Dissertations / Theses on the topic 'Computer applications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Computer applications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Tarnoff, David. "Episode 2.10 – Gray Code Conversion and Applications." Digital Commons @ East Tennessee State University, 2020. https://dc.etsu.edu/computer-organization-design-oer/16.
Full textPaisley, Jonathan. "Application and network traffic correlation of grid applications." Thesis, Connect to e-thesis, 2006. http://theses.gla.ac.uk/535/.
Full textPh.D. thesis submitted to the Department of Computing Science, University of Glasgow, 2006. Includes bibliographical references. Print version also available.
Collins, Rob. "Computer applications to special education." Thesis, Keele University, 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.238175.
Full textChristie, Gordon A. "Computer Vision for Quarry Applications." Thesis, Virginia Tech, 2013. http://hdl.handle.net/10919/42762.
Full textMaster of Science
Chi, Wen-Hsiang. "Computer applications in counselor education /." The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487259125219338.
Full textOhmer, Julius Fabian. "Computer vision applications on graphics processing units." Thesis, Queensland University of Technology, 2007. https://eprints.qut.edu.au/16463/1/Julius_Ohmer_Thesis.pdf.
Full textOhmer, Julius Fabian. "Computer vision applications on graphics processing units." Queensland University of Technology, 2007. http://eprints.qut.edu.au/16463/.
Full textHodgkinson, Derek Anthony Martin. "Computer graphics applications in offshore hydrodynamics." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26705.
Full textApplied Science, Faculty of
Civil Engineering, Department of
Graduate
Colombi, David Paul. "Computer applications for the probation service." Thesis, University of Southampton, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241600.
Full textSofeikov, Konstantin Igorevich. "Measure concentration in computer vision applications." Thesis, University of Leicester, 2018. http://hdl.handle.net/2381/42791.
Full textKing, Daniel E. "Computer Applications At The Village Mailbox." NSUWorks, 1993. http://nsuworks.nova.edu/gscis_etd/634.
Full textGuillory, Helen E. (Helen Elizabeth). "Computer Applications to Second Language Acquisition." Thesis, University of North Texas, 1991. https://digital.library.unt.edu/ark:/67531/metadc504628/.
Full textPellegrini, Lorenzo <1993>. "Continual learning for computer vision applications." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2022. http://amsdottorato.unibo.it/10401/1/Lorenzo%20Pellegrini%20-%20PhD%20Thesis.pdf.
Full textMiller, G. S. P. "Computer display and manufacture of 3-D models." Thesis, University of Cambridge, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.235044.
Full textTran, Sang Cong. "Applications of formal methods in engineering." Thesis, University of Warwick, 1991. http://wrap.warwick.ac.uk/60452/.
Full textLuhamba, John K. M. "Evaluating The Use Of Laptop Computers In Teaching Construction Computer Applications At The College Of Technology, Bowling Green State University." Bowling Green State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1185651720.
Full textElfström, Adam. "The State of Progressive Web Applications : an investigation of the experiences and opinions of developers in the industry." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104891.
Full textPai, Hsueh-Ieng 1975. "Applications of extensible markup language to mobile application patterns." Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33817.
Full textHerdman, Andy. "The readying of applications for heterogeneous computing." Thesis, University of Warwick, 2017. http://wrap.warwick.ac.uk/102343/.
Full textCheda, Diego. "Monocular Depth Cues in Computer Vision Applications." Doctoral thesis, Universitat Autònoma de Barcelona, 2012. http://hdl.handle.net/10803/121644.
Full textDepth perception is a key aspect of human vision. It is a routine and essential visual task that the human do effortlessly in many daily activities. This has often been associated with stereo vision, but humans have an amazing ability to perceive depth relations even from a single image by using several monocular cues. In the computer vision field, if image depth information were available, many tasks could be posed from a different perspective for the sake of higher performance and robustness. Nevertheless, given a single image, this possibility is usually discarded, since obtaining depth information has frequently been performed by three-dimensional reconstruction techniques, requiring two or more images of the same scene taken from different viewpoints. Recently, some proposals have shown the feasibility of computing depth information from single images. In essence, the idea is to take advantage of a priori knowledge of the acquisition conditions and the observed scene to estimate depth from monocular pictorial cues. These approaches try to precisely estimate the scene depth maps by employing computationally demanding techniques. However, to assist many computer vision algorithms, it is not really necessary computing a costly and detailed depth map of the image. Indeed, just a rough depth description can be very valuable in many problems. In this thesis, we have demonstrated how coarse depth information can be integrated in different tasks following holistic and alternative strategies to obtain more precise and robustness results. In that sense, we have proposed a simple, but reliable enough technique, whereby image scene regions are categorized into discrete depth ranges to build a coarse depth map. Based on this representation, we have explored the potential usefulness of our method in three application domains from novel viewpoints: camera rotation parameters estimation, background estimation and pedestrian candidate generation. In the first case, we have computed camera rotation mounted in a moving vehicle from two novels methods that identify distant elements in the image, where the translation component of the image flow field is negligible. In background estimation, we have proposed a novel method to reconstruct the background by penalizing close regions in a cost function, which integrates color, motion, and depth terms. Finally, we have benefited of geometric and depth information available on single images for pedestrian candidate generation to significantly reduce the number of generated windows to be further processed by a pedestrian classifier. In all cases, results have shown that our depth-based approaches contribute to better performances.
Mendes, Barbosa Álvaro Manuel. "Computer-suported cooperative work for music applications." Doctoral thesis, Universitat Pompeu Fabra, 2006. http://hdl.handle.net/10803/7536.
Full textLa primera contribució d'aquest treball és un anàlisi exhaustiu i una classificació sistemàtica del Treball Cooperatiu amb Ordinadors per Aplicacions Musicals. Aquest anàlisi es va centrar en la identificació de propostes innovadores, models i aplicacions, amb un especial èmfasi en la natura compartida de la comunicació mitjançant internet. El concepte d'Entorns Sonors Compartits va ser presentat i implementat en una aplicació prototip anomenada Public Sound Objects (PSOs).
La segona gran contribució d'aquesta tesi consisteix en l'estudi del possibles mètodes per reduir les interrupcions degudes als retards inherents en la comunicació musical entre xarxes molt allunyades. A partir de l'experimentació i avaluació al laboratori les tècniques Network Latency Adaptive Tempo i Individual Delayed Feed-Back van ser definides i implementades dins del prototip PSOs.
Al llarg del desenvolupament del PSOs es van haver de resoldre altres problemes, com per exemple, el disseny d'interfícies en funció del comportament per a aplicacions amb interfícies desacoblades, la superació dels diversos sistemes de seguretat de les xarxes informàtiques i les possibilitats d'escalabilitat de diverses aplicacions d'àudio per a web.
Durant l'elaboració d'aquesta tesi es van discutir diferents perspectives per resoldre problemes relacionats amb la pràctica musical mitjançant ordinadors, aplicant diferents punts de vista provinents de l'estudi psicosocial dels processos de col·laboració musical al món de la informàtica i de la tecnologia musical.
This dissertation derives from research on musical practices mediated by computer networks conducted from 2001 to 2005 in the Music Technology Group of the Pompeu Fabra University in Barcelona, Spain. It departs from work carried out over the last decades in the field of Computer-Supported Cooperative Work (CSCW), which provides us with collaborative communication mechanisms that can be regarded from a music perspective in diverse scenarios: Composition, Performance, Improvisation or Education.
The first contribution originated from this research work is an extensive survey and systematic classification of Computer-Supported Cooperative Work for Music Applications. This survey led to the identification of innovative approaches, models and applications, with special emphasis on the shared nature of geographically displaced communication over the Internet. The notion of a Shared Sonic Environments was introduced and implemented in a proof-of-concept application entitled Public Sound Objects (PSOs).
A second major contribution of this dissertation concerns methods that reduce the disrupting effect of network latency in musical communication over long distance networks. From laboratorial experimentation and evaluation, the techniques of Network Latency Adaptive Tempo and Individual Delayed Feed-Back were proposed and implemented in the PSOs prototype.
Over the course of the PSOs development other relevant and inspirational issues were addressed, such as, behavioral-driven interface design applied to interface decoupled applications, the overcome of network technology security features and system scalability for various applications in audio web services.
Throughout this dissertation conceptual perspectives of related issues to computer-mediated musical practices dissertation were widely discussed, conveying different standpoints ranging from a Psycho-Social study of collaborative music processes to the Computer Science and Music Technology point of view.
Stumpf, Barbara A. "The learning of computer applications, students' perceptions." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq21103.pdf.
Full textLowman, Tim. "Secure Computer Applications in an Enterprise Environment." NCSU, 1999. http://www.lib.ncsu.edu/theses/available/etd-19990401-134848.
Full textSophisticated computing environments support many of the complex tasks whicharise in modern enterprises. An enterprise environment is a collective ofthe organization's software, hardware, networking, and data systems.Typically, many user workstations communicate with shared servers, balancingcomputer processing throughout the organization. In a ``secure" modernenterprise issues of authentication, private communication, and protected,shared data space must be addressed. In this thesis we present a generalmodel for adding security to the currently popular enterprise architecture:the World Wide Web (WWW).
The results of our investigation into adding security to the generalWWW architecture are reported in this document. We focus onauthenticating users (Kerberos), establishing a secure communicationlink for private data exchange (SSL), protected space to store shareddata (AFS filesystem), and an enhanced server (Apache) to integrate thesecomponents. After presenting our secure model, we describe a prototypeapplication, built using our approach, which addresses a common problemof secure online submission of homework assignments in a universityenvironment.
Gordon, Neil Andrew. "Finite geometry and computer algebra, with applications." Thesis, University of Hull, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.262412.
Full textRoomi, Akeel S. "Multiprocessor computer architectures : algorithmic design and applications." Thesis, Loughborough University, 1989. https://dspace.lboro.ac.uk/2134/10872.
Full textAn, Hong. "Computer-aided applications in process plant safety." Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6418.
Full textPerwass, Christian Bernd Ulrich. "Applications of geometric algebra in computer vision." Thesis, University of Cambridge, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.621941.
Full textWang, Yuan-Fang. "Computer Vision Analysis for Vehicular Safety Applications." International Foundation for Telemetering, 2015. http://hdl.handle.net/10150/596451.
Full textIn this paper, we present our research on using computer-vision analysis for vehicular safety applications. Our research has potential applications for both autonomous vehicles and connected vehicles. In particular, for connected vehicles, we propose three image analysis algorithms that enhance the quality of a vehicle's on-board video before inter-vehicular information exchange takes place. For autonomous vehicles, we are investigating a visual analysis scheme for collision avoidance during back up and an algorithm for automated 3D map building. These algorithms are relevant to the telemetering domain as they involve determining the relative pose between a vehicle and other vehicles on the road, or between a vehicle and its 3D driving environment, or between a vehicle and obstacles surrounding the vehicle.
Tabak, Daniel. "VLSI ORIENTED COMPUTER ARCHITECTURE AND SOME APPLICATIONS." International Foundation for Telemetering, 1985. http://hdl.handle.net/10150/615746.
Full textThe paper surveys the particular problems, arising in the architectural design of computing systems, realized on VLSI chips. Particular difficulties due to limited on-chip density and power dissipation are discussed. The difficulties of the realization of on-chip communications between various subsystems (between themselves and between other offchip systems) are stressed. A number of design principles for the realization of on-chip communication paths is presented. Two design philosophies for the instruction set design in a VLSI environment are brought up: (a) The large microcoded instruction set, (b) The Reduced Instruction Set Computer (RISC) approach, based on the Streamlined Instruction Set Design. A survey of the author’s research group work in this area is presented. This includes the ZT-1 single chip microcomputer, RISC computing space studies, applications to a distributed traffic control and a la rge scale, reconfigurable communications system.
Chung, Wai Hing. "Teaching computer control applications : a programming approach." Thesis, University of Edinburgh, 1986. http://hdl.handle.net/1842/19628.
Full textMaynes-Aminzade, Daniel. "Interactive visual prototyping of computer vision applications /." May be available electronically:, 2008. http://proquest.umi.com/login?COPT=REJTPTU1MTUmSU5UPTAmVkVSPTI=&clientId=12498.
Full textWhitaker, Robert Bruce. "Applying Information Visualization to Computer Security Applications." DigitalCommons@USU, 2010. https://digitalcommons.usu.edu/etd/636.
Full textPAOLANTI, MARINA. "Pattern Recognition for challenging Computer Vision Applications." Doctoral thesis, Università Politecnica delle Marche, 2018. http://hdl.handle.net/11566/252904.
Full textPattern Recognition is the study of how machines can observe the environment, learn to distinguish patterns of interest from their background, and make sound and reasonable decisions about the patterns categories. Nowadays, the application of Pattern Recognition algorithms and techniques is ubiquitous and transversal. With the recent advances in computer vision, we now have the ability to mine such massive visual data to obtain valuable insight about what is happening in the world. The availability of affordable and high resolution sensors (e.g., RGB-D cameras, microphones and scanners) and data sharing have resulted in huge repositories of digitized documents (text, speech, image and video). Starting from such a premise, this thesis addresses the topic of developing next generation Pattern Recognition systems for real applications such as Biology, Retail, Surveillance, Social Media Intelligence and Digital Cultural Heritage. The main goal is to develop computer vision applications in which Pattern Recognition is the key core in their design, starting from general methods, that can be exploited in more fields, and then passing to methods and techniques addressing specific problems. The privileged focus is on up-to-date applications of Pattern Recognition techniques to real-world problems, and on interdisciplinary research, experimental and/or theoretical studies yielding new insights that advance Pattern Recognition methods. The final ambition is to spur new research lines, especially within interdisciplinary research scenarios. Faced with many types of data, such as images, biological data and trajectories, a key difficulty was to nd relevant vectorial representations. While this problem had been often handled in an ad-hoc way by domain experts, it has proved useful to learn these representations directly from data, and Machine Learning algorithms, statistical methods and Deep Learning techniques have been particularly successful. The representations are then based on compositions of simple parameterized processing units, the depth coming from the large number of such compositions. It was desirable to develop new, efficient data representation or feature learning/indexing techniques, which can achieve promising performance in the related tasks. The overarching goal of this work consists of presenting a pipeline to select the model that best explains the given observations; nevertheless, it does not prioritize in memory and time complexity when matching models to observations. For the Pattern Recognition system design, the following steps are performed: data collection, features extraction, tailored learning approach and comparative analysis and assessment. The proposed applications open up a wealth of novel and important opportunities for the machine vision community. The newly dataset collected as well as the complex areas taken into exam, make the research challenging. In fact, it is crucial to evaluate the performance of state of the art methods to demonstrate their strength and weakness and help identify future research for designing more robust algorithms. For comprehensive performance evaluation, it is of great importance developing a library and benchmark to gauge the state of the art because the methods design that are tuned to a specic problem do not work properly on other problems. Furthermore, the dataset selection is needed from different application domains in order to offer the user the opportunity to prove the broad validity of methods. Intensive attention has been drawn to the exploration of tailored learning models and algorithms, and their extension to more application areas. The tailored methods, adopted for the development of the proposed applications, have shown to be capable of extracting complex statistical features and efficiently learning their representations, allowing it to generalize well across a wide variety of computer vision tasks, including image classication, text recognition and so on.
Buoncompagni, Simone <1987>. "Computer Vision Techniques for Ambient Intelligence Applications." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amsdottorato.unibo.it/7327/1/buoncompagni_simone_tesi.pdf.
Full textSchiavinato, Michele <1986>. "Transformation synchronization with applications in computer vision." Doctoral thesis, Università Ca' Foscari Venezia, 2018. http://hdl.handle.net/10579/13457.
Full textMahadevan, Karthikeyan. "Estimating reliability impact of biometric devices in large scale applications." Morgantown, W. Va. : [West Virginia University Libraries], 2003. http://etd.wvu.edu/templates/showETD.cfm?recnum=3096.
Full textTitle from document title page. Document formatted into pages; contains vii, 66 p. : ill. (some col.). Vita. Includes abstract. Includes bibliographical references (p. 62-64).
Chester, Adam P. "Towards effective dynamic resource allocation for enterprise applications." Thesis, University of Warwick, 2011. http://wrap.warwick.ac.uk/49959/.
Full textZhang, Fu. "Intelligent feature selection for neural regression : techniques and applications." Thesis, University of Warwick, 2012. http://wrap.warwick.ac.uk/49639/.
Full textMercanti, Ivan. "Models and applications for the Bitcoin ecosystem." Thesis, IMT Alti Studi Lucca, 2022. http://e-theses.imtlucca.it/357/1/Mercanti_phdthesis.pdf.
Full textLalani, Nisar. "Validation of Internet Applications." Thesis, Karlstad University, Faculty of Economic Sciences, Communication and IT, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-449.
Full textToday, testing applications for Internet (web sites and other applications) is being verified using
proprietary test solutions. An application is developed and another application is developed to
test the first one. Test Competence Centre at Ericsson AB has expertise on testing telecom
applications using TTCN-2 and TTCN-3 notations. These notations have lot of potential and are
being used for testing in various areas. So far, not much work has been done on using TTCN
notations for testing Internet application. This thesis was a step through which the
capabilities/possibilities of the TTCN notation (in Web testing) could be determined.
This thesis presents investigation results of the 3 different test technologies/tools (TTCN-2,
TTCN-3 and a proprietary free software, PureTest) to see which one is the best for testing
Internet Applications and what are the drawbacks/benefits each technology has.
The background topics included are brief introduction of software testing and web testing, short
introduction of TTCN language and its version 2 and 3, description of the tool set representing
the chosen technologies, conceptual view of how the tools work, a short description of HTTP
protocol and description of HTTP adapter (Test Port).
Several benefits and drawbacks were found from all the three technologies but it can be said that
at the moment proprietary test solutions (PureTest in this case) is still the best tool to test Internet
Application. It scores over other the two technologies (TTCN-2 and TTCN-3) due to reason like
flexibility, cost effectiveness, user friendliness, small lead times for competence development etc.
TTCN-3 is more of a programming language and is certainly more flexible when compared to
TTCN-2. TTCN-3 is still evolving and it can be said that it holds promise. Some of the features
are missing which are vital for testing Internet Applications but are better than TTCN-2.
Lowe, Richard. "Content-driven superpixels and their applications." Thesis, University of Southampton, 2013. https://eprints.soton.ac.uk/351734/.
Full textTruong, L. H. "Dielectrics for high temperature superconducting applications." Thesis, University of Southampton, 2013. https://eprints.soton.ac.uk/355538/.
Full textGlover, Kevin. "The genitive ratio and its applications." Thesis, University of Essex, 2016. http://repository.essex.ac.uk/16463/.
Full textChenyan, Xu. "Accessing the Power of Aesthetics in Human-computer Interaction." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc500128/.
Full textHansen, Christian Leland. "Towards Comparative Profiling of Parallel Applications with PPerfDB." PDXScholar, 2001. https://pdxscholar.library.pdx.edu/open_access_etds/2666.
Full textKim, Jang Don. "Applications performance on reconfigurable computers." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42711.
Full textPandey, Amit Kumar. "Securing Web Applications From Application-Level Attack." Kent State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=kent1181098075.
Full textUr-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.
Full textGoudie, Robert J. B. "Bayesian structural inference with applications in social science." Thesis, University of Warwick, 2011. http://wrap.warwick.ac.uk/78778/.
Full textChen, Xinuo. "Parallelisation for data-intensive applications over peer-to-peer networks." Thesis, University of Warwick, 2009. http://wrap.warwick.ac.uk/3640/.
Full text