To see the other types of publications on this topic, follow the link: Computer applications in industry and technology.

Dissertations / Theses on the topic 'Computer applications in industry and technology'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Computer applications in industry and technology.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Sciaky, Davide. "The digital transformation of the music industry through applications of blockchain technology." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-264916.

Full text
Abstract:
Since its introduction in 2008, the blockchain technology has been hailed as the one that could revolutionise many different industries. The music industry underwent several changes in the last 20 years as a consequence of phenomena such as music piracy, digital music and music streaming. Many considered the blockchain technology the solution to the many issues the music industry is facing. However, while the technology has been around for more than 10 years, and despite the enthusiasm of scholars and experts, little has been done to actually implement blockchains in the industry, especially by its biggest players. The resulting question is if and how the technology could change the music industry. This research starts by looking into previous studies on the blockchain technology, on the music industry and on the possible intersections of the two: from there the most popular suggested applications of the blockchain technology are extracted and presented in interviews to people working in the music industry. The goal of the interviews is to understand if the issues that the suggestions aimed to solve are real, and if the suggested applications are thought to be actually useful. The results are also compared with considerations from previously analysed papers, and showed a general interest in the blockchain technology and in the belief that it could help solve some issues of the music industry. At the same time, it was found that the technology is considered too young to be employed at the present time, with most people reckoning it is a technology that could have an impact in 10-15 year time.<br>Sedan år 2008 har man trott att Blockchain teknologin skulle kunna revolutionera många olika industrier. Exempelvis trodde man att blockchain kunde vara lösningen på många problem som musikindustrin hade. Musikindustrin har gått igenom många olika förändringar under de senaste 20 åren som en konsekvens av piratverksamhet inom musikvärden och musik streaming. Även om denna teknologi funnits i över 10 år och varit mycket uppskattad av forskare och experter, så har det inte skett så många insatser för att försöka introducera blockchain i industrin, speciellt från de stora aktörerna. Frågan är om och hur teknologin kan förändra musikindustrin. Denna forskning analyserar tidigare studier i blockchain och i musikindustri, och om det kan finnas en koppling mellan dem. De mest kända tillämpningarna av blockchain kommer att presenteras, tillsammans med intervjuer med personer som jobbar i musikindustrin. Målet med intervjuerna är att förstå om problemen som teknologin vill lösa verkligen existerar, och om dem föreslagna lösningarna verkligen kan hjälpa. Resultaten jämförts också med tidigare studier som visar intresse för blockchain teknologin och tror på att den ska hjälpa. Ibland visade det sig att denna teknologi tros vara för ung för att bli applicerad i nutid, och majoriteten tror att den kommer ha en större betydelse om 10/15 år.
APA, Harvard, Vancouver, ISO, and other styles
2

Chan, Kin-chung, and 陳建中. "The strategic implications of the developments in the application areaof the information technology industry." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1991. http://hub.hku.hk/bib/B31264864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Grip, William George. "Applications of bar code technology in the construction industry." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/25694.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cavusoglu, Muhittin. "An analysis of technology applications in the restaurant industry." Scholar Commons, 2015. https://scholarcommons.usf.edu/etd/5456.

Full text
Abstract:
The purpose of this study was to examine the utilization of Front of House and Back of House technology applications by U.S. restaurants across different types of restaurants along with their level of IT management style, and the importance of these technology applications to the restaurants' operations. This study used secondary data. The survey data collected from 500 randomly selected restaurant technology managers who are current subscribers of Hospitality Technology Magazine as of January 2013. Response rate was 27.2% and these sample groups represented 67,299 restaurant units. The data analysis was organized into 3 parts (descriptive, factor analysis and independent samples t-test). In the descriptive part of the data analysis, the information about respondents' job functions, company characteristics and companies' IT perspectives are evaluated. In the second part, factor analysis was used. Since the factor analysis is a data reduction technique, factor analysis is used to create correlated variable composites and to reduce variables for better interpretation. The third and final stage of the data analysis included testing hypotheses based on factor analysis outcomes by using an independent samples t-test. The main purpose of using an independent samples t-test is to determine whether position (IT versus Non-IT), types of restaurant (Chain versus Independent), business leadership and technology leadership (Innovator versus Follower) differ on the factor attributes.
APA, Harvard, Vancouver, ISO, and other styles
5

Read, Tony J. "Strategic Information Technology Investment Decisions in the Banking Industry." NSUWorks, 2005. http://nsuworks.nova.edu/gscis_etd/794.

Full text
Abstract:
Spending on IT has continually increased over the last 10 years within the North American retail banking industry, but debate remains as to whether organizations have seen the expected value from these IT investments. Greater management focus is being placed on evaluating and realizing shareholder value from IT investments. The challenge is to reduce IT costs from operational infrastructure and move spending to strategic IT investments for business growth and shareholder value. Banks need to develop and implement improved techniques for planning, investing, value realization, and governing strategic IT investments. The goal of the study was to investigate the strategic environment of the retail banking industry in North America and understand how banks decide upon strategic IT investments. The study consisted of a description of the retail banking strategic environment and applied bank strategies, a literature review of how IT is used within the banks, differentiating between strategic and non-strategic investments, and a cross disciplinary literature review of financial and organizational IT investment techniques for evaluating strategic IT investments. A survey was conducted at a large bank to identify what IT investment techniques were used in practice and why techniques identified in the literature review were not being applied. The study found that there were varying approaches to assessing strategic IT investments within the banking industry, but typical techniques deployed were traditional financial and conventional planning methods. Emerging organizational management techniques, like the balanced scorecard, proved to be more important than expected and were being actively deployed. Emerging information economics and decision support methods proved promising, but were deemed advanced and less important in the absence of more basic business measures. The study proposes a maturity framework and 16 techniques for assessing strategic IT investments, which showed promise at the surveyed bank. Future research could consider empirically testing the framework in a longitudinal bank study, evaluating the techniques over the life of strategic projects, in addition to evaluating the framework's potential in other industries. The author hopes that the study has promoted a better understanding of bank's strategic IT investment decision-making, and the applicability of assessment techniques for effective investment management.
APA, Harvard, Vancouver, ISO, and other styles
6

Ding, Lian. "Feature technology and its applications in computer integrated manufacturing." Thesis, University of Bedfordshire, 2003. http://hdl.handle.net/10547/622150.

Full text
Abstract:
Computer aided design and manufacturing (CAD/CAM) has been a focal research area for the manufacturing industry. Genuine CAD/CAM integration is necessary to make products of higher quality with lower cost and shorter lead times. Although CAD and CAM have been extensively used in industry, effective CAD/CAM integration has not been implemented. The major obstacles of CAD/CAM integration are the representation of design and process knowledge and the adaptive ability of computer aided process planning (CAPP). This research is aimed to develop a feature-based CAD/CAM integration methodology. Artificial intelligent techniques such as neural networks, heuristic algorithms, genetic algorithms and fuzzy logics are used to tackle problems. The activities considered include: 1) Component design based on a number of standard feature classes with validity check. A feature classification for machining application is defined adopting ISO 10303-STEP AP224 from a multi-viewpoint of design and manufacture. 2) Search of interacting features and identification of features relationships. A heuristic algorithm has been proposed in order to resolve interacting features. The algorithm analyses the interacting entity between each feature pair, making the process simpler and more efficient. 3) Recognition of new features formed by interacting features. A novel neural network-based technique for feature recognition has been designed, which solves the problems of ambiguity and overlaps. 4) Production of a feature based model for the component. 5) Generation of a suitable process plan covering selection of machining operations, grouping of machining operations and process sequencing. A hybrid feature-based CAPP has been developed using neural network, genetic algorithm and fuzzy evaluating techniques.
APA, Harvard, Vancouver, ISO, and other styles
7

Gibson, Ian. "Applications for robotics in the shoe manufacturing industry." Thesis, University of Hull, 1988. http://hydra.hull.ac.uk/resources/hull:3106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Henriksson, Sam. "Technology Strategies for Personalized Marketing in the Computer Game Industry." Thesis, KTH, Industriell ekonomi och organisation (Inst.), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-170615.

Full text
Abstract:
The computer game industry has during the past years performed a paradigm shift from physical to digital online retailing based on game portals. Due to the many possibilities Big Data in combination with personalized marketing provides, especially in the form on in-game shops in the software, it is interesting for the computer game companies to investigate how this marketing approach can be performed most beneficially. Since the computer game industry has not been thoroughly investigated in relation to personalized marketing and customer integrity, it has in this study been performed as a predictive research, based on how personalized marketing is used in other industries. This benchmark has been combined with a literature study as well as a case study on a Swedish computer game company, Paradox Interactive in the form of personal interviews, a customer survey as well as gathering of internal data. The analysis of the chosen industries, the grocery store industry, the travel and hospitality industry as well the online gambling industry, demonstrates the importance of offering the customers relevant marketing offers that benefits the customers as well as the company. This approach has been shown to imply a positive spiral of increased customer loyalty and raised revenue for the company. The performed customer surveys emphasizes high loyalty, satisfied customers, positive attitude for a loyalty program as well as for an in-game shop as well as a majority of positively minded customers for personalized marketing. The negatively minded was shown to be affected by data security, the feeling of being monitored as well as the fear for data spread. The investigation further shows a high level of technology knowledge among the computer game customers. This increases the importance of offering high data security as well as describes the used approaches for the customers. Based on these results recommendations related to the implementation of personalized marketing was developed for computer game companies. These emphasizes the importance of using secure techniques related to the data security and the explicit information related to this, which is argued to lead to increased trust amongst the customers and an increased willingness to share personal data. Further the data and information related to the customers should be gathered from different sources and be analyzed together in order to increase the deep of the knowledge about the customers, which enables more accurate and relevant offers. This relevance should be high, but well balanced in relation to the negative aspects related to customers’ possible feeling of being monitored.   For increased knowledge about the customers as well improved customer loyalty the computer game companies should implement loyalty programs, which should be well aligned with the image of the company. This study contributes to the theoretical field related to personalized marketing by investigating how current models and theories aligns with, or should be modified in order to match, the computer game industry. Besides from this it contributes with theories related to data security within the field of personalized marketing, focused on personal integrity and privacy. Theories related to the importance of trust from the customers and the relation between trust and loyalty has been verified for the computer game industry. The importance of identifying a well-balanced level of the personalization has been verified, which in turn falsifies the theories emphasizing that maximized personalization is to strive for. Theories related to key aspects to take into consideration related to data security and handling of personal data has been verified for the computer game industry related to the handling of Big Data.<br>Dataspelsindustrin har under åren gjort en resa från fysisk försäljning i butik till digital försäljning via spelportaler på internet. I och med de många möjligheter Big Data i kombination med personlig marknadsföring möjliggör, speciellt i formatet av en inbyggd försäljningskanal inuti mjukvaran, är det av stort intresse för företag i spelbranschen att undersöka hur personlig marknadsföring mest fördelaktigt utförs.  I och med att dataspelinsdustrin ej blivit undersökt med avseende på personlig marknadsföring och kunders integritet tidigare, har detta utförts i form av en förutsägande undersökning baserat på användning av personlig marknadsföring i andra industrier. Denna utvärderande analys har kombinerats med en litteraturstudie samt en fallstudie på det svenska dataspelsföretaget Paradox Interactive i form av intervjuer, en kundenkät samt insamling av intern data. Analysen av de valda industrierna, matvaruhandeln, rese- och hotellindustrin och onlinespelindustrin, påvisar vikten av att erbjuda kunderna relevanta erbjudanden som i längden gynnar såväl kunden som företaget. Detta har påvisats leda till en god spiral av ökad kundlojalitet och ekonomisk vinst för företaget. Utförda kundundersökningar påvisar hög lojalitet, nöjda kunder, positiv attityd till sålväl en inbyggd butik i mjukvaran som ett lojalitetsprogram samt en övervägande andel positiva attityder för personlig marknadsföring. De negativt inställda påverkas av såväl datasäkerheten, känslan av att vara övervakad samt rädslan för att data sprids till tredje part. Undersökningen visar även på en hög kunskapsnivå inom data hos kunderna, vilket höjer vikten av att erbjuda hög säkerhet och även av att förmedla detta till dem. Baserat på dessa resultat har rekommendation gällande implementationen av personlig marknadsföring tagit fram för dataspelsföretag. Dessa framhäver vikten av att ha hög datasäkerhet och förmedla detta till kunderna, vilket i sin tur gör kunderna mer trygga och villiga att dela personlig information. Vidare bör data och information om kunderna skall samlas in från olika kanaler och analyseras tillsammans i syfte att öka kunskapem om kunder, vilket ger möjligheten att erbjuda kunderna mer träffsäkra och relevanta erbjudanden. Denna relevans skall vara hög, men väl avvägd mot den negativa effekten som uppstår om kunden känner sig övervakad.   För utökad kunskap om kunderna och samtidigt generera höjd kundlojalitet skall företag i industrin implementera lojalitetsprogram, vilka skall vara enhetlig med företagets framtoning. Detta arbete bidrar till teorier inom personlig markandsföring genom att undersöka hur rådande teorier och modeller passar eller skall ändras för att matcha dataspelindustrin. Utöver detta bidrar arbetet till teorier gällande datasäkerhet inom området personlig markandsföring, med fokus på integritet och privatliv. Teorier gällande vikten av fötroende från kunderna och sambandet mellan förtroende och lojalitet har påvisats stämma för dataspelindustrin. Vikten av att hitta ett mellanläge för markandsförings relevans har påvisats stämma, vilket i sin tur dementerar teorier som påvisar att maximal relevans är eftertraktat. Teorier gällande huvudaspekter att ta hänsyn till gällande datasäkerhet och behandling av personlig data har påvisats stämma för datapselindustrin relaterat till behandlingen av Big Data.
APA, Harvard, Vancouver, ISO, and other styles
9

Hedlund, Markus. "Eye tracking technology for Automation Industry." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-182145.

Full text
Abstract:
This master thesis is done at CrossControl, a company in the automation industry. A literature review was done covering state of the art technology of eye-tracking and gaze control and how it can be used in the automation industry. One purpose with the study was to indentify features important for an eye-tracker in automation applications. Findings suggests that there are no standard methods for measuring the performance of trackers and further that performance in regard to gaze control is limited by physiology of the eye rather than limitations of the devices. The differences between trackers are found in robustness when it comes to differences in people or conditions in the environment. A prototype was made for demonstration. The prototype was built on equipment used in the industry combined with an eye-tracker from Tobii. A library, where coordinates from the eye-tracker were used to indicate what object in the interface was gazed upon, was implemented and used to demonstrate concepts such as buttons outside the screen activated by gaze.
APA, Harvard, Vancouver, ISO, and other styles
10

Yu, Lili Ph D. Massachusetts Institute of Technology. "MoS₂ electronics : technology, high yield circuits and applications." Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/108993.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2017.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 177-186).<br>In the last few decades, the device community has explored a large number of technologies beyond silicon, that not only allow for further shrinkage in electronic systems size and power but can also provide new features, such as mechanical flexibility, large-area coverage at low cost thanks to inkjet printing, and simplified 3D integration. Two-dimensional electronics based on single-layer MoS₂ synthesized by chemical vapor deposition (CVD) offers significant advantages for realizing large-scale flexible systems owing to the ultrathin nature, excellent transport properties and stable crystalline structure of MoS₂. Despite all the progress, the MoS₂ electronics demonstrated so far is limited to single or few-device- scale circuits built on exfoliated flakes due to the many challenges associated with the uniformity and yield control in both material growth and device technologies. This thesis addresses issues which are crucial for realizing reliable, and high-yield complex circuits using emerging 2D materials, such as MoS₂: (1) Develop large-area material synthesis and transfer methods, as well as some of the first technologies for reliable enhancement mode MoS₂ transistors. (2) Design an automatic flow for fast implementation of complex circuits using MoS₂.Compact models and a process development kit (PDK) are developed for MoS₂ and are used to successfully implement both digital and analog circuits. (3) Study the sources of variability in MoS₂ devices and circuits and improve circuits yield by material, process, and device and circuit design co-optimization. (4) Demonstrate two system-level applications of CVD MoS₂: active matrix backplane circuits for transparent displays and radio frequency energy harvester. (5) Demonstrate the first air-stable CMOS technology monolithically integrated on WSe₂ to offer low power electronic solution. The future opportunities and potential challenges for all these technologies are also discussed. This thesis, in summary, provided important guidelines on how to take a new proof-of-concept material/device and make it into a useful technology to enable practical applications.<br>by Lili Yu.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
11

Andersson, Kent. "Knowledge Technology Applications for Knowledge Management." Doctoral thesis, Uppsala : Institutionen för informationsvetenskap, Univ. [distributör], 2000. http://w3.ub.uu.se/fulltext/91-506-1437-1.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Roy, Shaunak S. M. Massachusetts Institute of Technology. "Future value chains in the computer hardware industry." Thesis, Massachusetts Institute of Technology, 2006. http://hdl.handle.net/1721.1/38568.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program; and, (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2006.<br>Includes bibliographical references (leaves 96-97).<br>Companies in the computer hardware industry can benefit by incorporating future business scenarios in their present decision-making processes. Any decision regarding strategic supply chain design is one such area where long-range planning can especially help. This is primarily because investments in new supply chains have a long return period, which also influence the chances of future success of a company. However, developing such long-range views of the whole industry is a challenging task, because of inherent uncertainties of the future and rapid changes in the computer industry itself. This paper takes a step towards achieving this goal by introducing several frameworks for the development of future scenarios and their analysis.<br>by Shaunak Roy.<br>M.Eng.in Logistics<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
13

Bergström, Amanda. "Imagining Future Technology of the Horse Industry and Equestrian Sports." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-258418.

Full text
Abstract:
Equestrian sports are amongst the largest sports and leisure activities in Sweden. One of the major reasons for engaging with horses is the bond to the horse. Just recently technology has found its way into the horse industry which otherwise is a very traditional sport. This paper explores possible consequences technology may have in the future in the environment around horses and on the horse-rider relationship. The exploration was done by combining auto-ethnographic research and a co-speculation workshop. The ideas that were gathered were then the starting point for the creation of a design fiction, in which the ideas were developed and explored. The design fiction also serves as an approachable way of mediating the consequences of technology to the equestrian community. The imagined technology for equestrian sports had both positive and negative impact on the sport and the relationship between horse and human.<br>Ridsporten är en av Sveriges mest populära idrotter. En av de viktigaste anledningarna till att hålla på med hästar är relationen till hästen, enligt dess utövare. Nyligen har tekniken hittat in i ridsporten, som annars är en mycket traditionell sport, i form av sensorteknik, träningsappar och videoövervakning. Trots ridsportens utbredning, är tekniken eftersatt i förhållande till andra idrotter. Detta arbete utforskar, analyserar och diskuterar möjliga konsekvenser som tekniken kan medföra i framtiden i miljön kring hästar, i ridsporten och på relationen mellan häst och ryttare. Studien utfördes genom att kombinera etnografiska metoder och en spekulativ workshop ihop med ryttare. Idéerna från dessa blev utgångspunkten för skapandet av en fiktiv tidning, i vilken idéerna vidareutvecklades och utforskades i sitt sammanhang. Den fiktiva tidningen fungerar även som ett sätt att förmedla studien och dess resultat till ridsportens utövare. Teknikens frammarsch i ridsporten kan tänkas ha både positiv och negativ inverkan på sporten och relationen mellan häst och ryttare.
APA, Harvard, Vancouver, ISO, and other styles
14

胡元佳. "Pharmaceutical patent valuation based on technology innovation and applications in the industry." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2150641.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Pader, Kruthardh. "Blockchain Applications in Healthcare Industry : A literature survey." Thesis, Blekinge Tekniska Högskola, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-21800.

Full text
Abstract:
Background: Blockchain technology may seem like a complex system, but it is simply a decentralized database designed to remove the need for third-party organisation in data management. Blockchain is being researched for uses in the various industry out of which healthcare is one. Healthcare industry suffers from various issues such as imperfect data, a broken medical history that is split across various healthcare institutions, and so on. Blockchain might be the approach it needs to optimize it to a greater level of functioning. Objectives: The objectives of this report are to understand whether the decentralization feature along with other features of blockchain technology can be advantageous to the healthcare industry and also to summarize the previous implementation for the use cases of the technology in the domain. Methods: The method used is a literature survey. We perform a study selection process in four steps. After each step, the number of publications is reduced as unwanted publications are omitted using search strings, inclusion and exclusion criteria. We even conducted a study quality assessment which helps us analyse the quality offindings from the final set of selected papers in answering the research questions. Results: We have summarized the findings from the 36 selected papers from the study selection process according to the research questions. Conclusions: Blockchain technology provides data security, once any data is registered on the blockchain it cannot be altered or manipulated. It eliminates the need for a third party to verify the transactions on the chain. As blockchain is a budding new technology with very little age under its belt, there needs to more research on the topic before this can be applied over a large scale of systems that are operating in critical areas such as healthcare. Even though implementing blockchain for the use cases such as Electronic Medical Records (EMRs), research trials and so on, it can not be done immediately as the exposure of this technology to the common public and healthcare individuals is very limited.
APA, Harvard, Vancouver, ISO, and other styles
16

Reimers, Karl Walter. "Impact of Information Technology (IT) Industry Certification on the Achievement of High School Students Enrolled in Technology Courses." NSUWorks, 2009. http://nsuworks.nova.edu/gscis_etd/284.

Full text
Abstract:
Being proficient with technology is becoming an essential part of a high school education, and some high schools now require computer skills as a prerequisite to graduation. School districts that recognize the relevancy and value of Information Technology (IT) courses to student careers and education can provide insight into effective teaching. Although most high school technology teachers have professional teaching certifications from passing prescribed subject area tests, many of these IT teachers do not possess IT industry certifications. IT industry certifications are official recognitions that verify competence through an array of requirements including education, experience, and examinations. The goal of this study was to quantify the effect of student achievement by comparing student posttest scores of teachers holding relevant IT industry certifications with those of teachers not possessing IT industry certifications. To accomplish the goal, nine North Carolina school districts furnished student posttest data on teachers who taught the Computer Applications I course. In addition, 51 of 80 Computer Applications I teachers completed an online survey that solicited information on IT industry certifications (e.g., Microsoft Office and IC3 Certifications). The posttest data and survey information was compared and analyzed using parametric inferential statistics. The study demonstrated that IT certified teachers had a significant, positive effect on the level of achievement of Computer Applications I high school students. Thus, high school teachers who possess IT industry certifications may be better equipped to instruct complex technology courses to their students. Based on the findings of this study, school districts should institute professional development programs that promote relevant IT industry certification to their Computer Applications I teachers. Finally, IT teachers possessing relevant IT certification could advocate the importance of IT industry certifications to their students in an effort to elevate the perceived value of technology courses.
APA, Harvard, Vancouver, ISO, and other styles
17

Wu, Joyce H. (Joyce Hsia-Sing) 1974. "A high aspect-ratio silicon substrate-via technology and applications." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/8811.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.<br>Includes bibliographical references (p. 85-90).<br>Substrate vias are widely used in GaAs microwave and millimeter-wave ICs to provide low impedance ground connections. As silicon RFICs strive for high-frequency operation, it becomes increasingly important to reduce all extrinsic parasitics. Of particular concern is the MOSFET source or BJT emitter impedance, which greatly affects the gain of RF amplifiers. To address this, we have developed a through-wafer via technology for silicon, which allows the implementation of high-aspect ratio, low-impedance ground connections. The fabrication of these vias involves three main steps: (1) anisotropic DRIE to etch the vias, (2) PECVD silicon nitride deposition to form an insulating, barrier liner, and (3) copper electroplating to fill the via. Since our vias incorporate an insulating liner, this through-wafer via technology could also be used to distribute power and ground in logic circuits and MEMS. We have demonstrated vias with an aspect ratio as high as 14:1 and an inductance that approaches the theoretically expected value. Our via technology can also be exploited to reduce crosstalk and improve subsystem isolation in RF System-on-a-Chip applications. High crosstalk immunity is critical to enable one-chip systems integrating noisy logic with sensitive low-noise amplifier and analog circuitry. Using our substrate-via technology, we have implemented a novel Faraday cage isolation scheme that is successful in suppressing crosstalk by over 20 dB at 1 GHz at a distance of 100 [mu]m.<br>by Joyce H. Wu.<br>S.M.
APA, Harvard, Vancouver, ISO, and other styles
18

Ng, Hok-cheong. "Information technology distribution networks in Mainland China /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19872562.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Bauer, Leesa. "We love to hate help desk /." Electronic resource, 2000. http://adt.lib.uts.edu.au/public/adt-NTSM20030408.142011/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chiu, Wan Ting. "The innovator's dilemma? : re-thinking disruptive technology in the hard disk drive industry /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?SOSC%202006%20CHIU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Hempel, Marek Ph D. Massachusetts Institute of Technology. "Technology and applications of 2D materials in micro- and macroscale electronics." Thesis, Massachusetts Institute of Technology, 2020. https://hdl.handle.net/1721.1/130201.

Full text
Abstract:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, May, 2020<br>Cataloged from student-submitted PDF of thesis.<br>Includes bibliographical references (pages 198-209).<br>Over the past 50 years, electronics has truly revolutionized our lives. Today, many everyday objects rely on electronic circuitry from gadgets such as wireless earbuds, smartphones and laptops to larger devices like household appliances and cars. However, the size range of electronic devices is still rather limited from the millimeter to meter scale. Being able to extend the reach of electronics from the size of a red blood cell to a skyscraper would enable new applications in many areas including energy production, entertainment, environmental sensing, and healthcare. 2D-materials, a new class of atomically thin materials with a variety of electric properties, are promising for such electronic systems with extreme dimension due to their flexibility and ease of integration. On the macroscopic side, electronics produced on thin films by roll-to-roll fabrication has great potential due to its high throughput and low production cost. Towards this end, this thesis explores the transfer of 2D-materials onto flexible EVA/PET substrates with hot roll lamination and electrochemical delamination using a custom designed roll-to-roll setup. The transfer process is characterized in detail and the lamination of multiple 2D material layers is demonstrated. As exemplary large-scale electronics application, a flexible solar cell with graphene transparent electrode is discussed. On the microscopic side, this thesis presents a 60x60 [mu]m² microsystem platform called synthetic cells or SynCells. This platform offers a variety of building blocks such as chemical sensors and transistors based on molybdenum disulfide, passive germanium timers, iron magnets for actuation, as well as gallium nitride LEDs and solar cells for communication and energy harvesting. Several system-level applications of SynCells are explored such as sensing in a microfluidic channel or spray-coating SynCells on arbitrary surfaces.<br>by Marek Hempel.<br>Ph. D.<br>Ph.D. Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
22

Mitropoulos, Panagiotis. "An expert systems technology transfer model for the architecture-engineering-construction industry." Thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-10102009-020054/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Poon, Auliana. "Information technology and innovation in international tourism Implications for the Caribbean tourist industry /." Online version, 1987. http://ethos.bl.uk/OrderDetails.do?did=1&uin=uk.bl.ethos.383578.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Flores, Jorge Augusto Borrego. "Technology transfer and industrial policy : the case of the computer industry in Mexico." Thesis, University of Sussex, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.284110.

Full text
Abstract:
This dissertation assesses the Mexican government policy in computers during a ten year period (1981-1991). The Mexican computer industry was created by a strategic industrial programme which provided a package of conditions that attracted domestic and international capital during this period. The main policy instruments used initially were the market reserve and import permits. The programme was known in Spanish as 'Programa de Fomento Para la Manufactura de Equipo de C6mputo, Sus Principales M6dulos y Perifericos' or the PF Policy. The analysis follows policy and industry performance developments (from the birth of the PF policy to its successor the 'Programa Para la Modernizaci6n de la Industria de Computo' or PMIC). This perspective on the policy issues raised by the programme is based mainly on the views of firms and interest groups perspective. The analysis is based upon a four dimensional framework developed by the author and based upon a synthesis of theories of technological learning, technology transfer and firms strategic behaviour. This is used to explore the impact of the PF Policy at the firm and industry levels as well as to investigate the performance of government agencies and the impact of the policy on users (diffusion) and social applications. This dissertation explores the PF Policy as the first programme that in rejecting the import substitution industrialisation (lSI) model Mexico had followed for several decades, embraced export oriented industrialisation (EOI). This analysis explores the changes in the regulatory environment which accompanied the transition from lSI to EOI and considers how this shift impacted upon the performance of firms and the computer industry. The transition to EOI resulted in greater production efficiencies, higher quality and cheaper prices but these benefits are shown to have accrued to large volume producing firms (a few domestic and multinational computer firms). With regard to export generation, only the multinational computer firms have shown significant growth rates. The emphasis on export generation, the shift to EOI and rapid liberalisation of consumer and component electronics had a negative impact on the generation of productive linkages within the Information Technology Complex, e.g. the development of a horizontal layer of component producers. During this period of transition from lSI to EOI there were conflicting objectives within the policy environment. For example, policies were implemented to liberalise trade as part of commitments to GATT and policies were introduced to strengthen industrial development in the electronics sector for domestic consumption. The major failure of the PF policy in relation to its initial objectives occurred in relation to technological development. This is illustrated by the limited innovations that occurred over the ten year period among domestic firms producing microcomputers and peripherals. Despite this failure, there is evidence that technological learning occurred 'against all odds'.
APA, Harvard, Vancouver, ISO, and other styles
25

Le, Roux Johanna Regine Josèphe. "Corporate reputation in the information technology industry a South African case study /." Pretoria : [s.n.], 2003. http://upetd.up.ac.za/thesis/available/etd-04202004-145730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Li, Chuen-Yueh. "Global sourcing in innovation." Diss., Restricted to subscribing institutions, 2008. http://proquest.umi.com/pqdweb?did=1619148901&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Chuvessiriporn, Suttichai. "Hospitality Students' Attitudes and Behavioral Intentions toward Learning and Using Computer Technology." Thesis, University of North Texas, 1999. https://digital.library.unt.edu/ark:/67531/metadc2279/.

Full text
Abstract:
Following Ajzen/Fishbein's 1980 Theory of Reasoned Action, influences of hospitality students' external variables (age, gender, university classification, and work experience) on computer attitudes, and relationships between computer attitudes and intentions to learn and use computers were tested. A sample of 412 hospitality students completed two measurements: Loyd/Gressard's 1984 Computer Attitude Scale, and Behavioral Intentions to Learn and Use Computers. Males and females had positive computer attitudes. Graduates had more positive computer attitudes. No interaction effect existed between gender and classification. No relationships existed between age and work experience on computer attitudes. Computer attitudes positively correlated with intentions to learn and use computers. Results supported the Theory of Reasoned Action. External variables partially influence attitudes and attitudes influence intentions.
APA, Harvard, Vancouver, ISO, and other styles
28

Shereif, Mahdi Mohamed Osman. "The management of technology and change : the introduction of computer-based information technology in the Sudanese banking industry." Thesis, University of Aberdeen, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.420128.

Full text
Abstract:
This study represents a research effort aimed at contributing to the literature on the management of technology and change in general; and in particular on the adoption of new technology by commercial banks operating in developing economies. The context of Sudan provides a good research opportunity to investigate the issues and problems faced by banks adopting information technology in such an economy. To investigate this issue, relevant literature was explored and examined prior to conducting fieldwork in the Sudan. The theoretical section analyses debates on the change process and perspectives on IT and change. The empirical research and the practical aspect of the investigation is based on fieldwork carried out in Sudan. The study design comprised mixed methods: that is, a combination of quantitative and qualitative data collection to construct a picture of how IT has been introduced and implemented in the SBI. Response rate of (90.7 per cent) to questionnaire survey was received; and (82) interviews were conducted with General/Bank Managers, IT managers, employees, IT consultants and senior officials/top policy makers in the SBI in the period from January 2003 to July 2003. SPSS was used to analyse the quantitative data; and all taped interviews were transcribed and data were analysed using manual thematic analysis methods. Findings suggest a top down approach in the strategic decision to adopt new technology, whereas the process of managing the implementation of change was determined at the local banking level. The findings reveal how bank managers constrained the process of technological change and inhibited the strategic development of IT in the Sudanese banking sector, largely due to lack of technology awareness and IT knowledge. These findings have implications for strategy and policy making, particularly in the areas of technology investment, recruitment of staff, employees’ training and modification of systems to comply with Islamic Modes of banking practice in the SBI. The study offers a contribution to knowledge by providing new empirical evidence on the management of technology and change in the context of a developing country, identifying lessons for business managers, professionals and academics, as well as enhancing our theoretical understanding of the management of change.
APA, Harvard, Vancouver, ISO, and other styles
29

Haque, Md Ansarul, and Md Delwar Hossain. "Technology Survey of Wireless Communication for In-vehicle Applications." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23389.

Full text
Abstract:
Currently, wireless communication technologies are expected to be widely employed for in-vehicle communication where in-vehicle communication is built upon the interactions of different parts inside the vehicle. This communication is to enable a variety of applications for driver and passenger needs.  To have improved driving assistance, development of in-vehicle applications is very much needed. At present, intelligent systems inside the vehicle are mostly dominated by the wired technologies. The possibilities of wireless communication have inspired us and made an opportunity to analyse replacements for wired communication within a vehicle. In this connection, the scope of our thesis is to define the in-vehicle applications which are preferred by the wireless technologies, to define the applications using wired technologies which could be replaced by the wireless technologies and to identify those applications which are difficult to implement by the wireless technologies.   In-vehicle wired networks; and problems of these wired networks, along with several existing applications, have been discussed at the initial stage of this thesis for the purpose of having a clear understanding. After that, existing In-vehicle wireless applications and several challenging applications have also been studied. Studies have been done on the most important wireless technologies with their respective specifications. The requirement of establishing wireless communication has also been explained. Finally, an analysis has been done according to the requirements of the applications and verification of their possible reliance on the wireless technologies.   In a brief, comparable studies have been done among the wireless technologies to assess their current and future fitness for In-vehicle applications. The thesis concludes with some recommendations regarding when wireless technologies might be suitable for some in-vehicle applications to replace the wired technologies.
APA, Harvard, Vancouver, ISO, and other styles
30

Osborne, Mark M. "The computer based analysis & design of custom power technology for industrial applications." Thesis, University of Sunderland, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.242113.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Sayler, Andy. "Securing Secrets and Managing Trust in Modern Computing Applications." Thesis, University of Colorado at Boulder, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108746.

Full text
Abstract:
<p> The amount of digital data generated and stored by users increases every day. In order to protect this data, modern computing systems employ numerous cryptographic and access control solutions. Almost all of such solutions, however, require the keeping of certain secrets as the basis of their security models. How best to securely store and control access to these secrets is a significant challenge: such secrets must be stored in a manner that protects them from a variety of potentially malicious actors while still enabling the kinds of functionality users expect. </p><p> This dissertation discusses a system for isolating secrets from the applications that rely on them and storing these secrets via a standardized, service-oriented secret storage system. This &ldquo;Secret Storage as a Service&rdquo; (SSaaS) model allows users to reduce the trust they must place in any single actor while still providing mechanisms to support a range of cloud-based, multi-user, and multi-device use cases. </p><p> This dissertation contains the following contributions: an overview of the secret-storage problem and how it relates to the security and privacy of modern computing systems and users, a framework for evaluating the degree by which one must trust various actors across a range of popular use cases and the mechanisms by which this trust can be violated, a description of the SSaaS model and how it helps avoid such trust and security failures, a discussion of how the SSaaS approach can integrate with and improve the security of a range of applications, an overview of Custos &ndash; a first-generation SSaaS prototype, an overview of Tutamen &ndash; a next-generation SSaaS prototypes, and an exploration of the legal and policy implications of the SSaaS ecosystem. </p>
APA, Harvard, Vancouver, ISO, and other styles
32

Piechocinski, Marek. "Electrochemical sensor system architecture using the CMOS-MEMS technology for cytometry applications." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3694/.

Full text
Abstract:
This thesis presents the development process of an integrated sensor-system-on-chip for recording the parameters of blood cells. The CMOS based device consists of the two flow-through sensor arrays, stacked one on top of the other. The sensors are able to detect the biological cell in terms of its physical size and the surface charge on a cell’s membrane. The development of the measurement system was divided into several stages these were to design and implement the two sensor arrays complemented with readout circuitry onto a single CMOS chip to create an on-chip membrane with embedded flow-through micro-channels by a CMOS compatible post-processing techniques to encapsulate and hermeti-cally package the device for liquid chemistry experiments, to test and characterise the two sensor arrays together with readout electronics, to develop control and data acquisition software and to detect the biological cells using the complete measurement system. Cy-tometry and haematology fields are closely related to the presented work, hence it is envis-aged that the developed technology enables further integration and miniaturisation of the biomedical instrumentation. The two vertically stacked 4 x 4 flow-through sensor arrays, embedded into an on-chip membrane, were implemented in a single silicon chip device together with a readout circuitry for each of the sensor sets. To develop a CMOS-MEMS device the design and fabrication was carried out using a commercial process design kit (0.35 µm 4-Metal, 2-Poly, CMOS) as well as the foundry service. Thereafter the device was post-processed in-house to develop the on-chip membrane and open the sensing micro-apertures. The two types of sensor were integrated on the silicon dice for multi-parametric characterisation of the analyte. To read the cell membrane charge the ion sensitive field effect transistor (ISFET) was utilised and for cell size (volume) detection an impedance sensor (Coulter counter) was used. Both sensors rely on a flow-through mode of operation, hence the constant flow of the analyte sample could be maintained. The Coulter counter metal electrode was exposed to the solution, while the ISFET floating gate electrode maintained contact with the analyte through a charge sensitive membrane constructed of a dielectric material (silicon dioxide) lining the inside of the micro-pore. The outside size of each of the electrodes was 100 µm x 100 µm and the inside varied from 20 µm x 20 µm to 58 µm x 58 µm. The sense aperture size also varied from 10 µm x 10 µm to 16 µm x 16 µm. The two stacked micro-electrode arrays were layed out on an area of 5002 µm2. The CMOS-MEMS device was fit into a custom printed circuit board (PCB) chip carrier, thereafter insulated and hermetically packaged. Microfluidic ports were attached to the packaged module so that the analyte can be introduced and drained by a flow-through mode of operation. The complete microfluidic system and packaging was assembled and thereafter evaluated for correct operation. Undisturbed flow of the analyte solution is es-sential for the sensor operation. This is related to the fact that the electrochemical response of both sensors depends on the analyte flow through the sense micro-apertures thus any aggregation of the sample within the microfluidic system would cause clogging of the mi-cro-pores. The on-chip electronic circuitry was characterised, and after comparison with the simulated results found to be within an error margin of what enables it for reliable sensor signal readout. The measurement system is automated by software control so that the bias parame-ters can be set precisely, it also helped while error debugging. Analogue signals from the two sensor arrays were acquired, later processed and stored by a data acquisition system. Both control and data capture systems are implemented in a high level programming lan-guage. Furthermore both are integrated and operated in a one window based graphical user interface (GUI). A fully functional measurement system was used as a flow-through cytometer for living cells detection. The measurements results showed that the system is capable of single cell detection and on-the-fly data display.
APA, Harvard, Vancouver, ISO, and other styles
33

Lewis, Tony. "Electronic data interchange in the construction industry." Thesis, Loughborough University, 1998. https://dspace.lboro.ac.uk/2134/11183.

Full text
Abstract:
The aim of this research is to improve the efficiency of the construction process through the application of electronic data interchange (EDI). This thesis describes the development and application of EDI messages. The messages described are targeted to provide a means for transferring construction specific information during the construction process. The definition of electronic data interchange and its technical issues are first described. The nature of EDI, replacing paper based communication with electronic messages, impacts on the way in which business is conducted, and also has far reaching legal implications due to the reliance of many legal systems on paper documents and signatures. The business and legal implications are therefore discussed in detail. The application of EDI in the construction industry is investigated by means of a literature review. This work is furthered by a longitudinal study of the construction industry's application of EDI, which consisted of two surveys at a five year interval. A model of the information flows within the traditional construction process is developed to assist in the identification of information flows suitable for EDI. A methodology for message development was produced. The methodology was then applied to develop a description data model that could be utilised in the existing bill of quantity and trading cycle messages. The bill of quantity message set was at a stage ready for trial. To determine the issues related to implementation specifically in the construction industry a trial implementation of this message set was undertaken. The official implementation undertaken by EDICON is described. Software was also developed to undertake the trial. This software was tested and proved the message set developed was suitable for the transfer of bill of quantity related information during a construction project. The factors causing the failure of the implementation of the bill of quantities message set are discussed. A number of these factors are considered valid for all construction project information flows. Finally, the use of shared project models to re-engineer construction information tasks is recommended as a means of achieving significant benefit from electronic data exchange in the construction process.
APA, Harvard, Vancouver, ISO, and other styles
34

Kelly, T. J. C. "The location and spatial organisation of high technology industry in Great Britain : Computer electronics." Thesis, University of Cambridge, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.372656.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

吳學章 and Hok-cheong Ng. "Information technology distribution networks in Mainland China." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1998. http://hub.hku.hk/bib/B31269126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Jackson, Mona M. "Competency-based computer applications for secondary schools and community colleges." CSUSB ScholarWorks, 1992. https://scholarworks.lib.csusb.edu/etd-project/1048.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Kemp, Sean Nicholas. "The application of groupware in the manufacturing industry." Thesis, University of Strathclyde, 1999. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21406.

Full text
Abstract:
Groupware was developed to address the limitations of existing Information Technologies in facilitating an increased level of collaboration in todays' customer focused industries. These systems are a hybrid between a database, to organise and store previously unstructured knowledge, and an e-mail system, to disseminate this knowledge across entire organisations. Lotus Notes has become the recognised industry standard for a Groupware system, providing an application development platform on which can be built a company's knowledge infrastructure, and the research concentrates on this system. Groupware systems are not designed to replace existing technologies, rather supplement them by capturing the information outwith the structure that they impose, and there are many applications where the implementation of a Lotus Notes application is not feasible. A review of the literature revealed that there is a limited amount of guidance on what constitutes a suitable candidate for implementation. From an analysis of the functionality of the system, the research develops a detailed reference model of the ideal Lotus Notes application, in order to provide a method of rapidly assessing the suitability of a potential application to the implementation of Groupware. Three case studies are presented, utilising the reference model to identify suitable candidates and following the implementation of these through to a point where the results can be assessed, providing a level of validation for the developed model. The case studies provide the opportunity to highlight methods of overcoming the potential barriers to success, revealed by an audit against the reference model. This experience is collected together as design guidelines, cross-referenced against the reference model. The overall result being the production of a series of tools, and a methodology for their use, intended to facilitate the implementation of successful Groupware applications, maximising the benefit that an organisation can achieve from its investment in new technology.
APA, Harvard, Vancouver, ISO, and other styles
38

Childers, John Stephen Jr. "An Examination into Technological Timing Efforts: The Performance of Firms in the Personal Computer Industry." Diss., Virginia Tech, 2005. http://hdl.handle.net/10919/30077.

Full text
Abstract:
This study investigates how firms navigate technological changes over time. Specifically, we determine whether firms follow a consistent strategy in regards to when they time their entry into technological waves. Resulting performance implications of these actions are also measured. The theoretical underpinnings of this study lie at the intersection of the technology literature, the learning school, firm evolutionary theory, and the resource-based view of the firm. Past studies have added clarity as to how firms behave within a single technological wave; however, investigations regarding firm actions over successive waves are needed if we are to truly understand which firm actions lead to long-term success. This study fills the research gap by investigating firm timing patterns over multiple successive waves of technology and the resulting long-term performance implications of these actions. Further, this study examines timing efforts over both competence enhancing (incremental) and competence destroying (architectural) cycles. The findings indicate that while technological follower firms are able to consistently repeat their timing strategy, technological leaders have a much more difficult time in repeating early entry timing. Repeated leadership entry was found to be difficult in both incremental and architectural cycles. Characteristics of those leaders able to repeat leadership entry are provided. While consistent entry timing was not found to impact market share, it was found to benefit firms by reducing their hazard rate. This hazard rate reduction for timing entry consistency, whether it is as a leader or as a follower, was observed during both incremental and architectural technological changes.<br>Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
39

EL, OUARDI Abdelghafour. "Applying Autonomous Methods for Signal Analysis and Correction with Applications in the ship Industry." Thesis, Mälardalens högskola, Akademin för utbildning, kultur och kommunikation, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-39629.

Full text
Abstract:
The manufacturing and transportation industries generate a large amount of data sets which are often of inconsistent quality. The goal of this project is to find the mathematical principles of a system which learns automatically the essential statistical and analytical properties of datasets in order to detect and correct certain classes of faults in real time.
APA, Harvard, Vancouver, ISO, and other styles
40

Medeiros, David R. "Organic materials for applications in computer technology : electrooptic liquid crystals and water processable photoresists /." Digital version accessible at:, 1998. http://wwwlib.umi.com/cr/utexas/main.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Mendes, Barbosa Álvaro Manuel. "Computer-suported cooperative work for music applications." Doctoral thesis, Universitat Pompeu Fabra, 2006. http://hdl.handle.net/10803/7536.

Full text
Abstract:
Aquesta tesi recull la recerca al voltant de les pràctiques musicals mitjançant xarxes d'ordinadors realitzada al Grup de Tecnologia Musical de la Universitat Pompeu Fabra a Barcelona entre l'any 2001 i el 2005. Parteix del treball dut a terme durant la última dècada dins del camp del Treball Cooperatiu amb Ordinadors (Computer-Supported Cooperative Work, CSCW) el qual aporta els mecanismes de col·laboració els quals, des de un punt de vista musical, poden ser estudiats en diversos escenaris: composició, interpretació, improvisació i educació.<br/>La primera contribució d'aquest treball és un anàlisi exhaustiu i una classificació sistemàtica del Treball Cooperatiu amb Ordinadors per Aplicacions Musicals. Aquest anàlisi es va centrar en la identificació de propostes innovadores, models i aplicacions, amb un especial èmfasi en la natura compartida de la comunicació mitjançant internet. El concepte d'Entorns Sonors Compartits va ser presentat i implementat en una aplicació prototip anomenada Public Sound Objects (PSOs).<br/>La segona gran contribució d'aquesta tesi consisteix en l'estudi del possibles mètodes per reduir les interrupcions degudes als retards inherents en la comunicació musical entre xarxes molt allunyades. A partir de l'experimentació i avaluació al laboratori les tècniques Network Latency Adaptive Tempo i Individual Delayed Feed-Back van ser definides i implementades dins del prototip PSOs.<br/>Al llarg del desenvolupament del PSOs es van haver de resoldre altres problemes, com per exemple, el disseny d'interfícies en funció del comportament per a aplicacions amb interfícies desacoblades, la superació dels diversos sistemes de seguretat de les xarxes informàtiques i les possibilitats d'escalabilitat de diverses aplicacions d'àudio per a web.<br/>Durant l'elaboració d'aquesta tesi es van discutir diferents perspectives per resoldre problemes relacionats amb la pràctica musical mitjançant ordinadors, aplicant diferents punts de vista provinents de l'estudi psicosocial dels processos de col·laboració musical al món de la informàtica i de la tecnologia musical.<br>This dissertation derives from research on musical practices mediated by computer networks conducted from 2001 to 2005 in the Music Technology Group of the Pompeu Fabra University in Barcelona, Spain. It departs from work carried out over the last decades in the field of Computer-Supported Cooperative Work (CSCW), which provides us with collaborative communication mechanisms that can be regarded from a music perspective in diverse scenarios: Composition, Performance, Improvisation or Education.<br/>The first contribution originated from this research work is an extensive survey and systematic classification of Computer-Supported Cooperative Work for Music Applications. This survey led to the identification of innovative approaches, models and applications, with special emphasis on the shared nature of geographically displaced communication over the Internet. The notion of a Shared Sonic Environments was introduced and implemented in a proof-of-concept application entitled Public Sound Objects (PSOs).<br/>A second major contribution of this dissertation concerns methods that reduce the disrupting effect of network latency in musical communication over long distance networks. From laboratorial experimentation and evaluation, the techniques of Network Latency Adaptive Tempo and Individual Delayed Feed-Back were proposed and implemented in the PSOs prototype.<br/>Over the course of the PSOs development other relevant and inspirational issues were addressed, such as, behavioral-driven interface design applied to interface decoupled applications, the overcome of network technology security features and system scalability for various applications in audio web services.<br/>Throughout this dissertation conceptual perspectives of related issues to computer-mediated musical practices dissertation were widely discussed, conveying different standpoints ranging from a Psycho-Social study of collaborative music processes to the Computer Science and Music Technology point of view.
APA, Harvard, Vancouver, ISO, and other styles
42

Littlejohns, Callum George. "Silicon-germanium for photonic applications." Thesis, University of Southampton, 2015. https://eprints.soton.ac.uk/376480/.

Full text
Abstract:
Germanium and silicon-germanium have become crucial materials in the silicon photonics field, enabling devices such as high speed photodetectors and high speed modulators to be realised. In order to fabricate efficient and cost effective silicon photonic devices, high quality epitaxial germanium and silicon-germanium growth on silicon, or silicon-on-insulator, is of the utmost importance. In this project, localised single crystal, defect free silicon-germanium on insulator islands have been grown using a rapid melt growth technique. Tailored tree-like structures have been used to modify the cooling rate of the structures during re-growth from the liquid phase. The resulting silicon-germanium composition profiles have been characterised using Raman spectroscopy. Using these tailored tree-like structures, uniform composition silicon- germanium strips have been grown, which is the first time this has been demonstrated using a rapid melt growth technique. Additionally, the ability to locally tune the composition of adjacent silicon-germanium strips has been shown. This enables the possibility of growing a whole range of uniform composition strips, using only a single growth step and a single anneal step, for, amongst others, wavelength division multiplexing applications. Epitaxial growth of germanium on silicon by plasma enhanced chemical vapour deposition has also been studied. Single crystal layers with a defect density of approximately 3.3x108 cm-2 and root mean square surface roughness of 3.5 nm have been demonstrated. It has also been shown that the defect density, surface roughness and crystallinity are all improved with a two minutes, 600 °C anneal. This material has been used to fabricate 12.5 Gbit/s, 0.1 A/W waveguide integrated, zero bias photodetectors for 1550 nm silicon photonics applications, and also, germanium-on-silicon waveguides for mid-infrared silicon photonics applications.
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Dejiu. "Systems Modeling and Modularity Assessment for Embedded Computer Control Applications." Doctoral thesis, KTH, Maskinkonstruktion, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3792.

Full text
Abstract:
AbstractThe development of embedded computer control systems(ECS) requires a synergetic integration of heterogeneoustechnologies and multiple engineering disciplines. Withincreasing amount of functionalities and expectations for highproduct qualities, short time-to-market, and low cost, thesuccess of complexity control and built-in flexibility turn outto be one of the major competitive edges for many ECS products.For this reason, modeling and modularity assessment constitutetwo critical subjects of ECS engineering.In the development ofECS, model-based design is currently being exploited in most ofthe sub-systems engineering activities. However, the lack ofsupport for formalization and systematization associated withthe overall systems modeling leads to problems incomprehension, cross-domain communication, and integration oftechnologies and engineering activities. In particular, designchanges and exploitation of "components" are often risky due tothe inability to characterize components' properties and theirsystem-wide contexts. Furthermore, the lack of engineeringtheories for modularity assessment in the context of ECS makesit difficult to identify parameters of concern and to performearly system optimization. This thesis aims to provide a more complete basis for theengineering of ECS in the areas of systems modeling andmodularization. It provides solution domain models for embeddedcomputer control systems and the software subsystems. Thesemeta-models describe the key system aspects, design levels,components, component properties and relationships with ECSspecific semantics. By constituting the common basis forabstracting and relating different concerns, these models willalso help to provide better support for obtaining holisticsystem views and for incorporating useful technologies fromother engineering and research communities such as to improvethe process and to perform system optimization. Further, amodeling framework is derived, aiming to provide a perspectiveon the modeling aspect of ECS development and to codifyimportant modeling concepts and patterns. In order to extendthe scope of engineering analysis to cover flexibility relatedattributes and multi-attribute tradeoffs, this thesis alsoprovides a metrics system for quantifying componentdependencies that are inherent in the functional solutions.Such dependencies are considered as the key factors affectingcomplexity control, concurrent engineering, and flexibility.The metrics system targets early system-level design and takesinto account several domain specific features such asreplication and timing accuracy. Keywords:Domain-Specific Architectures, Model-basedSystem Design, Software Modularization and Components, QualityMetrics.<br>QC 20100524
APA, Harvard, Vancouver, ISO, and other styles
44

DeJean, Gerald Reuben. "Design of compact antennas in multilayer technology for wireless communications : WLAN applications." Available online, Georgia Institute of Technology, 2005, 2004. http://etd.gatech.edu/theses/available/etd-12092004-162859/unrestricted/dejean%5Fgerald%5Fr%5F200505%5Fmast.pdf.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2005.<br>Joy Laskar, Committee Member ; Manos Tentzeris, Committee Member ; John Papapolymerou, Committee Chair. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
45

Noreña, Adriana Maria 1967. "Best practices in B2B e-commerce : the case of Dell and IBM in the computer hardware industry." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9234.

Full text
Abstract:
Thesis (S.M.M.O.T.)--Massachusetts Institute of Technology, Sloan School of Management, Management of Technology Program, 2000.<br>Also available online at the MIT Theses Online homepage <http://thesis.mit.edu>.<br>Includes bibliographical references (leaves 109-112).<br>Research was done on several public sources to identify the 828 practices of two players in the computer hardware industry. As key players in a technology intensive industry, such as computer hardware, yet coming from different starting points, IBM as an incumbent and Dell as an attacker should provide insights in key success factors in e-commerce and their application to a more general group of players in other industries. A framework for analyzing the specifics of the 828 strategy for these two companies was developed. This framework was an adaptation and evolution of the Value Chain and the Integrated Value Chain concepts. This framework provides a better understanding of the relationship between the 828 strategy and the overall strategy of the company. From the results achieved by these companies' 828 practices, several conclusions and recommendations were drawn for IBM and Dell. Specific recommendations on the key issues brought about by the Internet in areas such as channel restructuring, customer relationship management and trends towards providing full customer solutions are provided. This work also shows how specialization and partnerships will play an increasingly important role for computer hardware vendors, as clients look for integrated solutions and one stop buying for products and services. An assessment of the future challenges brought about by new marketplaces such as e-marketplaces, specifically 828 exchanges, shows how companies need to be prepared to embrace e-business rather than e-commerce in order to survive. Other new challenges are analyzed, particularly those related to the commoditization of the computer hardware industry, the birth of PC substitutes, such as wireless appliances, and the use of the Web as the software holder. Finally, a partnership or strategic alliance between these two companies is discussed as a plausible strategy to leverage on their distinct core strengths: Dell's capability to effectively manage outsourcing and the direct channel, and IBM's skills on building in-house capabilities for creating new service lines and developing world class software.<br>by Adriana Maria Noreňa [sic].<br>S.M.M.O.T.
APA, Harvard, Vancouver, ISO, and other styles
46

La, Vertu Edmond G. "From a slave to a critical-thinker-artistic-writer: Emancipating a professional's anthill using action research professional practice with information systems professionals as the crux: Gnothe se auton non, j regrette rien die lichtung and all the world's a stage." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/617.

Full text
Abstract:
The diagram shown in figure 1 gives an impression of this thesis around the key words slavery, enslavement, emancipation, freedom, power, critical thinker, and artistic writer. The text at the centre reads "my rich model evolution during this thesis." On rereading the text, I wonder if it is referring to my own evolution during the research, which could be described as "rich model," or the evolution of the rich model that encapsulates, and in one sense is, the chief contribution of the thesis. That I use this sentence and this impressionistic diagram to begin this abstract should signal to you, dear reader, that this thesis tells my truth, with a little't', in my own way, about my reflective practitioner investigation of my experience of being part of the information systems profession and then part of a Doctor of Business Administration (D.B.A) programme. As such, it is what some may term post-modem, although I hesitate to describe it as such. Through my lived experience as an enslaved information systems professional, I can relate to the current situation of asymmetric warfare (note the picture of a fighter plane dropping a bomb with the word "hacker" under), asymmetric industrial relations, and some other forms of the master-relationship relationship. In my career as an information systems' professional I have experienced that here is a constant that permeates the world: that parties desire to achieve greater power over any other competitor while sacrificing as little as possible of their own resources. Whether this is an actual war or just a simple jousting for advantage, the process remains similar: Two structuralist sides in conflict. Perhaps this simple description is the apparent reason why most fights are simply a zero-sum game, that is, one side wins ( + 1) and the other loses (-1). There are however variations to this theme. Hegel's Master-slave dialogue is one. In this case the vanquished who is now a slave, eventually gains power over their master, the original victor, not through force of arms, but by becoming indispensable to the Master. The major and subtle weapon the slave possesses is time with obsequiousness that leads to dependency of the master to the actions of the slave. Again through my lived experience of near imagined slavery, I can also relate to another form of conflict that is now upon us, that of a structuralist formal army supported by post-structuralist critical-thinkers and the artist-writers of a post-modernist society against a structuralist guerrilla grouping, with a post-modem idealism giving vital quasi or actual intellectual support. This leaves the structuralist formal army seeking effective and favourable counters to this asymmetric situation through the weakness of the guerrilla forces, that is, a lack of critical-thinkers; else, it will see a form of defeat that is reliance upon the guerrilla force not to attack. It is a modem and curious situation where an overwhelming force seems to be impotent against a quick, opportunistic, attack by a much smaller, under-resourced opponent. Yet, if the guerrilla forces do in fact win, what is the result within the territory the guerrillas now control? It seems that it is not an egalitarian-based modem democracy, or even a functioning theocracy. The key is the critical-thinker, without these people who ask questions, embarrassing ones most times, the necessary balance to support a string of freedoms is lacking. The major problem is where do the guerrilla forces find these people, and support them by not exterminating them as counter-revolutionaries, thereby creating the basic weaknesses to the system they wish to impose. However, the above guerrilla case need not prevail. In my experience of organisational relationships, which are by their very nature asymmetric, a structuralist organisation can defeat even its deadliest asymmetric foe - an enslaved, passed over, disgruntled, and sabotage-prone information systems employee. I was one such employee, one such enslaved person.
APA, Harvard, Vancouver, ISO, and other styles
47

Rijuan, Li. "Problems encountered with the teaching of computer applications technology and information technology at senior secondary school level : a managerial approach." Thesis, Bloemfontein : Central University of Technology, Free State, 2009. http://hdl.handle.net/11462/38.

Full text
Abstract:
Thesis (M. Tech.) -- Central University of Technology, Free State, 2010<br>The aim of the study was to determine the problems encountered by educators who teach Computer Applications Technology (CAT) and Information Technology (IT) in the FET band in the Bloemfontein area, Free State. The main contribution of the study lies in the identification of those problems. By knowing and understanding the problems, the Department of Education and the stakeholders will seek solutions to rectify the problems which will lead to the successful implementation of IT and CAT. The assumptions of the study were that many educators lacked basic ICT skills and pedagogical training, and there were not enough computer stations for learners. Both the qualitative and quantitative approaches were used in the study. The researcher used the survey research method and data was collected through the use of questionnaires and interviews. Simple random sampling was used to ensure that each member of the population in the study had an equal chance of being selected. Descriptive and inferential statistics were used in analyzing the data from the questionnaires. In order to analyze the qualitative data from the interviews, the researcher described the sample populations, ordered and coded the data (data processing), and displayed summaries of data in such a way that interpretation became easy. This was done by preparing tables, diagrams and pie charts. According to the results of the study, the problems that the educators encountered include a lack of sufficient didactical training for educators, learners don’t have computers at home to practice on, a lack of financial support to provide relevant facilities for schools, such as computer laboratories and learning materials in IT/CAT, educators spend too much time on paper work and do not have enough time for teaching, and IT/CAT teachers become ‘do-it-all’ teachers with regard to any work on the computer, such as fixing the computer, designing the school website. Regarding the identified problems, recommendations were made, such as the Department of Education must review the curriculum of IT and CAT, sufficient subject related training and didactical training for IT and CAT educators should be provided by the Department of Education on a regular basis.
APA, Harvard, Vancouver, ISO, and other styles
48

Dick, Martin. "The benefits of object technology to Australian software development organisations." Monash University, School of Computer Science and Software Engineering, 2002. http://arrow.monash.edu.au/hdl/1959.1/9313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Lee, Jae Ho, and n/a. "Modeling Computer Integated Construction Site Management." Griffith University. School of Engineering, 2004. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20040322.132814.

Full text
Abstract:
Construction is one of the most information-dependent industries compared to other sectors. Computers have been used to improve the efficiency of management in most businesses including the construction industry. Treating information efficiently is the key to maintaining an edge over competitors and for success in business. However, in order to succeed, companies must choose a management system that is most suited to their operations. The difficulty about computerization in civil engineering is that the construction industry does not have trained IT experts with Civil engineering or Management background. Although there are many computer applications for project management, almost all the applications required some form of manual modification for updating information. In a construction project, time and accurate information is vitally important in order to accomplish scheduled completion. A small change in plan costs money and time in both the traditional methods as well as current IT applications. The main reason is that there is no direct link between the head office and the regional site office and there is no “quick” link between site office and site engineers who are out in the field for most of the time. This study proposes the design of an information transfer system to improve construction site management. A Web-based Construction Site Management system called “WCSM” will be developed. WCSM incorporates some major features including: Integration of Web technology and mobile computing into construction site management and automatic project schedule updates. The performance of WCSM is evaluated through virtual simulations, and comparisons with other relevant applications are reported. These evaluations showed that WCSM required significantly less time, for initial project set up and modifications during project implementation, when compared to MS Project and Micro Planner.
APA, Harvard, Vancouver, ISO, and other styles
50

Lee, Jae Ho. "Modeling Computer Integated Construction Site Management." Thesis, Griffith University, 2004. http://hdl.handle.net/10072/368089.

Full text
Abstract:
Construction is one of the most information-dependent industries compared to other sectors. Computers have been used to improve the efficiency of management in most businesses including the construction industry. Treating information efficiently is the key to maintaining an edge over competitors and for success in business. However, in order to succeed, companies must choose a management system that is most suited to their operations. The difficulty about computerization in civil engineering is that the construction industry does not have trained IT experts with Civil engineering or Management background. Although there are many computer applications for project management, almost all the applications required some form of manual modification for updating information. In a construction project, time and accurate information is vitally important in order to accomplish scheduled completion. A small change in plan costs money and time in both the traditional methods as well as current IT applications. The main reason is that there is no direct link between the head office and the regional site office and there is no “quick” link between site office and site engineers who are out in the field for most of the time. This study proposes the design of an information transfer system to improve construction site management. A Web-based Construction Site Management system called “WCSM” will be developed. WCSM incorporates some major features including: Integration of Web technology and mobile computing into construction site management and automatic project schedule updates. The performance of WCSM is evaluated through virtual simulations, and comparisons with other relevant applications are reported. These evaluations showed that WCSM required significantly less time, for initial project set up and modifications during project implementation, when compared to MS Project and Micro Planner.<br>Thesis (Masters)<br>Master of Philosophy (MPhil)<br>School of Engineering<br>Faculty of Engineering and Information Technology<br>Full Text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!