Dissertations / Theses on the topic 'Codes and Code Enforcement'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Codes and Code Enforcement.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Al-Fahad, Jasem Y. "Reform of building codes, regulations, administration and enforcement in Kuwait : within the legal, administrative, technical & social framework." Thesis, Loughborough University, 2012. https://dspace.lboro.ac.uk/2134/9883.
Full textCaldwell, Anita M. "Should Enforcement Provisions be Included in Newsroom Codes of Ethics." Thesis, The University of Arizona, 1994. http://hdl.handle.net/10150/292172.
Full textBrown, Sara E. "Code enforcement, tax delinquency, and strategic management of problematic properties." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/90090.
Full textThesis: S.M. in Real Estate Development, Massachusetts Institute of Technology, Program in Real Estate Development in conjunction with the Center for Real Estate, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 129-137).
This thesis considers two interrelated sources of blight in cities: so-called "problem properties" (PP), or properties in poor physical condition where owners have stopped performing basic maintenance, and tax-delinquent properties (TDP), where owners have stopped paying their property taxes. It focuses on how cities can be more effective in addressing PP and TDP both "before" (through proactive prevention) and "after" (through correction/collection) they emerge. Fundamentally, it argues that cities should recognize the relationship between PP and TDP, which often constitute the same properties, but, more importantly, both can be "liened up" and taken through foreclosure if their owners are truly unresponsive. These liens can be established through unpaid code violation fines and receivership liens, as well as unpaid taxes. This approach is based on the premise that cities want to receive as few properties as possible through foreclosure, because of the costs associated with holding excess land and buildings, but also want to avoid the "worst of the worst" PP and TDP becoming a blight on neighborhoods. Thus, if owners are going to refuse to correct severe code violations and/or delinquency, cities want to transfer properties to responsible owners as quickly as possible. Recognizing the links between PP and TDP enables cities to switch from a reactive to proactive approach in treating blight. This thesis also discusses barriers to addressing PP and TDP. It suggests that cities treat them through comprehensive "enforcement pathways" targeted to specific property and owner types. In particular, owners are divided into three groups: cooperative, non-cooperative, and "missing in action." This segmentation methodology recognizes that different properties present different enforcement challenges and require different strategies to return them to productive use. In addition, this thesis examines the three collection methods available to cities: public collection, contracted third-party servicing, and privatized collection (tax lien sales), and addresses a major limiting factor on tax lien sales: their dependence on private market demand. Finally, it examines how cities can be more effective in managing and disposing of their property inventories. To guide property usage and disposition timing, it suggests that cities establish a central property inventory that includes critical land and building characteristics, a property potential reuse scoring system, and a market model that segments neighborhoods and identifies spatial and temporal "inflection points." It also recommends that cities not take a "one size fits all" approach to their entire inventory, but rather select the disposition method, -- sheriff's sale/auction, RFP, third-party transfer, or land banking, -- that is most appropriate for the property type, (sub)market condition, and desired outcome(s). Finally, it outlines strategies to overcome under-management of public assets, weak markets, and financing challenges. To support the discussion about how to best manage delinquency and disposition, it includes detailed case studies of Philadelphia, New York City, and Boston.
by Sara E. Brown.
M.C.P.
S.M. in Real Estate Development
Morrison, Alexandra. "The Influence of Ethical Code of Conduct Enforcement on Unethical Behavior." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/321884.
Full textBeets, S. Douglas. "Effectiveness of the complaint-based enforcement system of the AICPA Code of Professional Ethics." Diss., Virginia Polytechnic Institute and State University, 1987. http://hdl.handle.net/10919/82900.
Full textPh. D.
Wegmann, Jacob Anthony George. ""We Just Built It|" Code Enforcement, Local Politics, and the Informal Housing Market in Southeast Los Angeles County." Thesis, University of California, Berkeley, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3708337.
Full textThis dissertation is an exploration of the role of informality in the housing market in southeast Los Angeles County. While informality has long been the subject of scholarship in cases from the Global South, and increasingly in the United States, examinations of housing informality in the US thus far have largely been situated in rural and peri-urban areas. This work seeks to interrogate informality in housing processes unfolding within the very heart of northern North America's leading industrial metropolis.
After a brief preface, the dissertation's second chapter reviews literature on various aspects of informality and on Accessory Dwelling Units, or additions or conversions of living quarters on residential properties. Chapter 3 introduces the work's methodological pillars, and describes the four major, mixed methods relied upon. These are a survey of code enforcement officers; interviews and direct observation; and analyses of rental and property sales markets. Two other, minor, methods employed are an analysis of building footprints and the analysis of secondary data.
Chapter 4 introduces the single case used in the dissertation. This is a group of 14 communities, with a total population of 700,000, that are collectively referred to via the neologism City of Gateway. Next follows a historical overview of the area. Following a discussion of the 1965 Watts riots as a historical watershed, trends in the City of Gateway's economy and population that have driven a dramatic informalization of the housing stock since that time are examined.
Chapter 5 describes the physical expression of the informal housing market in the City of Gateway, in seven extralegal modes that involve either the conversion of existing space or the addition of new space, and the tactics used to effect them. Chapter 5 closes with a quantification and discussion of the consequences of the characteristic urban form produced by the informal housing market, horizontal density, which is the addition of density by more intensively covering lots with buildings rather than building upwards.
Chapter 6 describes the "nuts and bolts" of the informal housing market. It presents evidence that extralegal rentals are, on balance, generally (though not always) cheaper for their occupants than formal market alternatives. It examines presale ordinances that some cities have passed to try to disrupt the informal housing market by intervening in the sale of residential property. It discusses the important role of appraisers in providing or denying mortgage credit to current or would-be homeowners with extralegal space. An analysis of property sales transactions provides evidence that extralegal space does not appear to be capitalized in property values. Finally, the chapter discusses barriers imposed by the current US mortgage system to financing the construction of rentable space on residential properties.
Chapter 7 is an examination of the role played by code enforcement in shaping the informal housing market in the City of Gateway. Specifically, it examines how code enforcement departments allocate their time and effort given that there are far more potential enforcement actions than their capacity allows. The chapter presents arguments that code enforcement reshapes the informal housing market while failing to suppress it; that it is applied unevenly; and that it paradoxically helps maintain the informal order of the informal housing market.
Chapter 8 begins by arguing that issues related to informal housing, when they are discussed at all in the local political sphere, tend to be filtered through the reductive frame of law and order. The chapter presents reasons for this state of affairs, both ones specific to the City of Gateway and others that are more general and potentially applicable to other places in the US. Chapter 8 closes with a summary of high-profile local debates in which informal housing's influence is considerable but rarely acknowledged: fair share housing, water and sewer utility capacity, parking, and school crowding.
The conclusion, Chapter 9, begins by assessing the positive and negative attributes of the informal housing system. A normative judgment is made that the former outweigh the latter, although the drawbacks are considerable and in need of urgent attention. A multiscalar palette of policy interventions intended to usefully and justly intervene in the informal housing system is put forth. Many of these are within the ambit of local government, but action in other spheres—in state and even federal government, and within the housing NGO sector—is needed. Next, lessons for advocates, policymakers, and researchers drawn from the broader implications of this dissertation are presented. After that follows a speculative discussion about the role of culture in comparison with economic necessity in driving the informal housing market in the City of Gateway. Next, informed speculation about the future of the City of Gateway's housing market is presented. The dissertation closes with a discussion of these trends' implications for the City of Gateway's continued existence as that increasingly rare of type of place, a working class enclave in the heart of a vast global metropolis.
Pamborides, George Pan. "The impact of public international law on private shipping law : the effect of the modern international legislative and enforcement practices on certain principles of maritime law." Thesis, University of Southampton, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.264650.
Full textMartori, Adrian Jordi. "Probabilistic Models of Partial Order Enforcement in Distributed Systems." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0040/document.
Full textDistributed systems have managed to extend technology to a broader audience, in both terms of location and numbers. However these geo-replicated systems need to be scalable in order to meet the ever growing demands. Moreover, the system has to be able to process messages in an equivalent order that they were created to avoid unwanted side effects. Partial order enforcement provides an ordering of events that all nodes will follow therefore processing the messages in an adequate order. A system that enforces a partial order simplifies the challenge of developing distributed applications, and ensures that the end-user will not observe causality defying behaviors. In this thesis we present models for different partial order enforcements, using different latency model distributions. While a latency model, which yields the time it takes for a message to go from one node to another, our model builds on it to give the additional time that it takes to enforce a given partial order. We have proposed the following models. First, in a one to many nodes communication, the probability for the message to be delivered in all the nodes before a given time. Second, in a one to many nodes communication from the receivers, the probability that all the other nodes have delivered the message after a given time of him receiving it. Third, in a one to many nodes communication, the probability that the message has arrived to at least a subset of them before a given time. Fourth, applying either FIFO or Causal ordering determining if a message is ready for being delivered, in one node or many. All of this furthers the understanding of how distributed systems with partial orders behave. Furthermore using this knowledge we have built an algorithm that uses the insight of network behavior to provide a reliable causal delivery system. In order to validate our models, we developed a simulation tool that allows to run scenarios tailored to our needs. We can define the different parameters of the latency model, the number of clients, and the clients workloads. This simulation allows us to compare the randomly generated values for each specific configuration with the predicted outcome from our model. One of the applications that can take advantage of our model, is a reliable causal delivery algorithm. It uses causal information to detect missing elements and removes the need of message acknowledgment by contacting other replicas only when the message is assumed missing. This information is provided by our model, that defines waiting timers according to the network statistics and resource consumption. Finally this application has been both tested in the same simulator as the models, with promising results, and then evaluated in a real-life experiment using Amazon EC2 for the platform
Hadravová, Andrea. "Pojetí exekutorských služeb v České republice a jejich porovnání s vybranými státy EU." Master's thesis, Vysoká škola ekonomická v Praze, 2017. http://www.nusl.cz/ntk/nusl-359903.
Full textReece, Kristie M. "Fighting Urban Blight through Community Engagement and GIS." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1544810680015951.
Full textUhl, Philip J. "A Spatio-Temporal Data Model for Zoning." BYU ScholarsArchive, 2002. https://scholarsarchive.byu.edu/etd/1.
Full textGuesnet, Yannick. "Codes et interprétations." Rouen, 2001. http://www.theses.fr/2001ROUES019.
Full textLeslie, Martin P. "Hypermap-Homology Quantum Codes." Diss., The University of Arizona, 2013. http://hdl.handle.net/10150/297012.
Full textTixier, Audrey. "Reconnaissance de codes correcteurs." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066554/document.
Full textIn this PhD, we focus on the code reconstruction problem. This problem mainly arises in a non-cooperative context when a communication consisting of noisy codewords stemming from an unknown code is observed and its content has to be retrieved by recovering the code that is used for communicating and decoding with it the noisy codewords. We consider here three possible scenarios and suggest an original method for each case. In the first one, we assume that the code that is used is a turbo-code and we propose a method for reconstructing the associated interleaver (the other components of the turbo-code can be easily recovered by the existing methods). The interleaver is reconstructed step by step by searching for the most probable index at each time and by computing the relevant probabilities with the help of the BCJR decoding algorithm. In the second one, we tackle the problem of reconstructing LDPC codes by suggesting a new method for finding a list of parity-check equations of small weight that generalizes and improves upon all existing methods. Finally, in the last scenario we reconstruct an unknown interleaved convolutional code. In this method we used the previous one to find a list of parity-check equations for this code. Then, by introducing a graph representing how these parity-check equations intersect we recover at the same time the interleaver and the convolutional code
Szabo, Steve. "Convolutional Codes with Additional Structure and Block Codes over Galois Rings." Ohio University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1257792383.
Full textTrinh, Thuy Duong. "Ochrana autorských práv v on-line médiích." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-198040.
Full textKetkar, Avanti Ulhas. "Code constructions and code families for nonbinary quantum stabilizer code." Thesis, Texas A&M University, 2004. http://hdl.handle.net/1969.1/2743.
Full textSchofield, Mark. "The equivocation of codes." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/11297.
Full textBienert, Rolf. "Über Automorphismengruppen von zyklischen Codes." Saarbrücken VDM Verlag Dr. Müller, 2007. http://d-nb.info/989226832/04.
Full textQiu-Cheng, Xie, and Lei Zhong-Kui. "NEW DEVELOPMENT OF OPTIMUM GROUP SYNCHRONIZATION CODES." International Foundation for Telemetering, 1990. http://hdl.handle.net/10150/613434.
Full textIn this paper, twenty-four optimum group synchronization codes (N=31 to 54) for PCM telemetry systems are presented. These optimum codes are the newest development at the category of optimum group synchronization codes up to now in the world.
Bärmann, Daniel. "Aufzählen von DNA-Codes." Master's thesis, Universität Potsdam, 2006. http://opus.kobv.de/ubp/volltexte/2006/1026/.
Full textIn this work a model for enumerating DNA codes is developed. By applying an order on the set of DNA codewords and extending this order on the set of codes, this model assists in the discovery of DNA codes with properties like non-overlappingness, compliance, comma-freeness, sticky-freeness, overhang-freeness, subword-compliance, solidness and others with respect to a given involution on the set of codewords. This tool can be used to find codes with arbitrary combinations of code properties with respect to the standard Watson-Crick-DNA involution. The work also investigates DNA codes with respect to the optimizing of the information rate, as well as finding solid DNA codes.
Cuevas, Ordaz Francisco Javier. "Turbo décodage de code produit haut débit." Lorient, 2004. http://www.theses.fr/2004LORIS033.
Full textThis thesis continues research undertaken on new error correcting code techniques, following work on block turbo codes, BTCs, introduced in 1994 by R. Pyndiah. It proposes an innovative architecture for the turbo decoding of product codes, using extended BCH codes as elementary codes. This innovative architecture stores several data at the same address and performs parallel decoding to increase the data rate. First, we propose a new high rate turbo decoding architecture using a BCH (32,26,4) code with a soft input-soft output (SISO), correcting 1 error (Hamming code). Then, we dedicate the second group of results to decoding BCH (128,106,8) code for high data rates with strong error correction power, correcting 3 errors (minimum distance of product code d=64) and high code rates (R close to 0,7). The first advantage of theses designs is that they use only one memory (n2 data grouped into blocks of m2) at the input. The elementary decoder designs presented are capable of treating m data simultaneously, with m=1, 2, 4 and 8. The second result is that by using m parallel decoders of the same type for the architecture of the turbo decoder, we obtain a decoding m2 higher speed and a m2/2 surface area, for these elementary decoders. To compare the performance and complexity of the decoders, we use C language for behavioural simulations, VHDL for functional simulations and Synopsys Design Compiler for the synthesis. The results obtained open up the possibility of future integration on silicon for turbo decoders with strong error correction power (minimum distance 64, code rate 0. 8) and very high data rate (6. 4 Gbits/s with a CMOS 0. 18μm target library)
Kühn, Stefan. "Organic codes and their identification : is the histone code a true organic code." Thesis, Stellenbosch : Stellenbosch University, 2014. http://hdl.handle.net/10019.1/86673.
Full textENGLISH ABSTRACT: Codes are ubiquitous in culture|and, by implication, in nature. Code biology is the study of these codes. However, the term `code' has assumed a variety of meanings, sowing confusion and cynicism. The rst aim of this study is therefore to de ne what an organic code is. Following from this, I establish a set of criteria that a putative code has to conform to in order to be recognised as a true code. I then o er an information theoretical perspective on how organic codes present a viable method of dealing with biological information, as a logical extension thereof. Once this framework has been established, I proceed to review several of the current organic codes in an attempt to demonstrate how the de nition of and criteria for identifying an organic code may be used to separate the wheat from the cha . I then introduce the `regulatory code' in an e ort to demonstrate how the code biological framework may be applied to novel codes to test their suitability as organic codes and whether they warrant further investigation. Despite the prevalence of codes in the biological world, only a few have been de nitely established as organic codes. I therefore turn to the main aim of this study which is to cement the status of the histone code as a true organic code in the sense of the genetic or signal transduction codes. I provide a full review and analysis of the major histone post-translational modi cations, their biological e ects, and which protein domains are responsible for the translation between these two phenomena. Subsequently I show how these elements can be reliably mapped onto the theoretical framework of code biology. Lastly I discuss the validity of an algorithm-based approach to identifying organic codes developed by G orlich and Dittrich. Unfortunately, the current state of this algorithm and the operationalised de nition of an organic code is such that the process of identifying codes, without the neccessary investigation by a scientist with a biochemical background, is currently not viable. This study therefore demonstrates the utility of code biology as a theoretical framework that provides a synthesis between molecular biology and information theory. It cements the status of the histone code as a true organic code, and criticises the G orlich and Dittrich's method for nding codes by an algorithm based on reaction networks and contingency criteria.
AFRIKAANSE OPSOMMING: Kodes is alomteenwoordig in kultuur|en by implikasie ook in die natuur. Kodebiologie is die studie van hierdie kodes. Tog het die term `kode' 'n verskeidenheid van betekenisse en interpretasies wat heelwat verwarring veroorsaak. Die eerste doel van hierdie studie is dus om te bepaal wat 'n organiese kode is en 'n stel kriteria te formuleer wat 'n vermeende kode aan moet voldoen om as 'n ware kode erken te word. Ek ontwikkel dan 'n inligtings-teoretiese perspektief op hoe organiese kodes `n manier bied om biologiese inligting te hanteer as 'n logiese uitbreiding daarvan. Met hierdie raamwerk as agtergrond gee ek `n oorsig van 'n aantal van die huidige organiese kodes in 'n poging om aan te toon hoe die de nisie van en kriteria vir 'n organiese kode gebruik kan word om die koring van die kaf te skei. Ek stel die `regulering kode' voor in 'n poging om te wys hoe die kode-biologiese raamwerk op nuwe kodes toegepas kan word om hul geskiktheid as organiese kodes te toets en of dit die moeite werd is om hulle verder te ondersoek. Ten spyte daarvan dat kodes algemeen in die biologiese w^ereld voorkom, is relatief min van hulle onomwonde bevestig as organiese kodes. Die hoofdoel van hierdie studie is om vas te stel of die histoonkode 'n ware organiese kode is in die sin van die genetiese of seintransduksie kodes. Ek verskaf 'n volledige oorsig en ontleding van die belangrikste histoon post-translasionele modi kasies, hul biologiese e ekte, en watter prote endomeine verantwoordelik vir die vertaling tussen hierdie twee verskynsels. Ek wys dan hoe hierdie elemente perfek inpas in die teoretiese raamwerk van kodebiologie. Laastens bespreek ek die geldigheid van 'n algoritme-gebaseerde benadering tot die identi sering van organiese kodes wat deur G orlich en Dittrich ontwikkel is. Dit blyk dat hierdie algoritme en die geoperasionaliseerde de nisie van 'n organiese kode sodanig is dat die proses van die identi sering van kodes sonder die nodige ondersoek deur 'n wetenskaplike met 'n biochemiese agtergrond tans nie haalbaar is nie. Hierdie studie bevestig dus die nut van kodebiologie as 'n teoretiese raamwerk vir 'n sintese tussen molekul^ere biologie en inligtingsteorie, bevestig die status van die histoonkode as 'n ware organiese kode, en kritiseer G orlich en Dittrich se poging om organiese kodes te identi seer met 'n algoritme wat gebaseer is op reaksienetwerke en `n kontingensie kriterium.
Chai, Huiqiong. "Parallel concatenation of regular LDGM codes." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 81 p, 2007. http://proquest.umi.com/pqdlink?did=1251904891&Fmt=7&clientId=79356&RQT=309&VName=PQD.
Full textKim, Han Jo. "Improving turbo codes through code design and hybrid ARQ." [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0012169.
Full textAbbara, Mamdouh. "Turbo-codes quantiques." Phd thesis, Ecole Polytechnique X, 2013. http://pastel.archives-ouvertes.fr/pastel-00842327.
Full textDelfosse, Nicolas. "Constructions et performances de codes LDPC quantiques." Thesis, Bordeaux 1, 2012. http://www.theses.fr/2012BOR14697/document.
Full textThis thesis is devoted to the study of quantum LDPC codes. The first part presents some topological constructions of quantum LDPC codes. We introduce a family of color codes based on tilings of the hyperbolic plane. We study the parameters of a family of codes based on Cayley graphs.In a second part, we analyze the performance of these codes. We obtain an upper bound on the performance of regular quantum LDPC codes over the quantum erasure channel. This implies that these codes don't achieve the capacity of the quantum erasure channel. In the case of the depolarizing channel, we propose a new decoding algorithm of color codes based on three surface codes decoding. Our numerical results show good performance for toric color codes.Finally, we focus on percolation theory. The central question in percolation theory is the determination of the critical probability. Computing the critical probability exactly is usually quite difficult. We relate the probability of percolation in some regular tilings of the hyperbolic plane to the probability of a decoding error for hyperbolic codes on the quantum erasure channel. This leads to an upper bound on the critical probability of these hyperbolic tilings based on quantum information. It is an application of quantum information to a purely combinatorial problem
Hsu, Teh-Hsuan. "Robust concatenated codes for the slow Rayleigh fading channel." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2723.
Full textDingninou, Adodo. "Implémentation de Turbo code pour trames courtes." Brest, 2001. http://www.theses.fr/2001BRES2006.
Full textOzadam, Hakan. "Repeated-root Cyclic Codes And Matrix Product Codes." Phd thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12615304/index.pdf.
Full textRodriguez, Fernandez Carlos Gustavo. "Machine learning quantum error correction codes : learning the toric code /." São Paulo, 2018. http://hdl.handle.net/11449/180319.
Full textBanca:Alexandre Reily Rocha
Banca: Juan Felipe Carrasquilla
Resumo: Usamos métodos de aprendizagem supervisionada para estudar a decodificação de erros em códigos tóricos de diferentes tamanhos. Estudamos múltiplos modelos de erro, e obtemos figuras da eficácia de decodificação como uma função da taxa de erro de um único qubit. Também comentamos como o tamanho das redes neurais decodificadoras e seu tempo de treinamento aumentam com o tamanho do código tórico.
Abstract: We use supervised learning methods to study the error decoding in toric codes ofdifferent sizes. We study multiple error models, and obtain figures of the decoding efficacyas a function of the single qubit error rate. We also comment on how the size of thedecoding neural networks and their training time scales with the size of the toric code
Mestre
Muller, Wayne. "East City Precinct Design Code: Redevelopment through form-based codes." Master's thesis, University of Cape Town, 2014. http://hdl.handle.net/11427/12952.
Full textThis thesis confines itself to a consideration of urban development opportunity in the East City Precinct through the understanding of it former historical character and memory which can be implemented through Form Based Codes. It locates the design process in the sub-regional context and puts forward notional spatial proposal for the physical area of the East City Precinct and its surrounds. The application of theory is tested at precinct level and emphasis remains firmly on the public elements ordering the spatial structure. With all these considerations, this dissertation presents a piece of history of District Six and the importance of memory in relation to the East City. This contested site of memory and heritage informs the area’s contextual development amid the often-essentialising multicultural in particular to the ‘new South Africa’. In turn, an understanding of District Six’s urban quality which frames the intricacies of a restitution and redevelopment plan. It also illustrates the genuine uniqueness of its principles of urbanism, in contrast to market-oriented urban development which reproduces spaces of social fragmentation, exclusion and inequality. Indeed, the vision for the East City concerns long-term urban sustainability, an investment in a city of fluid spaces, a city of difference and meaning. This dissertation contends that there is a real role for urban and social sustainability in the redevelopment potential of the study area, with its historical, social, cultural and symbolic significance. Therefore its outline the key elements and principles for a development framework prepared for the study area and discuss the prospects for urban and social sustainability. This will inform where and how to apply form based codes with in the East City context.
Saeed, Mohamed Ahmed. "Approche algébrique sur l'équivalence de codes." Thesis, Normandie, 2017. http://www.theses.fr/2017NORMR034/document.
Full textCode equivalence problem plays an important role in coding theory and code based cryptography.That is due to its significance in classification of codes and also construction and cryptanalysis of code based cryptosystems. It is also related to the long standing problem of graph isomorphism, a well-known problem in the world of complexity theory. We introduce new method for solving code equivalence problem. We develop algebraic approaches to solve the problem in its permutation and diagonal versions. We build algebraic system by establishing relations between generator matrices and parity check matrices of the equivalent codes. We end up with system of multivariables of linear and quadratic equations which can be solved using algebraic tools such as Groebner basis and related techniques. By using Groebner basis techniques we can solve the code equivalence but the computation becomes complex as the length of the code increases. We introduced several improvements such as block linearization and Frobenius action. Using these techniques we identify many cases where permutation equivalence problem can be solved efficiently. Our method for diagonal equivalence solves the problem efficiently in small fields, namely F3 and F4. The increase in the field size results in an increase in the number of variables in our algebraic system which makes it difficult to solve. We introduce a new reduction from permutation code equivalence when the hull is trivial to graph isomorphism. This shows that this subclass of permutation equivalence is not harder than graph isomorphism.Using this reduction we obtain an algebraic system for graph isomorphism with interesting properties in terms of the rank of the linear part and the number of variables. We solve the graph isomorphism problem efficiently for random graphs with large number of vertices and also for some regular graphs such as Petersen, Cubical and Wagner Graphs
Wu, Yufei. "Implementation of Parallel and Serial Concatenated Convolutional Codes." Diss., Virginia Tech, 2000. http://hdl.handle.net/10919/27342.
Full textPh. D.
Biswas, Bhaskar. "Implementational aspects of code-based cryptography." Palaiseau, Ecole polytechnique, 2010. http://pastel.archives-ouvertes.fr/docs/00/52/30/07/PDF/thesis.pdf.
Full textSur la plateforme de thèses en ligne Tel on trouve le résumé suivant : We present the implementation details of Hybrid McEliece Encryption Scheme (HyMES), a improved version of the original McEliece scheme developed with Nicolas Sendrier. We present a modified version of the original scheme (which we call hybrid). It has two modifications, the first increases the information rate by putting some data in the error pattern. The second reduces the public key size by making use of a generator matrix in systematic form. We will show that the same security reduction as for the original system holds. We then describe the key generation, the encryption and the decryption algorithms and their implementation. Finally we will give some computation time for various parameters, compare them with the best known attacks, and discuss the best trade-offs. The idea of McEliece scheme is to hide the structure of the code by means of a transformation of the generator matrix. The transformed generator matrix becomes the public key and the secret key is the structure of the Goppa code together with the transformation parameters. The security relies on the fact that the decoding problem for general linear code is NP-complete. While the RSA public-key cryptosystem has become most widely used, McEliece cryptosystem has not been quite as successful. Partly because of the large public key, which impose less problem with the advance in hardware today. Our aim has been to implement a fairly fast and concise software implementation that may be used as a reference benchmark. We present the algorithmic details of our implementation as well. That is to specify the algorithms we use and the way we use them. The whole project is freely available at http://www-roc. Inria. Fr/secret/CBCrypto/index. Php?pg=hymes
Benoit, Didier. "Les définitions dans le Code pénal." Cergy-Pontoise, 2001. http://www.theses.fr/2001CERG0129.
Full textThe study of Penal Code definitions entails a formal analysis of the definitions and a semantic analysis which shows the importance of meaning. The formal analysis encompasses a syntaxic and stylistic study which highlights the system which leads to language production. Definitions are built through either one of these studies. Semantic analysis deals with the problem of meaning. Definitions present a set meaning formed by the legal body of definitions. However, this apparent rigidity truly conceals a very wide flexibility of definitional notions. This flexibility, revealed through the process of interpretation, gives the definitions a very sharp extensional characteristic Hence, the object becomes malleable with uncertain contours. As an element of a technical and normative speech, the definition is built from concrete realities which can be easily grasped and analysed. The definition is an entity meant to be used in a linguistic environment (the speech of specialty) and in a social environment. This approach turns it into a definition of terms related to one field : penal law. The meaning of the definitions then blends with the conceptualisation of what they refer to. As they come under a semasiological approach as well as an onomasiological approach to meaning, the definitions tend towards the recognition of a functional meaning of the object. The vagueness of the definitional content as well as the prototypical approach of the object turn definitions in the penal code into functional tools for understanding the object. Thus, the definition in the penal law comes under a pragmatic approach to the description of meaning. As this approach banks on the flexibility of meaning, it permits the definitions to be a malleable tool which is capable of grasping the complexity of facts. The definitions in the penal code are perfectly in keeping with the contemporary tendency of language pragmatism
Zhong, Wei. "Low density generator matrix codes for source and channel coding." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 144 p, 2006. http://proquest.umi.com/pqdweb?did=1172111921&sid=3&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textZhao, Ying. "Turbo codes for data compression and joint source-channel coding." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 112 p, 2007. http://proquest.umi.com/pqdlink?did=1251904871&Fmt=7&clientId=79356&RQT=309&VName=PQD.
Full textValvo, Daniel William. "Repairing Cartesian Codes with Linear Exact Repair Schemes." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/98818.
Full textMaster of Science
Distributed storage systems are systems which store a single data file over multiple storage nodes. Each storage node has a certain storage efficiency, the "space" required to store the information on that node. The value of these systems, is their ability to safely store data for extended periods of time. We want to design distributed storage systems such that if one storage node fails, we can recover it from the data in the remaining nodes. Recovering a node from the data stored in the other nodes requires the nodes to communicate data with each other. Ideally, these systems are designed to minimize the bandwidth, the inter-nodal communication required to recover a lost node, as well as maximize the storage efficiency of each node. A great mathematical framework to build these distributed storage systems on is erasure codes. In this paper, we will specifically develop distributed storage systems that use Cartesian codes. We will show that in the right setting, these systems can have a very similar bandwidth to systems build from Reed-Solomon codes, without much loss in storage efficiency.
Panagos, Adam G., and Kurt Kosbar. "A METHOD FOR FINDING BETTER SPACE-TIME CODES FOR MIMO CHANNELS." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604782.
Full textMultiple-input multiple output (MIMO) communication systems can have dramatically higher throughput than single-input, single-output systems. Unfortunately, it can be difficult to find the space-time codes these systems need to achieve their potential. Previously published results located good codes by minimizing the maximum correlation between transmitted signals. This paper shows how this min-max method may produce sub-optimal codes. A new method which sorts codes based on the union bound of pairwise error probabilities is presented. This new technique can identify superior MIMO codes, providing higher system throughput without increasing the transmitted power or bandwidth requirements.
Zhongkui, Lei, Xie Qiucheng, and Cao Jie. "Research and Recommendation of Optimum Group Synchronization Codes for N = 7 -- 32." International Foundation for Telemetering, 1988. http://hdl.handle.net/10150/615069.
Full textIn this paper, based on a series of research achievements [2,3,4,5,6], are examined the "The Optimum Frame Synchronization Codes" provided by J. L. Maury Jr. and F. J. Styles for IRIG Telemetry Standards USA, and furthermore, recommended a set of Optimum Group Synchronization Codes for China Telemetry Standards.
Schmitt, Maxime. "Génération automatique de codes adaptatifs." Thesis, Strasbourg, 2019. http://www.theses.fr/2019STRAD029.
Full textIn this thesis we introduce a new application programming interface to help developers to optimize an application with approximate computing techniques. This interface is provided as a language extension to advise the compiler about the parts of the program that may be optimized with approximate computing and what can be done about them. The code transformations of the targeted regions are entirely handled by the compiler to produce an adaptive software. The produced adaptive application allocates more computing power to the locations where more precision is required, and may use approximations where the precision is secondary. We automate the discovery of the optimization parameters for the special class of stencil programs which are common in signal/image processing and numerical simulations. Finally, we explore the possibility of compressing the application data using the wavelet transform and we use information found in this basis to locate the areas where more precision may be needed
Schmidt, Kai-Uwe. "On spectrally bounded codes for multicarrier communications." Dresden Vogt, 2007. http://deposit.d-nb.de/cgi-bin/dokserv?id=2973482&prov=M&dok_var=1&dok_ext=htm.
Full textLawson, John. "Duty specific code driven design methodology : a model for better codes." Thesis, University of Aberdeen, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274818.
Full textFirmanto, Welly T. (Welly Teguh) Carleton University Dissertation Engineering Systems and Computer. "Code combining of Reed-Muller codes in an indoor wireless environment." Ottawa, 1995.
Find full textVeluri, Subrahmanya Pavan Kumar. "Code Verification and Numerical Accuracy Assessment for Finite Volume CFD Codes." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/28715.
Full textPh. D.
Huang, Weizheng. "Investigation on Digital Fountain Codes over Erasure Channels and Additive White Gaussian Noise Channels." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1336067205.
Full textEl, Shafey Ezzat. "Codes linguistiques et alternance de codes chez les immigrants égyptiens en France." Thesis, Sorbonne université, 2019. http://www.theses.fr/2019SORUL071.
Full textThis thesis analyses for the first time the language practices of the growing community of Egyptian immigrants in France. The morphosyntactical analysis is made in the framework of insertional theory Matrix Language Frame of Myers-Scotton (1993, 1997 and 2000). We find that the Egyptians of the first generation resort to code switching without realizing it or recognizing it while those of second generation are aware of the linguistic characteristics of the language contact. Furthermore, the Egyptian woman, with her role of maintaining Arabic with her children, finds her femininity in learning French and therefore she plays an important role in the practice of code switching within the family. The reasons of the code switching in the Egyptian community are varied, for example, the quotation or the reported speech ; the designation of an interlocutor by integrating into a group an interlocutor kept apart ; the humor that particularly characterizes the Egyptians of the first generation ; the spontaneity and the precision by opting directly for the most immediately available lexeme even if it is in a different language than the rest of the communication. Our informants of the first generation use morphological procedures to simplify the use of French words having sounds that don’t exist in Egyptian Arabic or those that consist of more than three syllables. We use the characteristics of this language contact to help Egyptian students newlly arrived to succeed in their schooling and integrate into the French society through the mastering of French language
Parra, Avila Benigno Rafael. "On Rational and Periodic Power Series and on Sequential and Polycyclic Error-Correcting Codes." Ohio University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1257886601.
Full textSabir, Tanveer. "Classification of Perfect codes in Hamming Metric." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-13833.
Full text