Dissertations / Theses on the topic 'Cognitive engineering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Cognitive engineering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Ball, Linden John. "Cognitive processes in engineering design." Thesis, University of Plymouth, 1990. http://hdl.handle.net/10026.1/674.
Full textMazzuto, Giovanni. "Fuzzy Cognitive Maps tools for Industrial Engineering." Doctoral thesis, Università Politecnica delle Marche, 2014. http://hdl.handle.net/11566/242871.
Full textThe proposed thesis highlighted the potential of cognitive maps in their explanatory and reflective functions and their value in support of decision making within organizations in a phase of any consolidation of the cognitive distances involved. Intelligent agents use mental models and have various “internal” processes (physical, mental, emotional) as they interact with other agents. Encourage group members to produce their own learning and cognitive maps represent their mental models that can have multiple functions in the formation, whether or not assisted by the network. The considered areas of study are characterized by complexity requiring the investigation of new advanced methods for modelling and development of sophisticated systems. In order to improve the communication between the different actors in relation to the factors, it becomes important to recognize that the mental models that characterize them influence the way they perceive the world and, consequently, the risks. The information collected through this analysis have been used both as a basis for the definition of strategies of risk communication, and as a guide for the negotiation process aimed at reducing existing levels of conflict and, at improving the mitigation measures to be taken. On the basis of the results obtained, it becomes important to encourage administrators to increase the dissemination of information about previous responsibilities relating to risk management, and the future ones relating to possible measures to be undertaken in a specific area. The proposed PhD thesis analyses some cases of study. It has been described the application of the FCM in the suppliers' selection sector, specifically, in the new product development process; in the analysis of injury events on workplace, where the social aspect has a great relevance; it has been analysed in order to define a new ranking method, in an Italian company, for defining a criticality indicator for the equipment and a proper maintenance program and, finally, the FCM has been applied in the Healthcare sector and, specifically, it has been used to define the main causes affecting the drug administration risk.
Cox, David Daniel. "Reverse engineering object recognition." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/42042.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Page 95 blank.
Includes bibliographical references (p. 83-94).
Any given object in the world can cast an effectively infinite number of different images onto the retina, depending on its position relative to the viewer, the configuration of light sources, and the presence of other objects in the visual field. In spite of this, primates can robustly recognize a multitude of objects in a fraction of a second, with no apparent effort. The computational mechanisms underlying these amazing abilities are poorly understood. This thesis presents a collection of work from human psychophysics, monkey electrophysiology, and computational modelling in an effort to reverse-engineer the key computational components that enable this amazing ability in the primate visual system.
by David Daniel Cox.
Ph.D.
Pallotta, Vincenzo. "Cognitive language engineering towards robust human-computer interaction /." Lausanne, 2002. http://library.epfl.ch/theses/?display=detail&nr=2630.
Full textTan, Kok Keng. "Cognitive Systems Engineering as an Ontology for Design." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1269531460.
Full textThoms, Joanne. "Human centric systems engineering." Thesis, University of Bath, 2009. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.501636.
Full textCardella, Monica E. "Engineering mathematics : an investigation of students' mathematical thinking from a cognitive engineering perspective /." Thesis, Connect to this title online; UW restricted, 2006. http://hdl.handle.net/1773/10692.
Full textTimmer, Peter Robin. "Expression of operator planning horizons : a cognitive engineering approach." Thesis, University College London (University of London), 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.325012.
Full textDowell, John. "Cognitive engineering and the rationalisation of the flight strip." Thesis, University College London (University of London), 1993. http://discovery.ucl.ac.uk/1350070/.
Full textPinto, Nicolas. "Forward engineering object recognition : a scalable approach." Thesis, Massachusetts Institute of Technology, 2011. http://hdl.handle.net/1721.1/62622.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (p. 254-302).
The ease with which we recognize visual objects belies the computational difficulty of this feat. Despite the concerted efforts of both biological and computer vision research communities over the last forty years, human-level visual recognition remains an unsolved problem. The impact of a robust yet inexpensive solution would dramatically change computer science and neuroscience, unleashing a host of innovative applications in our modern society. In this thesis, we identify two operational barriers that have obstructed progress towards finding a solution { namely the lack of clear indicators and operational definitions of success, and the currently limited exploration of the staggeringly large hypothesis space of biologically- inspired solutions. To break down these barriers, we first establish new neuroscience-motivated baselines and new suites of fully-controlled benchmarks for object and face recognition. We also compare and contrast a variety of high-level visual systems, both artificial (state-of-the- art computer vision) and biological (humans). Then, we propose a simple high-throughput approach to undertake a systematic exploration of the biologically-inspired model class. By leveraging recent advances in massively parallel computing, we show that it is possible to generate a multitude of candidate models, screen them for desirable properties and discover robust solutions. Finally, we validate the scalability of our approach by showing its potential on large-scale real-world" applications. Taken together, this thesis represents a humble attempt towards an integrated approach to the problem of brain-inspired object recognition { spanning the engineering, specification, evaluation, and application of an interesting set of biologically-inspired ideas, driven and enabled by massively parallel technology. Even relatively early instantiations of this approach yield algorithms that achieve state-of-the-art performance in object recognition tasks and can generalize to other image domains. In addition, it offers insight into which computational ideas may be important for achieving this performance. Such insights can then be "fed back" into the design of new candidate models, constraining the search space and suggesting improvements, further guiding "evolutionary" progress. We hope that our results will point a new way forward, both in the creation of powerful yet simple computer vision systems and in providing insights into the computational underpinnings of biological vision.
by Nicolas Pinto.
Ph.D.
Goodman, Katherine Ann. "The Transformative Experience in Engineering Education." Thesis, University of Colorado at Boulder, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3743651.
Full textThis research evaluates the usefulness of transformative experience (TE) in engineering education. With TE, students 1) apply ideas from coursework to everyday experiences without prompting (motivated use); 2) see everyday situations through the lens of course content (expanded perception); and 3) value course content in new ways because it enriches everyday affective experience (affective value). In a three-part study, we examine how engineering educators can promote student progress toward TE and reliably measure that progress.
For the first study, we select a mechanical engineering technical elective, Flow Visualization, that had evidence of promoting expanded perception of fluid physics. Through student surveys and interviews, we compare this elective to the required Fluid Mechanics course. We found student interest in fluids fell into four categories: complexity, application, ubiquity, and aesthetics. Fluid Mechanics promotes interest from application, while Flow Visualization promotes interest based in ubiquity and aesthetics. Coding for expanded perception, we found it associated with students’ engineering identity, rather than a specific course. In our second study, we replicate atypical teaching methods from Flow Visualization in a new design course: Aesthetics of Design. Coding of surveys and interviews reveals that open-ended assignments and supportive teams lead to increased ownership of projects, which fuels risk-taking, and produces increased confidence as an engineer.
The third study seeks to establish parallels between expanded perception and measurable perceptual expertise. Our visual expertise experiment uses fluid flow images with both novices and experts (students who had passed fluid mechanics). After training, subjects sort images into laminar and turbulent categories. The results demonstrate that novices learned to sort the flow stimuli in ways similar to subjects in prior perceptual expertise studies. In contrast, the experts’ significantly better results suggest they are accessing conceptual fluids knowledge to perform this new, visual task. The ability to map concepts onto visual information is likely a necessary step toward expanded perception.
Our findings suggest that open-ended aesthetic experiences with engineering content unexpectedly support engineering identity development, and that visual tasks could be developed to measure conceptual understanding, promoting expanded perception. Overall, we find TE a productive theoretical framework for engineering education research.
Coelho, Denis. "A growing concept of ergonomics including pleasure. comfort and cognitive engineering: an engineering design perspective." Doctoral thesis, Universidade da Beira Interior, 2002. http://hdl.handle.net/10400.6/660.
Full textGrubbs, Michael Edwin. "Further Characterization of High School Pre- and Non-Engineering Students' Cognitive Activity During Engineering Design." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/70926.
Full textPh. D.
Dreany, Harry Hayes. "Safety Engineering of Computational Cognitive Architectures within Safety-Critical Systems." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688677.
Full textThis paper presents the integration of an intelligent decision support model (IDSM) with a cognitive architecture that controls an autonomous non-deterministic safety-critical system. The IDSM will integrate multi-criteria, decision-making tools via intelligent technologies such as expert systems, fuzzy logic, machine learning, and genetic algorithms.
Cognitive technology is currently simulated within safety-critical systems to highlight variables of interest, interface with intelligent technologies, and provide an environment that improves the system’s cognitive performance. In this study, the IDSM is being applied to an actual safety-critical system, an unmanned surface vehicle (USV) with embedded artificial intelligence (AI) software. The USV’s safety performance is being researched in a simulated and a real-world, maritime based environment. The objective is to build a dynamically changing model to evaluate a cognitive architecture’s ability to ensure safe performance of an intelligent safety-critical system. The IDSM does this by finding a set of key safety performance parameters that can be critiqued via safety measurements, mechanisms, and methodologies. The uniqueness of this research lies in bounding the decision-making associated with the cognitive architecture’s key safety parameters (KSPs). Other real-time applications (RTAs) that would benefit from advancing cognitive science associated with safety are unmanned platforms, transportation technologies, and service robotics. Results will provide cognitive science researchers with a reference for the safety engineering of artificially intelligent safety-critical systems.
Schmidt, Ludger [Verfasser]. "Ein Cognitive-Engineering-Ansatz zur Unterstützung der Produktentwicklung / Ludger Schmidt." Aachen : Shaker, 2004. http://d-nb.info/1172610339/34.
Full textMcMeekin, David Andrew. "A software inspection methodology for cognitive improvement in software engineering." Thesis, Curtin University, 2010. http://hdl.handle.net/20.500.11937/400.
Full textMora, Sánchez Aldo. "Cognitive brain-computer interfaces : From feature engineering to neurophenomenological validation." Electronic Thesis or Diss., Sorbonne université, 2018. http://www.theses.fr/2018SORUS217.
Full textThis thesis aims at describing in detail the design, implementation and validation of cognitive brain-computer interfaces (cBCI). Chapter 1 introduces cBCI design and brain metastability. In Chapter 2, a specific cognitive function (Working Memory) is selected for the construction of a cBCI. In Chapter 3, we explore the use of spatio temporal properties of brain dynamics as biomarkers for cBCIs, and we address scientific questions concerning cognition-driven brain metastability. The BCI described in Chapter 2 continuously monitors Working Memory (WM) load in real-time. It relies on spectral properties of EEG as biomarkers. The applications may range from improved learning to security in industrial environments. To our knowledge, this represents the first cBCI research in which different key elements are included simultaneously: real-time tests, a cross-task, disentanglement of motor and cognitive confounders and neurophenomenological validation. In Chapter 3, we develop a data-driven framework for studying the spatio temporal structure of brain state switches under cognition, with two specific objectives. First, to identify and utilise patterns of brain activity elicited by cognition as descriptors in cBCIs. Second, to investigate how the brain self-organizes allowing different regions to engage and disengage in joint activity in a manner driven by cognition. Assuming brain metastability (in the context of statistical physics), we propose a set of local variables that are expected to be spatially and temporarily affected by cognitive states. We correlate these variables with cognitive conditions, such as high-WM load, Alzheimer disease, and positive emotional valence
Mattaparthy, Jaya Vinay. "Cognitive work analysis for design of instructional practice in engineering education." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textBalakrishnan, Gautam. "Cognitive radio cooperative spectrum sensing." Thesis, California State University, Long Beach, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10252432.
Full textThe effectiveness of a cognitive radio (CR) system depends mainly on involved spectrum sensing techniques. The main aim of CR is for effective utilization of the spectrum opportunistically by sharing it with secondary users (SUs), when the primary user (PU) is absent. In this project, cooperative spectrum sensing using weights based on the distance measures from the PU and Multitaper Method (MTM) method is briefly explained. The results show that MTM method provides more accurate threshold value compared to other methods for low signal to noise ratios (SNRs), hence improving the spectrum sensing technique. The results also show that MTM method requires a lesser number of Orthogonal Frequency Division Multiplexing (OFDM) sub-blocks compared to Periodogram (PE) for the same performance.
Uden, Lorna. "A courseware engineering methodology for technology-based learning." Thesis, Staffordshire University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.310576.
Full textAdams, Robin S. "Cognitive processes in iterative design behavior /." Thesis, Connect to this title online; UW restricted, 2001. http://hdl.handle.net/1773/7631.
Full textZayour, Iyad. "Reverse engineering: A cognitive approach, a case study and a tool." Thesis, University of Ottawa (Canada), 2002. http://hdl.handle.net/10393/6075.
Full textMcWhirter, Nathan Daniel. "Teaching Engineering Students About Cognitive Barriers During Design for Sustainable Infrastructure." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/81310.
Full textMaster of Science
Scott, David (David Arthur). "Interrogation of CRISPR-Cas targeting specificity for mammalian genome engineering." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/113958.
Full textCataloged from PDF version of thesis. "February 2017."
Includes bibliographical references (pages 134-138).
Class II CRISPR-Cas RNA programmable DNA endonucleases enable high efficiency genome editing across the biological diversity for research, industrial, and biomedical applications. Human genome editing with CRISPR-Cas just recently made its debut in human clinical trials and has immense therapeutic potential to fix disease-causing mutations at the level of DNA. Ensuring the integrity and safety of research, industrial, and biomedical applications of CRISPR-Cas necessitates efficient, versatile, and comprehensive methods to evaluate of the specificity of genome editing. Here, we optimize the efficiency and characterize the targeting specificity of SpCas9 to ensure robust cleavage activity while minimizing off-target activity in human cells. We characterize SpCas9 mismatch tolerance between the guide RNA and target, and provide data-driven design software to guide the selection of high fidelity Cas9 targets. We find that SpCas9 binding activity is not predictive of DNA cleavage, limiting the efficacy of Cas9 ChIP for unbiased evaluation of Cas9 off-target activity. Alternatively, we demonstrate that insert capture - insertion of short DNA fragments at double strand breaks (DSBs) by non-homologous end-joining (NHEJ) - provides unbiased genomewide identification of off-target cleavage by Cas9 as well as relative rates of indel, chromosomal rearrangement, and translocation accompanying NHEJ repair. However, insert capture is largely limited to use in model cell lines and is fundamentally limited in sensitivity due to labeling of low frequency errors in DSB repair. To directly label DSBs from cell culture or tissue samples, we adapted BLESS (direct in situ breaks labeling, enrichment on streptavidin and next-generation sequencing) and BLISS (Breaks Labeling In Situ and Sequencing) for unbiased genome-wide analysis of CRISPR-Cas specificity. Finally, we consider how human genetic variation will affect the targeting specificity of CRISPR-Cas endonucleases for therapeutic applications. Using the ExAC and 1000 Genomes datasets we find that human variation has important implications for Cas enzyme choice as well as target efficacy and safety. From this analysis, we provide a framework for the design of CRISPR-based therapeutics to maximize efficacy and safety across patient populations.
by David Scott.
Ph. D.
Horine, Brent. "Bootstrapping Cognitive Radio Networks." Doctoral diss., University of Central Florida, 2012. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/5306.
Full textPh.D.
Doctorate
Electrical Engineering and Computer Science
Engineering and Computer Science
Electrical Engineering
Miller, Janet E. "Critiquing as a cognitive task analysis methodology /." The Ohio State University, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=osu1486402544588743.
Full textLieder, Falk. "Beyond Bounded Rationality| Reverse-Engineering and Enhancing Human Intelligence." Thesis, University of California, Berkeley, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10817569.
Full textBad decisions can have devastating consequences, and there is a vast body of literature suggesting that human judgment and decision-making are riddled with numerous systematic violations of the rules of logic, probability theory, and expected utility theory. The discovery of these cognitive biases in the 1970s challenged the concept of Homo sapiens as the rational animal and has profoundly shaken the foundations of economics and rational models in the cognitive, neural, and social sciences. Four decades later, these disciplines still lack a rigorous theoretical foundation that can account for people’s cognitive biases. Furthermore, designing effective interventions to remedy cognitive biases and improve human judgment and decision-making is still an art rather than a science. I address these two fundamental problems in the first and the second part of my thesis respectively.
To develop a theoretical framework that can account for cognitive biases, I start from the assumption that human cognition is fundamentally constrained by limited time and the human brain’s finite computational resources. Based on this assumption, I redefine human rationality as reasoning and deciding according to cognitive strategies that make the best possible use of the mind’s limited resources. I draw on the bounded optimality framework developed in the artificial intelligence literature to translate this definition into a mathematically precise theory of bounded rationality called resource-rationality and a new paradigm for cognitive modeling called resource-rational analysis. Applying this methodology allowed me to derive resource-rational models of judgment and decisionmaking that accurately capture a wide range of cognitive biases, including the anchoring bias and the numerous availability biases in memory recall, judgment, and decision-making. By showing that these phenomena and the heuristics that generate them are consistent with the rational use of limited resources, my analysis provides a rational reinterpretation of cognitive biases that were once interpreted as hallmarks of human irrationality. This suggests that it is time to revisit the debate about human rationality with the more realistic normative standard of resource-rationality. To enable a systematic assessment of the extent to which human cognition is resource- rational, I present an automatic method for deriving resource-rational heuristics from a mathematical specification of their function and the mind’s computational constraints. Applying this method to multi-alternative risky-choice led to the discovery of a previously unknown heuristic that people appear to use very frequently. Evaluating human decision-making against resource-rational heuristics suggested that, on average, human decision-making is at most 88% as resource-rational as it could be.
Since people are equipped with multiple heuristics, a complete normative theory of bounded rationality also has to answer the question of when each of these heuristics should be used. I address this question with a rational theory of strategy selection. According to this theory, people gradually learn to select the heuristic with the best possible speed-accuracy trade-off by building a predictive model of its performance. Experiments testing this model confirmed that people gradually learn to make increasingly more rational use of their finite time and bounded cognitive resources through a metacognitive reinforcement learning mechanism.
Overall, these findings suggest that—contrary to the bleak picture painted by previous research on heuristics and biases—human cognition is not fundamentally irrational, and can be understood as making rational use of bounded cognitive resources. By reconciling rationality with cognitive biases and bounded resources, this line of research addresses fundamental problems of previous rational modeling frameworks, such as expected utility theory, logic, and probability theory. Resource-rationality might thus come to replace classical notions of rationality as a theoretical foundation for modeling human judgment and decision-making in economics, psychology, neuroscience, and other cognitive and social sciences.
In the second part of my dissertation, I apply the principle of resource-rationality to develop tools and interventions for improving the human mind. Early interventions educated people about cognitive biases and taught them the normative principles of logic, probability theory, and expected utility theory. The practical benefits of such interventions are limited because the computational demands of applying them to the complex problems people face in everyday life far exceed individuals’ cognitive capacities. Instead, the principle of resource-rationality suggests that people should rely on simple, computationally efficient heuristics that are well adapted to the structure of their environments. Building on this idea, I leverage the automatic strategy discovery method and insights into metacognitive learning from the first part of my dissertation to develop intelligent systems that teach people resource-rational cognitive strategies. I illustrate this approach by developing and evaluating a cognitive tutor that trains people to plan resource-rationally. My results show that practicing with the cognitive tutor improves people’s planning strategies significantly more than does practicing without feedback. (Abstract shortened by ProQuest.)
Tang, Liang. "Performance analyses and design for cognitive radios." Thesis, University of Warwick, 2012. http://wrap.warwick.ac.uk/56288/.
Full textAzmat, Freeha. "Machine learning and energy efficient cognitive radio." Thesis, University of Warwick, 2016. http://wrap.warwick.ac.uk/85990/.
Full textCoral, Melissa Patricia. "Analyzing Cognitive Workload Through Eye-related Measurements: A Meta-Analysis." Wright State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=wright1464209028.
Full textGellman, Michael. "Packet loss in the cognitive packet network." Honors in the Major Thesis, University of Central Florida, 2001. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/274.
Full textBachelors
Engineering
Computer Science
Mäkeläinen, M. (Marko). "Algorithms for opportunistic load balancing cognitive engine." Master's thesis, University of Oulu, 2013. http://urn.fi/URN:NBN:fi:oulu-201303011071.
Full textYhä tehokkaampien älykkäiden langattomien päätelaitteiden nopea lisääntyminen johtaa niukan radiospektrin yhä kiihtyvään käyttöön. Eräs menetelmä radiospektrin lisääntyvän kysynnän tyydyttämiseen on hyödyntää innovatiivista ja joustavaa resurssin käytönjakoa kuten spektrin jakamista. Spektrinjakamismalli mahdollistaa useiden käyttäjien ja/tai järjestelmien yhtäaikaisen käytön samalla taajuuskaistalla hyödyntämällä sovittua käytäntöä resurssien jakamisesta. Radiospektrin jakaminen on tänä päivänä yleisesti suositeltu toteuttamaan hyödyntämällä kognitiivista radioteknologiaa. Tässä työssä suunnittellaan ja toteutetaan kognitiivinen päätöksentekokone, joka jakaa radiospektriresursseja käyttäjille älykkäästi ja dynaamisesti. Kognitiivista päätöksentekokonetta radioresurssien jakamisessa hyödynnetään kahdessa skenaariossa. Ensimmäisessä skenaariossa radioverkolla on yksinomainen pääsy taajuuskaistalle, jonka käyttöä kognitiivinen päätöksentekokone säätelee joko hyväksymällä tai hylkäämällä verkkoon liittyviä käyttäjiä. Kognitiivinen päätöksentekokoneen päätökset perustuu algoritmiin, joka ottaa huomioon käyttäjien määritetyn tärkeyden ja käyttäjän vaatiman kaistanleveyden. Seuraavassa skenaariossa radioverkko voi oman yksinomaisen taajuuskaistan lisäksi hyödyntää opportunisesti toisen radioverkon taajuuskaistaa silloin, kun siellä ei ole liikennettä. Tätä skenaariota varten suunnitteltiin kognitiivinen päätöksentekokone, jolla on kaksi päätehtävää: 1) hyväksyä tai hylätä verkkoon liittyviä käyttäjiä edellämainitun tärkeysperusteisen algoritmin avulla; ja 2) jakaa käyttäjien liikennettä kahden tarjolla olevan verkon välillä samalla ottaen huomioon opportunistisen resurssin pääkäyttäjien liikenteen jaetulla taajuuskaistalla. Tässä työssä esitellään toteutettu kuormantasausalgoritmi, jonka suorituskykyä tarkastellaan erilaisissa pääkäyttäjien ja toissijaisien käyttäjien liikenneskenaarioissa. Simulaatiotulokset osoittavat, että esitellyn kuormanjakoalgoritmin hyödyntäminen kognitiivisessa päätöksentekokoneessa parantaa verkon keskimääräistä siirtonopeutta, sekä vähentää keskimääräistä käyttäjien hylkäysastetta verkossa. Algoritmimme parantaa opportunistisen taajuuskaistan käyttöastetta. Algoritmimme ottaa myös huomioon käyttäjille asetetut prioriteetit ja parantaa korkeampi prioriteettisten käyttäjien asemaa verkossa. Tämä tulee ilmi muun muassa korkeampi prioriteettisten käyttäjien pienemmässä hylkäysasteessa
Khalil, Karim. "Cooperation and Competition in Cognitive Radio Networks." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1398771432.
Full textLiang, Wei. "Cooperative communication for cognitive radio networks." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/382935/.
Full textShiferaw, Anteneh. "Cognitive techniques in smart system technologies." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42588.
Full textDevapatla, Srikanth B. "Design and evaluation of a corrective measure for students' deficiencies in basic engineering calculus." Ohio : Ohio University, 1988. http://www.ohiolink.edu/etd/view.cgi?ohiou1182783509.
Full textDadi, Gabriel B. "Applying Cognitive Principles to the Delivery of Engineering Information by Different Mediums." UKnowledge, 2013. http://uknowledge.uky.edu/ce_etds/10.
Full textZolynski, Gregor [Verfasser]. "Cognitive Maps for Autonomous Machines in Construction and Civil Engineering / Gregor Zolynski." München : Verlag Dr. Hut, 2018. http://d-nb.info/1162768185/34.
Full textAvnet, Mark Sean. "Socio-cognitive analysis of engineering systems design : shared knowledge, process, and product." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/52782.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (p. 213-222).
This research is based on the well-known but seldom stated premise that the design of complex engineered systems is done by people -- each with their own knowledge, thoughts, and views about the system being designed. To understand the implications of this social dimension, the Integrated Concurrent Engineering (ICE) environment, a real-world setting for conceptual space mission design, is examined from technical and social perspectives. An integrated analysis demonstrates a relationship among shared knowledge, process, and product. The design process is analyzed using a parameter-based Design Structure Matrix (DSM). This model, consisting of 682 dependencies among 172 parameters, is partitioned (reordered) to reveal a tightly coupled design process. Further analysis shows that making starting assumptions about design budgets leads to a straightforward process of well-defined and sequentially executed design iterations. To analyze the social aspects, a network-based model of shared knowledge is proposed. By quantifying team members' common views of design drivers, a network of shared mental models is built to reveal the structure of shared knowledge at a snapshot in time. A structural comparison of pre-session and post-session networks is used to compute a metric of change in shared knowledge. Based on survey data from 12 design sessions, a correlation is found between change in shared knowledge and each of several system attributes, including technological maturity, development time, mass, and cost. Integrated analysis of design process and shared knowledge yields three interdisciplinary insights.
(cont.) First, certain features of the system serve a central role both in the design process and in the development of shared knowledge. Second, change in shared knowledge is related to the design product. Finally, change in shared knowledge and team coordination (agreement between expected and reported interactions) are positively correlated. The thesis contributes to the literature on product development, human factors engineering, and organizational and social psychology. It proposes a rigorous means of incorporating the socio cognitive aspects of design into the practice of systems engineering. Finally, the thesis offers a set of recommendations for the formation and management of ICE design facilities and discusses the applicability of the proposed methodology to the full-scale development of complex engineered systems.
by Mark Sean Avnet.
Ph.D.
Foltz, Christian. "Cognitive Engineering zur Analyse und Gestaltung kreativ-informatorischer Arbeit in der Verfahrensentwicklung." Aachen Shaker, 2009. http://d-nb.info/999883844/04.
Full textValieva, Inna. "Spectrum Sensing for Dynamic Spectrum Access in Cognitive Radio." Licentiate thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-52881.
Full textAl-Saadi, Ahmed. "Cognitive network framework for heterogeneous wireless mesh systems." Thesis, Cardiff University, 2016. http://orca.cf.ac.uk/96622/.
Full textVinter, Ricky Jay. "Evaluating formal specifications : a cognitive approach." Thesis, University of Hertfordshire, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268048.
Full textAlhanai, Tuka(Tuka Waddah Talib Ali Al Hanai). "Detecting cognitive impairment from spoken language." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/122724.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 141-165).
Dementia comes second only to spinal cord injuries in terms of its debilitating effects; from memory-loss to physical disability. The standard approach to evaluate cognitive conditions are neuropsychological exams, which are conducted via in-person interviews to measure memory, thinking, language, and motor skills. Work is on-going to determine biomarkers of cognitive impairment, yet one modality that has been relatively less explored is speech. Speech has the advantage of being easy to record, and contains the majority of information transmitted during neuropsychological exams. To determine the viability of speech-based biomarkers, we utilize data from the Framingham Heart Study, that contains hour-long audio recordings of neuropsychological exams for over 5,000 individuals. The data is representative of a population and the real-world prevalence of cognitive conditions (3-4%). We first explore modeling cognitive impairment from a relatively small set of 92 subjects with complete information on audio, transcripts, and speaker turns. We loosen these constraints by modeling with only a fraction of audio (~2-3 minutes), of which the speaker segments are defined through text-based diarization. We next apply this diarization method to extract audio features from all 7,000+ recordings (most of which have no transcripts), to model cognitive impairment (AUC 0.83, spec. 78%, sens. 79%). Finally, we eliminate the need for feature-engineering by training a neural network to learn higher-order representations from filterbank features (AUC 0.85, spec. 81%, sens. 82%). Our speech models exhibit strong performance and are comparable to the baseline demographic model (AUC 0.85, spec. 93%, sens. 65%). Further analysis shows that our neural network model automatically learns to detect specific speech activity which clusters according to: pause followed by onset of speech, short burst of speech, speech activity in high-frequency spectral energy bands, and silence.
by Tuka Alhanai.
Ph. D.
Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
Atasoy, Guzide. "Using Cognitive Maps For Modeling Project Success." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12608545/index.pdf.
Full textwhat are the factors affecting the success&rdquo
and &ldquo
according to whom and which criteria should the success be measured&rdquo
should be answered. Both the factors and their influences vary depending on a project&rsquo
s specific characteristics, different environmental factors affecting it, and different parties involved. These factors are not independent of each other and the interrelationship between them should be investigated as a whole in order to model the project success. Moreover, parties involved in a project usually have different objectives and the performance indicators used to measure project success differ according to company priorities, preferences and attitudes. Thus, there exists a need to develop a project success model that contains the interrelationships between factors such as risks, decisions, and strategies, project success criteria, objectives and the relations of the factors with the objectives. A cognitive map (CM) is a strong visual tool to reflect the beliefs and knowledge of people about a situation or domain, identifying the causes, effects and the relations between them. This qualitative technique being enhanced by quantifiable properties makes it appropriate to be utilized to model the project success. As a result, the objective of this study is to demonstrate the application of CMs as a powerful tool for modeling project success. It is hypothesized that CMs can be effectively used to model the factors affecting success of a construction project, to reflect the interrelations between project success factors, to demonstrate the different objectives of parties involved in a project and show how the project success can be defined differently, by different parties. This technique is applied to a real construction project realized in Turkey. CMs of two consortium contractors and client organization involved in the project are constructed and the differences between the perceptions of three parties are revealed by content and structural analyses. Finally, the benefits and shortcomings of using CMs for modeling project success are discussed by referring to case study findings.
Periola, Ayodele Abiola. "Efficient spectrum-handoff schemes for cognitive radio networks." Doctoral thesis, University of Cape Town, 2016. http://hdl.handle.net/11427/24443.
Full textFaizan, Shah Ali. "SDN based security using cognitive algorithm against DDOS." Master's thesis, University of Cape Town, 2018. http://hdl.handle.net/11427/29880.
Full textVakili, Arash. "Adaptive spectrum sensing for cognitive radio networks." Thesis, McGill University, 2012. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=106425.
Full textLa détection de spectre est une fonctionnalité importante de la radio cognitive car elle permet de vérifier la présence ou l'absence d'un utilisateur principal (PU) sur une bande de spectre donnée. La détection de l'énergie est une méthode fréquemment utilisée pour y parvenir.Cette dernière s'appuie sur l'hypothèse que le PU est présent ou absent pour la totalité de la période de mesure. Cependant, cette hypothèse n'est pas réaliste pour un environnement dynamique dans lequel le PU peut apparaître ou disparaître à n'importe quel instant. En effet, les performances d'un détecteur d'énergie conventionnel (ED) se détériorent lorsque l'état du PU varie au cours de la période durant laquelle les mesures sont effectuées. C'est donc pour cette raison qu'il est nécessaire de concevoir un détecteurqui s'adapte bien à ce genre d'environnement et qui permet de détecter de manière fiable tout changement dans l'activité du PU. Plusieurs techniques de détection de changements séquentiels existent dans la littérature mais la détection de changement pour une durée fixe n'a pas été explorée suffisamment en détails. Dans le cadre de ce mémoire, trois EDs adaptatifs sont proposés dans le but d'améliorer les performances dans un environnement dynamique au sein duquel il y a un seul changement au niveau de l'activité du PU et ce durant une période de mesure de durée fixe. Pour tenter de résoudre cette problématique, une approche à pondération exponentielle et deux approches théoriques en lien avec le test d'hypothèse composée sont proposées. Dans le premier cas, une approche intuitive exploitant la pondération exponentielle de l'énergie mesurée est utilisée afin de concevoir un ED adaptatif qui satisfait le critère de Neyman-Pearson (NP). L'analyse des performances et des résultats de simulation prouvent que cette stratégie offre de meilleures performances par rapport aux ED conventionnels. Il s'agit également du seul ED adaptatif présent dans la littérature qui tente de résoudre la problématique précédemment mentionnée. Dans le second cas, deux approches théoriques fondées sur le test d'hypothèse composée sont utilisées afin de concevoir deux nouveaux EDs adaptatifs qui améliorent la détection de changements durant la période de mesure. La première approche s'appuie sur le test généralisé de vraisemblance (GLRT) et utilise une estimation de la vraisemblance maximale (MLE) de la position inconnue du changement. Dans ce cas, une méthode itérative est proposée pour réduire la complexité de calcul du processus de MLE. La deuxième approche, dite composée bayésienne, prend pour acquis que la position inconnue du changement est une variable aléatoire discrète dont la loi de probabilité (PMF) est connue. Pour cette dernière approche, les accès au canal sont modélisés par un modèle de Markov à deux états afin d'obtenir la PMF de la position du changement et la probabilité d'occurrence des deux hypothèses. Le ED adaptatif utilisant le GLRT tente de satisfaire le critère de NP tandis que le ED adaptatif utilisant l'approche de la composée bayésienne tente de minimiser la probabilité d'une erreur. Il est démontré à l'aide de simulations que ces deux EDs adaptatifs offrent des performances supérieures à celles du ED conventionnel. En outre, le ED adaptatif utilisant le GLRT surpasse le ED adaptive utilisant l'approche pondération exponentielle.
Jia, Peng. "Spectrum-sensing threshold designs for cognitive radios." Thesis, McGill University, 2011. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=97121.
Full textCe mémoire présente une étude de la conception de seuils optimaux pour les méthodes de perception du spectre basées sur le test d'énergie dans un réseau de radio cognitive, dans lequel se trouve une paire émetteur-récepteur pour l'Utilisateur Primaire (PU) et une paire émetteur-récepteur pour l'Utilisateur Secondaire (SU) uniformément distribuées dans leurs plages de transmission et d'interférence respectives. L'affaiblissement de propagation et l'évanouissement à petite échelle sont tous deux considérés dans le modèle du canal sans fil. En premier lieu, les problèmes d'optimisation sont formulés pour le PU avec possibilité de perception du spectre en bande étroite selon trois critères: minimisation du risque, minimisation du coût et maximisation de capacité. Obtenus grâce à un cadre bayésien, le seuil de minimisation du risque cherche à minimiser la somme des probabilités de détection manquée et de fausse alerte tandis que le seuil de minimisation du coût considère les pertes de débit du PU et SU dues à la détection manquée et à la fausse alerte. En revanche, les seuils de maximisation de capacité sont dérivés pour atteindre la somme pondérée maximum de débit du PU et SU. La performance des seuils optimaux dérivés est enquêtée et comparée selon le débit atteint par le PU et SU, ainsi que la somme des débits du réseau pour différents facteurs d'activités de transmission pour le PU. Les avantages apportés par la connaissance de la localisation du SU sont aussi évalués. Les résultats illustratifs démontrent que la capacité opportuniste du SU peut être obtenue au détriment du débit du PU. Dans le cas d'écoute en bande étroite, les seuils bayésiens obtenus avec la minimisation du risque et la minimisation du coût protègent mieux le PU (i.e., introduisent moins de dégradation du débit du PU, en particulier lorsque le facteur d'activité du PU est élevé) tandis que les seuils de maximization de capacité peuvent atteindre la plus haute capacité combinée du réseau. La conception de seuils optimaux pour la perception du spectre en bande étroite est examinée d'avantage pour inclure la contrainte qui garantit la dégradation minimale du débit atteignable du PU. Avec cette contrainte, il n'est plus avantageux de protéger le lien du PU des seuils bayésiens, et le seuil de maximisation de capacité représente un meilleur choix puisqu'il offre un plus haut débit pour le SU ainsi qu'une capacité combinée augmentée. De plus, l'étude des seuils optimaux pour les trois critères, avec et sans contrainte, est étendue pour considérer le cas du SU avec possibilité de perception du spectre en bande large ainsi qu'un algorithme pour accéder au spectre, visant à réduire la probabilité de détection manquée. Les résultats démontrent que, comparée à la perception du spectre en bande étroite, la perception du spectre en bande large offre de meilleurs débits aux SU et PU sur toute la plage de facteurs d'activité du PU et le débit combiné est en augmentation monotonique avec le nombre de sous-porteurs. Il est aussi confirmé que, pour la perception du spectre en bande large, le seuil pour la maximisation de capacité est plus performant que les seuils bayésiens pour permettre une contrainte beaucoup plus stricte sur les débits guarantis au PU tout en fournissant de meilleurs débits au PU et SU.
Lundqvist, Tomas. "Creating Resilience – A Matter of Control or Computation? : Resilience Engineering explored through the lenses of Cognitive Systems Engineering and Distributed Cognition in a patient safety case study." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-102366.
Full text