To see the other types of publications on this topic, follow the link: Tag Network.

Dissertations / Theses on the topic 'Tag Network'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Tag Network.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ye, Qianyun. "2.4-GHz Wireless Network Based Multi-Tag Access System." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188491.

Full text
Abstract:
Machine-to-Machine technology has been intensively researched recently which is believed to take the role of leading ICT industry development. Wireless Sensor Networks provide solution to integrate numerous numbers of machines who require features include low power, low cost, and flexible, which can be fulfilled by applying Zigbee technique. This thesis devotes an effort into Wireless Sensor Network development that a Multi- Tag System operating on 2.4-GHz wireless network is developed. A theoretical study about ZigBee protocol and its bottom layers IEEE 802.15.4 standard is provided to lay a foundation of the design work. The thesis also includes a practical usage of low cost TI CC2530 Systom-on-Chip, together with the illustration of software development inside the chip. The design work provides GUI Platform for users to register themselves into the network and central monitoring platform to track all users within the area. Both GUI platforms are developed based on VB IDE. The Multi-Tag Access System is suitable for attendee control functionality in big-scale conference, events, and lecture, which is also a prototype expecting more functionality to be added in the future.
APA, Harvard, Vancouver, ISO, and other styles
2

Wei, Wei. "Utilizing Social Bookmarking Tag Space for Web Content Discovery: A Social Network Analysis Approach." Diss., The University of Arizona, 2010. http://hdl.handle.net/10150/195123.

Full text
Abstract:
Social bookmarking has gained popularity since the advent of Web 2.0. Keywords known as tags are created to annotate web content, and the resulting tag space composed of the tags, the resources, and the users arises as a new platform for web content discovery. Useful and interesting web resources can be located through searching and browsing based on tags, as well as following the user-user connections formed in the social bookmarking community. However, the effectiveness of tag-based search is limited due to the lack of explicitly represented semantics in the tag space. In addition, social connections between users are underused for web content discovery because of the inadequate social functions. In this research, we propose a comprehensive framework to reorganize the flat tag space into a hierarchical faceted model. We also studied the structure and properties of various networks emerging from the tag space for the purpose of more efficient web content discovery.The major research approach used in this research is social network analysis (SNA), together with methodologies employed in design science research. The contribution of our research includes: (i) a faceted model to categorize social bookmarking tags; (ii) a relationship ontology to represent the semantics of relationships between tags; (iii) heuristics to reorganize the flat tag space into a hierarchical faceted model using analysis of tag-tag co-occurrence networks; (iv) an implemented prototype system as proof-of-concept to validate the feasibility of the reorganization approach; (v) a set of evaluations of the social functions of the current networking features of social bookmarking and a series of recommendations as to how to improve the social functions to facilitate web content discovery.
APA, Harvard, Vancouver, ISO, and other styles
3

Hijazi, Issa, and Pontus Pettersson. "Animal ID Tag Recognition with Convolutional and Recurrent Neural Network : Identifying digits from a number sequence with RCNN." Thesis, Högskolan i Skövde, Institutionen för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-17031.

Full text
Abstract:
Major advances in machine learning have made image recognition applications, with Artificial Neural Network, blossom over the recent years. The aim of this thesis was to find a solution to recognize digits from a number sequence on an ID tag, used to identify farm animals, with the help of image recognition. A Recurrent Convolutional Neural Network solution called PPNet was proposed and tested on a data set called Animal Identification Tags. A transfer learning method was also used to test if it could help PPNet generalize and better recognize digits. PPNet was then compared against Microsoft Azures own image recognition API, to determine how PPNet compares to a general solution. PPNet, while not performing as good, still managed to achieve competitive results to the Azure API.
APA, Harvard, Vancouver, ISO, and other styles
4

Esfahani, Alireza. "Security schemes against pollution attacks in network coding over wireless networks." Doctoral thesis, Universidade de Aveiro, 2017. http://hdl.handle.net/10773/21773.

Full text
Abstract:
Doutoramento em Telecomunicações
Resumo em português não disponivel
The topic of this thesis is how to achieve e cient security against pollution attacks by exploiting the structure of network coding. There has recently been growing interest in using network coding techniques to increase the robustness and throughput of data networks, and reduce the delay in wireless networks, where a network coding-based scheme takes advantage of the additive nature of wireless signals by allowing two nodes to transmit simultaneously to the relay node. However, Network Coding (NC)-enabled wireless networks are susceptible to a severe security threat, known as data pollution attack, where a malicious node injects into the network polluted (i.e., corrupted) packets that prevent the destination nodes from decoding correctly. Due to recoding at the intermediate nodes, according to the core principle of NC, the polluted packets propagate quickly into other packets and corrupt bunches of legitimate packets leading to network resource waste. Hence, a lot of research e ort has been devoted to schemes against data pollution attacks. Homomorphic Message Authentication Code (MAC)-based schemes are a promising solution against data pollution attacks. However, most of them are susceptible to a new type of pollution attack, called tag pollution attack, where an adversary node randomly modi es tags appended to the end of the transmitted packets. Therefore, in this thesis, we rst propose a homomorphic message authentication code-based scheme, providing resistance against data pollution attacks and tag pollution attacks in XOR NC-enabled wireless networks. Moreover, we propose four homomorphic message authentication code-based schemes which provide resistance against data and tag pollution attacks in Random Linear Network Coding (RLNC). Our results show that our proposed schemes are more e cient compared to other competitive tag pollution immune schemes in terms of complexity, communication overhead and key storage overhead.
APA, Harvard, Vancouver, ISO, and other styles
5

Jeevarathnam, Nanda Gopal. "Grid-Based RFID Indoor Localization Using Tag Read Count and Received Signal Strength Measurements." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/7039.

Full text
Abstract:
Passive ultra-high frequency (UHF) radio frequency identification (RFID) systems have gained immense popularity in recent years for their wide-scale industrial applications in inventory tracking and management. In this study, we explore the potential of passive RFID systems for indoor localization by developing a grid-based experimental framework using two standard and easily measurable performance metrics: received signal strength indicator (RSSI) and tag read count (TRC). We create scenarios imitating real life challenges such as placing metal objects and other RFID tags in two different read fields (symmetric and asymmetric) to analyze their impacts on location accuracy. We study the prediction potential of RSSI and TRC both independently and collaboratively. In the end, we demonstrate that both signal metrics can be used for localization with sufficient accuracy whereas the best performance is obtained when both metrics are used together for prediction on an artificial neural network especially for more challenging scenarios. Experimental results show an average error of as low as 0.286 (where consecutive grid distance is defined as unity) which satisfies the grid-based localization benchmark of less than 0.5.
APA, Harvard, Vancouver, ISO, and other styles
6

Klaus, Jan Philipp. "Three Essays on the Effects of Executives' Informal Networks on Shareholder Value, Financial and Tax Reporting Outcomes." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1707258/.

Full text
Abstract:
Prior literature suggests that CEOs capitalize on their position within the hierarchy of all business executives, resulting in various – both positive and negative – firm outcomes. Using a novel data set on golf outings to measure the quality of a CEO's informal (vs. formal) network, as measured by the CEO's network centrality, this study examines whether well-connected CEOs generate private gains through insider trades. Results suggest that, among golfing CEOs, CEOs with higher quality informal networks generate significantly higher insider trading profits on sales of their firms' stock, consistent with more famous, powerful, and influential CEOs possessing superior information. The paper continues by delineating a channel through which private information flow to network participants by documenting significantly different golf patterns of CEOs during the two weeks before material firm events become public while showing that CEOs generate noticeably higher insider trading profits from stock trades executed during the two weeks following these golf outings. This study highlights a setting in which shareholders are at risk of wealth transfer and illustrates the potential limitations of regulation concerning insider trading.
APA, Harvard, Vancouver, ISO, and other styles
7

Cranley, Nikki. "The Implications for Network Switch Design in a Networked FTI Data Acquisition System." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595675.

Full text
Abstract:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada
Switches are a critical component in any networked FTI data acquisition system in order to allow the forwarding of data from the DAU to the target destination devices such as the network recorder, PCM gateways, or ground station. Commercial off the shelf switches cannot meet the harsh operating conditions of FTI. This paper describes a hardware implementation of a crossbar switching architecture that meets the reliability and performance requirements of FTI equipment. Moreover, by combining the crossbar architecture with filtering techniques, the switch can be configured to achieve sophisticated forwarding operations. By way of illustration, a Gigabit network tap application is used to demonstrate the fundamental concepts of switching, forwarding, crossbar architecture, and filtering.
APA, Harvard, Vancouver, ISO, and other styles
8

Guo, Yue. "Capability assessment of VAr support and demand response to transmission network using flexible tap changing techniques in distribution networks." Thesis, University of Manchester, 2017. https://www.research.manchester.ac.uk/portal/en/theses/capability-assessment-of-var-support-and-demand-response-to-transmission-network-using-flexible-tap-changing-techniques-in-distribution-networks(5a373163-d2c9-4e13-9720-0c4fa0456c3f).html.

Full text
Abstract:
Due to the increasing integration of renewable energy generations, the overvoltage and overload issues in transmission networks have become more significant, and they may occur at various locations. To mitigate the overvoltage issues, traditional solutions which often consider the installation of reactive power compensators such as shunt reactors, SVC, STATCOM may not be cost-effective. To mitigate the overload issues, traditional methods using direct or price-based demand control will affect customers’ electrical experience in that they are inconvenienced greatly. This thesis discusses the flexible tap changing techniques that utilise existing parallel transformers in distribution networks to provide reactive power absorption and demand response services for transmission systems. Among them, the tap stagger technique operates parallel transformers in small different tap positions, i.e. staggered taps, to result in more reactive power absorption from upstream networks. In addition, the tap changing technique changes voltages in the range of statutory limits through the adjustment of tap positions in order to change network demands without directly affecting customers. The aggregated reactive power absorption or demand response from many pairs of parallel transformers in distribution networks could be sufficient to provide VAr or demand support to transmission networks. Network capability studies have been carried out in OpenDSS simulation software to investigate the VAr absorption capability by using tap staggering technique and the demand reduction capability by using tap changing technique. The studies are based on two UK HV distribution networks (132-33kV) with 11 and 28 primary substations (33/11 or 6.6 kV) respectively, and the techniques are applied to parallel transformers in primary substations. Based on the results of the two networks, the capabilities of the whole ENW and the UK distribution networks have been estimated respectively by using linear estimation method. In addition, the VAr absorption capability of the tap stagger technique has been validated by using site trial data. The results show an average VAr absorption capability of 0.89MVAr for a primary substation, 315MVAr for ENW networks and about 2500MVAr for the UK at stagger level 4 and show an average demand reduction capability of 3.1% of the original demand at tap down level 3. The results of capability studies together with the validations results confirm that the flexible tap changing techniques are able to provide transmission networks with effective VAr support and demand response services. To assess network VAr absorption and demand response capability more precisely, this thesis also proposes an online load profile estimation method to estimate the load profiles of the network more accurately if not all substations in the network are monitored. The method uses Peak Load Share values, Euclidean Distance, and some load measurements to estimate load profiles. The method has been validated and compared with a traditional aggregation-based method. The results show an average estimation error of 13% ~ 23% in different conditions using the proposed method, and show an average estimation error reduction from about 47% (using the traditional method) to about 13% (using the proposed method). The results indicate that the developed method has a considerable improvement on the accuracy of load profile estimation.
APA, Harvard, Vancouver, ISO, and other styles
9

Baloch, Fariha. "Tag anti-collision algorithms for active and passive RFID networks with foresight." Diss., Wichita State University, 2014. http://hdl.handle.net/10057/10931.

Full text
Abstract:
In the world where initiatives to automate jobs are becoming a norm, it is no surprise that the interest in radio frequency identification (RFID) networks has grown exponentially. With RFID technology, organizations around the world can reduce their workforce and grow their businesses. However, this technology is not yet at a maturity point. For example, in order for a cart full of groceries to go through an unmanned checkout lane, it is crucial that all of the tagged items are read and processed with 100% reliability. Also, the time to process items needs to be fast enough so that customers can pay and be on their way as quickly as possible. In order to achieve speed and reliability, many transmission control protocols have been devised. The most popular protocol with passive RFID equipment manufacturers is Electronic Product Code global (EPCglobal(R)) Class 1 Generation 2, or simply EPC C1G2. Transmission control in the EPC C1G2 protocol is achieved with framed slotted ALOHA (FSA), where tags pick a random slot from choices given by the reader, and when their turn comes, they backscatter their information to the reader. FSA produces three kinds of slots: empty, collided, and successful. Empty and collided slots are categorized under unsuccessful slots, and the time spent on these is considered as wasted time. Several research studies in the past have focused on reducing the occurrence of unsuccessful slots by using new and innovative methods and increasing RFID network throughput. The motivation of this research, however, is to reduce the overall time of reading tags in a passive and active RFID network by minimizing the time spent on unsuccessful slots. This research builds upon methods used in previous research, and proposes three new methods for passive RFID systems and one new method for active RFID systems in order to diminish wasted time on unsuccessful slots.
Thesis (Ph.D.)-- Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
10

Holmeide, Øeyvind, and Markus Schmitz. "Advanced Network Tap Application for Flight Test Instrumentation Systems." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596387.

Full text
Abstract:
ITC/USA 2015 Conference Proceedings / The Fifty-First Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2015 / Bally's Hotel & Convention Center, Las Vegas, NV
Digital data distribution systems are widely used in Aerospace and Defense products to allow devices to communicate with one another. In many cases it is desirable to monitor the data traffic flowing between two points in a copper or fiber based Operational or Onboard Network System (ONS) for Flight Test Instrumentation (FTI) purposes because these ONS systems may carry important data which can be used without duplicating/installing a specific FTI data acquisition system to receive this data. The two types of network taps that can be used are Inline Network Taps and network end-point taps. This paper examines the usage of Inline Network Taps for FTI applications and how they can support network access strategies and objectives. An Inline Network Tap is a hardware device which allows access to data flowing across a network. These devices are typically active/powered and have a number of ports: a first tap port, a second tap port, and one or more mirror ports. An in-line network tap inserted between the first and second tap port passes all data traffic through unimpeded but also copies that same data to one or more mirror ports. Some Inline Network Tap devices may also pass packets when the tap is not powered or a malfunction is detected on the device via an integrated by-pass function. If the Inline Network Tap device goes offline the unit automatically bypasses the tap connection and data traffic is directed through the bypass directly to network devices. This capability is crucial for inline usage on mission critical network segments that cannot afford the risk of losing the network connection. An in-line network tap can either be based on copper or fiber technology and as a "filterable" network tap can also provide advanced packet filtering capabilities. These filterable network taps can selectively pass data, e.g., based on VLAN ID or other parameters, to a mirror port for deep analysis, monitoring and recording. Another advanced tap function that is presented in this paper is the support for inserting time stamps at the tap level in monitored packets which provides a reference time when the data content of a given packet was generated at a data source. This capability is a significant feature for FTI applications as most ONS systems do not provide time stamped data.
APA, Harvard, Vancouver, ISO, and other styles
11

Tao, Tao [Verfasser], Andreas [Akademischer Betreuer] Czylwik, and Volker [Akademischer Betreuer] Kühn. "Relay Technology in Cellular Networks / Tao Tao. Gutachter: Volker Kühn. Betreuer: Andreas Czylwik." Duisburg, 2014. http://d-nb.info/1063278201/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Petkova, Kunka, Andrzej Stasio, and Martin Zagler. "On the relevance of double tax treaties." WU Vienna University of Economics and Business, Universität Wien, 2018. http://epub.wu.ac.at/6071/1/SSRN%2Did3126593.pdf.

Full text
Abstract:
This paper investigates the effects of double tax treaties (DTTs) on foreign direct investment (FDI) after controlling for their relevance in the presence of treaty shopping. DTTs cannot be considered a bilateral issue, but must be viewed as a network, since FDI can flow from home to host country through one or more conduit countries. By accounting for treaty shopping, we calculate the shortest (i.e. the cheapest) tax distance between any two countries allowing the corporate income to be channelled through intermediate jurisdictions. We differentiate between relevant and neutral DTTs - i.e. tax treaties that offer investors a financial advantage - and irrelevant DTTs and use these data to derive two important results. First, only relevant and neutral tax treaties increase bilateral FDI, whereas irrelevant DTTs do not. We can quantify the increase of FDI due to a relvant DTT at around 22%. Second, significant tax reductions due to treaty benefits will lead to an increase in FDI.
Series: WU International Taxation Research Paper Series
APA, Harvard, Vancouver, ISO, and other styles
13

Finley, Andrew Rhodes. "The Impact of Large Tax Settlements on Firms' Subsequent Tax and Financial Reporting." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/555888.

Full text
Abstract:
In this study, I examine how firms change their tax avoidance and financial reporting following large tax settlements. I find that firms decrease tax avoidance following large settlements and this effect is concentrated among firms under-reserved for the settlement for financial accounting purposes. Additionally, my results suggest firms learn from tax examination resolutions in a way that affects their financial reporting over the tax account. Finally, I find that the effect of large settlements also spills over to firms within the same auditor network. This study provides context to the tax authority's efficacy in deterring tax avoidance and highlights its role in the financial reporting process.
APA, Harvard, Vancouver, ISO, and other styles
14

Eriksson, Lina, and Mattias Hildén. "Vem tar beslut om inte chefen? : -en kvalitativ studie om chefslösa organisationer." Thesis, Uppsala universitet, Sociologiska institutionen, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-295504.

Full text
Abstract:
Hierarkier har funnits under en lång tid och är för många en självklarhet inom organisationer. Vi vill i denna uppsats undersöka tre organisationer i Sverige, som menar att de utmanar den hierarkiska strukturen genom att de inte har några chefer. Syftet med uppsatsen är att öka kunskapen om dessa organisationer genom att undersöka hur beslut tas och färdas. Vi undersöker även vad det är som påverkar beslut och beslutsfattande i dessa organisationer. Tidigare forskning behandlar dels organisationsutveckling ur ett historiskt perspektiv och hur beslut kommer till, olika beslutsmodeller, hur beslut färdas och implementeras och kopplingen mellan beslut och ansvar. Det teoretiska perspektivet är Actor- Network Theory, ANT. Empirin har samlats in genom nio stycken kvalitativa intervjuer. Den har kodats och analyserats utifrån teorins begrepp aktör-nätverk, performativitet, handlingsnät och översättning. Beslut har analyserats som en symbol, vilken kan skapas och färdas inom organisationen med hjälp av olika aktörer. Studien visar på att begreppet beslut är starkt kopplat till ett agerande. Beslut som något performativt blir en översättningskedja som består av många detaljer som lättare beskrivs med ett sammanfattande beskrivande begrepp, beslut, för att kunna begripliggöra vad det är. Vi har även hittat faktorer i materialet som visar på hur beslut är kopplat till den decentraliserade strukturen samt att medarbetaren som individ blir viktig. Slutligen förs en diskussion av resultatet i förhållande till frågeställningar, tidigare forskning, teori och metod samt ger implikationer för vidare forskning inom ämnet.
APA, Harvard, Vancouver, ISO, and other styles
15

Ta, Thi Minh Tam [Verfasser]. "Test-Retest Reliabilität des Attention-Network-Test bei Schizophrenie / Thi Minh Tam Ta." Berlin : Medizinische Fakultät Charité - Universitätsmedizin Berlin, 2013. http://d-nb.info/1037725654/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Hmimida, Manel. "Une nouvelle approche topologique pour la recommandation de tags dans les folksonomies." Thesis, Paris, CNAM, 2015. http://www.theses.fr/2015CNAM1054/document.

Full text
Abstract:
Nous nous intéressons dans cette thèse à la problématique de recommandation de tags dans les systèmes de partage et de classification sociale des ressources, dits folksonomies. Les utilisateurs annotent les ressources à partager par des tags librement choisis. Or, la liberté de choix de tags les rends ambigus. Nous proposons une nouvelle approche topologique nommé TLTR (Two Level Tag Recommendation)pour la recommandation de tags. TLTR est basée sur une approche originale de compression des graphes. Le graphe d'une folksonomie est compressé en appliquant une méthode de clustering sur chacune des trois composantes d'une folksonomie, à savoir: l'ensemble des utilisateurs, des ressources et des tags. Nous proposons également une méthode de clustering topologique basée sur une approche centrée graine pour la détection des communautés dans les graphes multiplexes. Une approche topologique classique, en occurrence la méthode Folkrank, est appliquée sur le graphe réduit afin de sélectionner les clusters de tags les plus appropriés. Ces clusters sont ensuite utilisés pour construire un autre graphe contextuel extrait du graphe original représentant la folksonomie. La méthode Folkrank est à nouveau appliquée afin de calculer la liste de tags à recommander. Des expérimentations sur des grandes folksonomies, notamment, des jeux de données extraits du système de partage des références bibliographiques Bibsonomy montrent la pertinence de notre approche
We focus in this thesis on the problem of tag recommendation in social sharing to classification systems called folksonomies. Users of a folksonomy annotate their resources with freely tags chosen. We propose here a new topological approach for tags recommendation called TLTR (Two Level Tag Recommendation). TLTR (Two Level Tag Recommendation) is based on an original approach of graph compression. The graph of a folksonomy is compressed by a clustering each of the three components, namely the set of users, resources and tags. A topological clustering method based on a seed-centered approach for community detection in multiplex graphs is proposed. A classical topological approach, namely Folkrank, is applied to the reduced graph to select the most appropriate clusters of tags. These clusters are then used to build another contextual graph extracted from the original graph representing the folksonomy. Folkrank method is applied again to compute the list of tags to recommend. Experiments on large folksonomy, including, data extracted from references system Bibsonomy show the relevance of our approach
APA, Harvard, Vancouver, ISO, and other styles
17

Gao, Chao. "Voltage control in distribution networks using on-load tap changer transformers." Thesis, University of Bath, 2013. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.607476.

Full text
Abstract:
Voltage is one of the most important parameters for electrical power networks. The Distribution Network Operators (DNOs) have the responsibility to maintain the voltage supplied to consumers within statutory limits. On-Load Tap Changer (OLTC) transformer equipped with Automatic Voltage Control (AVC) relay is the most widely used and effective voltage control device. Due to a variety of advantages of adding Distributed Generation (DG), more and more distributed resources are connected to local distribution networks to solve constraints of networks, reduce the losses from power supply station to consumers. When DG is connected, the direction of power flow can be reversed when the DG output power exceeds the local load. This means that the bidirectional power flow can either be from power grid towards loads, or vice versa. The connection point of DG may suffer overvoltage when the DG is producing a large amount of apparent power. The intermittent nature of renewable energy resources which are most frequently used in DG technology results in uncertainty of distribution network operation. Overall, conventional OLTC voltage control methods need to be changed when DG is connected to distribution networks. The required voltage control needs to address challenges outlined above and new control method need to be formulated to reduce the limitations of DG output restricted by current operational policies by DNOs. The thesis presents an analysis of voltage control using OLTC transformer with DG in distribution networks. The thesis reviews conventional OLTC voltage control schemes and existing policies of DNOs in the UK. An overview of DG technologies is also presented with their operation characteristics based on power output. The impact of DG on OLTC voltage control schemes in distribution networks is simulated and discussed. The effects of different X/R ratio of overhead line and underground cable are also considered. These impacts need to be critically assessed before any new method implementation. The thesis also introduces the new concepts of Smart Grid and Smart Meter in terms of the transition from passive to active distribution networks. The role of Smart Meter and an overview of communication technologies that could be used for voltage control are investigated. The thesis analyses the high latency of an example solution of which cost and availability are considered to demonstrate the real-time voltage control using Smart Metering with existing communication infrastructures cannot be achieved cost-effectively. The thesis provides an advanced compensation-based OLTC voltage control algorithm using Automatic Compensation Voltage Control (ACVC) technique to improve the voltage control performance with DG penetration without communication. The proposed algorithm is simulated under varying load and DG conditions based on Simulink MATLAB to show the robustness of the proposed method. A generic 11kV network in the UK is modelled to evaluate the correct control performance of the advanced voltage control algorithm while increasing the DG capacity.
APA, Harvard, Vancouver, ISO, and other styles
18

Hallinan, Grace Isabella. "Neurotraffic : oriented neuronal networks for investigating the mechanisms of tau propagation." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/418421/.

Full text
Abstract:
Neurofibrillary tangles (NFTs), a pathological hallmark of Alzheimer’s disease (AD), consist of insoluble aggregates of hyperphosphorylated tau protein. In AD, NFTs are seen to accumulate first in the entorhinal cortex, and with progression of AD they appear in neighbouring regions such as the hippocampus, followed by the neocortex in late stages. Examination of the neuroanatomical localisation of NFTs in AD brains suggests that the NFTs spread through the brain due to the propagation of pathogenic tau along anterograde connected brain circuits. Pathogenic tau can spread between cells, and it can act as a prion-like seed, inducing misfolding of healthy tau. However, it is not yet known how tau spreads between neurons, or if the diseased cells need to die in order to propagate pathology. In this project, we recreated a minimalistic neuronal circuit, and established a robust and reproducible system through which tau propagation can be examined extensively in vitro. With this we show that pathogenic tau formed in a diseased donor neuron can both spread intracellularly, and trigger a prion-like misfolding of healthy tau in connected neurons, without the death of the do neurons. We determined that pathogenic tau is actively spread along intact neuronal circuits, with a preference for anterograde directionality. We also discovered tau aggregation-resistance in a neuronal subpopulation, and in an axonal subcompartment. Our established method of interrogating the propagation of tau in disease can now be used for further studies to determine the specific molecular mechanisms at play.
APA, Harvard, Vancouver, ISO, and other styles
19

Chik, Tai-wai David. "Global coherent activities in inhibitory neural systems Chik Tai Wai David." Click to view the E-thesis via HKUTO, 2004. http://sunzi.lib.hku.hk/hkuto/record/B31040408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Moen, Henrik Ljøgodt. "A Study of Wi-Fi RFID Tags in Citywide Wireless Networks : How well do Wi-Fi RFID tags work in outdoor Wi-Fi networks and is it possible to build commercial services based on Wi-Fi RFID tags in citywide wireless networks?" Thesis, Norwegian University of Science and Technology, Department of Telematics, 2007. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-8775.

Full text
Abstract:

Active Radio Frequency Identification (RFID) tags that comply with IEEE 802.11 standards are currently used within indoor Real-Time Location Systems (RTLS) in several niche markets. With the rapid deployment of citywide wireless networks, outdoor Location-Based Services (LBS) have become an important research area. Such services are believed to have a considerable business potential in citywide wireless networks. Wi-Fi RFID tags can be used to take advantage of such a potential. However, very limited testing has been carried out in order to examine the performance of the Wi-Fi RFID technology in outdoor environments. Wireless Trondheim is one of the first citywide wireless networks in Europe. In this Master's thesis, the possibilities for building commercial services based on Wi-Fi RFID tags in Wireless Trondheim are examined. Three potential services, which can utilize such tags are also proposed. In order to verify the reality of a possible implementation of these services, five test scenarios are carried out with Wi-Fi RFID tags within Wireless Trondheim. The location-based solution in Wireless Trondheim has explicitly no support for determining location in outdoor environments. Nevertheless, testing is important to identify how well the Wi-Fi RFID technology perform in such environments. The results presented in this report point out several limitations with this technology in the citywide wireless network. Considerable variations in the location accuracy and precision are revealed. Problems with delayed location updates when traveling between adjacent coverage zones are also discovered. These limitations constrain the commercial services that can be based on Wi-Fi RFID tags in Wireless Trondheim. Currently, on-demand services with limited requirements to the accuracy of the computed location are supported to some extent. However, real-time services, which require a high degree of location accuracy are not supported with the location-based solution in this citywide wireless network. The described limitations should be improved in order to achieve an acceptable performance for LBS. Such improvements are also essential in order to determine the business potential of LBS in in a citywide wireless network like Wireless Trondheim.

APA, Harvard, Vancouver, ISO, and other styles
21

Braun, Julia, and Hernandez Daniel Fuentes. "A Legal and Economic Analysis of Austria's Double Tax Treaty Network with Developing Countries." WU Vienna University of Economics and Business, Universität Wien, 2014. http://epub.wu.ac.at/4354/1/SSRN%2Did2516308.pdf.

Full text
Abstract:
To what degree developing countries gain from signing double tax treaties is being hotly debated. In this paper, we analyze the Austrian tax treaty policy. Combining legal and economic perspectives, we find that developing countries are likely to expect both positive and negative impacts from signing a double tax treaty (DTT) with Austria. On the one hand, the results of our econometric analysis suggest that middle-income countries that sign a DTT with Austria may expect an increased number of foreign direct investment projects from Austrian companies. On the other hand, the signatory states may suffer from limited withholding taxation rights established in the DTTs for the source country, which could lead to reduced tax revenues in the developing countries. (authors' abstract)
Series: WU International Taxation Research Paper Series
APA, Harvard, Vancouver, ISO, and other styles
22

Chik, Tai-wai David, and 戚大衛. "Global coherent activities in inhibitory neural systems: Chik Tai Wai David." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B31040408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Srinivasan, Nikhil S. "The Long-Tails in Content Services: How the Structure of Hybrid Networks Shape Content Popularity and Related Decision-Making." Case Western Reserve University School of Graduate Studies / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=case1355748209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

SANTO, DANIEL PRADO DO ESPÍRITO. "THE INFLUENCE OF TAX PLANNING IN THE DISTRIBUTION NETWORK DESIGN AND LOCATION OF DISTRIBUTION CENTERS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2015. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=26871@1.

Full text
Abstract:
A inclusão da gestão tributária no planejamento da cadeia de distribuição é fator diferenciador, especialmente no Brasil, onde os Estados têm políticas tributárias díspares e uma postura agressiva para atrair empresas. A inclusão das preocupações tributárias quando da definição de redes de distribuição, nomeadamente na escolha de localização de infraestruturas, é, no entanto, ainda feito de forma empírica. Para avaliar o impacto dos incentivos fiscais no desenho da rede de distribuição, foi proposto um modelo de programação linear inteira mista (PLIM), incluindo como parâmetros e restrições as oportunidades criadas pela política tributária. O objetivo é definir o número e o local de centros de distribuição, bem como a alocação de clientes a cada centro, tal que o custo logístico seja minimizado (custo de frete, custo de construção, operação e manutenção dos centros de distribuição e custos tributários divididos entre mudanças de alíquotas de produtos e de fretes ao realizar cada transferência de localização). O modelo é aplicado a uma empresa brasileira que comercializa produtos químicos e foi instalada em um local distante do ponto de entrega final dos produtos, devido à inserção em um programa de incentivos fiscais, sem a adoção de nenhum modelo de localização para avaliação desta estratégia. A solução gerada pelo modelo obteve menores custos totais para o novo desenho de rede em comparação com a rede atual.
Including tax management in supply chain planning is a profitable differentiating factor, especially in Brazil, where each State exhibits its own tax policy. Some studies have been conducted taking into account the tax issues in the logistics network design, however this thesis takes into account the tax incentives offered by some Brazilian states to attract business. To assess the impact of tax incentives in the distribution network design, it proposed a model for locating distribution centers based on Mixed Integer Linear Programming (MILP) that includes parameters and factors related to the restrictions and opportunities created by Brazilian tax policies. The model is applied to a Brazilian company that sells chemical products. This company is installed in a location away from the end point of delivery of the products due to insertion into a tax incentive program, without adopting any location model for evaluating the strategy. The goal is to determine the actual advantages of a reduction in tax rates offset an increase in logistics transportation costs. The solution determined whether the construction of a new distribution center is beneficial, if the results generated by the model had lower total costs for the new network design compared to the current network.
APA, Harvard, Vancouver, ISO, and other styles
25

Petkova, Kunka, Andrzej Stasio, and Martin Zagler. "On the relevance of double tax treaties." Springer US, 2020. http://epub.wu.ac.at/7181/1/2019itax.pdf.

Full text
Abstract:
This paper investigates the effects of double tax treaties (DTTs) on foreign direct investment (FDI) after controlling for their relevance in the presence of treaty shopping. DTTs cannot be considered a bilateral issue, but must be viewed as a network. We define tax distance as the cost of channelling corporate income from one country to another and, by considering treaty shopping through intermediate jurisdictions, we calculate the shortest (i.e. the cheapest) distance between any two countries. We show that relevant tax treaties-which reduce the direct tax distance both over domestic law and the entire existing treaty network-will increase FDI by about 18%.
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Linwei. "Distribution network supports for transmission system reactive power management." Thesis, University of Manchester, 2015. https://www.research.manchester.ac.uk/portal/en/theses/distribution-network-supports-for-transmission-system-reactive-power-management(abcc8197-fd85-478b-b91a-fd3d0b3220db).html.

Full text
Abstract:
To mitigate high voltages in transmission systems with low demands, traditional solutions often consider the installation of reactive power compensators. The deployment and tuning of numbers of VAr compensators at various locations may not be cost-effective. This thesis presents an alternative method that utilises existing parallel transformers in distribution networks to provide reactive power supports for transmission systems under low demands. The operation of parallel transformers in small different tap positions, i.e. with staggered taps, can provide a means of absorbing reactive power. The aggregated reactive power absorption from many pairs of parallel transformers could be sufficient to provide voltage support to the upstream transmission network. Network capability studies have been carried out to investigate the reactive power absorption capability through the use of tap stagger. The studies are based on a real UK High Voltage distribution network, and the tap staggering technique has been applied to primary substation transformers. The results confirm that the tap staggering method has the potential to increase the reactive power demand drawn from the transmission grid. This thesis also presents an optimal control method for tap stagger to minimise the introduced network loss as well as the number of tap switching operations involved. A genetic algorithm (GA) based procedure has been developed to solve the optimisation problem. The GA method has been compared with two alternative solution approaches, i.e. the rule-based control scheme and the branch-and-bound algorithm. The results indicate that the GA method is superior to the other two approaches. The economic and technical impacts of the tap staggering technique on the transmission system has been studied. In the economic analysis, the associated costs of applying the tap staggering method have been investigated from the perspective of transmission system operator. The IEEE Reliability Test System has been used to carry out the studies, and the results have been compared with the installation of shunt reactors. In the technical studies, the dynamic impacts of tap staggering or reactor switching on transmission system voltages have been analysed. From the results, the tap staggering technique has more economic advantages than reactors and can reduce voltage damping as well as overshoots during the transient states.
APA, Harvard, Vancouver, ISO, and other styles
27

Wilmot, Sinbad, and Diarmuid Corry. "EVALUATING IEEE 1588 IN A HOMOGENOUS SWITCHED NETWORK TEST ARTICLE SEGMENT." International Foundation for Telemetering, 2007. http://hdl.handle.net/10150/604573.

Full text
Abstract:
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada
At the 2007 iNet Technology Demonstrator multiple vendors are asked to participate to develop and evaluate protocols for time synchronization, configuration identification and heterogeneous data packet transfer. The iNet initiative from RCC is aimed at focusing and collating telemetry network developments within the wider sphere of commercial and military network developments. The KAM-500 is an inherently networked data-acquisition system offering seamless gateways to many heterogeneous data sources, such as different sensor devices, avionics-busses, networks and video sources. This paper offers insights into the impact of traffic and network configuration on the performance of heterogeneous data acquisition in a homogenous-switched network based a 1588 enabled controller module.
APA, Harvard, Vancouver, ISO, and other styles
28

Chemburkar, Kirti. "Performance of BFSA Based Anti-Collision Protocols for RFID Networks Supporting Identical Tags." UNF Digital Commons, 2011. http://digitalcommons.unf.edu/etd/124.

Full text
Abstract:
Radio Frequency Identification (RFID) is a powerful emerging technology widely used for asset tracking, supply chain management, animal identification, military applications, payment systems, and access control. Over the years, RFID has emerged as a popular technology in various industries because of its ability to track moving objects. As RFID is becoming less expensive and more robust, many companies and vendors are developing tags to track objects. Multiple vendors manufacture RFID tags worldwide. Therefore, it is quite possible that they manufacture tags with the same identification code (ID) as vendor ID code data sets may not be synchronized or may be subject to tag id errors. Due to this drawback, there is the possibility that non-unique tags exist along with unique tags in the same RFID system. As existing implementations optimize the performance of RFID systems performance based on the assumption of unique tags, it is important to study the effect of non-unique tags on RFID systems. This thesis focuses on a formal analysis of the Basic Frame Slotted ALOHA (BFSA) Muting RFID system with non-unique tags. An RFID network was modeled with OPNET Modeler 14.5. An evaluation model was built to measure the total census delay, optimal frame size, and network throughput for an RFID network based on a BFSA protocol for non-unique tags and support for muting. The evaluation results are in agreement with results obtained from the evaluation of a similar model for unique tags [Kang08]. Comparing total census delay for unique and non-unique tags for variable frame sizes showed an increase in total census delay with an increase in the number of tags. Comparing minimum network throughput, mean network throughput, and maximum network throughput for unique and non-unique tags for variable frame sizes showed a decrease in network throughput with an increase in the number of tags.
APA, Harvard, Vancouver, ISO, and other styles
29

Pavlica, Jan. "Re-identifikace graffiti tagů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2020. http://www.nusl.cz/ntk/nusl-432839.

Full text
Abstract:
This thesis focuses on the possibility of using current methods in the field of computer vision to re-identify graffiti tags. The work examines the possibility of using convolutional neural networks to re-identify graffiti tags, which are the most common type of graffiti. The work experimented with various models of convolutional neural networks, the most suitable of which was MobileNet using the triplet loss function, which managed to achieve a mAP of 36.02%.
APA, Harvard, Vancouver, ISO, and other styles
30

Chattha, Jawwad Nasar. "Characterization of Selfish Behavior in Mobile Ad Hoc Networks through Virtual Emulation." Thesis, Virginia Tech, 2009. http://hdl.handle.net/10919/34666.

Full text
Abstract:
Unlike infrastructure-based networks, mobile ad hoc networks consist of nodes independent of any infrastructure. Cooperation among these nodes is essential for the sustenance of multi hop communication. However, battery and bandwidth constraints may lead nodes in an ad hoc network to adopt energy- and bandwidth-conserving strategies. As routing and packet forwarding are end results of cooperation, network performance is affected when nodes in the network behave selfishly to conserve their resources.

Our work involves characterizing selfish behavior by nodes in ad hoc networks and assessing the effectiveness of adopting tit for tat based strategies, which are meant to discourage selfish behavior in the network. We show that in an ad hoc network where other nodes act selfishly to conserve their resources, a node can benefit by adopting a generous tit for tat strategy. We also show that a node can gain benefit by avoiding selfish nodes in an ad hoc network, adopting a strategy that we call generous tit for tat with selfish avoidance (GTFT-SA).

To analyze the effectiveness of cooperation strategies in selfish ad hoc networks we create an emulation environment based on virtualization. Such an emulation environment is more flexible to changes and is simpler to replicate than real life testbeds, while providing higher fidelity than simulations.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
31

Tao, Narisu [Verfasser], Xiaoming [Akademischer Betreuer] Fu, Dieter [Akademischer Betreuer] Hogrefe, and K. K. [Akademischer Betreuer] Ramakrishnan. "Data-Driven Network Analysis and Applications / Narisu Tao. Betreuer: Xiaoming Fu. Gutachter: Dieter Hogrefe ; K. K. Ramakrishnan." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2016. http://d-nb.info/1081246782/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Alkadi, Alaa. "Anomaly Detection in RFID Networks." UNF Digital Commons, 2017. https://digitalcommons.unf.edu/etd/768.

Full text
Abstract:
Available security standards for RFID networks (e.g. ISO/IEC 29167) are designed to secure individual tag-reader sessions and do not protect against active attacks that could also compromise the system as a whole (e.g. tag cloning or replay attacks). Proper traffic characterization models of the communication within an RFID network can lead to better understanding of operation under “normal” system state conditions and can consequently help identify security breaches not addressed by current standards. This study of RFID traffic characterization considers two piecewise-constant data smoothing techniques, namely Bayesian blocks and Knuth’s algorithms, over time-tagged events and compares them in the context of rate-based anomaly detection. This was accomplished using data from experimental RFID readings and comparing (1) the event counts versus time if using the smoothed curves versus empirical histograms of the raw data and (2) the threshold-dependent alert-rates based on inter-arrival times obtained if using the smoothed curves versus that of the raw data itself. Results indicate that both algorithms adequately model RFID traffic in which inter-event time statistics are stationary but that Bayesian blocks become superior for traffic in which such statistics experience abrupt changes.
APA, Harvard, Vancouver, ISO, and other styles
33

Nakamoto, Tembo. "The International Tax System in the Digitalized Economy Studied from the Viewpoints of Network Science and Policy Processes." Doctoral thesis, Kyoto University, 2021. http://hdl.handle.net/2433/263805.

Full text
Abstract:
付記する学位プログラム名: 京都大学大学院思修館
京都大学
新制・課程博士
博士(総合学術)
甲第23344号
総総博第17号
京都大学大学院総合生存学館総合生存学専攻
(主査)教授 池田 裕一, 特定教授 武田 英俊, 教授 諸富 徹
学位規則第4条第1項該当
Doctor of Philosophy
Kyoto University
DFAM
APA, Harvard, Vancouver, ISO, and other styles
34

Xu, Zhouyi. "Stochastic Modeling and Simulation of Gene Networks." Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/645.

Full text
Abstract:
Recent research in experimental and computational biology has revealed the necessity of using stochastic modeling and simulation to investigate the functionality and dynamics of gene networks. However, there is no sophisticated stochastic modeling techniques and efficient stochastic simulation algorithms (SSA) for analyzing and simulating gene networks. Therefore, the objective of this research is to design highly efficient and accurate SSAs, to develop stochastic models for certain real gene networks and to apply stochastic simulation to investigate such gene networks. To achieve this objective, we developed several novel efficient and accurate SSAs. We also proposed two stochastic models for the circadian system of Drosophila and simulated the dynamics of the system. The K-leap method constrains the total number of reactions in one leap to a properly chosen number thereby improving simulation accuracy. Since the exact SSA is a special case of the K-leap method when K=1, the K-leap method can naturally change from the exact SSA to an approximate leap method during simulation if necessary. The hybrid tau/K-leap and the modified K-leap methods are particularly suitable for simulating gene networks where certain reactant molecular species have a small number of molecules. Although the existing tau-leap methods can significantly speed up stochastic simulation of certain gene networks, the mean of the number of firings of each reaction channel is not equal to the true mean. Therefore, all existing tau-leap methods produce biased results, which limit simulation accuracy and speed. Our unbiased tau-leap methods remove the bias in simulation results that exist in all current leap SSAs and therefore significantly improve simulation accuracy without sacrificing speed. In order to efficiently estimate the probability of rare events in gene networks, we applied the importance sampling technique to the next reaction method (NRM) of the SSA and developed a weighted NRM (wNRM). We further developed a systematic method for selecting the values of importance sampling parameters. Applying our parameter selection method to the wSSA and the wNRM, we get an improved wSSA (iwSSA) and an improved wNRM (iwNRM), which can provide substantial improvement over the wSSA in terms of simulation efficiency and accuracy. We also develop a detailed and a reduced stochastic model for circadian rhythm in Drosophila and employ our SSA to simulate circadian oscillations. Our simulations showed that both models could produce sustained oscillations and that the oscillation is robust to noise in the sense that there is very little variability in oscillation period although there are significant random fluctuations in oscillation peeks. Moreover, although average time delays are essential to simulation of oscillation, random changes in time delays within certain range around fixed average time delay cause little variability in the oscillation period. Our simulation results also showed that both models are robust to parameter variations and that oscillation can be entrained by light/dark circles.
APA, Harvard, Vancouver, ISO, and other styles
35

Gutierrez, Lagos Luis Daniel. "Advanced voltage control for energy conservation in distribution networks." Thesis, University of Manchester, 2018. https://www.research.manchester.ac.uk/portal/en/theses/advanced-voltage-control-for-energy-conservation-in-distribution-networks(2718dcf1-f5db-45df-84e2-4890956ba8b1).html.

Full text
Abstract:
The increasing awareness on the effect of carbon emissions in our planet has led to several countries to adopt targets for their reduction. One way of contributing to this aim is to use and distribute electricity more efficiently. In this context, Conservation Voltage Reduction (CVR), a well-known technique that takes advantage of the positive correlation between voltage and demand to reduce energy consumption, is gaining renewed interest. This technique saves energy by only reducing customer voltages, without relying on customer actions and, therefore, can be controlled by the Distribution Network Operator (DNO). CVR not only brings benefits to the electricity system by reducing generation requirements (fewer fossil fuel burning and carbon emissions), but also to customers, as energy bill reductions. The extent to which CVR can bring benefits mainly depends on the customers load composition and their voltages. While the former dictates the voltage-demand correlation, the latter constraints the voltage reduction that can be applied without violating statutory limits. Although CVR has been studied for many years, most of the studies neglect the time-varying voltage-demand characteristic of loads and/or do not assess end customer voltages. While these simplifications could be used to estimate CVR benefits for fixed and limited voltage reductions, realistic load and network models are needed to assess the performance of active CVR schemes, where voltages are actively managed to be close to the minimum limit. Moreover, distribution networks have been traditionally designed with limited monitoring and controllability. Therefore, CVR has been typically implemented by adopting conservative voltage reductions from primary substations, for both American and European-style networks. However, as new infrastructure is deployed in European-style LV networks (focus of this work), such as monitoring and on-load tap changers (OLTCs), the opportunity arises to actively manage voltages closer to end customer (unlocking further energy savings). Although these technologies have shown to effectively control voltages in LV networks, their potential for CVR has not been assessed before. Additionally, most CVR studies were performed in a context where distributed generation (DG) was not common. However, this has changed in many countries, with residential photovoltaic (PV) systems becoming popular. As this is likely to continue, the interactions of residential PV and CVR need to be studied. This thesis contributes to address the aforementioned literature gaps by: (i) proposing a simulation framework to characterise the time-varying voltage-demand correlation of individual end customers; (ii) developing a process to model real distribution networks (MV and LV) from DNO data; (iii) adopting a Monte Carlo-based quantification process to cater for the uncertainties related to individual customer demand; (iv) assessing the CVR benefits that can be unlocked with new LV infrastructure and different PV conditions. To accomplish (iv), first, a simple yet effective rule-based scheme is proposed to actively control voltages in OLTC-enabled LV networks without PV and using limited monitoring. It is demonstrated that by controlling voltages closer to customers, annual energy savings can increase significantly, compared to primary substation voltage reductions. Also, to understand the effect of PV on CVR, a centralized, three-phase AC OPF-based CVR scheme is proposed. This control, using monitoring, OLTCs and capacitors across MV and LV networks, actively manages voltages to minimize energy consumption in high PV penetration scenarios whilst considering MV-LV constraints. Results demonstrate that without CVR, PV systems lead to higher energy imports for customers without PV, due to higher voltages. Conversely, the OPF-based CVR scheme can effectively manage voltages throughout the day, minimising energy imports for all customers. Moreover, if OLTCs at secondary substations are available (and managed in coordination with the primary substation OLTC), these tend to regulate customer voltages close to the minimum statutory limit (lower tap positions), while the primary OLTC delivers higher voltages to the MV network to also reduce MV energy losses.
APA, Harvard, Vancouver, ISO, and other styles
36

Ibarra, Olivares Rebeca. "Social mechanisms of tax behaviour." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:2893069a-a2bf-46ff-a769-e9ec4ec58b48.

Full text
Abstract:
The main goal of this thesis is to provide a sociologically informed analysis of tax avoidance and tax evasion in contemporary Mexico and Sweden, focusing particular attention on the explanatory role of social networks, social interactions, and positive feedback mechanisms. Two major data sources are used: (1) A panel dataset that includes all persons, 16 years or older, who resided in Stockholm County during at least one of the years 1990 to 2003 (N=1,967,993). The dataset includes detailed information on the socio-demographic characteristics, kinship networks, and criminal offences of these individuals; (2) A random sample of 36,949 firms that appeared in the Mexican Federal Register of Taxpayers for the year 2002. The records of the Mexican Federal Administrative Fiscal Tribunal provided data on all types of tax claims appealed before them during the 2002-2008 period. A variety of approaches and techniques are used such as agent-based simulation models, discrete time event history models, random effect logit models, and hierarchical linear models. These models are used to test different hypotheses related to the role of social networks, social interactions, and positive feedback mechanisms in explaining tax behaviour. There are five major empirical findings. (1) Networks seem to matter for individuals' tax behaviour because exposure to tax crimes of family members appears to increase a person’s likelihood of committing a tax crime. (2) Positive feedback mechanisms appear relevant because if a person commits a tax crime, it seems to increase the likelihood that the person will commit more tax crimes in the future. (3) Positive feedback mechanisms are also important for explaining corporate tax behaviour because a firm that has engaged in legal tax avoidance in the past appears to be more likely to engage in tax avoidance in the future. (4) Network effects are important in the corporate world because exposure to the tax avoidance of other firms increase the propensity of a firm to engage in tax avoidance. (5) Substitution effects between tax evasion and tax avoidance are likely to exist because when tax evasion becomes more prevalent in a firm’s environment, their likelihood of engaging in legal tax avoidance is lowered. The results underscore the importance of a sociological perspective on tax behaviour that takes into account social interactions and positive feedback mechanisms. In order to understand microscopic as well as macroscopic tax evasion patterns, the results presented in this thesis suggest that much more attention must be given to mechanisms through which taxation crimes breed more taxation crimes.
APA, Harvard, Vancouver, ISO, and other styles
37

Holland, William S. "Development of an Indoor Real-time Localization System Using Passive RFID Tags and Artificial Neural Networks." Ohio University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1249062541.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

McMorries, David W. "Investigation into the effects of voice and data convergence on a Marine Expeditionary Bridgade TRI-TAC digital transmission network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA379684.

Full text
Abstract:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, June 2000.
Thesis advisors, Osmundson, John S. ; Brady, Terrence C. "June 2000." Includes bibliographical references (p. 69). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
39

Buckley, Ryan. "Defining a royalty from a South African perspective for the purposes of the South African Income Tax Act and the South African application of its Double Tax Treaty network." Master's thesis, University of Cape Town, 2012. http://hdl.handle.net/11427/10270.

Full text
Abstract:
Inludes bibliographical references.
The word "royalty" is used in South Africa's Income Tax Act No. 58 of 1962 ("TA") at various points. Although there is a general understanding on the meaning of a royalty, there is no official definition for this term which can be used throughout the ITA. Section 35 of the ITA provides the strongest guidance of what a royalty is. However, this section applies to royalties and similar payments.
APA, Harvard, Vancouver, ISO, and other styles
40

Butts, John Charles. "Tracking the Sequences of Regulatory Linkages and Their Evolution Within a Fruit Fly Gene Regulatory Network." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1352918524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Tang, Qinrui Verfasser], Bernhard [Akademischer Betreuer] [Friedrich, and Dirk C. [Akademischer Betreuer] Mattfeld. "Minimization of road network travel time by prohibiting left turns at signalized intersections / Qinrui Tang ; Bernhard Friedrich, Dirk C. Mattfeld." Braunschweig : Technische Universität Braunschweig, 2019. http://d-nb.info/1185632654/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Tang, Qinrui [Verfasser], Bernhard [Akademischer Betreuer] Friedrich, and Dirk C. [Akademischer Betreuer] Mattfeld. "Minimization of road network travel time by prohibiting left turns at signalized intersections / Qinrui Tang ; Bernhard Friedrich, Dirk C. Mattfeld." Braunschweig : Technische Universität Braunschweig, 2019. http://d-nb.info/1185632654/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Ganief, Tariq Ahmad. "A network analysis based proteomic and transcriptomic investigation into HIV-Tat induced neuronal dysfunction and the neuroprotective effect of lithium." Doctoral thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/22759.

Full text
Abstract:
HIV-associated neurocognitive disorders (HAND) affect up to 70% of HIV positive individuals and are the leading cause of dementia in patients under 40 years. Despite this, the molecular mechanisms involved in the onset of HAND are not well understood. Among a number of plausible etiological agents of HAND, HIV-Tat has been shown to be neurotoxic in vitro and in vivo, but the basis of its induced neuronal dysregulation remains relatively poorly characterised, giving rise to various competing theories. This thesis describes differential, quantitative proteomic analyses of HIV-Tat-treated neuronal cells in vitro, the goal being to gain deeper insight into the underlying molecular basis of this HIV-Tat-mediated dysregulation, as well as to potentially inform better patient treatments in the future. To achieve this goal, deep, quantitative proteomic analysis of HIV-Tat treated SILAC-labelled SH-SY5Y neuroblastoma cells was carried out, alongside transcriptomic analysis of the same system in which 3077 proteins were identified and quantified with 407 proteins and 1074 genes being differentially expressed. Subsequently, label-free proteomics analysis was used to study the ability of lithium - a proposed new treatment for HAND - to suppress the HIV-Tat induced dysregulated molecular phenotype in SH-SY5Y cells in which 3757 were identified and quantified with 360 and 531 being significantly differentially expressed in HIV-Tat and HIV-Tat + lithium treated cells, respectively.
APA, Harvard, Vancouver, ISO, and other styles
44

Ramagoffu, Madisa Modisaotsile. "The impact of network related factors on Internet based technology in South Africa : a cloud computing perspective." Diss., University of Pretoria, 2012. http://hdl.handle.net/2263/22820.

Full text
Abstract:
Outsourcing, consolidation and cost savings of IT services, are increasingly becoming an imperative source of competitive advantage and a great challenge for most local and global businesses. These challenges not only affect consumers, but also the service providers’ community. As IT is slowly becoming commoditised, consumers, such as business organisations, are increasingly expecting IT services that will mimic other utility services such as water, electricity, and telecommunications.To this end, no one model has been able to emulate these utilities in the computing arena.Cloud Computing is the recent computing phenomenon that attempts to be the answer to most business IT requirements. This phenomenon is gaining traction in the IT industry, with a promise of advantages such as cost reduction, elimination of upfront capital outlay, pay per use models, shared infrastructure, and high flexibility allowing users and providers to handle high elasticity of demand. The critical success factor that remains unanswered for most IT organisations and its management is: What is the effect of the communication network factors on Internet based technology such as Cloud Computing, given the emerging market context.This study therefore, investigates the effect of four communication network factors (price, availability, reliability and security) in the adoption of Cloud Computing by IT managers in a South African context, including their propensity to adopt the technology. The study investigates numerous technology adoption theories, in which Technology, Organisation and Environment (TOE) framework is selected due to it having an organisational focus as opposed to an individual focus.Based on the results, this study proposes that Bandwidth (Pricing and Security) should be included into any adoption model that involves services running on the Internet. The study makes an attempt to contribute to the emerging literature of Cloud Computing, Internet in South Africa, in addition to offering organisations considering adoption and Cloud Providers’ significant ideas to consider for Cloud Computing adoption.
Dissertation (MBA)--University of Pretoria, 2012.
Gordon Institute of Business Science (GIBS)
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
45

Panayiotou, Panayiotis Andrea. "Immovable property taxation and the development of an artificial neural network valuation system for residential properties for tax purposes in Cyprus." Thesis, University of South Wales, 1999. https://pure.southwales.ac.uk/en/studentthesis/immovable-property-taxation-and-the-development-of-an-artificial-neural-network-valuation-system-for-residential-properties-for-tax-purposes-in-cyprus(3ec3bd33-0820-4e21-97f0-a3ea0e303a9a).html.

Full text
Abstract:
The last General Valuation in Cyprus, in 1980, took about twelve years to be completed by the Lands and Surveys Department. The comparison method was adopted and no computerised (mass appraisal) method or tool was used to assist the whole process. Although the issue of mass appraisal was raised by Sagric International, who had been invited to Cyprus as consultants, and recently by DataCentralen A/S with the development of a mass appraisal system based on regression analysis, there has been little literature and no research directly undertaken on the problems and the analysis of immovable property taxation in Cyprus and the development of an artificial neural networks valuation system for houses and apartments. The research project approached the issue of property taxation and mass appraisal through an investigation into Cyprus's needs for an up-dated tax base for equitabileness and for an assessment system capable of performing an effective revaluation at a certain date, with minimum acceptable mean error, minimum data and minimum cost. Investigation within Cyprus and world-wide indicated that this research project is a unique study in relation to Cyprus's property taxation and the development of a computer assisted mass appraisal system based on modular artificial neural networks. An empirical study was carried out, including prototyping and testing. The system results satisfy IAAO criteria for mass appraisal techniques, compare favourably with other studies and established a framework upon which future research into computer assisted mass appraisal for taxation purposes can be developed. In conclusion, the project has contributed significantly to the available literature on the immovable property taxation in Cyprus and the development of a computer assisted mass appraisal system for houses and apartments based on modular artificial neural network method. The proposed approach is novel not only in the context of Cyprus but also world-wide.
APA, Harvard, Vancouver, ISO, and other styles
46

Hsu, Sen-Kuei, and 許森貴. "Adaptive Impedance Matching Network for Radio Frequency Identification Tag." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/17140397573674864390.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

GerelTumenbayar and 貝嘉友. "Topic Suggestion by Bayesian Network Enhanced Tag Inference in CQA." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/16197208467771641044.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Luo, Jing-Kai, and 羅經凱. "Efficient Tag-Based Routing Algorithms for the Backward Network of a Bidirectional General Shuffle-Exchange Network." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/88702219939049409812.

Full text
Abstract:
碩士
國立交通大學
應用數學系所
93
In [7], Padmanbhan proposed the general shuffe-exchange network (GSEN) and an effcient tag-based routing algorithm for it. In [1], Chen, Liu and Qiu further enhanced the GSEN with bidirectional links. The bidirectional GSEN can be divided into two dependent networks, the forward network and the backward network. Since the forward network is a GSEN, Padmanbhan's tag-based routing algorithm can be applied on it. As for the backward network, Chen et al. [1] proposed a routing algorithm which is based on the idea of inversely using the forward control tag. In this thesis, we will show that the backward network has a wonderful property: for each destination i, there are two backward control tags associated with it such that every source j can get to i by using one of the two control tags. We will use this property to derive effcient algorithms for one-to-one routing and for constructing a routing table.
APA, Harvard, Vancouver, ISO, and other styles
49

jên, chien hung, and 簡鴻任. "A Study on the TAG for Wireless Local area network Location Technology." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/v828hr.

Full text
Abstract:
碩士
亞洲大學
電腦與通訊學系碩士班
95
Elder problem becomes civilization topic that country can’t ignore. Population develops a vast market, under popularizing the national attention. It is no longer one-way consumption in the social cost, and becomes a vast market offering community service. Various types of looking after this interdependent market direction of the equipment is developed rapidly. The researchers make great strides in the research and development of wireless network (WLAN) ,due to the popularization of WLAN. In this paper, we proposed a research to orientate the subject by detecting the power of radio wave. Then we adding the idea of e-health care to achieve an objective in remote control. The focus of our research was advancing the stability when retrieving the paper of radio-wave by ameliorating design of TAG. We combine the relevant physiological signal detecting devices with the TAG system made by ourself to achieve the applications of orientating the subject and e-health care.
APA, Harvard, Vancouver, ISO, and other styles
50

Chen, Ying-Chieh, and 陳英傑. "Design of RFID Tag Antenna with T-Matching Network and Shorting Plates." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/98080689741646677552.

Full text
Abstract:
碩士
國立雲林科技大學
電機工程系碩士班
97
In this paper, a low-cost novel antenna for passive UHF radio frequency identification (RFID) tags mountable on metallic surface is presented.The proposed antenna consists of a T-matching network with a inductively-coupled feed loop,two symmetrical radiating patches shorted to ground plane by shorting plates,a FR-4 substrate and air layer.The substrate FR4 has a thickness of 1.6mm and relative permittivity of 4.6.Overall dimension of the proposed antenna is 91.2 mm × 53.25 mm × 4.6 mm . Because the proposed antenna has the ground plane,the performance of the antenna has not been changed much when the tag is attached on metallic surface.By simply adjusting the size of the feeding element,desired impedance for any microchip can be achieved without significant modification of the radiating element. The proposed antenna operate from 902 to 928 MHz.When the antenna is placed in free space and close to 300 mm x 300 mm x 1 mm metallic plate 30 mm away ,the maximun reading distance is 6.23 m and 7.07 m,respectively.The proposed design is verified by simulation and measurement,which show good agreement.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography