Дисертації з теми "T-schema"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: T-schema.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-43 дисертацій для дослідження на тему "T-schema".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Richards, Daniel J. "Grounding the T-schema." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ61942.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Stampoultzis, Michael. "The use of XML schema and XSLT rules for product information personalization." Thesis, City University London, 2004. http://openaccess.city.ac.uk/8453/.

Повний текст джерела
Анотація:
This thesis describes research carried out in order to help solve the problem of personalization in e-commerce/CRM system. Web-based personalization consists of activities, such as providing customised information, that tailor the user's Web experience- browsing a Web site or purchasing a product, for example-to that user's particular needs. The main research objective of the project is to investigate how XSLT technologies can be used for the development of matching engines that find XML represented products that match the tastes, needs or requirements of customers as captured in customer profiles, also represented in XML. More specifically our research investigates into novel algorithms for transforming XML based product specifications using rules that derive from mining customer profiles with the purpose of customizing the product information.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Darr, Tim, John Hamilton, and Ronald Fernandes. "Design Considerations for XML-Based T&E Standards." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595666.

Повний текст джерела
Анотація:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada
The next generation of telemetry systems will rely heavily on XML-based standards. Multiple standards are currently being developed and reviewed by the T&E community, including iNET's Metadata Description Language (MDL), the XML-version of IRIG 106, Chapter 9 (TMATS XML), the Instrumentation Hardware Abstraction Language (IHAL), and the Data Display Markup Language (DDML). In this paper, we share design considerations for developing XML-based T&E standards, gained from our experiences in designing IHAL and DDML.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Braido, Valentina. "The Notion of Truth through Dialetheism, Deflationism and Fictionalism." Doctoral thesis, Università degli studi di Padova, 2017. http://hdl.handle.net/11577/3424894.

Повний текст джерела
Анотація:
In the present work three different areas about the truth predicate coexist: the semantic area, whose focus is on theories dealing with the solution to the semantic paradoxes that involve the truth predicate; the ontological area, which covers the theories investigating the nature of truth; and the area of discourse, in which the focus is on those theories that analyse how the discourse about the truth predicate has to be understood. The aim of this work is to analyze the consequences arising from certain specific ways in which these areas can interact with each other. The first three chapters expose the main features of the theories corresponding to the three areas about the truth predicate, respectively dialetheism, deflationism and fictionalism. The possible combinations between those theories are the focus of the two following chapters. Finally, a new attempt to account for the liar paradox is provided.
Il presente lavoro interseca tre diversi ambiti concernenti il predicato di verità: l’ambito semantico, che vede al centro le teorie che si occupano della risoluzione dei paradossi semantici che coinvolgono il predicato di verità; quello ontologico, nel quale sono interessate le teorie che si interrogano su quale sia la natura della verità; e l’ambito, per così dire, del discorso, all’interno del quale si muovono le teorie che analizzano in che modo debba essere inteso il discorso riguardo al predicato di verità. Lo scopo di questo lavoro è analizzare le conseguenze che emergono da alcuni specifici modi in cui questi tre ambiti possono interagire tra di loro. Nei primi tre capitoli sono esposte le caratteristiche peculiari delle teorie corrispondenti alle tre aree del predicato di verità, rispettivamente dialeteismo, deflazionismo e finzionalismo. Le possibili combinazioni tra queste teorie saranno l’argomento dei due capitoli successivi. Infine, il lavoro si conclude con un nuovo tentativo di rendere conto del paradosso del mentitore.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Choi, Sul-young. "Maximal (0,1,2,...t)-cliques of some association schemes /." The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487261553059595.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Smiley, W. J. "Collision detection scheme for unmanned aircraft using passive Panospheric§T§M Imaging sensor." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0002/MQ44858.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Sander, Amy Janay Boswell. "Toward an integration of Beck's cognitive theory and Bowlby's attachment theory : self-schema and adult attachment classification in relation to depressive symptoms /." Access restricted to users with UT Austin EID Full text (PDF) from UMI/Dissertation Abstracts International, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3035975.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Rahman, S. M. Hasibur. "IP Multicasting over DVB-T/H and eMBMS : Efficient System Spectral Efficiency Schemes for Wireless TV Distributions." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-18134.

Повний текст джерела
Анотація:
In today’s DVB-T/H (Digital Video Broadcasting-Terrestrial/Handheld) systems, broadcasting is employed, meaning that TV programs are sent over all transmitters, also where there are no viewers. This is inefficient utilization of spectrum and transmitter equipment. IP multicasting is increasingly used for IP-TV over fixed broadband access. In this thesis, IP multicasting is proposed to also be used for terrestrial and mobile TV, meaning that TV programs are only transmitted where viewers have sent join messages over an interaction channel. This would substantially improve the system spectral efficiency (SSE) in (bit/s)/Hz/site, allowing reduced spectrum for the same amount of TV programs. It would even further improve the multiuser system spectral efficiency (MSSE – a measure defined in this study), allowing increased number of TV programs to be transmitted over a given spectrum. Further efficiency or coverage improvement, may be achieved by forming single-frequency networks (SFN), i.e. groups of adjacent transmitters sending the same signal simultaneously, on the same carrier frequency. The combination of multicasting and SFNs is also the principle of eMBMS (evolved Multicast Broadcast Multimedia Service) for cellular mobile TV over 4G LTE. PARPS (packet and resource plan scheduling) is an optimized approach to dynamically forming SFNs that is employed in this study. The target applications are DVB-T/H and eMBMS. Combining SFNs with non-continuous transmission (switching transmitters on and off dynamically) may give even further gain, and is used in LTE, but is difficult to achieve in DVB-T/H. Seven schemes are suggested and analyzed, in view to compare unicasting, multicasting and broadcasting, with or without SFN, with or without PARPS, and with or without continuous transmission. The schemes are evaluated in terms of coverage probability, SSE and MSSE. The schemes are simulated in MATLAB for a system of 4 transmitters, with random viewer positions. Zipf-law TV program selection is employed, using both a homogeneous and heterogeneous user behavior model. The SFN schemes provide substantially better system spectral efficiency compared to the multi-frequency networks (MFN) schemes. IP multicasting over non-continuous transmission dynamic SFN achieves as much as 905% and 1054% gain respectively in system spectral efficiency and multiuser system  spectral efficiency, from broadcasting over MFN, and 425% and 442% gain respectively from  IP multicasting over MFN, for heterogeneous fading case. Additionally, the SFN schemes gives a diversity gain of 3 dB over MFN, that may be utilized to increase the coverage probability by 4.35% for the same data rate, or to increase the data rate by 27 % for the same coverage as MFN.   Keywords: IP multicasting, broadcasting, coverage probability, system spectral efficiency, multiuser system spectral efficiency, DVB-T/H, eMBMS, mobile TV, IP-TV, SFN, MFN, Dynamic SFN, PARPS, homogeneous, heterogeneous, zipf-law
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hackl, Daniela [Verfasser], Michael [Akademischer Betreuer] Schemann, Dirk [Akademischer Betreuer] Haller, and Anne [Akademischer Betreuer] Krug. "Influence of toll-like receptor ligands on the generation and function of regulatory T cells / Daniela Hackl. Gutachter: Dirk Haller ; Anne Krug ; Michael Schemann. Betreuer: Michael Schemann." München : Universitätsbibliothek der TU München, 2012. http://d-nb.info/1031514872/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Heid, Irina [Verfasser], Michael [Akademischer Betreuer] Schemann, Bernhard [Akademischer Betreuer] Küster, and Jens T. [Akademischer Betreuer] Siveke. "Molecular carcinogenesis, development of new therapeutic strategies and multimodal imaging in murine endogenous pancreatic cancer / Irina Heid. Gutachter: Bernhard Küster ; Jens T. Siveke ; Michael Schemann. Betreuer: Michael Schemann." München : Universitätsbibliothek der TU München, 2013. http://d-nb.info/1038526825/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Conrad, Heinke [Verfasser], Helga [Akademischer Betreuer] Bernhard, Christian [Akademischer Betreuer] Peschel, and Michael [Akademischer Betreuer] Schemann. "Generierung von zytotoxischen T-Zellen gegen das tumorassoziierte Antigen HER2 / Heinke Conrad. Gutachter: Christian Peschel ; Michael Schemann. Betreuer: Helga Bernhard." München : Universitätsbibliothek der TU München, 2006. http://d-nb.info/1058141406/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Grüner, Barbara Maria [Verfasser], Angelika [Akademischer Betreuer] Schnieke, Michael [Akademischer Betreuer] Schemann, and Jens T. [Akademischer Betreuer] Siveke. "Molecular and proteomic analysis of signaling pathways in pancreatic ductal adenocarcinoma using genetically engineered mouse models / Barbara Maria Grüner. Gutachter: Angelika Schnieke ; Jens T. Siveke ; Michael Schemann. Betreuer: Michael Schemann." München : Universitätsbibliothek der TU München, 2012. http://d-nb.info/1031512365/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Yomsatieankul, Warisa [Verfasser], and T. [Akademischer Betreuer] Sonar. "High-Order Non-Oscillatory Schemes Using Meshfree Interpolating Moving Least Squares Reconstruction for Hyperbolic Conservation Laws / Warisa Yomsatieankul ; Betreuer: T. Sonar." Braunschweig : Technische Universität Braunschweig, 2010. http://d-nb.info/1175827363/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Schmees, Christian [Verfasser], Christian [Akademischer Betreuer] Prinz, Dirk [Akademischer Betreuer] Haller, and Michael [Akademischer Betreuer] Schemann. "Hemmung der Proliferation von T-Lymphozyten durch Helicobacter pylori als Mechanismus der Immunevasion / Christian Schmees. Gutachter: Dirk Haller ; Michael Schemann. Betreuer: Christian Prinz." München : Universitätsbibliothek der TU München, 2006. http://d-nb.info/1058141333/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Moradi, Eshkafti Milad Verfasser], and Hartmut [Gutachter] [Pasternak. "Influence of various welding sequence schemes on the load bearing capacity of square hollow section T-joint / Milad Moradi Eshkafti ; Gutachter: Hartmut Pasternak." Cottbus : BTU Cottbus - Senftenberg, 2018. http://d-nb.info/1151520985/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Jacque-Sabatier, Françoise. "CORRECTEURS DE FLUX V. T. D. POUR LES SCHEMAS CENTRES S [exposant] α [indice] β ET APPLICATION A L'ETUDE DES ECOULEMENTS COMPRESSIBLES INSTATIONNAIRES DANS LES CANALISATIONS DE MOTEURS". Paris 6, 1987. http://www.theses.fr/1987PA066441.

Повний текст джерела
Анотація:
Description d'un schema numerique a variation totale decroissante applique a une classe de schemas centres explicites de type predicteur-correcteur dans lesquels la viscosite artificielle joue le role d'un post-processeur et permet d'ameliorer la qualite des calculs en ce qui concerne le probleme des oscillations parasites. Application a un calcul de canalisation d'admission de moteur
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Rüssel, Jörn [Verfasser], Ingo Akademischer Betreuer] Hansmann, and Werner [Akademischer Betreuer] [Schempp. "Molekulare Charakterisierung der chromosomalen Bruchpunkte einer mit chronischer lymphatischer Leukämie assoziierten konstitutionellen Translokation t(6;9)(p12;p24) / Jörn Rüssel. Betreuer: Ingo Hansmann ; Werner Schempp." Halle, Saale : Universitäts- und Landesbibliothek Sachsen-Anhalt, 2009. http://d-nb.info/1024896072/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Hiller, Julia [Verfasser], Wolfgang [Akademischer Betreuer] Liebl, Claudia I. [Akademischer Betreuer] Traidl-Hoffmann, Michael [Akademischer Betreuer] Schemann, and Werner [Akademischer Betreuer] Back. "Differential regulation of T cell responses by pathogenic and apathogenic microorganisms / Julia Hiller. Gutachter: Claudia I. Traidl-Hoffmann ; Michael Schemann ; Wolfgang Liebl ; Werner Back. Betreuer: Wolfgang Liebl." München : Universitätsbibliothek der TU München, 2012. http://d-nb.info/1024567443/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Heinemann, Christina [Verfasser], Thomas [Akademischer Betreuer] Korn, and Michael [Akademischer Betreuer] Schemann. "IL-12 antagonizes IL-23 in autoimmune inflammation by Blimp1-dependent programming of CD4+ effector T cells into suppressive IL-10 producers / Christina Heinemann. Gutachter: Thomas Korn ; Michael Schemann. Betreuer: Thomas Korn." München : Universitätsbibliothek der TU München, 2014. http://d-nb.info/1065376480/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Lucas, D. Pulane. "Disruptive Transformations in Health Care: Technological Innovation and the Acute Care General Hospital." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/2996.

Повний текст джерела
Анотація:
Advances in medical technology have altered the need for certain types of surgery to be performed in traditional inpatient hospital settings. Less invasive surgical procedures allow a growing number of medical treatments to take place on an outpatient basis. Hospitals face growing competition from ambulatory surgery centers (ASCs). The competitive threats posed by ASCs are important, given that inpatient surgery has been the cornerstone of hospital services for over a century. Additional research is needed to understand how surgical volume shifts between and within acute care general hospitals (ACGHs) and ASCs. This study investigates how medical technology within the hospital industry is changing medical services delivery. The main purposes of this study are to (1) test Clayton M. Christensen’s theory of disruptive innovation in health care, and (2) examine the effects of disruptive innovation on appendectomy, cholecystectomy, and bariatric surgery (ACBS) utilization. Disruptive innovation theory contends that advanced technology combined with innovative business models—located outside of traditional product markets or delivery systems—will produce simplified, quality products and services at lower costs with broader accessibility. Consequently, new markets will emerge, and conventional industry leaders will experience a loss of market share to “non-traditional” new entrants into the marketplace. The underlying assumption of this work is that ASCs (innovative business models) have adopted laparoscopy (innovative technology) and their unification has initiated disruptive innovation within the hospital industry. The disruptive effects have spawned shifts in surgical volumes from open to laparoscopic procedures, from inpatient to ambulatory settings, and from hospitals to ASCs. The research hypothesizes that: (1) there will be larger increases in the percentage of laparoscopic ACBS performed than open ACBS procedures; (2) ambulatory ACBS will experience larger percent increases than inpatient ACBS procedures; and (3) ASCs will experience larger percent increases than ACGHs. The study tracks the utilization of open, laparoscopic, inpatient and ambulatory ACBS. The research questions that guide the inquiry are: 1. How has ACBS utilization changed over this time? 2. Do ACGHs and ASCs differ in the utilization of ACBS? 3. How do states differ in the utilization of ACBS? 4. Do study findings support disruptive innovation theory in the hospital industry? The quantitative study employs a panel design using hospital discharge data from 2004 and 2009. The unit of analysis is the facility. The sampling frame is comprised of ACGHs and ASCs in Florida and Wisconsin. The study employs exploratory and confirmatory data analysis. This work finds that disruptive innovation theory is an effective model for assessing the hospital industry. The model provides a useful framework for analyzing the interplay between ACGHs and ASCs. While study findings did not support the stated hypotheses, the impact of government interventions into the competitive marketplace supports the claims of disruptive innovation theory. Regulations that intervened in the hospital industry facilitated interactions between ASCs and ACGHs, reducing the number of ASCs performing ACBS and altering the trajectory of ACBS volume by shifting surgeries from ASCs to ACGHs.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Hýl, Petr. "Slovinské národní divadlo v Lublani." Master's thesis, Vysoké učení technické v Brně. Fakulta architektury, 2009. http://www.nusl.cz/ntk/nusl-215582.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

"Automating GD&T Schema for Mechanical Assemblies." Master's thesis, 2016. http://hdl.handle.net/2286/R.I.40226.

Повний текст джерела
Анотація:
abstract: Parts are always manufactured with deviations from their nominal geometry due to many reasons such as inherent inaccuracies in the machine tools and environmental conditions. It is a designer job to devise a proper tolerance scheme to allow reasonable freedom to a manufacturer for imperfections without compromising performance. It takes years of experience and strong practical knowledge of the device function, manufacturing process and GD&T standards for a designer to create a good tolerance scheme. There is almost no theoretical resource to help designers in GD&T synthesis. As a result, designers often create inconsistent and incomplete tolerance schemes that lead to high assembly scrap rates. Auto-Tolerancing project was started in the Design Automation Lab (DAL) to investigate the degree to which tolerance synthesis can be automated. Tolerance synthesis includes tolerance schema generation (sans tolerance values) and tolerance value allocation. This thesis aims to address the tolerance schema generation. To develop an automated tolerance schema synthesis toolset, to-be-toleranced features need to be identified, required tolerance types should be determined, a scheme for computer representation of the GD&T information need to be developed, sequence of control should be identified, and a procedure for creating datum reference frames (DRFs) should be developed. The first three steps define the architecture of the tolerance schema generation module while the last two steps setup a base to create a proper tolerance scheme with the help of GD&T good practice rules obtained from experts. The GD&T scheme recommended by this module is used by the tolerance value allocation/analysis module to complete the process of automated tolerance synthesis. Various test cases are studied to verify the suitability of this module. The results show that software-generated schemas are proper enough to address the assemblability issues (first order tolerancing). Since this novel technology is at its initial stage of development, performing further researches and case studies will definitely help to improve the software for making more comprehensive tolerance schemas that cover design intent (second order tolerancing) and cost optimization (third order tolerancing).
Dissertation/Thesis
Masters Thesis Mechanical Engineering 2016
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Young, Ryan. "The Liar Paradox: A Consistent and Semantically Closed Solution." Phd thesis, 2011. http://hdl.handle.net/1885/8898.

Повний текст джерела
Анотація:
This thesis develops a new approach to the formal de nition of a truth predicate that allows a consistent, semantically closed defiition within classical logic. The approach is built on an analysis of structural properties of languages that make Liar Sentences and the paradoxical argument possible. By focusing on these conditions, standard formal dfinitions of semantics are shown to impose systematic limitations on the definition of formal truth predicates. The alternative approach to the formal definition of truth is developed by analysing our intuitive procedure for evaluating the truth value of sentences like "P is true". It is observed that the standard procedure breaks down in the case of the Liar Paradox as a side effect of the patterns of naming or reference necessary to the definition of Truth as a predicate. This means there are two ways in which a sentence like "P is true" can be not true, which requires that the T-Schema be modified for such sentences. By modifying the T-Schema, and taking seriously the effects of the patterns of naming/ reference on truth values, the new approach to the definition of truth is developed. Formal truth definitions within classical logic are constructed that provide an explicit and adequate truth definition for their own language, every sentence within the languages has a truth value, and there is no Strengthened Liar Paradox. This approach to solving the Liar Paradox can be easily applied to a very wide range of languages, including natural languages.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

"3-D Conformance Analysis of Manufacturing Plans Using M-Maps, by Explicating Formal GD&T Schema from the Process Plan." Master's thesis, 2015. http://hdl.handle.net/2286/R.I.34868.

Повний текст джерела
Анотація:
abstract: A process plan is an instruction set for the manufacture of parts generated from detailed design drawings or CAD models. While these plans are highly detailed about machines, tools, fixtures and operation parameters; tolerances typically show up in less formal manner in such plans, if at all. It is not uncommon to see only dimensional plus/minus values on rough sketches accompanying the instructions. On the other hand, design drawings use standard GD&T (Geometrical Dimensioning and tolerancing) symbols with datums and DRFs (Datum Reference Frames) clearly specified. This is not to say that process planners do not consider tolerances; they are implied by way of choices of fixtures, tools, machines, and operations. When converting design tolerances to the manufacturing datum flow, process planners do tolerance charting, that is based on operation sequence but the resulting plans cannot be audited for conformance to design specification. In this thesis, I will present a framework for explicating the GD&T schema implied by machining process plans. The first step is to derive the DRFs from the fixturing method in each set-up. Then basic dimensions for the features to be machined in each set up are determined with respect to the extracted DRF. Using shop data for the machines and operations involved, the range of possible geometric variations are estimated for each type of tolerances (form, size, orientation, and position). The sequence of manufacturing operations determines the datum flow chain. Once we have a formal manufacturing GD&T schema, we can analyze and compare it to tolerance specifications from design using the T-map math model. Since the model is based on the manufacturing process plan, it is called resulting T-map or m-map. Then the process plan can be validated by adjusting parameters so that the m-map lies within the T-map created for the design drawing. How the m-map is created to be compared with the T-map is the focus of this research.
Dissertation/Thesis
Masters Thesis Mechanical Engineering 2015
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Velegrakis, Yannis. "Managing schema mappings in highly heterogeneous environments." 2005. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=232736&T=F.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Maneva-Jakimoska, Karolina Burmester Mike. "Anonymous T-out-of-N threshold signature schemes." Diss., 2006. http://etd.lib.fsu.edu/theses/available/04092006-135341.

Повний текст джерела
Анотація:
Thesis (M.S.)--Florida State University, 2006.
Advisor: Mike Burmester, Florida State University,College of Arts amd Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 19, 2006). Document formatted into pages; contains viii, 40 pages. Includes bibliographical references.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Perng, Chi-Yow, and 彭集佑. "A Group-Oriented (t,n) Threshold Signature and A Verification Scheme." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/96544494483252549316.

Повний текст джерела
Анотація:
碩士
國立中興大學
應用數學系
88
Along with the great progress of technology,the paper document is converted to digital document gradually. The computer network is so popular that messages could be sent out by it instead of human’s power recently. However, the computer network is not always secure. The signature scheme and verification scheme are more and more important with transmitting messages or documents through the computer network. In our current society, one can do little thing, and team can do everything. In this thesis, we propose two schemes: One is an efficient group-oriented (t,n) threshold signature; another is a group-oriented (t,n) verification. There holds advantages of message recovery and message linkage in both schemes. Moreover, the transmission cost is lower than those proposals so far. Therefore, our methods can be applied to the realities.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Tsai, Chun-Wei, and 蔡俊偉. "Implementation and Evaluation of Applying Channel Estimation Scheme in DVB-T Receiver." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/q7m98p.

Повний текст джерела
Анотація:
碩士
國立臺北科技大學
電子電腦與通訊產業研發碩士專班
95
This paper’s principal is based on channel estimation scheme of OFDM systems by way of using FPTC to replace conventional system’s channel estimation for obtaining better BER performance of DVB-T receivers. In this paper, the second section mention, the characteristics and advantages of OFDM modulation and transmission parameters of DVB-T system. The third section compares the simulation result of one-tap equalizer and FPTC. The fourth section presents the performance of using FPTC channel estimation scheme in real DVB-T receiving signals. Finally, after using PLD and FPTC to replace the conventional synchronization and channel estimation scheme of DVB-T receiver. The reception performance increases 30.7% and 29.3%, respectively, in fixed and 40km/hr cases.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Chen, Pai-Li, and 陳百立. "Implementation and Evaluation of Applying Synchronization Estimation Scheme in DVB-T Receiver." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/qfv8eg.

Повний текст джерела
Анотація:
碩士
國立臺北科技大學
電子電腦與通訊產業研發碩士專班
95
DVB-T employs Orthogonal Frequency Division Multiplexing (OFDM) as its modulation method. OFDM is known for its better transmission rate, however, it is quite strict with requirements of synchronization. This paper describes, applies, and evaluates three different synchronization architectures for DVB-T system, including Maximum Likelihood Detection (ML), Ensemble Correlation Detection (ECD), and Part Likelihood Detection (PLD), which are used to reduce the BER performance at the receiving side due to timing offset and frequency offset. Finally, after using PLD and Frequency Domain Pilot Time Domain Correlation Method(FPTC)to replace the conventional synchronization and channel estimation scheme of DVB-T receiver. The reception performance increases 30.7% and 29.3%, respectively, in fixed and 40km/hr cases.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Chen, Sheng-Feng, and 陳昇鋒. "A non-symmetric T-R based PAPR Reduction Scheme with Multi-peak cancellation." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/572epb.

Повний текст джерела
Анотація:
碩士
國立東華大學
電機工程學系
105
Technology about Orthogonal Frequency Division Multiplexing(OFDM) is used widely in digital communication system nowadays, but a problem called Peak-to-Average Power Ratio(PAPR) severely degrades the performance of OFDM. Bigger value of PAPR which causes distortion of signal when Power Amplifier(PA) attempts to amplify it, and the distortion also lowers the efficiency of PA and increases the complexity of both analog to digital and digital to analog converters (A/D and D/A). In this thesis, we propose a method called "non-symmetric T-R based PAPR Reduction Scheme with Multi-peak cancellation" to improve PAPR. In this method, we first use the algorithm of non-symmetric T-R to set PRTs, then generate the best peak reduction tone, and coordinate with PAPR Reduction Scheme with Multi-peak cancellation to achieve the purpose of lower PAPR. The T-R based PAPR Reduction Scheme we suggested, according to the computer simulation, can lower the value of PAPR more efficiently than conventional tone reservation can.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Chen, Jiun Ming, and 陳俊名. "A Electronic Voting Protocol Based upon t-out-of-n Oblivious Signature Scheme." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/38302440303546954407.

Повний текст джерела
Анотація:
碩士
長庚大學
電機工程學系
101
E-voting is an online system which simulates the vote of citizen in real life. It considers the security. The properties fit in with the voting situation in real life. Simply speaking, it lets people vote electronically and online to save time, manpower and material resources. It also let citizen vote simple and easily. The project proposes a real-time voting system achieving privacy and authenticity using mobile devices. We consider the strategy and application of Oblivious Signatures in mobile devices. We also consider the real-time voting result achieving privacy and authenticity, make a complete research and discussion, and research the voting application of mobile devices, to propose an new E-voting method for mobile devices. The method can let users vote by using the mobile devices, which users take along with themselves all the time. It let users vote more convenient using the function of mobile devices. Also, considering the data protection of mobile network application, privacy of person and authenticity of information, we designs a security protocol possessing privacy and authenticity. Finally we implement the protocol on the mobile phone to let uses vote via their smart phones. This system can be used in not only every kinds of voting but also survey of rates of candidate which people are going to vote. Our system achieves soundness, completeness, fairness, privacy, verifiability, eligibility, and unreusability. It also guarantees that no one, including servers, can cheat users. It can be used in centralized and decentralized modes.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Chi, YU-Ting, and 紀育婷. "Synchronization Schemes for DAB, DVB-T and IEEE 802.16a Systems." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/w7eu44.

Повний текст джерела
Анотація:
碩士
國立交通大學
電子工程系所
92
The goal of this research is to design synchronization schemes for Eureka 147 DAB, DVB-T, and IEEE 802.16a DL TDD systems. We apply the maximum likelihood criterion to the estimations of symbol timing and fractional frequency offset for all these three systems. For Eureka DAB 147, the frame synchronization is done by exploiting two sliding windows to calculate energy and then detect null symbol. The integral frequency offset can be estimated after FFT by a differential matched filter using PRS. For DVB-T, the integral frequency synchronization is done by exploiting the continual pilots of two symbols in the frequency domain. Frame detection is done by matching the 1~16 bits of TPS. For IEEE 802.16a DL, the fixed-location pilots are used to estimate integral frequency and frame start. The performances of proposed methods are examined in both AWGN channel and multipath channel. Simulation results show that the investigated and proposed methods are effective in achieving the required synchronizations tasks.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Chiang, Jei-Kuo, and 姜瑞國. "Multiuser Detection Scheme for TDMA Mobile System Using T/2-MMSE Decision-Feedback Receiver." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/43516096861268603271.

Повний текст джерела
Анотація:
碩士
元智大學
電機與資訊工程研究所
87
The concept of multiuser detection was originally developed in the CDMA system, where multiple co-channel user signals using the same time duration and frequency band can be simultaneously received and demodulated by exploiting different spreading codes. This feature makes the CDMA system capable of achieving a greater theoretical capacity than 2nd-generation TDMA based mobile systems. As is noted for all existing TDMA systems, different mobiles within the same cell and using the same uplink frequency channel are assigned to different time slots for transmission, thus limiting the overall system capacity. In this thesis we propose and investigate a multiuser detection scheme that may double the capacity of TDMA system. Basically, it allows two co-channel users to occupy the same time slot and then be detected simultaneously in the base station. In so doing, the training sequences of both the co-channel users are reasonably assumed to be different, synchronized, and known by the system. And, it is required to use multiple base-station antennas for spatial-diversity reception to combat not only the inter-symbol interference (ISI) but also the co-channel interference (CCI). Hence, Spatial diversity reception can lead to both the capacity expansion and the BER performance improvement. In addition, for time variant channel, we use two kinds of methods to make the receiver adapted to the change of the channel. First, we adopt interpolated channel estimates to obtain the changing channel response between the regularly appearing training segments. Second, we also propose a RLS-MIMO DFE to achieve multiuser detection. Finally, We will use computer simulation to compare these two kinds of methods, and the results are shown in chapter 4.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Sander, Amy Janay Boswell 1973. "Toward an integration of Beck's cognitive theory and Bowlby's attachment theory : self-schema and adult attachment classification in relation to depressive symptoms." 2001. http://hdl.handle.net/2152/10828.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Wu, Shu-Zhen, and 吳淑貞. "DESIGNING A SOFTWARE CONFIGURATION MANAGEMENT SCHEME IN THE SOFTWARE DEVELOPMENT LIFE CYCLE FOR T COMPANY." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/21423335457953961752.

Повний текст джерела
Анотація:
碩士
大同工學院
事業經營研究所
81
Software Configuration Management (SCM) is the discipline of identifying the configuration of a system at discrete points in time for the purpose of systematically controlling changes to this configuration and maintaining the integrity and traceability of this configuration throughout the system life cycle. The purpose of this study is to design an appropriate managerial procedure of SCM for T Company, based on the general theory of SCM as well as the characteristics of projects developed by T Company. Software Configuration Management has four major parts: (1) identification, concerning with giving names to or providing labels for software configuration items (SCIs) and baselines as well as tracing their parentage, (2) control, an administrative mechanism for initializing, preparing, evaluating and approving/ disapproving all proposals for changing SCIs, (3) auditing, a process that should be performed periodically during the life cycle to reduce the likelihood of aberrant software behavior, (4) status accounting, providing a history of the three other configuration components by storing them in a database or in files.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Chang, Chia-Yu, and 張家玉. "Efficient computational schemes for supervised learning ofmultivariate t mixture models with missing information." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/30114475996940869491.

Повний текст джерела
Анотація:
碩士
東海大學
統計學系
95
A finite mixture model using the multivariate t distribution has been well recognized as a robust extension of Gaussian mixtures. This paper presents an efficient PX-EM algorithm for supervised learning of multivariate t mixture models in the presence of missing values. To simplify the development of new theoretic results and facilitate the implementation of the PX-EM algorithm, two auxiliary indicator matrices are incorporated into the model and shown to be effective. The proposed methodology is a generalized approach for robust mixture models that allow analysts to handle real-world multivariate data sets with complex missing patterns. The performance of computational aspects is investigated through a simulation study and the procedure is also applied to the analysis of real data with varying proportions of artificially missing values.
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Ho, Yi-Jan, and 賀逸然. "T-C Scheme for the Linearized Equations of the Viscous Conservation Laws around a Viscous Shock Profile." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/98544925877643125498.

Повний текст джерела
Анотація:
碩士
國立臺灣師範大學
數學系
102
Assume Fi is a viscous shock profile of the viscous hyperbolic conservation laws. We are concerned with the stability and the solution structure for the initial value problem of the viscous hyperbolic conservation laws around the viscous shock wave Fi. The T-C scheme is used to estimate the solution of the linearized equations around viscous shock profile Fi. The detail proofs for the transversal wave operator of the T-C scheme are given in this thesis.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

He, Yi Xuan, and 何懿軒. "An Efficient t–out–of–n Proxy Oblivious Signature Scheme and its Application on Online Lottery System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/45446543169715486051.

Повний текст джерела
Анотація:
碩士
長庚大學
電機工程學系
102
People changed in the habits of life gradually along with the advancement of technology and internet. The digital generation compared to the traditional living pattern is more convenient. An online lottery system needs to have perfect secure features so as to achieve the fairness. Functionality of the digital signature exactly can construct well for the working model. Due to the past signature schemes couldn't completely match the needs about scenarios of online lottery and offer consummate security and fairness. We propose an efficient t–out–of–n proxy oblivious signature scheme based on RSA cryptosystem. In response to the scenario of online lottery combines signatures of proxy and oblivious, and explain the analysis of security and argumentation. Furthermore, we applied in the smartphones equipped with the Android system. Compare to the traditional lottery game, it's more convenient for the users.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

SONG, YONG-GUANG, and 宋永光. "Analogues of Erdos-Ko-Rado theorem for t-designs in some classical association schemes." Thesis, 1987. http://ndltd.ncl.edu.tw/handle/96990051522714152325.

Повний текст джерела
Анотація:
碩士
國立交通大學
應用數學研究所
75
Erdos-Ko-Rado (1961)和Rands (1982)的兩篇論文分別探討了固定集合 上子集合間相交的性質,亦即是在Johnson schemes 的結構下討論諸點分佈的情形。 在本篇論文裡,就另外二個古典的結合架構(分別定義在向量子空間上和矩陣上), 我們分別證得相關結果。
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Cao, Jian. "Computation of High-Dimensional Multivariate Normal and Student-t Probabilities Based on Matrix Compression Schemes." Diss., 2020. http://hdl.handle.net/10754/662613.

Повний текст джерела
Анотація:
The first half of the thesis focuses on the computation of high-dimensional multivariate normal (MVN) and multivariate Student-t (MVT) probabilities. Chapter 2 generalizes the bivariate conditioning method to a d-dimensional conditioning method and combines it with a hierarchical representation of the n × n covariance matrix. The resulting two-level hierarchical-block conditioning method requires Monte Carlo simulations to be performed only in d dimensions, with d ≪ n, and allows the dominant complexity term of the algorithm to be O(n log n). Chapter 3 improves the block reordering scheme from Chapter 2 and integrates it into the Quasi-Monte Carlo simulation under the tile-low-rank representation of the covariance matrix. Simulations up to dimension 65,536 suggest that this method can improve the run time by one order of magnitude compared with the hierarchical Monte Carlo method. The second half of the thesis discusses a novel matrix compression scheme with Kronecker products, an R package that implements the methods described in Chapter 3, and an application study with the probit Gaussian random field. Chapter 4 studies the potential of using the sum of Kronecker products (SKP) as a compressed covariance matrix representation. Experiments show that this new SKP representation can save the memory footprint by one order of magnitude compared with the hierarchical representation for covariance matrices from large grids and the Cholesky factorization in one million dimensions can be achieved within 600 seconds. In Chapter 5, an R package is introduced that implements the methods in Chapter 3 and show how the package improves the accuracy of the computed excursion sets. Chapter 6 derives the posterior properties of the probit Gaussian random field, based on which model selection and posterior prediction are performed. With the tlrmvnmvt package, the computation becomes feasible in tens of thousands of dimensions, where the prediction errors are significantly reduced.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Chen, Kuo-Lun, and 陳國倫. "Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t, n) Threshold Scheme." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/81531832239793045879.

Повний текст джерела
Анотація:
碩士
國立中正大學
資訊工程研究所
87
In the ordinary signature schemes, one single signer can generate a digital signature for a document by himself. By verifying the signature, anyone can verify the validity of the signature. However, in some situations, there may be many signers in one group or many verifiers in one group. For the signers, they may wish to generate a group signature instead of many personal signatures for the same document. For the verifiers, they may wish that the signature only be verified when sufficient group members attend the verification. Especially when the content of the document can be recovered from the signature, the responsibility of verification should be shared among some group members. In this thesis, the concept of secret sharing is introduced briefly first and some previous proposed schemes are reviewed. And then by employing the concept of secret sharing, we proposed two modified signature schemes. One of these two schemes is a signature scheme with (t, n) threshold group-oriented. The other is a signature scheme with (t, n) shared verification. In the first scheme, any t or more than t members of the group can cooperate to generate the group signature. The first scheme is based on the factorization problem. The proposed scheme also provides the linkage property between signed message blocks to detect a removal by an eavesdropper. In the second scheme, also by employing the concept of the (t, n) threshold secret sharing scheme, any single signer can sign a message to a group of n verifiers. Once the group receives the signature, any t or more than t verifiers in the group can cooperate to verify the signature. The proposed scheme is more efficient than the previous schemes. The proposed scheme is more efficient than the previous schemes. In both of the schemes, the property of message recovery is also added into the schemes, the plaintext can be recovered from the signature.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Guntoro, Andre T. [Verfasser]. "Algorithm, application mapping, design and realization of the time-frequency representation with flexible kernels based on their lifting scheme / von Andre T. Guntoro." 2009. http://d-nb.info/998567876/34.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Maldonado, Ana Carolina. "Cuadrángulos generalizados esquemas de Johnson y álgebras de Terwilliger /." Doctoral thesis, 2004. http://hdl.handle.net/11086/88.

Повний текст джерела
Анотація:
Tesis (Doctor en Matemática)--Universidad Nacional de Córdoba. Facultad de Matemática, Astronomía y Física, 2004.
El trabajo de tesis se enmarca dentro de la Combinatoria Algebraica. Estudiamos dos casos particulares de esquemas de asociación: los provenientes de cuadrángulos generalizados y los esquemas de Johnson. Descomponemos en ideales simples las álgebras de Terwilliger asociadas (T-álgebras) y describimos en forma explícita los T-módulos irreducibles. Los cálculos realizados para los esquemas de Johnson pueden ser aplicados para describir explicítamente la T-álgebra de los hipercubos (recientemente estudiada por Go).
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії