To see the other types of publications on this topic, follow the link: Engineering|Information science|Systems science.

Dissertations / Theses on the topic 'Engineering|Information science|Systems science'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Engineering|Information science|Systems science.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Estridge, Craig Steven. "Perceived Value Technology Adoption Model for Accelerating Enterprise Transformation." Thesis, The George Washington University, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10751934.

Full text
Abstract:
<p> Executives and directors are seeking to transform their enterprises into more efficient operations to achieve a competitive advantage and increase shareholder value. In addition, modern enterprises are deploying new technologies to attain the desired efficiencies inherently promised by technology advancements. However, the transformation and technology adoption results vary considerably between failure and success. Therefore, to identify an efficient and consistent method for guiding transformation efforts, we conducted a literature review of the technology adoption models, enterprise transformations, systems of systems, and human factors to identify efforts directed at integrating these research areas. This holistic approach guided the research method in which we subsequently conducted a qualitative action research case study to identify the influencers of technology adoption factors. The results of the case study identified the factors of human perception (salience, effort, expectancy, and value) are key influencers that accelerate technology adoption during the deployment phase similar to the application of human factors during the development phase of the technology lifecycle. These influencers generate perceived value for the technology and tools employed during enterprise transformations. Furthermore, we propose a model for using technological capabilities to enhance enterprise transformations based on context, process-based work instructions, work-instruction-based training, and subject-matter-expert desk-side support. Consequently, we determined that this perceived value technology adoption model should be a preferred tool for new technology deployments in addition to updating existing deployed technology for increased value that can be leveraged for lasting enterprise transformations. </p><p>
APA, Harvard, Vancouver, ISO, and other styles
2

De, Soto Kristine M. "An assessment, survey, and systems engineering design of information sharing and discovery systems in a network-centric environment." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FDe%20Soto.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, December 2009.<br>Thesis Advisor(s): Goshorn, Rachel E. Second Reader: Shebalin, Paul V. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Systems engineering, systems architecture, network-centric systems, network-centric warfare, NCW, network-centric operations, NCO, information sharing, information discovery. Includes bibliographical references (p. 101-103). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
3

Woodford, Brendon James, and n/a. "Connectionist-Based Intelligent Information Systems for image analysis and knowledge engineering : applications in horticulture." University of Otago. Department of Information Science, 2008. http://adt.otago.ac.nz./public/adt-NZDU20080515.111549.

Full text
Abstract:
New Zealand�s main export earnings come from the primary production area including agriculture, horticulture, and viticulture. One of the major contributors in this area of horticulture is the production of quality export grade fruit; specifically apples. In order to maintain a competitive advantage, the systems and methods used to grow the fruit are constantly being refined and are increasingly based on data collected and analysed by both the orchardist who grows the produce and also researchers who refine the methods used to determine high levels of fruit quality. To support the task of data analysis and the resulting decision-making process it requires efficient and reliable tools. This thesis attempts to address this issue by applying the techniques of Connectionist-Based Intelligent Information Systems (CBIIS) for Image Analysis and Knowledge Discovery. Using advanced neurocomputing techniques and a novel knowledge engineering methodology, this thesis attempts to seek some solutions to a set of specific problems that exist within the horticultural domain. In particular it describes a methodology based on previous research into neuro-fuzzy systems for knowledge acquisition, manipulation, and extraction and furthers this area by introducing a novel and innovative knowledge-based architecture for knowledge-discovery using an on-line/real-time incremental learning system based on the Evolving Connectionist System (ECOS) paradigm known as the Evolving Fuzzy Neural Network (EFuNN). The emphases of this work highlights knowledge discovery from these data sets using a novel rule insertion and rule extraction method. The advantage of this method is that it can operate on data sets of limited sizes. This method can be used to validate the results produced by the EFuNN and also allow for greater insight into what aspects of the collected data contribute to the development of high quality produce.
APA, Harvard, Vancouver, ISO, and other styles
4

Nohlberg, Marcus. "Securing Information Assets : Understanding, Measuring and Protecting against Social Engineering Attacks." Doctoral thesis, Kista : Department of Computer and Systems Sciences (together with KTH), Stockholm University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-8379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mathieson, John T. J. "Towards Polymorphic Systems Engineering." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28257912.

Full text
Abstract:
Systems engineering is widely regarded as a full life cycle discipline and provides methodologies and processes to support the design, development, verification, sustainment, and disposal of systems. While this cradle-to-grave concept is well documented throughout literature, there has been recent and ever-increasing emphasis on evolving and digitally transforming systems engineering methodologies, practices, and tools to a model-based discipline, not only for advancing system development, but perhaps more importantly for extending agility and adaptability through the later stages of system life cycles – through system operations and sustainment. This research adopts principles from the software engineering domain DevOps concept (a collaborative merger of system development and system operations) into a Systems Engineering DevOps Lemniscate life cycle model. This progression on traditional life cycle models lays a foundation for the continuum of model-based systems engineering artifacts during the life of a system and promotes the coexistence and symbiosis of variants throughout. This is done by facilitating a merger of model-based systems engineering processes, tools, and products into a surrogate and common modeling environment in which the operations and sustainment of a system is tied closely to the curation of a descriptive system model. This model-based approach using descriptive system models, traditionally leveraged for system development, is now expanded to include the operational support elements necessary to operate and sustain the system (i.e. executable procedures, command scripts, maintenance manuals, etc. modeled as part of the core system). This evolution on traditional systems engineering implementation, focused on digitally transforming and enhancing system operations and sustainment, capitalizes on the ability of model-based systems engineering to embrace change to improve agility in the later life cycle stages and emphasizes the existence of polymorphic systems engineering (performing a variety of systems engineering roles in simultaneously occurring life cycle stages to increase system agility). A model-based framework for applying the Systems Engineering DevOps life cycle model is introduced as a new Systems Modeling Language profile. A use-case leveraging this “Model-Based System Operations” framework demonstrates how merging operational support elements into a spacecraft system model improves adaptability of support elements in response to faults, failures, and evolving environments during system operations, exemplifying elements of a DevOps approach to cyber-physical system sustainment.
APA, Harvard, Vancouver, ISO, and other styles
6

McBride, Sean Patrick. "SledgeEDF: Deadline-Driven Serverless for the Edge." Thesis, The George Washington University, 2021. http://pqdtopen.proquest.com/#viewpdf?dispub=28257914.

Full text
Abstract:
Serverless Computing has gained mass popularity by offering lower cost, improved elasticity, and improved ease of use. Driven by the need for efficient low latency computation on resource-constrained infrastructure, it is also becoming a common execution model for edge computing. However, hyperscale cloud mitigations against the serverless cold start problem do not cleanly scale down to tiny 10-100kW edge sites, causing edge deployments of existing VM and container-based serverless runtimes to suffer poor tail latency. This is particularly acute considering that future edge computing workloads are expected to have latency requirements ranging from microseconds to seconds. SledgeEDF is the first runtime to apply the traditional real-time systems techniques of admissions control and deadline-driven scheduling to the serverless execution model. It extends previous research on aWsm, an ahead-of-time (AOT) WebAssembly compiler, and Sledge, a single-process WebAssembly-based serverless runtime designed for the edge, yielding a runtime that targets efficient execution of mixed-criticality edge workloads. Evaluations demonstrate that SledgeEDF prevents backpressure due to excessive client requests and eliminates head-of-line blocking, allowing latency-sensitive high-criticality requests to preempt executing tasks and complete within 10% of their optimal execution time. Taken together, SledgeEDF's admissions controller and deadline-driven scheduler enable it to provide limited guarantees around latency deadlines defined by client service level objectives.
APA, Harvard, Vancouver, ISO, and other styles
7

Pongsuwan, Wuttipong. "Design and implementation of a multimedia DBMS retreival management /." Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA241069.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009.<br>Thesis Advisor(s): Lum, Vincent Y. Second Reader: Wu, C. Thomas. "September 1990." Description based on title screen as viewed on December 17, 2009. DTIC Descriptor(s): Data Bases, Data Management, Schools, Models, Computers, Alphanumeric Data, Navy, Semantics, Theses, Information Retrieval, User Needs, Media, Management, Interfaces. DTIC Identifier(s): Management Information Systems, Data Bases, Systems Engineering, Theses, Installation. Author(s) subject terms: Multimedia Database Management System, Multimedia, DBMS, MDBMS, Image Database. Includes bibliographical references (p. 128-130). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
8

Nuvvula, Yamini. "Improving the Usability of Document Authoring." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1526044171006591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mohleji, Nandita. "Decision Modeling Framework to Minimize Arrival Delays from Ground Delay Programs." Thesis, The George Washington University, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3740141.

Full text
Abstract:
<p> Convective weather and other constraints create uncertainty in air transportation, leading to costly delays. A Ground Delay Program (GDP) is a strategy to mitigate these effects. Systematic decision support can increase GDP efficacy, reduce delays, and minimize direct operating costs. In this study, a decision analysis (DA) model is constructed by combining a decision tree and Bayesian belief network. Through a study of three New York region airports, the DA model demonstrates that larger GDP scopes that include more flights in the program, along with longer lead times that provide stakeholders greater notice of a pending program, trigger the fewest average arrival delays. These findings are demonstrated to result in a savings of up to $1,850 per flight. Furthermore, when convective weather is predicted, forecast weather confidences remain the same level or greater at least 70% of the time, supporting more strategic decision making. The DA model thus enables quantification of uncertainties and insights on causal relationships, providing support for future GDP decisions. </p>
APA, Harvard, Vancouver, ISO, and other styles
10

Abdulgader, Musbah M. "Bio Inspired Evolutionary Fuzzy System for Data Classification." University of Toledo / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1575563281684676.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Thanguturi, Naren. "Automatic News Generation System based on Natural Language." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1525973404437239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Conley, Thomas A. "Effective Programmatic Analysis of Network Flow Data for Security and Visualization using Higher-order Statistics and Domain Specific Embedded Languages." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1336482912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Gorham, James Harold. "An Investigation into the Impact of Social Networking on Knowledge Sharing." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1071.

Full text
Abstract:
Today we are experiencing a rapidly increasing trend to use social networking in ways that dramatically affect both our personal and our public lives. This is a global phenomenon being experienced around the world. Exactly how this technology is being used and by whom is of great interest. The problem is that not a lot of research has been conducted to investigate the role social networking sites play to influence a person’s attitude toward sharing knowledge at work. In light of the marked increase in the use of social networking sites and how it is changing the way we live, both at work and during leisure activities, this research examines the factors that influence our attitudes towards knowledge sharing. This study presents the results of a quantitative research to understand the nature and impact of these motivating factors and analyzes how they influence our attitudes regarding the use of social networking sites as a venue in which to share knowledge. This study was conducted by means of an Internet survey. A self-administered questionnaire provided data and assisted in determining the degree to which the use of social networking sites is being used to share knowledge in the workplace. This non-experimental, cross-sectional, correlational study was conducted by means of quantitative research procedures to investigate the impact and influence social networking has on the knowledge transfer process. This research showed how social networking has redefined the collaborative environment that encourages knowledge holders to share their valuable knowledge. The results show that some factors, such as organizational climate, the subjective norm, and knowledge sharing attitudes, have a dominant impact on our behavior regarding the use of social networking sites and our intention to share knowledge with others. Another set of factors influenced our behavior and attitudes, but to a lesser degree, while one factor, anticipation of extrinsic rewards, actually exerted a negative influence on an individual’s knowledge sharing attitudes. The results of this dissertation increased and contributed to our understanding of the relationship between social networking sites and intention to share knowledge and set the stage for follow-on research.
APA, Harvard, Vancouver, ISO, and other styles
14

Raje, Satyajeet. "Data Fusion Ontology:Enabling a Paradigm Shift from Data Warehousing to Crowdsourcing for Accelerated Pace of Research." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1460993523.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Wistrand, Kai. "Method rationale revealed : communication of knowledge in systems development methods." Doctoral thesis, Örebro universitet, Handelshögskolan vid Örebro universitet, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-6180.

Full text
Abstract:
The practice of developing information systems with the support of information systems development methods is not new. A vast number of systems development methods have been suggested over the years in an attempt to solve the problems a development organisation might encounter. From early approaches like the Waterfall model to more modern monolithic methods such as the Rational Unified Process and the newest approaches exemplified in the Agile methods, the ambition has often been to find the silver bullet and the most effective ways to produce quality systems. Methods are prescriptive by nature as they suggest action and as such they represent rationale. Thus, one can speak of a method rationale as the dimension within methods that motivate their existence. Method rationale is understood as the goal and value rational relations between a method’s underlying philosophy and its proposed actions. During the methods’ evolution, the practice of systems development and the supporting systems development methods have been subjected to research from many perspectives. One possible way to understand the nature of the existing research is to separate it into two fields. The suggested fields have different strengths and weaknesses. The field of traditional research on information systems development (ISD) emphasise relevance in their studies but often overlook aspects of generalisation. The field of method engineering (ME) is highly formalistic and emphasise rigour but often miss aspects concerning relevance, such as the role methods play in peoples daily systems development efforts. In this dissertation, a polarisation of existing systems development method research is suggested in order to find a synthesis more capable of serving as a common ground for method research and for the understanding of the systems development method phenomenon. This is achieved through a proposed extension of the field of ME into the field of extended method engineering (EME). The foundation of the EME is found in the concept of method rationale and a method component concept design capable of carrying and expressing method rationale. The method component concept design is applied, evaluated, and re-designed in three different empirical settings in order to ascertain its practical potential and the benefits in explicating the dimension of method rationale.
APA, Harvard, Vancouver, ISO, and other styles
16

Yilmazel, Ozgur. "Empirical selection of NLP-driven document representations for text categorization." Related electronic resource: Current Research at SU : database of SU dissertations, recent titles available full text, 2006. http://proquest.umi.com/login?COPT=REJTPTU0NWQmSU5UPTAmVkVSPTI=&clientId=3739.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Deshpande, Shubhanan V. "Knowledge-based Cyberinfrastructures for Decision Making in Real-World Domains." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1293709851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Garip, Omer. "Web-based Thesis Workflow Management System." Youngstown State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1588779226055449.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Rogage, Kay. "The development and evaluation of a virtual simulation tool for testing emergency response planning strategies within the UK gas industry." Thesis, Northumbria University, 2014. http://nrl.northumbria.ac.uk/17599/.

Full text
Abstract:
Third party damage from activities such as work carried out by contractors’ poses risks to gas pipelines. Within the UK, emergency plans are drawn up in an attempt to mitigate the significant consequences of any pipeline failure. The Control of Major Accident Hazards 1999 and the Pipeline Safety Regulations 1996 place legislative requirements on UK gas infrastructure providers, to regularly test emergency plans with simulation exercises. The exercises are intended to support the preparation of responders for dealing with incidents of failure. Software simulation is not currently utilised to facilitate the testing of emergency response plans in the UK gas pipeline industry. This project serves to evaluate the user acceptance of a software simulation prototype to enable the testing of emergency response planning strategies in the UK gas industry. Current emergency planning legislation and strategies applied to satisfy legislation within the UK gas industry are reviewed. The adoption and application of software simulation for the development of applied skill in other industries is examined, to determine the potential for use in testing emergency response planning for gas incidents. The Technology Acceptance Model (TAM) is the theoretical framework that underpins the study of user acceptance, of a software simulation prototype designed for running exercises to test emergency response plans. A case study evaluation of the user acceptance of the prototype, by representatives experienced in testing emergency response planning strategies in the gas industry, is presented. The participants in this case study are drawn from the Police, Fire and Rescue Service, Local Authority and Gas infrastructure provider, that perform a range of job roles operating at Operational, Tactical and Strategical levels. The research findings demonstrate that the participants perceive software simulation of emergency response planning processes for gas incidents to be beneficial. The TAM claims that if users perceive a system to be useful they are likely to adopt that system. Furthermore if users don’t perceive a system to be easy to use, according to the TAM, they will still adopt it after the correct training has been provided. Users would be most likely to adopt and use the software to facilitate emergency response planning exercises, if the correct training is provided. Software simulation offers great potential for the testing of emergency plans, it provides a controlled environment where decisions and responses can be audited and mistakes can be made without serious consequence. Software simulation has been shown to enhance, rather than replace, existing emergency response planning processes.
APA, Harvard, Vancouver, ISO, and other styles
20

Backlund, Per. "The Use of Patterns in Information System Engineering." Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-619.

Full text
Abstract:
<p>The aims of this dissertation are to investigate the use and usefulness of patterns in Information Systems Engineering and to identify future areas of research. In order to do this there is a need to survey different types of patterns and find a common concept of patterns. A pattern is based on experience found in the real world. A text or a model or a combination of the both can describe the pattern. A pattern is typically described in terms of context, forces, problem, and solution. These can be explicitly expressed or implicitly found in the description of the pattern.</p><p>The types of patterns dealt with are: object-oriented patterns; design patterns, analysis patterns; data model patterns; domain patterns; business patterns; workflow patterns and the deontic pattern. The different types of patterns are presented using the authors' own terminology.</p><p>The patterns described in the survey are classified with respect to different aspects. The intention of this analysis is to form a taxonomy for patterns and to bring order into the vast amount of patterns. This is an important step in order to find out how patterns are used and can be used in Information Systems Engineering. The aspects used in the classification are: level of abstraction; text or model emphasis; product or process emphasis; life cycle stage usage and combinations of these aspects.</p><p>Finally an outline for future areas of research is presented. The areas that have been considered of interest are: patterns and Information Systems Engineering methods; patterns and tools (tool support for patterns); patterns as a pedagogical aid; the extraction and documentation of patterns and patterns and novel applications of information technology. Each future area of research is sketched out.</p>
APA, Harvard, Vancouver, ISO, and other styles
21

Kerzhner, Aleksandr A. "Using logic-based approaches to explore system architectures for systems engineering." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/44748.

Full text
Abstract:
This research is focused on helping engineers design better systems by supporting their decision making. When engineers design a system, they have an almost unlimited number of possible system alternatives to consider. Modern systems are difficult to design because of a need to satisfy many different stakeholder concerns from a number of domains which requires a large amount of expert knowledge. Current systems engineering practices try to simplify the design process by providing practical approaches to managing the large amount of knowledge and information needed during the process. Although these methods make designing a system more practical, they do not support a structured decision making process, especially at early stages when designers are selecting the appropriate system architecture, and instead rely on designers using ad hoc frameworks that are often self-contradictory. In this dissertation, a framework for performing architecture exploration at early stages of the design process is presented. The goal is to support more rational and self-consistent decision making by allowing designers to explicitly represent their architecture exploration problem and then use computational tools to perform this exploration. To represent the architecture exploration problem, a modeling language is presented which explicitly models the problem as an architecture selection decision. This language is based on the principles of decision-based design and decision theory, where decisions are made by picking the alternative that results in the most preferred expected outcome. The language is designed to capture potential alternatives in a compact form, analysis knowledge used to predict the quality of a particular alternative, and evaluation criteria to differentiate and rank outcomes. This language is based on the Object Management Group's System Modeling Language (SysML). Where possible, existing SysML constructs are used; when additional constructs are needed, SysML's profile mechanism is used to extend the language. Simply modeling the selection decision explicitly is not sufficient, computational tools are also needed to explore the space of possible solutions and inform designers about the selection of the appropriate alternative. In this investigation, computational tools from the mathematical programming domain are considered for this purpose. A framework for modeling an architecture selection decision in mixed-integer linear programming (MIP) is presented. MIP solvers can then solve the MIP problem to identify promising candidate architectures at early stages of the design process. Mathematical programming is a common optimization domain, but it is rarely used in this context because of the difficulty of manually formulating an architecture selection or exploration problem as a mathematical programming optimization problem. The formulation is presented in a modular fashion; this enables the definition of a model transformation that can be applied to transform the more compact SysML representation into the mathematical programming problem, which is also presented. A modular superstructure representation is used to model the design space; in a superstructure a union of all potential architectures is represented as a set of discrete and continuous variables. Algebraic constraints are added to describe both acceptable variable combinations and system behavior to allow the solver to eliminate clearly poor alternatives and identify promising alternatives. The overall framework is demonstrated on the selection of an actuation subsystem for a hydraulic excavator. This example is chosen because of the variety of potential architecture embodiments and also a plethora of well-known configurations which can be used to verify the results.
APA, Harvard, Vancouver, ISO, and other styles
22

Nero, Eva. "The Process of Metathinking in the Area of Information Systems Design." Thesis, University of Skövde, Department of Computer Science, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-486.

Full text
Abstract:
<p>In the area of information systems design it is important to select an appropriate methodology in order to get an information system that functions as expected. The perspective behind the methodology is seldom stated explicitly. The epistemology that a methodology is based on has impacts on the design of the system. Therefore, the process of selecting an appropriate methodology is important. The aim of this work is to study how the process of metamodelling or metathinking is considered in the area of information systems design.</p><p>Interviews and a study of the literature have been performed in order to investigate the awareness of metamodelling thinking in the area of information systems design.In the literature we found that only a small part dealt with the process of metamodelling. The method engineering (ME) approach was found as a way of thinking that seems to consider metamodelling thinking. We have evaluated ME according to a synthesis of the works by van Gigch, Churchman, and Flood and Carson. The evaluation has shown that ME deals with metamodelling thinking. In order to improve the metamodelling thinking in ME, it is important to explicitly define how ME considers the aspect of participation of motivated actors and the iterative process. The interviews have shown that information systems designers use some kind of metamodelling thinking, but they do not seem to be aware of the process.</p><p>In an information system design process, it is important to shift perspectives from reality to modelling, and to the metamodelling level, in order to apply metamodelling thinking. Further work should be performed with the purpose of making the information systems designers aware of the importance of applying metamodelling thinking.</p>
APA, Harvard, Vancouver, ISO, and other styles
23

Raje, Satyajeet. "ResearchIQ: An End-To-End Semantic Knowledge Platform For Resource Discovery in Biomedical Research." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1354657305.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Li, Chang. "Complexity Analysis of Physiological Time Series with Applications to Neonatal Sleep Electroencephalogram Signals." Case Western Reserve University School of Graduate Studies / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=case1345657829.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Amoako-Attah, Jospeh. "Impact of climate change on newly detached residential buildings in the UK passive mitigation and adaptation strategies." Thesis, University of West London, 2015. https://repository.uwl.ac.uk/id/eprint/1475/.

Full text
Abstract:
The global increase in demand for dwelling energy and implications of changing climatic conditions on buildings require the built environment to build sustainable dwellings. The aim of this thesis is to apply passive mitigation and adaptation design strategies to newly detached residential buildings in the UK with the view to identify the key building envelop and systems parameters to secure the right balance of energy consumption and thermal comfort in dwellings. In addition, currently, acceptable robust validation process for validating space temperatures is required, as existing simulation software validation is geared toward energy consumption. The thesis further aims to apply an effective validation method to the validation of building simulation indoor temperatures. This thesis comprised of six case studies. In the first study, Bland-Altman’s method of comparison is used as a validation technique in validating space temperatures in building simulation application. This is a newly developed knowledge in civil and construction engineering research in validating thermal analysis simulation software. The relevance of this approach is due to the emergent understanding that the goodness of fit measures used in current building simulation model validation are inadequate coupled with that fact that the current simulation software validation are geared toward energy consumption. In the second study, global Monte Carlo sensitivity analysis is performed on two differing weather patterns of UKCIP02 and UKCP09 weather data sets to compare their impact on future thermal performance of dwellings when use in thermal analysis simulation. The investigation seeks to ascertain the influential weather parameters which affect future dwelling indoor temperatures. The case study when compared to literature affirms the mean radiant temperature and the dry bulb air temperature as the key parameters which influence operative temperatures in dwellings. The third study, the extent of impact of climate change on key building performance parameters in a free running residential building is quantified. The key findings from this study were that the average percentage decrease for the annual energy consumption was predicted to be 2.80, 6.60 and 10.56 for 2020s, 2050s and 2080s time lines respectively. A similar declining trend in the case of annual natural gas consumption was 4.24, 9.98 and 16.1, and that for building emission rate and heating demand were 2.27, 5.49 and 8.72 and 7.82, 18.43 and 29.46 respectively. This decline is in consonance with the range of annual average temperature change predicted by the GCM based on the IPCC scenarios (IPCC, 2001) which generally shows an increase in temperature over stipulated timelines. The study further showed that future predicted temperature rise might necessitate the increasing use of cooling systems in residential buildings. The introduction of cooling to offset overheating risk, the trend of heating and cooling demand shows progressive increase variability with an average percentage increase of 0.53, 4.68 and 8.12 for 2020s, 2050s and 2080s timelines respectively. It is therefore observed that the introduction of cooling cancels out the energy gains related to heating due to future climatic variability. The fourth, fifth and sixth case studies consider the integrated passive mitigation strategies of varying future climatic conditions, variable occupant behaviour, building orientation, adequate provision of thermal mass, advance glazing, appropriate ventilation and sufficient level of external shading which influence the potential thermal performance of dwellings and a methodology that combines thermal analysis modelling and simulation coupled with the application of CIBSE TM52 adaptive overheating criteria to investigate the thermal comfort and energy balance of dwellings and habitable conservatories. In the fourth study, the impact of four standardized construction specifications on thermal comfort on detached dwellings in London, Birmingham and Glasgow are considered. The results revealed that the prime factor for the variation of indoor temperatures is the variability of climatic patterns. In addition, London is observed to experience more risk of thermal discomfort than Birmingham and Glasgow over the time period for the analysis. The total number of zones failing 2 or 3 CIBSE TM52 overheating criteria is more in London than in Birmingham and Glasgow. It was also observed that progressive increase in thermal mass of the standardized construction specifications decrease the indoor temperature swings but increase in future operative temperatures. The day ventilation scenario was seen not to be effective way of mitigating internal heat gains in London and Birmingham. The opposite was observed in Glasgow. Night ventilation coupled with shading offered the best mitigation strategy in reducing indoor temperatures in London and Birmingham. In the fifth study, Monte Carlo sensitivity analysis is used to determine the impact of standard construction specifications and UKCP09 London weather files on thermal comfort in residential buildings. Consideration of London urban heat island effect in the CIBSE TM49 weather files leading to the generation of three different weather data sets for London is analysed. The key findings of the study indicated that in the uncertainty analysis (box and whiskers plots), the medians for the day ventilation scenarios are generally higher than those of the night ventilation and further higher than the night ventilation with shading scenarios. This shows that applying mitigation scenarios of night ventilation and shading have a significant impact on reducing internal operative temperatures. In addition, the sensitivity analysis shows glazing as the most dominant parameter in enhancing thermal comfort. The sensitivity of glazing to thermal comfort increases from Gatwick, with London Weather Centre having the highest sensitivity index. This could be attributed to the urban heat island effect of central London, leading to higher internal operative temperatures. The study thus shows that more consideration should be given to glazing and internal heat gains than floor and wall construction when seeking to improve the thermal comfort of dwellings. Finally, the sixth study considers the use of passive solar design of conservatories as a viable solution of reducing energy consumption, enhancing thermal comfort and mitigating climate change. The results show that the judicious integration of the passive solar design strategies in conservatories with increasing conservatory size in elongated south facing orientation with an aspect ratio of at least 1.67 could progressively decrease annual energy consumption (by 5 kWh/m2), building emission rate (by 2.0 KgCO2/m2) and annual gas consumption (by 7 kWh/m2) when the conservatory is neither heated nor air-conditioned. Moreover, the CIBSE TM52 overheating analysis showed that the provision of optimum ventilation strategy depending on the period of the year coupled with the efficient design of awnings/overhangs and the provision of external adjustable shading on the east and west facades of the conservatory could significantly enhance the thermal comfort of conservatories. The findings from these case studies indicate that thermal comfort in dwellings can be enhanced by analysis of future climatic patterns, improved building fabric and provision of passive design consideration of improved ventilation and shading. They also confirm that the utilization of appropriate mitigation strategies to enhance thermal comfort could contribute to the reduction of the environmental implications to the built environment and facilitate the drive towards the attainment of future sustainability requirements.
APA, Harvard, Vancouver, ISO, and other styles
26

Magdalla, Irenee M. G. "Reverse Engineering Aspects to Derive Application Class Models." Cleveland State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=csu1277928046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Mathur, Kush. "Mathematical Models and Genetic Algorithm Approaches to Simultaneously Perform Workforce Overtime Capacity Planning and Schedule Cells." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1351306927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Dawson, Linda Louise 1954. "An investigation of the use of object-oriented models in requirements engineering practice." Monash University, School of Information Management and Systems, 2001. http://arrow.monash.edu.au/hdl/1959.1/8031.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Jacobs, Pierre Conrad. "Towards a framework for building security operation centers." Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1017932.

Full text
Abstract:
In this thesis a framework for Security Operation Centers (SOCs) is proposed. It was developed by utilising Systems Engineering best practices, combined with industry-accepted standards and frameworks, such as the TM Forum’s eTOM framework, CoBIT, ITIL, and ISO/IEC 27002:2005. This framework encompasses the design considerations, the operational considerations and the means to measure the effectiveness and efficiency of SOCs. The intent is to provide guidance to consumers on how to compare and measure the capabilities of SOCs provided by disparate service providers, and to provide service providers (internal and external) a framework to use when building and improving their offerings. The importance of providing a consistent, measureable and guaranteed service to customers is becoming more important, as there is an increased focus on holistic management of security. This has in turn resulted in an increased number of both internal and managed service provider solutions. While some frameworks exist for designing, building and operating specific security technologies used within SOCs, we did not find any comprehensive framework for designing, building and managing SOCs. Consequently, consumers of SOCs do not enjoy a constant experience from vendors, and may experience inconsistent services from geographically dispersed offerings provided by the same vendor.
APA, Harvard, Vancouver, ISO, and other styles
30

Strömberg, Lucas. "Optimizing Convolutional Neural Networks for Inference on Embedded Systems." Thesis, Uppsala universitet, Signaler och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-444802.

Full text
Abstract:
Convolutional neural networks (CNN) are state of the art machine learning models used for various computer vision problems, such as image recognition. As these networks normally need a vast amount of parameters they can be computationally expensive, which complicates deployment on embedded hardware, especially if there are contraints on for instance latency, memory or power consumption. This thesis examines the CNN optimization methods pruning and quantization, in order to explore how they affect not only model accuracy, but also possible inference latency speedup. Four baseline CNN models, based on popular and relevant architectures, were implemented and trained on the CIFAR-10 dataset. The networks were then quantized or pruned for various optimization parameters. All models can be successfully quantized to both 5-bit weights and activations, or pruned with 70% sparsity without any substantial effect on accuracy. The larger baseline models are generally more robust and can be quantized more aggressively, however they are also more sensitive to low-bit activations. Moreover, for 8-bit integer quantization the networks were implemented on an ARM Cortex-A72 microprocessor, where inference latency was studied. These fixed-point models achieves up to 5.5x inference speedup on the ARM processor, compared to the 32-bit floating-point baselines. The larger models gain more speedup from quantization than the smaller ones. While the results are not necessarily generalizable to different CNN architectures or datasets, the valuable insights obtained in this thesis can be used as starting points for further investigations in model optimization and possible effects on accuracy and embedded inference latency.
APA, Harvard, Vancouver, ISO, and other styles
31

Bärling, Leo. "Katana databas 1.0." Thesis, Mälardalen University, School of Innovation, Design and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-7575.

Full text
Abstract:
<p>The task to this thesis has been to create an application, Katana-databas 1.0, for analysing c-code. The generated output gets stored in a data structure which content in the end of the program run gets written in a textfile which gets used by Katana. It's a tool for reverse engineering, developed by Johan Kraft at Mälardalens institute.</p><p>Katana-databas has got the following limitations. (1) It can only handle preprocessed files, meaning it doesn't contain any rows beginning with "#". (2) Only complete files can be handled. (3) No references to unknown functions or variables are allowed. (4) A further limitation is that the application can't handle any ADT's. It can only handle primitive types. (5) Finally the application is only written for pure c-code, and thus doesn't handle code written C++.</p><p>The task has been solved by creating an automatically generated lexer with Flex and Bison rules in Visual Studio. There after a limited parser has been developed which purpose is to process the lexemes which the lexer generates.</p><p>The underlying causes for the thesis is to replace Understand with Katana-databas. Katana has this far used the database in Understand, but it contains closed source code. What is seeked is open source code, which Katana-databas is based on.</p><br><p>Programmeringsuppgiften till detta arbete har bestått i att skapa en applikation, Katana-databas 1.0, för analys av C-kod. Utflödet som applikationen skapar sparas i en datastruktur vars innehåll i slutet av programkörningen skrivs ut i en textfil som används av Katana. Det är ett verktyg för reverse engineering, utvecklat av Johan Kraft på Mälardalens högskola.</p><p>Katana-databas har fått följande begränsningar. (1) Den kan bara hantera filer som är preprocessade, dvs. den innehåller inga rader som inleds med ”#”. (2) Endast kompletta filer kan hanteras. (3) Inga referenser till okända funktioner eller variabler är tillåtna. (4) En ytterligare begränsning är att applikationen inte kan hantera ADT:er. Den kan bara hantera primitiva typer. (5) Tillsist är applikationen endast skriven för ren c-kod, och klarar således inte av att hantera kod skriven i C++.</p><p>Uppgiften har lösts genom att skapa en automatgenererad lexer med Flex och Bisonrules i Visual Studio. Därefter har en limiterad parser utvecklats vars syfte är att bearbeta de lexem som lexern genererar.</p><p>Det bakomliggande syftet med arbetet är att ersätta Understand med Katana-databas. Katana har hittills använt sig av databasen i Understand, men den består av sluten källkod. Det som eftersträvas är öppen källkod, vilket Katana-databas baseras på.</p>
APA, Harvard, Vancouver, ISO, and other styles
32

Matulevičius, Raimundas. "Process Support for Requirements Engineering : A Requirements Engineering Tool Evaluation Approach." Doctoral thesis, Norwegian University of Science and Technology, Faculty of Information Technology, Mathematics and Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-576.

Full text
Abstract:
<p>Requirements engineering (RE) tools are software tools which provide automated assistance during the RE process. However, the RE practice relies on office tools rather than RE-tools provided by various companies. Reasons for not using the RE-tools include financial causes. The part of the problem also lies in the difficulty to evaluate such tools before acquisition to support the RE process. Hence, to support the completeness and effectiveness of RE-tool evaluation, a sound framework providing methodological guidelines is needed.</p><p>This work proposes an RE-tool evaluation approach (R-TEA), which provides a systematic way of the RE-tool assessment using two evaluation frameworks. The framework for the functional RE-tool requirements consists of three dimensions: representation, agreement, and specification. The representation dimension deals with the degree of formality, where requirements are described using informal, semiformal and formal languages. The agreement dimension deals with the degree of agreement among project participants through communication means. The specification dimension deals with the degree of requirements understanding and completeness at a given time moment. The second framework categorises the non-functional RE-tool features to process, product, and external requirements. Process requirements characterise constraints placed upon the user’s work practice. Product requirements specify the desired qualitative characteristics of RE-tools. External requirements are derived from the user’s internal and external environment.</p><p>Both frameworks are applied to a specification exemplar which application initiates preparation of the requirements specification for the RE-tool selection. Assessment of the RE-tools’ compatibility to the specified RE-tool requirements is performed using different evaluation techniques. Decision about RE-tool selection is made after summarising all the assessment results.</p><p>A prototype tool is developed supporting the frameworks and R-TEA. The R-TEA method is tested in a number of case studies. The findings report on positive trends of the frameworks, prototype and the R-TEA method.</p>
APA, Harvard, Vancouver, ISO, and other styles
33

Kim, Sung Han. "Computing Research in Academia: Classifications, Keywords, Perceptions, and Connections." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/5893.

Full text
Abstract:
The Association for Computing Machinery (ACM) recognizes five computing disciplines: Computer Science (CS), Computer Engineering (CE), Information Technology (IT), Information Systems (IS), and Software Engineering (SE). Founded in 1947 the ACM is the world's largest society for computing educators, researchers, and professionals. While Computer Science has been a degree program since 1962, the other four are relatively new. This research focuses on understanding the graduate research in four of the five ACM disciplines (CS, CE, IT, and IS) using a large body of thesis and dissertation metadata. SE is not found in the metadata and graduate work in SE is not included. IS is no longer officially found in the metadata so its representative ProQuest replacement, Information Science although not an ACM recognized discipline is used based on the commonality of the associated ProQuest Classification code. The research is performed using co-word and graph analysis of author-supplied Classifications, Departments, and keywords. Similarities and differences between the disciplines are identified. Whether the computing discipline is the primary or the secondary focus of the research makes a large difference in the connections it makes with other academic disciplines. It was found that the Departments from which computing research originates varies widely but the majority come from computing-related Departments. Finally, gaps are apparent from the practitioners' views of the computing disciplines versus the public's view.
APA, Harvard, Vancouver, ISO, and other styles
34

Jagithyala, Anirudh. "Recommending recipes based on ingredients and user reviews." Thesis, Kansas State University, 2014. http://hdl.handle.net/2097/18154.

Full text
Abstract:
Master of Science<br>Department of Computing and Information Sciences<br>Doina Caragea<br>In recent years, the content volume and number of users of the Web have increased dramatically. This large amount of data has caused an information overload problem, which hinders the ability of a user to find the relevant data at the right time. Therefore, the primary task of recommendation systems is to analyze data in order to offer users suggestions for similar data. Recommendations which use the core content are known as content-based recommendation or content filtering, and recommendations which utilize directly the user feedback are known as collaborative filtering. This thesis presents the design, implementation, testing, and evaluation of a recommender system within the recipe domain, where various approaches for producing recommendations are utilized. More specifically, this thesis discusses approaches derived from basic recommendation algorithms, but customized to take advantage of specific data available in the {\it recipe} domain. The proposed approaches for recommending recipes make use of recipe ingredients and reviews. We first build ingredient vectors for both recipes and users (based on recipes they have rated highly), and recommend new recipes to users based on the similarity between user and recipe ingredient vectors. Similarly, we build recipe and user vectors based on recipe review text, and recommend new recipes based on the similarity between user and recipe review vectors. At last, we study a hybrid approach, where both ingredients and reviews are used together. Our proposed approaches are tested over an existing dataset crawled from recipes.com. Experimental results show that the recipe ingredients are more informative than the review text for making recommendations. Furthermore, when using ingredients and reviews together, the results are better than using just the reviews, but worse than using just the ingredients, suggesting that to make use of reviews, the review vocabulary needs better filtering.
APA, Harvard, Vancouver, ISO, and other styles
35

Narula, Aradhana. "Information theoretic analysis of multiple-antenna transmission diversity." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10453.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.<br>Includes bibliographical references (leaves 125-127).<br>by Aradhana Narula.<br>Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
36

Grahn, Pernilla. "Reverse Engineering : En jämförelse mellan företag och forskare." Thesis, University of Skövde, School of Humanities and Informatics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-854.

Full text
Abstract:
<p>Användning av mjukvaruverktyg när reverse engineering utförs är ett måste för att få ett användbart resultat enligt Hainaut (2002). Kudrass m fl (1997) visar på brister som kan uppstå när mjukvaruverktyg används. Gemensamt för de forskare som har studerats i detta arbete är att de hävdar att företag saknar kunskap för att utföra reverse engineering med mjukvaruverktyg. Har forskarna rätt i att det saknas kunskap eller har företagen mer kunskap än vad forskarna tror? Då dessa forskare har en klar koppling till tillverkning av mjukvaruverktyg så är eventuellt inte deras påstående opartiska och därför är det intressant att se om deras påstående stämmer med verkligheten. För att undersöka hur mycket kunskap olika företag har om utförande av reverse engineering har intervjuer utförts för att få fram information som sedan jämfördes med forskarnas påstående. Av de företag som deltog i denna undersökning blev resultatet att forskarnas påstående inte kunde styrkas, det finns ingen kunskapsbrist på svenska företag idag inom reverse engineering. Och den naturliga kopplingen mellan mjukvaruverktyg och reverse engineering är mer framtvingad av leverantörer än naturlig för företagen, enligt några av de företag som deltog. Eftersom detta arbete är begränsat i tid så kan inte resultatet som har framkommit ses som att forskarna har rätt eller fel utan bara visa en liten del av vad företagen har för kunskap inom reverse engineering.</p>
APA, Harvard, Vancouver, ISO, and other styles
37

Gieske, Edmund Joseph. "Critical Words Cache Memory." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1208368190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Albinsdotter, Sofia. "En utredning gällande vilken information en kravspecifikation bör innehålla ur ett kontraktperspektiv." Thesis, University of Skövde, Department of Computer Science, 1999. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-344.

Full text
Abstract:
<p>Utvecklingen av informationssystem utförs vanligen med hjälp av en systemutvecklingsmodell där kravhanteringsaktivitetens (Requirements Engineering – RE-processen) syfte är att samla in och bearbeta kundens alla krav på systemet. Den slutliga produkten av RE-processen är en kravspecifikation där alla kraven gällande exempelvis systemets funktionalitet, syfte etc skall specificeras.</p><p>Det är inte alltid självklart vilken information som en kravspecifikation bör innehålla då detta dokument kan för både kunden och leverantören ses som ett kvitto på vad som skall utvecklas och hur det skall gå till. Dokumentet skall nämligen fungera som ett underlag för de så kallade implementations- och designaktiviteterna i systemutvecklingsarbetet samt fungera som ett underlag för diskussion och kontrakt mellan leverantör och kund gällande utvecklingen av informationssystemet. Kravspecifikationen bör därför innehålla komplett och förståelig information så att detta dokument uppfyller sina syften. Därmed är det inte enkelt att veta vilken information som en kravspecifikation bör innehålla för att detta dokument skall uppfylla ovannämnda egenskaper. Då kravspecifikationen skall upprättas kan ett ramverk eller en standard tillämpas som förespråkar att viss information skall ingå.</p><p>Det ramverk som är upprättat i detta examensarbete innehåller den information som jag anser bör ingå i en kravspecifikation. Utifrån detta ramverk finns det viss information som jag anser att en kravspecifikation bör innehålla just ur kontraktsynpunkt. Denna information är följande:</p><p>· Informationssystemets funktioner</p><p>· Informationssystemets funktionella egenskaper</p><p>· Informationssystemets generella egenskaper</p><p>· Utbildning</p><p>· Dokumentation</p><p>· Leveransdatum</p>
APA, Harvard, Vancouver, ISO, and other styles
39

Ardjmand, Ehsan. "An Interactive Intelligent Decision Support System for Integration of Inventory, Planning, Scheduling and Revenue Management." Ohio University / OhioLINK, 2015. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1427299338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Johansson, Björn. "Joint control in dynamic situations." Doctoral thesis, Linköpings universitet, Institutionen för datavetenskap, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-4677.

Full text
Abstract:
This thesis focuses on the cooperative and communicative aspects of control over dynamic situations such as emergency management and military operations. Taking a stance in Cognitive Systems Engineering, Decision making and Communication studies, the role of information systems as tools for communication in dynamic situations is examined. Three research questions are examined; 1 ) How new forms of information technology affects joint control tasks in dynamic situations, and how/if microworld simulations can be used to investigate this. 2 ) What the characteristics of actual use of information systems for joint control are in dynamic situations? 3 ) What the pre-requisites are for efficient communication in joint control tasks and especially in dynamic, high-risk situations? Four papers are included. A study performed with a microworld simulation involving military officers as participants is presented, and the method of using microworlds for investigating the effects of new technology is discussed. Field observations from an emergency call centre are used to exemplify how information systems actually are used in a cooperative task. An interview study with military officers from a UN-mission describes the social aspects of human-human communication in a dynamic, high risk environment. Finally, an elaborated perspective on the role of information systems as tools for communication, and especially the relation between the social, organisational and technical layers of a joint control activity is presented.
APA, Harvard, Vancouver, ISO, and other styles
41

Ikusan, Ademola A. "Collaboratively Detecting HTTP-based Distributed Denial of Service Attack using Software Defined Network." Wright State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=wright1515067456228498.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Boström, Gustav. "Simplifying development of secure software : Aspects and Agile methods." Licentiate thesis, KTH, Numerical Analysis and Computer Science, NADA, 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-3913.

Full text
Abstract:
<p>Reducing the complexity of building secure software systems is an important goal as increased complexity can lead to more security flaws. This thesis aims at helping to reduce this complexity by investigating new programming techniques and software development methods for implementing secure software. We provide case studies on the use and effects of applying Aspect-oriented software development to Confidentiality, Access Control and Quality of Service implementation. We also investigate how eXtreme Programming can be used for simplifying the secure software development process by comparing it to the security engineering standards Common Criteria and the Systems Security Engineering Capability Maturity Model. We also explore the relationship between Aspect-oriented programming and Agile software development methods, such as eXtreme Programming.</p>
APA, Harvard, Vancouver, ISO, and other styles
43

Little, Timothy. "Critical success factors in software projects : a framework under scrutiny." Thesis, University of Skövde, Department of Computer Science, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-798.

Full text
Abstract:
<p>As a means of addressing the failure rate of information systems Aggestam (2001) proposes a framework which aims to guide organisations in the development of this type of software system. Software is a common concept today and can therefore be anticipated in contexts other than organisations. Examples of such contexts can be given as: embedded software, scientific software and personal computer software. The literature informs that 20% of these software projects are failures and 46% experience cost and schedule overruns. In an attempt to address this failure rate the aim of this report will be to investigate if the framework proposed by Aggestam (2001) can also be applied in this type of software project.</p><p>Through a comprehensive literature study success factors pertaining to software projects where an organisational information system has not been built have been identified. These factors have then provided the foundation for a deeper interview study. It has been shown that the framework displays promising potential for use in this type of software project. A stable groundwork has also been laid for continued research in this area.</p>
APA, Harvard, Vancouver, ISO, and other styles
44

Sama, Sanjana. "An Empirical Study Investigating Source Code Summarization Using Multiple Sources of Information." Youngstown State University / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1527673352984124.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Sarkar, Arkopaul. "Semantic Agent Based Process Planning for Distributed Cloud Manufacturing." Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1578585210407386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Rayo, Michael F. Jr. "Directive Displays: Supporting Human-machine Coordination by Dynamically Varying Representation, Information, and Interjection Strength." The Ohio State University, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=osu1373384199.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Thakur, Neha S. "Forensic Analysis of WhatsApp on Android Smartphones." ScholarWorks@UNO, 2013. http://scholarworks.uno.edu/td/1706.

Full text
Abstract:
Android forensics has evolved over time offering significant opportunities and exciting challenges. On one hand, being an open source platform Android is giving developers the freedom to contribute to the rapid growth of the Android market whereas on the other hand Android users may not be aware of the security and privacy implications of installing these applications on their phones. Users may assume that a password-locked device protects their personal information, but applications may retain private information on devices, in ways that users might not anticipate. In this thesis we will be concentrating on one such application called 'WhatsApp', a popular social networking application. We will be forming an outline on how forensic investigators can extract useful information from WhatsApp and from similar applications installed on an Android platform. Our area of focus is extraction and analysis of application user data from non-volatile external storage and the volatile memory (RAM) of an Android device.
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, Chao Gilbert Juan E. "CSSE document management system implementation and usability evaluation /." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/WANG_CHAO_41.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Nikfal, Mohammadreza. "Developing a Soil Moisture-Based Irrigation Scheduling Tool (SMIST) Using Web-GIS Technology." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157621/.

Full text
Abstract:
Software as a service (SaaS) is a primary working pattern and a significant application model for next generation Internet application. Web GIS services are the new generation of the Software as a service that can provide the hosted spatial data and GIS functionalities to the practical customized applications. This study focused on developing a webGIS based application, Soil Moisture-Based Irrigation Scheduling Tool (SMIST), for predicting soil moisture in the next seven days using the soil moisture diagnostic equation (SMDE) and the upcoming seven precipitation forecasts made by the National Weather Service (NWS), and ultimately producing an accurate irrigation schedule based on the predicted soil moisture. The SMIST is expected to be capable of improving the irrigation efficiency to protect groundwater resources in the Texas High Plains and reducing the cost of energy for pumping groundwater for irrigation, as an essential public concern in this area. The SMIST comprised an integration of web-based programs, a Hydrometeorological model, GIS, and geodatabase. It integrates two main web systems, the soil moisture estimating web application for irrigation scheduling based on the soil moisture diagnostic equation (SMDE), and an agricultural field delineation webGIS application to prepare input data and the model parameters. The SMIST takes advantage of the latest historical and forecasted precipitation data to predict soil moisture in the user-specified agricultural field(s). In this regard, the next seven days soil moisture versus the soil moisture threshold for normal growth would be presented in the result page of the SMIST to help users to adjust irrigation rate and sequence.
APA, Harvard, Vancouver, ISO, and other styles
50

Daniel, Michael M. "Multiresolution statistical modeling with application to modeling groundwater flow." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/10749.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.<br>Includes bibliographical references (p. 205-211).<br>by Michael M. Daniel.<br>Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!