Search results
Filter
Filetype
Your search for "*" yielded 549400 hits
Fire Protection of Steel Structures. Examples of Applications
M-ary coded modulation by Butterworth filtering
Earlier we have studied the bandwidth and distance of binary codes created by Butterworth lowpass filtering of a pulse stream. Here the work is extended to 4- and 8-ary inputs (16- and 64-ary QAM). Performance reaches into a very narrow-band part of the distance-bandwidth plane. An M-algorithm decoder is tested.
Surfactants, Phase Behavior
The Akha Language
Abstract not available
Novel binding specificities engineered into the scaffold of a carbohydrate binding module
The growing field of biotechnology is in constant need of proteins that can function as recognition tools for separational, analytical and therapeutic purposes. Different molecular engineering approaches are applied on natural proteins in order to create variants with desired properties. This thesis is based on five original papers that deal with selection, characterisation and application of nove
Transforming Monopolies – EU-adjustment or Social Changes?
Evaluation and testing in creativity
In situations that require creative thinking, there is no well-known procedure for how to reach the goal, or the solution. Among other things, it is not clear how choices between outcomes are made, or when the search for a solution should terminate. The article focusses on the evaluation of solutions that are generated during the search. The general question concerns the standards according to whi
Understanding styling activity of automotive designers: A study of manual interpolative morphing through freehand sketching
Kulturorienterad psykologi
This chapter gives an introduction to how psychology has dealt with the human being as a culture influenced being. This topic is discussed also within the context of cross-cultural interaction and migration to a new country. First the debate on the meaning of culture is reviewed and discussed. Here the changing and heterogeneous nature of socially dependent understanding is emphasized. The larger
Snören för korta att använda
Many-Valued Hybrid Logic
In this paper we define a many-valued semantics for hybrid logic and we give a sound and complete tableau system which is proof-theoretically well-behaved, in particular, it gives rise to a decision procedure for the logic. This shows that many-valued hybrid logics is a natural enterprise and opens up the way for future applications.
Conditioned Actions in Strategic Coordination Games
Kommentar till Rådets förordning (EEG) nr 2658/87 av den 23 juli 1987 om tulltaxe- och statistiknomenklaturen och om Gemensamma tulltaxan
Organizational Psychology and Safety Culture in Air Traffic Control : Concerning Organizational Climate, Situational Leadership and Psychosocial Work Environment
Popular Abstract in Swedish Föreliggande avhandling behandlar organisatoriska aspekter såsom organi-sationsklimat, psykosocial arbetsmiljö, situationsanpassat ledarskap samt säkerhetskultur inom den svenska flygtrafikledningen. Avhandlingen är en del av ett större forsknings- och utvecklingsprojekt ? Human Factors in Air Navigation Services (HUFA) ? som drivs i samarbe-te mellan det svenska LuftfThe air traffic control industry in Europe is under mounting pressure due to increasing air traffic and inefficient routines caused by a fragmented air space. In order to handle the demands the European Commission has launched a program entitled the Single European Sky initiative which seeks to promote a more efficient way of handling the air traffic over Europe. A reorganization of air traffic ma
Introduktion
Trängd mellan politik och pedagogik. Svensk språkutbildning efter 1990
Trace Elemental Analysis by Means of Heavy Particle-Induced X-Rays
Belysningskvalitetens betydelse för tillgänglighet och upplevd rädsla längs gångvägar
Using TPM Secure Storage in Trusted High Availability Systems
We consider the problem of providing trusted computing functionality in high availability systems. We consider the case where data is required to be encrypted with a TPM protected key. For redundancy, and to facilitate high availability, the same TPM key is stored in multiple computational units, each one ready to take over if the main unit breaks down. This requires the TPM key to be migratable.
