Context-aware worker selection for efficient quality control in crowdsourcing." Thesis, Lyon, 2018. http://www.theses.fr/2018LYSEI099/document.
Повний текст джерелаCrowdsourcing has proved its ability to address large scale data collection tasks at a low cost and in a short time. However, due to the dependence on unknown workers, the quality of the crowdsourcing process is questionable and must be controlled. Indeed, maintaining the efficiency of crowdsourcing requires the time and cost overhead related to this quality control to stay low. Current quality control techniques suffer from high time and budget overheads and from their dependency on prior knowledge about individual workers. In this thesis, we address these limitation by proposing the CAWS (Context-Aware Worker Selection) method which operates in two phases: in an offline phase, the correlations between the worker declarative profiles and the task types are learned. Then, in an online phase, the learned profile models are used to select the most reliable online workers for the incoming tasks depending on their types. Using declarative profiles helps eliminate any probing process, which reduces the time and the budget while maintaining the crowdsourcing quality. In order to evaluate CAWS, we introduce an information-rich dataset called CrowdED (Crowdsourcing Evaluation Dataset). The generation of CrowdED relies on a constrained sampling approach that allows to produce a dataset which respects the requester budget and type constraints. Through its generality and richness, CrowdED helps also in plugging the benchmarking gap present in the crowdsourcing community. Using CrowdED, we evaluate the performance of CAWS in terms of the quality, the time and the budget gain. Results shows that automatic grouping is able to achieve a learning quality similar to job-based grouping, and that CAWS is able to outperform the state-of-the-art profile-based worker selection when it comes to quality, especially when strong budget ant time constraints exist. Finally, we propose CREX (CReate Enrich eXtend) which provides the tools to select and sample input tasks and to automatically generate custom crowdsourcing campaign sites in order to extend and enrich CrowdED
Crump, Matthew John Charles Milliken Bruce. "Context-specific learning and control: An instance based view of flexible online control." *McMaster only, 2007.
Знайти повний текст джерелаProuzeau, Arnaud. "Collaboration around wall displays in command and control contexts." Thesis, Université Paris-Saclay (ComUE), 2017. http://www.theses.fr/2017SACLS544/document.
Повний текст джерелаIn this thesis, I study the benefits of collaboration in front of Ultra-High ResolutionInteractive Wall Displays (UHRWD). I focus on the specific collaborative context of control rooms.Visits of control rooms and interviews with operators show that different degrees of collaboration arerequired in function of the situation. I believe that a UHRIWD could be beneficial in situations whenclose collaboration is needed. I first show that wall display encourages close collaboration comparedto multiple separate displays. Then I show that the interaction techniques can also influence thedegree of collaboration, for instance, a technique with a large visual footprint also encourages a closecollaboration. I apply this in the design of technique to visualize road traffic forecast on a wall displayfor road traffic control centres. Finally, I propose techniques to help the transition between thedifferent setups of a control room: the workstations and the wall display
Rölli, Marc. "Power Regimes of Control: Remarks on their Neoliberal Context." Universität Leipzig, 2020. https://ul.qucosa.de/id/qucosa%3A72861.
Повний текст джерелаArnaut, Lynn Y. "An evaluation of display/control gain in the context of control-display interface optimization." Diss., Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/49978.
Повний текст джерелаPh. D.
incomplete_metadata
Bhatia, Nupur. "Policy Management in Context-Aware Networks." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92015.
Повний текст джерелаAmbient Network är ett EU-finansierat project inom det 6:e ramprogrammet.Projektets mål är att möjliggöra samarbete mellan heterogena nätverk, som använderbåde dagens men även framtidens trådlösa teknologier, för att minimeraslutanvändarens insats för att nå den tjänst de är intresserade av – oberoende av platseller vilket nätverk de använder. På grund av den stora delen av mobila användaresom kräver omedelbar och dynamisk tillgång till tjänster måste dessa nätverk gåsamman ’on the fly’ utan tidigare konfigurering.Användningen av context information i Ambient Networks kan elmininera behovet avförkonfigurering av nätverk, följaktligen blir de då autonoma. Dock, ett problem somuppkommer med detta är att den fria och okontrollerade spridningen av contextinformation bryter integriteten för deltagarna. Det är väldigt viktigt att ta itu med dettaproblem för att kunna kontrollera vilka som har tillgång till vilken contextinformation. Den här kontrollen kan uppnås genom väldefinierade policies. Dettaskapar ett behov av ett ramverk inom ContextWare arkitekturen för att skydda dentillgängliga context informationen. Den här uppsatsen är en del i ansträngningen att skapa en policy baserad infrastrukturför attestering av tillgång till context information inom Ambient Networks. Uppsatsenundersöker och designar en arkitektur för ett policy handhavande system som ärbaserat på OASIS XACML, den bygger vidare på arkitekturen för handhavande avcontext information i Ambient Networks. Utöver policy hantering inom ett ambientnetwork skapas också policy hantering mellan ambient networks när de förenas. Denframtagna arkitekturen är därefter implementerad för att visa på konceptets hållbarhet. En sammanslagning av två policy handhavande system när två nätverk slås ihop ärbehandlat endast i teorin, det är inte implementerat. Designen utvärderas genom att köra test på den implementerade versionen ochdärefter analysera och visa resultaten i rapporten. Dessa test innehåller mätningar avfördröjningen av en enda begäran samt flera, responstiden i ett system med policyhanteringjämfört med utan samt prestandan i ett policy-hanteringssystem med en litenmängd policies jämfört med en större mängd policies.
Matos, Ricardo Jorge Magalhães de. "Context-based wireless mesh networks." Doctoral thesis, Universidade de Aveiro, 2013. http://hdl.handle.net/10773/12450.
Повний текст джерелаIn the modern society, new devices, applications and technologies, with sophisticated capabilities, are converging in the same network infrastructure. Users are also increasingly demanding in personal preferences and expectations, desiring Internet connectivity anytime and everywhere. These aspects have triggered many research efforts, since the current Internet is reaching a breaking point trying to provide enough flexibility for users and profits for operators, while dealing with the complex requirements raised by the recent evolution. Fully aligned with the future Internet research, many solutions have been proposed to enhance the current Internet-based architectures and protocols, in order to become context-aware, that is, to be dynamically adapted to the change of the information characterizing any network entity. In this sense, the presented Thesis proposes a new architecture that allows to create several networks with different characteristics according to their context, on the top of a single Wireless Mesh Network (WMN), which infrastructure and protocols are very flexible and self-adaptable. More specifically, this Thesis models the context of users, which can span from their security, cost and mobility preferences, devices’ capabilities or services’ quality requirements, in order to turn a WMN into a set of logical networks. Each logical network is configured to meet a set of user context needs (for instance, support of high mobility and low security). To implement this user-centric architecture, this Thesis uses the network virtualization, which has often been advocated as a mean to deploy independent network architectures and services towards the future Internet, while allowing a dynamic resource management. This way, network virtualization can allow a flexible and programmable configuration of a WMN, in order to be shared by multiple logical networks (or virtual networks - VNs). Moreover, the high level of isolation introduced by network virtualization can be used to differentiate the protocols and mechanisms of each context-aware VN. This architecture raises several challenges to control and manage the VNs on-demand, in response to user and WMN dynamics. In this context, we target the mechanisms to: (i) discover and select the VN to assign to an user; (ii) create, adapt and remove the VN topologies and routes. We also explore how the rate of variation of the user context requirements can be considered to improve the performance and reduce the complexity of the VN control and management. Finally, due to the scalability limitations of centralized control solutions, we propose a mechanism to distribute the control functionalities along the architectural entities, which can cooperate to control and manage the VNs in a distributed way.
Na sociedade actual, novos dispositivos, aplicações e tecnologias, com capacidades sofisticadas, estão a convergir na mesma infra-estrutura de rede. Os utilizadores são também cada vez mais exigentes nas suas preferências e expectativas pessoais, desejando conetividade `a Internet em qualquer hora e lugar. Estes aspectos têm desencadeado muitos esforços de investigação, dado que a Internet atual está a atingir um ponto de rutura ao tentar promover flexibilidade para os utilizadores e lucros para os operadores, enquanto lida com as exigências complexas associadas `a recente evolução. Em sintonia com a linha de investigação para a Internet do futuro, muitas soluções têm sido propostas para melhorar as arquiteturas e protocolos da Internet atual, de forma a torná-los sensíveis ao contexto, isto é, adaptá-los dinamicamente `a alteração da informação que caracteriza qualquer entidade de rede. Neste sentido, a presente Tese propõe uma nova arquitetura que permite criar várias redes com diferentes características de acordo com o contexto das mesmas, sobre uma única rede em malha sem fios (WMN), cuja infra-estructura e protocolos são muito flexíveis e auto-adaptáveis. Mais especificamente, esta Tese modela o contexto dos utilizadores, que pode abranger as suas preferências de segurança, custo e mobilidade, capacidades dos seus dispositivos ou requisitos de qualidade dos seus serviços, de forma a transformar uma WMN num conjunto de redes lógicas. Cada rede lógica ´e configurada para satisfazer um conjunto de necessidades de contexto do utilizador (como exemplo, suporte de mobilidade elevada e de baixa seguran¸ca). Para implementar esta arquitetura centrada no utilizador, esta Tese utiliza a virtualização de redes, que tem muitas vezes sido defendida como um meio para implementar arquiteturas e serviços de rede de uma forma independente, enquanto permite uma gestão dinâmica dos recursos. Desta forma, a virtualização de redes pode permitir uma configuração flexível e programável de uma WMN, a fim de ser partilhada por várias redes lógicas (ou redes virtuais - VNs). Além disso, o grau de isolamento introduzido pela virtualização de redes pode ser utilizado para diferenciar os protocolos e mecanismos de cada VN baseada em contexto. Esta arquitetura levanta vários desafios para controlar e gerir as VNs em tempo real, e em resposta `a dinâmica dos utilizadores e da WMN. Neste contexto, abordamos os mecanismos para: (i) descobrir e selecionar a VN a atribuir a um utilizador; (ii) criar, adaptar e remover as topologias e rotas das VNs. Também exploramos a possibilidade de considerar a taxa de variação dos requisitos de contexto dos utilizadores de forma a melhorar o desempenho e reduzir a complexidade do controlo e gestão das VNs. Finalmente, devido ´as limitações de escalabilidade das soluções de controlo centralizadas, propomos um mecanismo para distribuir as funcionalidades de controlo ao longo das entidades da arquitectura, que podem cooperar para controlar e gerir as VNs de uma forma distribuída.
Schäfer, Dirk. "Context-sensitive speech recognition in the air traffic control simulation." [S.l. : s.n.], 2000. http://deposit.ddb.de/cgi-bin/dokserv?idn=961514280.
Повний текст джерелаTheodoulis, Spilios. "Robust Control in a Nonlinear Context for Large Operating Domains." Phd thesis, Université Paris Sud - Paris XI, 2008. http://tel.archives-ouvertes.fr/tel-00352237.
Повний текст джерелаCette stratégie est basée sur une pré-compensation (loop shaping) faite à partir des systèmes linéarisés du système non-linéaire autour d'un petit nombre de points de fonctionnement en utilisant des compensateurs de structure simple (e.g. PID), et de plus en utilisant une compensation additionnelle/corrective type retour de sortie H1 statique. Les points de fonctionnement de la deuxième compensation sont calculés à l'aide d'un algorithme de choix de points de synthèse basé sur la connexion des théories de la gap métrique et de la commande H1 par loop shaping. La loi de commande globale non-linéaire séquencée est finalement obtenue en utilisant une interpolation de tous les gains des com-pensateurs impliqués pendant la phase de synthèse.
La méthode proposée ici est validée sur deux exemples d'application : le pilotage autour de l'axe de tangage d'un missile fortement manœuvrant et d'un véhicule de rentrée atmosphérique. Les deux autopilotes sont testés de façon intensive en utilisant des simulations non-linéaires, une analyse Monte Carlo et linéaire à temps figé afin de démontrer leurs excellentes caractéristiques en termes de performance et de robustesse.
Shiller, Douglas M. "Understanding speech motor control in the context of orofacial biomechanics." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=84435.
Повний текст джерелаIn the first experiment, empirical and modeling studies were carried out to examine whether the nervous system compensates for naturally occurring forces acting on the jaw during speech. As subjects walk or run, loads to the jaw vary with the direction and magnitude of head acceleration. While these loads are large enough to produce a measurable effect on jaw kinematics, variation in jaw position during locomotion is shown to be substantially reduced when locomotion is combined with speech. This reduction in jaw motion is consistent with the idea that in speech, the control of jaw movement is adjusted to offset the effects of head acceleration. Results of simulation studies using a physiologically realistic model of the jaw provide further evidence that subjects compensate for the effects of self-generated loads by adjusting neural control signals.
A second experiment explores the idea that a principle mechanical property of the jaw---its spring-like behavior, or stiffness---might influence patterns of kinematic variation in speech movements. A robotic device was used to deliver mechanical perturbations to the jaw in order to quantify stiffness in the mid-sagittal plane. The observed stiffness patterns were non-uniform, with higher stiffness in the protrusion-retraction direction. Consistent with the idea that kinematic patterns reflect directional asymmetries in stiffness, a detailed relationship between jaw kinematic variability and stiffness was observed---kinematic variability was consistently higher under conditions in which jaw stiffness was low. Modeling studies suggested that the pattern of jaw stiffness is significantly determined by jaw geometrical properties and muscle force generating abilities.
A third experiment examines the extent to which subjects are able to alter the three-dimensional pattern of jaw stiffness in a task-dependent manner. Destabilizing loads were applied to the jaw in order to disrupt the ability of subjects to maintain a static jaw posture. Subjects adapted by increasing jaw stiffness in a manner that depended on the magnitude and, to a more limited extent, direction of the destabilizing load. The results support the idea that stiffness properties can be controlled in the jaw, and thus may play a role in regulating mechanical interactions in the orofacial system.
Rayner, Danielle. "Informal social control in the context of deindustrialisation and disinvestment." Thesis, Cardiff University, 2013. http://orca.cf.ac.uk/52677/.
Повний текст джерелаPetchchedchoo, Pattanant. "Management Control Systems (MCS) in the Context of Knowledge Management." Thesis, University of Manchester, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.508826.
Повний текст джерелаBeyl, Tim [Verfasser]. "Workflow-based Context-aware Control of Surgical Robots / Tim Beyl." München : Verlag Dr. Hut, 2016. http://d-nb.info/1084385694/34.
Повний текст джерелаLynch, Clifford. "The New Context for Bibliographic Control In the New Millennium." the Library of Congress, 2000. http://hdl.handle.net/10150/105464.
Повний текст джерелаVile, Matthew. "Gun Control Policy Preference in Context: A Contextually Sensitive Model of Gun Control Policy Preferences." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/332.
Повний текст джерелаBandeira, Junior Marcos. "CONTROLE DE ACESSO A RECURSOS COMPUTACIONAIS DE FORMA FLEXÍVEL E DINÂMICA ATRAVÉS DE CONTEXTO." Universidade Federal de Santa Maria, 2010. http://repositorio.ufsm.br/handle/1/8139.
Повний текст джерелаA model of access control aims to limit the actions that a User can have legitimate in a system. Its purpose is to improve security by ensuring the properties of integrity and confidentiality. The model of access control is considered standard based on profiles or roles. The profiles are functions that the User can exercise and access permissions to objects are associated with a profile according to their function. The model-based profiles can not take into account aspects of the environment where the access occurs, it limits the possibilities of establishing policies for the most comprehensive security accompanying the scenario of technological change. Models that extend the model-based profiles have been proposed, there are settings in them that make possible the mapping of the environment where the access occurs, also called context, however, there is no consensus on the representation of context and security policies demonstrated by definitions of these models are specific to their use cases. This work presents a model based access control in context expressions CABEC. This model has definitions based on models that extend the model based on profiles, however, shows the construction of security policies for different domains. Security policies built with the CABEC take into account dynamic information environment and their combinations. These aspects are important because they increase the wealth of security policies and flexibility in its construction. The dynamic aspects of context refers to information the moment of interaction, are given as time intervals, number of simultaneous access, physical access, location. The aspect of flexibility in policy construction comes from the possibility of the security manager to choose the amount of rules and combinations thereof, can build a policy that takes into account the rule of office hours combined with the role that the subject is exerting at the time, or simply considering a rule that takes into account only its location. With a model of access control that takes into account dynamic information and their combination increases the security and, consequently, the gain in productivity in relation to ownership of availability of services, data and computing resources.
Um modelo de controle de acesso tem o objetivo de limitar as ações que um usuário legítimo pode exercer em um sistema. Sua finalidade é melhorar a segurança garantindo as propriedades de integridade e confidencialidade. O modelo de controle de acesso considerado padrão é o baseado em perfis ou papéis. Os perfis são funções que o usuário pode exercer e as permissões de acesso a objetos são associadas a um perfil de acordo com a sua função. O modelo baseado em perfis não consegue levar em conta aspectos do ambiente onde ocorre o acesso, isso limita as possibilidades de construção de políticas de segurança mais abrangentes que acompanhem o cenário da evolução tecnológica. Modelos que estendem do modelo baseado em perfis foram propostos, neles existem definições que tornam possível o mapeamento do ambiente onde ocorre o acesso, também chamado de contexto, porém, não existe um consenso em relação à representação do contexto e as políticas de segurança demonstradas pelas definições desses modelos são específicas para seus casos de uso. Esse trabalho apresenta um modelo de controle de acesso baseado em expressões de contexto CABEC. Tal modelo possui definições baseadas nos modelos que estendem o modelo baseado em perfis, porém, demonstra a construção de políticas de segurança para domínios diferentes. As políticas de segurança construídas com o CABEC levam em consideração informações dinâmicas do ambiente e suas combinações. Esses aspectos são importantes, pois aumentam a riqueza das políticas de segurança e a flexibilidade na sua construção. Os aspectos dinâmicos do contexto se referem a informações do instante da interação, são dados como intervalos de tempo, quantidade de acessos simultâneos, meio físico de acesso, localização. O aspecto da flexibilidade na construção das políticas vem da possibilidade do gerente de segurança escolher a quantidade de regras e suas combinações, pode construir uma política que leve em conta a regra de horário de expediente combinada com a função que o sujeito está exercendo naquele momento, ou simplesmente considerar uma regra que leva em conta somente sua localização. Com um modelo de controle de acesso que leva em conta informações dinâmicas e suas combinações aumenta-se a segurança e, conseqüentemente, se ganha em produtividade em relação à propriedade de disponibilidade de serviços, dados e recursos computacionais.
Devlic, Alisa. "Context-addressed communication dispatch." Licentiate thesis, KTH, Communication Systems, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-10282.
Повний текст джерелаThis research concerns exploiting knowledge of the user's environment (i.e., context information) to enrich a user's communication making it more personal, by ensuring that the user receives only relevant messages and calls in his/her current context, and to facilitate more opportunities for communication interactions with people that are in the same context and that share the same interests as this user. We describe in this licentiate thesis the concepts of context-addressed messaging and context-aware session control that enable users to: (1) send messages to others based on their context, rather than their network address and (2) to initiate, adapt, and terminate user's communication sessions based on this user's current context, respectively. These concepts address questions such as: how to discover, select, and switch to an optimal communication means to meet varying user, contextual, communication, and device resource requirements and preferences. A key to solving these problems is to create a representation of the user's context-dependent preferences and to process the user's context-dependent preferences which are part of context triggers. These context triggers can initiate a communication event upon a particular context update. Additionally, in order to provide the described context-aware communication functions, these mechanisms need timely access to the acquired (desired) context information. This in turn raises a plethora of other questions, such as how to discover sensors that provide the desired context information; how to acquire raw context data from these sensors; how to abstract, process, and model this data to become "understandable" to applications and system components; and how to distribute this context to applications that are running on different nodes.
This research is split into three different parts. The first part concerns investigating and implementing context management functions. As part of this research we propose a novel approach for context synthesis using context operators. We also propose a design architecture for context-aware middleware that mediates between the sensors and applications, and that is able to share and retrieve context from other nodes in the network. The second part of our research concerns our proposed mechanism for context-addressed messaging. To implement this mechanism we designed our own message format, called the Common Profile for Context-Addressed Messaging (CPCAM) that is able to use any high level context to compose a context-based address. Additionally, we proposed to use context-based filtering to find the correct message recipients and determine if this message is relevant to these potential message recipients in their current context, as well as to deliver this message to the recipients' preferred device that is adapted using their preferred communication means. At the end of this second part we design context-addressed messaging system operations on top of a SIP and SIMPLE-based network infrastructure. The third part of our research describes context-aware session control mechanisms using context switch and context trigger constructs. A context-switch selects an action from a set of context-dependent actions upon an incoming communication event based on the receiver's current context. In contrast, a context trigger initiates an action based on a context update and the user's preferences that are specified in this updated context. This part illustrates in several examples the context-aware session control mechanisms, i.e. the initiation of a communication session based on the match of a user's preferences and current context, as well as adaptation and (if necessary) termination of an ongoing communication session based upon the user's context-dependent preferences.
The research leading to this licentiate has created network and system level models necessary for implementation of a context-addressed communication system that would enable users to easily design their own personalized, context-aware communication services. The necessary constructs and properties of these models are designed and analyzed in the thesis, as well as in conference papers and other documents published in the process of doing the research for this thesis. A number of remaining open issues and challenges have been outlined as part of the future work.
EU FP6 MIDAS (Middleware Platform for Developing and Deploying Advanced Mobile Services)
EU FP6 MUSIC (Self-adapting Applications for Mobile Users In Ubiquitous Computing Environments)
Lam, Yu-chau. "A study of the drainage policy in the context of flood prevention in Hong Kong." Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B21036688.
Повний текст джерелаLI, ZHEN. "Control Flow Graph Based Attacks : In the Context of Flattened Programs." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155770.
Повний текст джерелаKalalas, Charalampos. "Enabling LTE for Control System Applications in a Smart Grid Context." Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-150344.
Повний текст джерелаLeslin, Jelin. "Hardware Acceleration in the Context of Motion Control for Autonomous Systems." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-288854.
Повний текст джерелаTillståndsberäkningsfilter är beräkningsintensiva block som används för att beräkna osäkra / okända tillståndsvärden från bullriga / ej tillgängliga sensoringångar i autonoma system. Ingångarna till manöverdonen beror på filterens utgång och därför måste schemaläggningen av filtret ske med mycket små tidsintervall. Syftet med denna avhandling är att undersöka möjligheten att använda hårdvaruacceleratorer för att utföra denna beräkning. För att göra en jämförande studie utvecklades och implementerades 3 filter som förutsäger information om 4, 8 och 16 tillstånd i realtid med applikationsändamålen CPU, NVIDIA Quadro och Turing GPU, och Xilinx FPGA programmerbar logik. Exekvering, minnesöverföringstid och den totala utvecklingstiden för att förverkliga logiken i båda hårdvarorna diskuteras. CUDAs utvecklingsmiljö användes för GPU-implementeringen och Vivado HLS med SDSoc-miljö användes för FPGA-implementering. Avhandlingen drar slutsatsen att en hårdvaru-accelerator behövs om filtret uppskattar information om mer än 16 tillstånd även om processorn är helt dedikerad för beräkning av filterlogik. För 4 och 8 tillståndsfilter, visar processorn liknande prestanda som en accelerator. Men i realtid är processorn hjärnan i systemet; så den måste ge instruktioner till många andra funktioner parallellt. I en sådan miljö kommer processorns instruktioner och datacacher att störas och det kommer att bli en fluktuation i exekveringstiden för filtret för varje iteration. För detta beräknas och diskuteras de bästa och värsta fallstiderna.
German, Richard Neil. "The role of landscape context in biological control of cereal aphids." Thesis, University of Leeds, 2012. http://etheses.whiterose.ac.uk/4165/.
Повний текст джерелаHill, Dawn Marie. "Contextual (setting/situational) Control of Pro/Anti Environmental Behavior." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/196064.
Повний текст джерелаLehan, Mackin Melissa Ann. "The social context of pregnancy intention." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/3336.
Повний текст джерелаSteinfeld, Michael. "Contextual Control Of Instrumental Actions And Habits Following Retroactive Interference." ScholarWorks @ UVM, 2019. https://scholarworks.uvm.edu/graddis/1041.
Повний текст джерелаYortanli, Ahmet. "A Certificate Based, Context Aware Access Control Model For Multi Domain Environments." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613000/index.pdf.
Повний текст джерелаBlack, Angus Hugh. "Software quality assurance in a remote client/contractor context." Thesis, Rhodes University, 2006. http://hdl.handle.net/10962/d1006615.
Повний текст джерелаZhang, Ni (Jenny). "Preserving individual privacy in context-aware ubiquitous computing environments : an intelligent and distributed agent technology for context-dependent privacy control." Thesis, University College London (University of London), 2008. http://discovery.ucl.ac.uk/1446221/.
Повний текст джерелаFruehauf, Lindsay Morgan. "Cognitive Control and Context Maintenance in Individuals with Obsessive-Compulsive Disorder (OCD)." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8476.
Повний текст джерелаAvdis, Alexandros. "Large eddy simulation of synthetic jets in the context of flow control." Thesis, Imperial College London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.497939.
Повний текст джерелаNaghiyev, Eldar. "Device-free localisation in the context of domestic energy saving control methods." Thesis, University of Nottingham, 2014. http://eprints.nottingham.ac.uk/14314/.
Повний текст джерелаChuluundorj, Zorigtbaatar. "Augmenting Network Flows with User Interface Context to Inform Access Control Decisions." Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1331.
Повний текст джерелаHenderson-Ross, Jodi A. "Informal Social Control in Action: Neighborhood Context, Social Differentiation, and Selective Efficacy." University of Akron / OhioLINK, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=akron1395755045.
Повний текст джерелаGoldberg, Lisa Stephanie. "Understanding Self-Control, Motivation, & Attention in the Context of Eating Behavior." W&M ScholarWorks, 2017. https://scholarworks.wm.edu/etd/1499450056.
Повний текст джерелаHill, Frances Margaret. "An evaluative study of quality circle operation and outcomes in a western context." Thesis, Queen's University Belfast, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.276829.
Повний текст джерелаCarmona, Matthew P. "Controlling the design of private sector residential development : context, practice and innovation." Thesis, University of Nottingham, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243613.
Повний текст джерелаMohamad, Nasri Nurfaradilla. "Reconceptualisation of self-directed learning in a Malaysian context." Thesis, University of Edinburgh, 2016. http://hdl.handle.net/1842/20461.
Повний текст джерелаTaher, Milad A. M. "Taguchi quality by design approach : an investigation within the context of Make-To-Order manufacturing." Thesis, University of Newcastle upon Tyne, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.260977.
Повний текст джерелаSiu, Po-lam Pauline, and 蕭寶琳. "Context-aware state management for supporting mobility in a pervasive environment." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B3147858X.
Повний текст джерелаMcKittrick, Alan. "Inter-organisational management control in the context of transactional business process outsourcing arrangements." Thesis, University of Ulster, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604653.
Повний текст джерелаBeyl, Tim [Verfasser], and H. [Akademischer Betreuer] Wörn. "Workflow-based Context-aware Control of Surgical Robots / Tim Beyl. Betreuer: H. Wörn." Karlsruhe : KIT-Bibliothek, 2015. http://d-nb.info/1081722207/34.
Повний текст джерелаPage, Teneille. "Effortful Control, Attention and Executive Functioning in the Context of Autism Spectrum Disorder." Master's thesis, Faculty of Humanities, 2019. http://hdl.handle.net/11427/30545.
Повний текст джерелаSantin, Joseph M. "Context-dependence of physiological systems: environment-physiology interactions in the respiratory control system." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright149336916471128.
Повний текст джерела