To see the other types of publications on this topic, follow the link: Electronic digital computers Evaluation.

Dissertations / Theses on the topic 'Electronic digital computers Evaluation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Electronic digital computers Evaluation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Fernandez, Sepulveda Antonio. "Evaluation of digital identity using Windows CardSpace." Thesis, Edinburgh Napier University, 2008. http://researchrepository.napier.ac.uk/output/4032/.

Full text
Abstract:
The Internet was initially created for academic purposes, and due to its success, it has been extended to commercial environments such as e-commerce, banking, and email. As a result, Internet crime has also increased. This can take many forms, such as: personal data theft; impersonation of identity; and network intrusions. Systems of authentication such as username and password are often insecure and difficult to handle when the user has access to a multitude of services, as they have to remember many different authentications. Also, other more secure systems, such as security certificates and
APA, Harvard, Vancouver, ISO, and other styles
2

Grove, Duncan A. "Performance modelling of message-passing parallel programs." Title page, contents and abstract only, 2003. http://web4.library.adelaide.edu.au/theses/09PH/09phg8832.pdf.

Full text
Abstract:
This dissertation describes a new performance modelling system, called the Performance Evaluating Virtual Parallel Machine (PEVPM). It uses a novel bottom-up approach, where submodels of individual computation and communication events are dynamically constructed from data-dependencies, current contention levels and the performance distributions of low-level operations, which define performance variability in the face of contention.
APA, Harvard, Vancouver, ISO, and other styles
3

Surma, David Ray 1963. "Design and performance evaluation of parallel architectures for image segmentation processing." Thesis, The University of Arizona, 1989. http://hdl.handle.net/10150/277042.

Full text
Abstract:
The design of parallel architectures to perform image segmentation processing is given. In addition, the various designs are evaluated as to their performance, and a discussion of an optimal design is given. In this thesis, a set of eight segmentation algorithms has been provided as a starting point. Four of these algorithms will be evaluated and partitioned using two techniques. From this study of partitioning and considering the data flow through the total system, architectures utilizing parallel techniques will be derived. Timing analysis using pen and paper techniques will be given on the
APA, Harvard, Vancouver, ISO, and other styles
4

Parker, Brandon S. "CLUE: A Cluster Evaluation Tool." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5444/.

Full text
Abstract:
Modern high performance computing is dependent on parallel processing systems. Most current benchmarks reveal only the high level computational throughput metrics, which may be sufficient for single processor systems, but can lead to a misrepresentation of true system capability for parallel systems. A new benchmark is therefore proposed. CLUE (Cluster Evaluator) uses a cellular automata algorithm to evaluate the scalability of parallel processing machines. The benchmark also uses algorithmic variations to evaluate individual system components' impact on the overall serial fraction and efficie
APA, Harvard, Vancouver, ISO, and other styles
5

Shultes, Bruce Chase. "Regenerative techniques for estimating performance measures of highly dependable systems with repairs." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/25035.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Demir, Ali. "Real-time 2d/3d Display Of Dted Maps And Evaluation Of Interpolation Algorithms." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/3/12611729/index.pdf.

Full text
Abstract:
In Geographic Information System (GIS) applications, aster data constitutes one of the major data types. The displaying of the raster data has an important part in GIS applications. Digital Terrain Elevation Data (DTED) is one of the raster data types, which is used as the main data source in this thesis. The DTED data is displayed on the screen as digital images as a pixel value, which is represented in gray scale, corresponding to an elevation (texel). To draw the images, the texel values are mostly interpolated in order to perform zoom-in and/or zoom-out operations on the concerned area. W
APA, Harvard, Vancouver, ISO, and other styles
7

Codrescu, Lucian. "An evaluation of the Pica architecture for an object recognition application." Thesis, Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/15483.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Weingartner, Stephan G. "System development : an algorithmic approach." Virtual Press, 1987. http://liblink.bsu.edu/uhtbin/catkey/483077.

Full text
Abstract:
The subject chosen to develop this thesis project on is developing an algorithm or methodology for system selection. The specific problem studied involves a procedure to determine anion computer system alternative is the best choice for a given user situation.The general problem to be addressed is the need for one to choose computing hardware, software, systems, or services in a -Logical approach from a user perspective, considering cost, performance and human factors. Most existing methods consider only cost and performance factors, combining these factors in ad hoc, subjective fashions to re
APA, Harvard, Vancouver, ISO, and other styles
9

Ali, Muhammad Usman, and Muhammad Aasim. "Usability Evaluation of Digital Library BTH a case study." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6140.

Full text
Abstract:
Libraries have for hundreds of years been an important entity for every kind of institute, especially in the educational sector. So now it is an age of computers and internet. People are now using electronic resources to fulfill their needs and requirements of their life. Therefore libraries have also converted to computerized systems. People can access and use library resources just sitting at their computers by using the internet. This modern way of running a library has been called or given the name of digital libraries. Digital libraries are getting famous for flexibility of use and becaus
APA, Harvard, Vancouver, ISO, and other styles
10

Piotrowski, Kathleen Ann. "A Feasibility Evaluation of a Digital Pen and Paper System for Accomplishing Electronic Anesthesia Record-keeping." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/202988.

Full text
Abstract:
In 2001, the Institute of Medicine stated that one of the parameters needing to be addressed to improve health care was the creation of electronic health records for all patients. This goal has proven to be very challenging to health care providers. Many barriers exist that prevent the goal of computerizing health records such as high costs, usability problems, interface incompatibility, and fear of change. The purpose of this feasibility project was to evaluate the usefulness and acceptability of a digital pen and paper (DPP) system for anesthesia documentation. The specific DPP technology u
APA, Harvard, Vancouver, ISO, and other styles
11

De, Pellegrini Martin. "Mobile-based 3D modeling : An indepth evaluation for the application to maintenance and supervision." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-298024.

Full text
Abstract:
Indoor environment modeling has become a relevant topic in several applications fields including Augmented, Virtual and Mixed Reality. Furthermore, with the Digital Transformation, many industries have moved toward this technology trying to generate detailed models of an environment allowing the viewers to navigate through it or mapping surfaces to insert virtual elements in a real scene. Therefore, this Thesis project has been conducted with the purpose to review well- established deterministic methods for 3D scene reconstruction and researching the state- of- the- art, such as machine learni
APA, Harvard, Vancouver, ISO, and other styles
12

Thakar, Aniruddha. "Visualization feedback from informal specifications." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-03242009-040810/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.

Full text
Abstract:
The ready availability of image-editing software makes it important to ensure the authenticity of images. This thesis concerns the detection and localization of cloning, or Copy-Move Forgery (CMF), which is the most common type of image tampering, in which part(s) of the image are copied and pasted back somewhere else in the same image. Post-processing can be used to produce more realistic doctored images and thus can increase the difficulty of detecting forgery. This thesis presents three novel methods for CMF detection, using feature extraction, surface fitting and segmentation. The Dense Sc
APA, Harvard, Vancouver, ISO, and other styles
14

Groves, Michael Peter. "A soliton circuit design system /." Title page, contents and summary only, 1987. http://web4.library.adelaide.edu.au/theses/09PH/09phg884.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Ghahroodi, Massoud. "Variation and reliability in digital CMOS circuit design." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/365136/.

Full text
Abstract:
The silicon chip industry continues to provide devices with feature sizes at Ultra-Deep-Sub-Micron (UDSM) dimensions. This results in higher device density and lower power and cost per function. While this trend is positive, there are a number of negative side effects, including the increased device parameter variation, increased sensitivity to soft errors, and lower device yields. The lifetime of next- generation devices is also decreasing due to lower reliability margins and shorter product lifetimes. This thesis presents an investigation into the challenges of UDSM CMOS circuit design, with
APA, Harvard, Vancouver, ISO, and other styles
16

Brower, Bernard V. "Evaluation of digital image compression algorithms for use on laptop computers /." Online version of thesis, 1992. http://hdl.handle.net/1850/11893.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Williams, Dewi L. (Dewi Lloyd) Carleton University Dissertation Engineering Electrical. "A Functional-test specification language." Ottawa, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Lima, Antonio. "Digital traces of human mobility and interaction : models and applications." Thesis, University of Birmingham, 2016. http://etheses.bham.ac.uk//id/eprint/6833/.

Full text
Abstract:
In the last decade digital devices and services have permeated many aspects of everyday life. They generate massive amounts of data that provide insightful information about how people move across geographic areas and how they interact with others. By analysing this detailed information, it is possible to investigate aspects of human mobility and interaction. Therefore, the thesis of this dissertation is that the analysis of mobility and interaction traces generated by digital devices and services, at different timescales and spatial granularity, can be used to gain a better understanding of h
APA, Harvard, Vancouver, ISO, and other styles
19

Betts, Thomas. "An investigation of the digital sublime in video game production." Thesis, University of Huddersfield, 2014. http://eprints.hud.ac.uk/id/eprint/25020/.

Full text
Abstract:
This research project examines how video games can be programmed to generate the sense of the digital sublime. The digital sublime is a term proposed by this research to describe experiences where the combination of code and art produces games that appear boundless and autonomous. The definition of this term is arrived at by building on various texts and literature such as the work of Kant, Deleuze and Wark and on video games such as Proteus, Minecraft and Love. The research is based on the investigative practice of my work as an artist-programmer and demonstrates how games can be produced to
APA, Harvard, Vancouver, ISO, and other styles
20

Ligon, Walter Batchelor III. "An empirical evaluation of architectural reconfigurability." Diss., Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/8204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Jayasinghe, U. U. K. "Trust evaluation in the IoT environment." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9451/.

Full text
Abstract:
Along with the many benefits of IoT, its heterogeneity brings a new challenge to establish a trustworthy environment among the objects due to the absence of proper enforcement mechanisms. Further, it can be observed that often these encounters are addressed only concerning the security and privacy matters involved. However, such common network security measures are not adequate to preserve the integrity of information and services exchanged over the internet. Hence, they remain vulnerable to threats ranging from the risks of data management at the cyber-physical layers, to the potential discri
APA, Harvard, Vancouver, ISO, and other styles
22

Pattanaphanchai, Jarutas. "Trustworthiness of Web information evaluation framework." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/370596/.

Full text
Abstract:
Assessing the quality of information on the Web is a challenging issue for at least two reasons. Firstly, there is little control over publishing quality. Secondly, when assessing the trustworthiness of Web pages, users tend to base their judgements upon subjective criteria such as the visual presentation of the website, rather than rigorous criteria such as the author's qualifications or the source's review process. As a result, Web users tend to make incorrect assessments of the trustworthiness of the Web information they are consuming. Also, they are uncertain of their ability to make a dec
APA, Harvard, Vancouver, ISO, and other styles
23

Ho, Chun-yin. "Group-based checkpoint/rollback recovery for large scale message-passing systems." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B39794052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Vasudevan, Vivek. "Evaluation of the separation involved in recycling end-of-life (EOL) electronic equipment." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=45.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2004.<br>Title from document title page. Document formatted into pages; contains xi, 92 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 74-76).
APA, Harvard, Vancouver, ISO, and other styles
25

Saliou, Lionel. "Network firewall dynamic performance evaluation and formalisation." Thesis, Edinburgh Napier University, 2009. http://researchrepository.napier.ac.uk/Output/2599.

Full text
Abstract:
Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to computer network security, but equally an organisation must be able to determine whether its security policy is achievable and under which criteria. Yet, it is not often possible for an organisation: to define its security policy, especially to fully comply with the laws of the land; ensure the actual implementation on network devices; and finally audit the overall system for compliance. This thesis argues that one of th
APA, Harvard, Vancouver, ISO, and other styles
26

Pelletingeas, Christophe. "Performance evaluation of virtualization with cloud computing." Thesis, Edinburgh Napier University, 2010. http://researchrepository.napier.ac.uk/Output/4010.

Full text
Abstract:
Cloud computing has been the subject of many researches. Researches shows that cloud computing permit to reduce hardware cost, reduce the energy consumption and allow a more efficient use of servers. Nowadays lot of servers are used inefficiently because they are underutilized. The uses of cloud computing associate to virtualization have been a solution to the underutilisation of those servers. However the virtualization performances with cloud computing cannot offers performances equal to the native performances. The aim of this project was to study the performances of the virtualization with
APA, Harvard, Vancouver, ISO, and other styles
27

Celestini, Alessandro. "On the analysis and evaluation of trust and reputation systems." Thesis, IMT Alti Studi Lucca, 2013. http://e-theses.imtlucca.it/114/1/Celestini_phdthesis.pdf.

Full text
Abstract:
In recent years, we have witnessed an increasing use of trust and reputation systems in different areas of ICT. The idea at the base of trust and reputation systems is of letting users to rate the provided services after each interaction. Other users may use aggregate ratings to compute reputation scores for a given party. The computed reputation scores are a collective measure of parties trustworthiness and are used to drive parties interactions. Due to the widespread use of reputation systems, research work on them is intensifying and several models have been proposed. This calls for a me
APA, Harvard, Vancouver, ISO, and other styles
28

Rudman, Hannah. "A framework for the transformation of the creative industries in a digital age." Thesis, Edinburgh Napier University, 2015. http://researchrepository.napier.ac.uk/Output/8866.

Full text
Abstract:
The creative industries sector faces a constantly changing context characterised by the speed of the development and deployment of digital information systems and Information Communications Technologies (ICT) on a global scale. This continuous digital disruption has had significant impact on the whole value chain of the sector: creation and production; discovery and distribution; and consumption of cultural goods and services. As a result, creative enterprises must evolve business and operational models and practices to be sustainable. Enterprises of all scales, type, and operational model are
APA, Harvard, Vancouver, ISO, and other styles
29

Kwon, Hyosun. "From ephemerality to delicacy : applying delicacy in the design space of digital gifting." Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/46705/.

Full text
Abstract:
We encounter uncountable ephemeral phenomena in everyday life. Some of them are particularly appreciated for their ungraspable beauty and limited availability. From the outset, one strand of computing technology has evolved to encapsulate and preserve this transient experience. A myriad of digital devices has been developed to capture the fleeting moments and to store as digital files for later use, edit, share, and distribute. On the other hand, a portion of Human-Computer Interaction (HCI) research has engaged in adopting the transience of temporal phenomena in the design of interactive comp
APA, Harvard, Vancouver, ISO, and other styles
30

Blair, Stuart Andrew. "On the classification and evaluation of prefetching schemes." Thesis, University of Glasgow, 2003. http://theses.gla.ac.uk/2274/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Miehling, Mathew J. "Correlation of affiliate performance against web evaluation metrics." Thesis, Edinburgh Napier University, 2014. http://researchrepository.napier.ac.uk/Output/7250.

Full text
Abstract:
Affiliate advertising is changing the way that people do business online. Retailers are now offering incentives to third-party publishers for advertising goods and services on their behalf in order to capture more of the market. Online advertising spending has already over taken that of traditional advertising in all other channels in the UK and is slated to do so worldwide as well [1]. In this highly competitive industry, the livelihood of a publisher is intrinsically linked to their web site performance. Understanding the strengths and weaknesses of a web site is fundamental to improving its
APA, Harvard, Vancouver, ISO, and other styles
32

Maguire, Joseph Noel. "An ecologically valid evaluation of an observation-resilient graphical authentication mechanism." Thesis, University of Glasgow, 2013. http://theses.gla.ac.uk/4708/.

Full text
Abstract:
Alphanumeric authentication, by means of a secret, is not only a powerful mechanism, in theory, but prevails over all its competitors in reality. Passwords, as they are more commonly known, have the potential to act as a fairly strong gateway. In practice, though, password usage is problematic. They are (1) easily shared, (2) trivial to observe and (3) maddeningly elusive when forgotten. Moreover, modern consumer devices only exacerbate the problems of passwords as users enter them in shared spaces, in plain view, on television screens, on smartphones and on tablets. Asterisks may obfuscate al
APA, Harvard, Vancouver, ISO, and other styles
33

Almutiq, Mutiq Mohammed. "An evaluation model for information security strategies in healthcare data systems." Thesis, Keele University, 2018. http://eprints.keele.ac.uk/5595/.

Full text
Abstract:
This thesis presents a newly developed evaluation model, EMISHD (An "Evaluation Model for Information Security Strategies in Healthcare Data Systems") which can address the specific requirements of information security in healthcare sector. Based on a systematic literature review and case study, the information security requirements and the existing evaluation models used to examine the information security strategies of healthcare data systems have been analysed. The requirements of information security in any sector generally vary in line with changes in laws and regulations, and the emergen
APA, Harvard, Vancouver, ISO, and other styles
34

Ho, Chun-yin, and 何俊賢. "Group-based checkpoint/rollback recovery for large scale message-passing systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B39794052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Leelanupab, Teerapong. "A ranking framework and evaluation for diversity-based retrieval." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3442/.

Full text
Abstract:
There has been growing momentum in building information retrieval (IR) systems that consider both relevance and diversity of retrieved information, which together improve the usefulness of search results as perceived by users. Some users may genuinely require a set of multiple results to satisfy their information need as there is no single result that completely fulfils the need. Others may be uncertain about their information need and they may submit ambiguous or broad (faceted) queries, either intentionally or unintentionally. A sensible approach to tackle these problems is to diversify sear
APA, Harvard, Vancouver, ISO, and other styles
36

Song, Chunlin. "A robust region-adaptive digital image watermarking system." Thesis, Liverpool John Moores University, 2012. http://researchonline.ljmu.ac.uk/6122/.

Full text
Abstract:
Digital image watermarking techniques have drawn the attention of researchers and practitioners as a means of protecting copyright in digital images. The technique involves a subset of information-hiding technologies, which work by embedding information into a host image without perceptually altering the appearance of the host image. Despite progress in digital image watermarking technology, the main objectives of the majority of research in this area remain improvements in the imperceptibility and robustness of the watermark to attacks. Watermark attacks are often deliberately applied to a wa
APA, Harvard, Vancouver, ISO, and other styles
37

Chen-Wilson, Lisha. "eCert : a secure and user centric edocument transmission protocol : solving the digital signing practical issues." Thesis, University of Southampton, 2013. https://eprints.soton.ac.uk/369983/.

Full text
Abstract:
Whilst our paper-based records and documents are gradually being digitized, security concerns about how such electronic data is stored, transmitted, and accessed have increased rapidly. Although the traditional digital signing method can be used to provide integrity, authentication, and non-repudiation for signed eDocuments, this method does not address all requirements, such as fine-grained access control and content status validation. What is more, information owners have increasing demands regarding their rights of ownership. Therefore, a secure user-centric eDocument management system is e
APA, Harvard, Vancouver, ISO, and other styles
38

Lee, Sae Hun. "A unified approach to optimal multiprocessor implementations from non-parallel algorithm specifications." Diss., Georgia Institute of Technology, 1986. http://hdl.handle.net/1853/16745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Blanke, Tobias. "Theoretical evaluation of XML retrieval." Thesis, University of Glasgow, 2011. http://theses.gla.ac.uk/2828/.

Full text
Abstract:
This thesis develops a theoretical framework to evaluate XML retrieval. XML retrieval deals with retrieving those document parts that specifically answer a query. It is concerned with using the document structure to improve the retrieval of information from documents by only delivering those parts of a document an information need is about. We define a theoretical evaluation methodology based on the idea of `aboutness' and apply it to XML retrieval models. Situation Theory is used to express the aboutness proprieties of XML retrieval models. We develop a dedicated methodology for the evaluatio
APA, Harvard, Vancouver, ISO, and other styles
40

Suh, Taeweon. "Integration and Evaluation of Cache Coherence Protocols for Multiprocessor SoCs." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14065.

Full text
Abstract:
System-on-a-chip (SoC) designs is characterized by heavy reuse of IP blocks to satisfy specific computing needs for target applications, reduce overall design cost, and expedite time-to-market. To meet their performance goal and cost constraint, SoC designers integrate multiple, sometimes heterogeneous, processor IPs to perform particular functions. This design approach is called Multiprocessor SoC (MPSoC). In this thesis, I investigated generic methodologies for enabling efficient communication among heterogeneous processors and quantified the efficiency of coherence traffic. Hardware techniq
APA, Harvard, Vancouver, ISO, and other styles
41

Corus, Dogan. "Runtime analysis of evolutionary algorithms with complex fitness evaluation mechanisms." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/48421/.

Full text
Abstract:
Evolutionary algorithms (EAs) are bio-inspired general purpose optimisation methods which are applicable to a wide range of problems. The performance of an EA can vary considerably according to the problem it tackles. Runtime analyses of EAs rigorously prove bounds on the expected computational resources required by the EA to solve a given problem. A crucial component of an EA is the way it evaluates the quality (i.e. fitness) of candidate solutions. Different fitness evaluation methods may drastically change the efficiency of a given EA. In this thesis, the effects of different fitness evalua
APA, Harvard, Vancouver, ISO, and other styles
42

Abdulla, Alan Anwer. "Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/149/.

Full text
Abstract:
The rapid advancements in digital communication technology and huge increase in computer power have generated an exponential growth in the use of the Internet for various commercial, governmental and social interactions that involve transmission of a variety of complex data and multimedia objects. Securing the content of sensitive as well as personal transactions over open networks while ensuring the privacy of information has become essential but increasingly challenging. Therefore, information and multimedia security research area attracts more and more interest, and its scope of application
APA, Harvard, Vancouver, ISO, and other styles
43

Cooper, Simon. "DISE : a game technology-based digital interactive storytelling framework." Thesis, Liverpool John Moores University, 2011. http://researchonline.ljmu.ac.uk/6101/.

Full text
Abstract:
This thesis details the design and implementation of an Interactive Storytelling Framework. Using software engineering methodology and framework development methods, we aim to design a full Interactive Storytelling system involving a story manager, a character engine, an action engine, a planner, a 3D game engine and a set of editors for story data, world environment modelling and real-time character animation. The framework is described in detail and specified to meet the requirement of bringing a more dynamic real-time interactive story experience to the medium of computer games. Its core co
APA, Harvard, Vancouver, ISO, and other styles
44

Majeed, Taban Fouad. "Segmentation, super-resolution and fusion for digital mammogram classification." Thesis, University of Buckingham, 2016. http://bear.buckingham.ac.uk/162/.

Full text
Abstract:
Mammography is one of the most common and effective techniques used by radiologists for the early detection of breast cancer. Recently, computer-aided detection/diagnosis (CAD) has become a major research topic in medical imaging and has been widely applied in clinical situations. According to statics, early detection of cancer can reduce the mortality rates by 30% to 70%, therefore detection and diagnosis in the early stage are very important. CAD systems are designed primarily to assist radiologists in detecting and classifying abnormalities in medical scan images, but the main challenges hi
APA, Harvard, Vancouver, ISO, and other styles
45

Koutsouras, Panagiotis. "Crafting content : the discovery of Minecraft's invisible digital economy." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/51744/.

Full text
Abstract:
This thesis presents an ethnographic study that aims at explicating the work of creating content in Minecraft. The existing literature paves the way in understanding Minecraft’s community by providing fragments of what players do. However, the game is studied mainly from a ludic perspective or is treated as a resource to explore distinct research agendas, instead of a field of study in itself. As such, particular phenomena that are situated inside Minecraft’s community are lost. The conducted fieldwork discovered the invisible digital economy that is part of this community. More specifically,
APA, Harvard, Vancouver, ISO, and other styles
46

Moss, William B. "Evaluating inherited attributes using Haskell and lazy evaluation." Diss., Connect to the thesis, 2005. http://hdl.handle.net/10066/1486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Pettitt, Michael Andrew. "Visual demand evaluation methods for in-vehicle interfaces." Thesis, University of Nottingham, 2008. http://eprints.nottingham.ac.uk/10436/.

Full text
Abstract:
Advancements in computing technology have been keenly felt in the automotive industry. Novel in-car systems have the potential to substantially improve the safety, efficiency and comfort of the driving experience. However, they must be carefully designed, so their use does not dangerously distract drivers from fundamental, safety-critical driving tasks. Distraction is a well-established causal factor in road accidents. A concern is that the introduction of new in-vehicle technology may increase exposure to distraction, and lead to an increase in distraction-related accidents. The range of syst
APA, Harvard, Vancouver, ISO, and other styles
48

Greenwood, Rob. "Semantic analysis for system level design automation." Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-10062009-020216/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Maache, Ahmed. "A prototype parallel multi-FPGA accelerator for SPICE CMOS model evaluation." Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/173435/.

Full text
Abstract:
Due to ever increasing complexity of circuits, EDA tools and algorithms are demanding more computational power. This made transistor-level simulation a growing bottleneck in the circuit development process. This thesis serves as a proof of concept to evaluate and quantify the cost of using multi-FPGA systems in SPICE-like simulations in terms of acceleration, throughput, area, and power. To this end, a multi-FPGA architecture is designed to exploit the inherent parallelism in the device model evaluation phase within the SPICE simulator. A code transformation flow which converts the high-level
APA, Harvard, Vancouver, ISO, and other styles
50

Newman, Kimberly Eileen. "A parallel digital interconnect test methodology for multi-chip module substrate networks." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/13847.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!