To see the other types of publications on this topic, follow the link: Microsoft file.

Dissertations / Theses on the topic 'Microsoft file'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 20 dissertations / theses for your research on the topic 'Microsoft file.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Chong, Yew Meng. "Microsoft Windows tutorial." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/834636.

Full text
Abstract:
Back in May of 1990, Windows was brought into the arena of viable operating environment due to the significant improvements Windows 3.0 made over its predecessor, Windows 2.11. Windows 3.1, another significant upgrade, was released in May, 1992. As the popularity of Windows has soared, the number of applications developed specifically for Windows has also sky-rocketed. This has translated into a huge demand for Windows programmers.Writing Windows code, however, is never an easy task. In fact, Windows has the reputation of being easy for users but hard for programmers. The difficulties in learning to program in Windows plus the increasing number of beginning Windows programmers lead to an urgent need to provide a solution to the problem: How to ease the learning curve of Windows programming?This is thus the theme of the thesis: building a comprehensive on-line Windows programming tutorial that helps ease the daunting learning curve. Through the use of interesting illustrations, example programs with on-line explanations, this tutorial makes Windows programming easier and more fun to learn.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
2

Atger, Dominique. "A Turing machines simulator using a Microsoft Windows' interface." Virtual Press, 1993. http://liblink.bsu.edu/uhtbin/catkey/865965.

Full text
Abstract:
The purpose of this thesis is to develop a software system simulating Turing machines using a Microsoft Windows' Interface.Developed in the 1930's by Alan Turing and Emil Post, Turing machines are defined as "abstract computers" . These machines seem able to solve all problems a modern computer can solve, however complex the problems may be. A Turing machine is a basic computational model for algorithms.The software provides a practical tool to students with a relative notion of Turing machines. The software contains introduction and general information on Turing machines that gives the beginner enough background to use the program. The user can create, modify or run Turing machines saved onto MS-DOS files. Some examples of Turing machines are preloaded. These examples give more help to the beginner.An on-line help facility is provided in order to direct and inform the learning student at each level of the software.The Microsoft Windows' Interface makes the software easy and friendly to use. The software has the modularity which will ease any future enhancement.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
3

Lambert, Aric Brian. "A controller area network simulation application program for Microsoft Windows." Virtual Press, 1995. http://liblink.bsu.edu/uhtbin/catkey/958782.

Full text
Abstract:
My thesis is to design a Controlled Area Network (CAN) simulator For Microsoft Windows. In a modern world we deal with complex mechanical systems that require special electronic control to guarantee ultimate safety and efficiency. These electronic control systems are responsible for monitoring subsystems within the mechanical systems. A good example of this is the motor vehicles that are being driven on the road today. These vehicles have been designed with increased safety and efficiency, such as electronic controlled anti lock breaks, fuel injection, and power control steering. To run all of these components, the car needs a very well designed protocol to be able to control series of messages being passed from one subsystem to another. To determine which message being passed has higher priority than any other messages. To deal with such circumstances, the Controlled Area Network (CAN) was designed. The purpose of the CAN simulator is to gather statistical information concerning the arbitration, message transfer, error detection, error signaling, and retransmision. The CAN simulating model will consist of one to sixty nodes. Each node is considered as a subsystem for the CAN simulator. The subsystems will be characterized as the breaks, engine, transmission, or any part of a car which needs to be connected to the CAN system. Each node will send one to ten messages through the CAN system. The CAN system will take the messages from the nodes and place them into an Arrival queue. Each node will have its own Arrival queue, and no nodes can have two messages on the bus at the same time. The messages will be sorted in the queues in the order of the time needed to be released onto the bus. There will be an internal clock that will monitor the time for when the messages are needed to be placed onto the bus. If there is a situation where two messages need to be sent at the same time, the arbitrator will determine the priority of the messages to be placed onto the bus. Once the message is on the bus, it will go to a transfer queue. Periodically, there will be an error signal sent with the message that will be detected by the error detection, and it will be required that the message to be retransmitted. At critical points on the simulation, statistical information will be gathered for an analyzation. Some examples of information to be analyzed are 1) verification of the simulation performance on a single node with a single message, 2) network load which is a rate of a utilized bus time to the total bus time, 3) network throughput which is a total number of messages that are transmitted per second, and 4) average response time which will be the average time taken by all messages to gain bus access.PLATFORM DESCRIPTIONThe computer to be used in this project will be an Intel Pentum 100 with 16 megs RAM, two 853 megabyte harddrive, and a 17 inch super VGA monitor. The user interface will be windows 3.1 application. The compiling language to be used will be Microsoft Visual C++.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
4

Musatoiu, Mihai. "An approach to choosing the right distributed file system : Microsoft DFS vs. Hadoop DFS." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-844.

Full text
Abstract:
Context. An important goal of most IT groups is to manage server resources in such a way that their users are provided with fast, reliable and secure access to files. The modern needs of organizations imply that resources are often distributed geographically, asking for new design solutions for the file systems to remain highly available and efficient. This is where distributed file systems (DFSs) come into the picture. A distributed file system (DFS), as opposed to a "classical", local, file system, is accessible across some kind of network and allows clients to access files remotely as if they were stored locally. Objectives. This paper has the goal of comparatively analyzing two distributed file systems, Microsoft DFS (MSDFS) and Hadoop DFS (HDFS). The two systems come from different "worlds" (proprietary - Microsoft DFS - vs. open-source - Hadoop DFS); the abundance of solutions and the variety of choices that exist today make such a comparison more relevant. Methods. The comparative analysis is done on a cluster of 4 computers running dual-installations of Microsoft Windows Server 2012 R2 (the MSDFS environment) and Linux Ubuntu 14.04 (the HDFS environment). The comparison is done on read and write operations on files and sets of files of increasing sizes, as well as on a set of key usage scenarios. Results. Comparative results are produced for reading and writing operations of files of increasing size - 1 MB, 2 MB, 4 MB and so on up to 4096 MB - and of sets of small files (64 KB each) amounting to totals of 128 MB, 256 MB and so on up to 4096 MB. The results expose the behavior of the two DFSs on different types of stressful activities (when the size of the transferred file increases, as well as when the quantity of data is divided into (tens of) thousands of many small files). The behavior in the case of key usage scenarios is observed and analyzed. Conclusions. HDFS performs better at writing large files, while MSDFS is better at writing many small files. At read operations, the two show similar performance, with a slight advantage for MSDFS. In the key usage scenarios, HDFS shows more flexibility, but MSDFS could be the better choice depending on the needs of the users (for example, most of the common functions can be configured through the graphical user interface).
APA, Harvard, Vancouver, ISO, and other styles
5

Li, Mingrui. "On the size of induced subgraphs of hypercubes and a graphical user interface to graph theory." Virtual Press, 1993. http://liblink.bsu.edu/uhtbin/catkey/879847.

Full text
Abstract:
The hypercube is one of the most versatile and efficient networks yet discovered for parallel computation. It is well suited for both special-purpose and general-purpose tasks, and it can efficiently simulate many other networks of the same size. The size of subgraphs can be used to estimate the efficient communications of hypercube computer systems.The thesis investigates induced subgraphs of a hypercube, discusses sizes of subgraphs, and provides a formula to give bounds on the size of any subgraph of the hypercube.The concept of spanning graphs and line graphs is useful for studying properties of graphs. An MS WINDOWS based graphical system is developed which allows the creation and display of graphs and their spanning graphs, line graphs and super line graphs.
Department of Computer Science
APA, Harvard, Vancouver, ISO, and other styles
6

Zakumba, Lwazi Xolisile. "A case study on the role of excel as a teaching and learning tool in influencing learners' interpretation of functions." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1018756.

Full text
Abstract:
The aim of this study was to investigate the role Excel could play in influencing Mathematics and Mathematical literacy learners’ interpretation of functions and their attitude towards Mathematics. I used a Mathematical Graphical Diagnostic (MGD) test, an attitude questionnaire, a reflective questionnaire and semi-structured interviews as instruments. The MGD test and the attitude questionnaire were given to 72 volunteer grade 11 learners at a former Model C school in Port Elizabeth, in the Eastern Cape. This group included 50 pure Mathematics learners and 22 Mathematical literacy learners. From this group, a smaller group of 10 learners further took part in the rest of the study were they went through an intervention were Excel was used as a teaching tool, covering concepts concerning functions. This group included 6 pure Mathematics and 4 Mathematical literacy learners. The 10 learners then re-wrote the MDG test and refilled the attitude questionnaire after the intervention. A reflective questionnaire was administered to the 10 learners after the intervention, with 5 learners from the 10 undergoing interviews in order to meet the objectives of the study. The administration of the MDG test and attitude questionnaire, interviews and reflective questionnaire enabled me to explore the relationship between learner performance and their attitude towards Mathematics as a subject, as well as the comparing the attitudes and performances between pure Mathematics and Mathematical Literacy learners. The study followed a qualitative research design, with an element of quantitative research. The qualitative data yielded findings that revealed the effectiveness of using Excel in teaching functions while the quantitative data revealed the difference in attitude and ability between pure Mathematics and Mathematical Literacy leaners. The findings of the study revealed that Excel played a major role in improving pure Mathematics learners’ results but not those of the Mathematical Literacy learners. The study also showed that technology does not necessarily impact on learners’ attitudes positively.
APA, Harvard, Vancouver, ISO, and other styles
7

Carmichael, Tammy. "Teaching Two Children with Autism to Follow a Computer-Mediated Activity Schedule Utilizing Microsoft® PowerPoint® Presentation Software." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4896/.

Full text
Abstract:
Children with autism typically exhibit deficits in behavior and also in visual processing. Development and implementation of visually-cued instructional procedures, combined with electronic technology, have been used successfully to teach children with autism complex behavior chains. This study used photographic activity schedules on computer slideshow software to teach two children with autism to follow computer-mediated cues and engage in four play activities, and to transition between each activity in their homes without the presence of a trained behavior therapist. Results of this study demonstrated that these technologies can be utilized in children's homes to promote computer-mediated play behavior while eliminating the necessary cost of a home behavior therapist to prompt and supervise such activities.
APA, Harvard, Vancouver, ISO, and other styles
8

Murdock, Jennifer. "An Evaluation of the Accuracy of PowerPoint Prescriptions." Honors in the Major Thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/784.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf
Bachelors
Arts and Sciences
Organizational Communication
APA, Harvard, Vancouver, ISO, and other styles
9

Tsegaye, Melekam Asrat. "A comparative study of the Linux and windows device driver architecture with a focus on IEEE1394 (high speed serial bus) drivers." Thesis, Rhodes University, 2004. http://hdl.handle.net/10962/d1004829.

Full text
Abstract:
New hardware devices are continually being released to the public by hardware manufactures around the world. For these new devices to be usable under a PC operating system, device drivers that extend the functionality of the target operating system have to be constructed. This work examines and compares the device driver architectures currently in use by two of the most widely used operating systems, Microsoft’s Windows and Linux. The IEEE1394 (high speed serial bus) device driver stacks on each operating system are examined and compared as an example of a major device driver stack implementation, including driver requirements for the upcoming IEEE1394.1 bridging standard.
APA, Harvard, Vancouver, ISO, and other styles
10

Mobarak, Barbara Ann. "The development of a computer literacy curriculum for California charter schools." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2683.

Full text
Abstract:
To develop leaders for the 21st century, schools must be able to prepare students to meet the high academic, technical and workforce challenges. Charter schools are increasingly attempting to meet these challenges by educating students through innovative means and by creating effectual educational programs that are more conducive to the needs of the student. This document provides a computer literacy curriculum, which will facilitate student learning of computer literacy skills.
APA, Harvard, Vancouver, ISO, and other styles
11

Swales, Dylan. "A comparison of web-based technologies to serve images from an Oracle9i database." Thesis, Rhodes University, 2004. http://hdl.handle.net/10962/d1004380.

Full text
Abstract:
The nature of Internet and Intranet Web applications has changed from a static content-distribution medium into an interactive, dynamic medium, often used to serve multimedia from back-end object-relational databases to Web-enabled clients. Consequently, developers need to make an informed technological choice for developing software that supports a Web-based application for distributing multimedia over networks. This decision is based on several factors. Among the factors are ease of programming, richness of features, scalability, and performance. The research focuses on these key factors when distributing images from an Oracle9i database using Java Servlets, JSP, ASP, and ASP.NET as the server-side development technologies. Prototype applications are developed and tested within each technology: one for single image serving and the other for multiple image serving. A matrix of recommendations is provided to distinguish which technology, or combination of technologies, provides the best performance and development platform for image serving within the studied envirorunent.
KMBT_363
Adobe Acrobat 9.54 Paper Capture Plug-in
APA, Harvard, Vancouver, ISO, and other styles
12

Xie, Liquan. "Dynamic Report Generator." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2547.

Full text
Abstract:
This project describes DRG (Dynamic Report Generator). This program can be used on the internet to summarize the content of a database based on user criteria. DRG allows the user to choose a database, input the data, and generate a report based on user input, and print out the results in a new format. This paper describes the design and analysis of the DRG program.
APA, Harvard, Vancouver, ISO, and other styles
13

Hula, Miroslav. "Analýza registrů Microsoft Windows." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236938.

Full text
Abstract:
Understanding and working with Microsoft Windows registry is an important ability from the perspective of security. This ability is used by malicious software as well as by software, which repaires the damage caused by activity of malicious software. However, applications accessing and working with the registry are platform dependent, which may not always be convenient and it can lead to other problems if the platform is not secure. Therefore, the aim of this work is to create a platform independent application for accessing and working with registry, which makes possible to analyse the effect of malware on registry.
APA, Harvard, Vancouver, ISO, and other styles
14

Uppströmer, Viktor, and Henning Råberg. "Detecting Lateral Movement in Microsoft Active Directory Log Files : A supervised machine learning approach." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18337.

Full text
Abstract:
Cyberattacker utgör ett stort hot för dagens företag och organisationer, med engenomsnittlig kostnad för ett intrång på ca 3,86 miljoner USD. För att minimera kostnaden av ett intrång är det viktigt att detektera intrånget i ett så tidigt stadium som möjligt. Avancerande långvariga hot (APT) är en sofistikerad cyberattack som har en lång närvaro i offrets nätverk. Efter attackerarens första intrång kommer fokuset av attacken skifta till att få kontroll över så många enheter som möjligt på nätverket. Detta steg kallas för lateral rörelse och är ett av de mest kritiska stegen i en APT. Syftet med denna uppsats är att undersöka hur och hur väl lateral rörelse kan upptäckas med hjälp av en maskininlärningsmetod. I undersökningen jämförs och utvärderas fem maskininlärningsalgoritmer med upprepad korsvalidering följt av statistisk testning för att bestämma vilken av algoritmerna som är bäst. Undersökningen konkluderar även vilka attributer i det undersökta datasetet som är väsentliga för att detektera laterala rörelser. Datasetet kommer från en Active Directory domänkontrollant där datasetets attributer är skapade av korrelerade loggar med hjälp av datornamn, IP-adress och användarnamn. Datasetet består av en syntetisk, samt, en verklig del vilket skapar ett semi-syntetiskt dataset som innehåller ett multiklass klassifierings problem. Experimentet konkluderar att all fem algoritmer klassificerar rätt med en pricksäkerhet (accuracy) på 0.998. Algoritmen RF presterar med den högsta f-measure (0.88) samt recall (0.858), SVM är bäst gällande precision (0.972) och DT har denlägsta inlärningstiden (1237ms). Baserat på resultaten indikerar undersökningenatt algoritmerna RF, SVM och DT presterar bäst i olika scenarier. Till exempel kan SVM användas om en låg mängd falsk positiva larm är viktigt. Om en balanserad prestation av de olika prestanda mätningarna är viktigast ska RF användas. Undersökningen konkluderar även att en stor mängd utav de undersökta attributerna av datasetet kan bortses i framtida experiment, då det inte påverkade prestandan på någon av algoritmerna.
Cyber attacks raise a high threat for companies and organisations worldwide. With the cost of a data breach reaching $3.86million on average, the demand is high fora rapid solution to detect cyber attacks as early as possible. Advanced persistent threats (APT) are sophisticated cyber attacks which have long persistence inside the network. During an APT, the attacker will spread its foothold over the network. This stage, which is one of the most critical steps in an APT, is called lateral movement. The purpose of the thesis is to investigate lateral movement detection with a machine learning approach. Five machine learning algorithms are compared using repeated cross-validation followed statistical testing to determine the best performing algorithm and feature importance. Features used for learning the classifiers are extracted from Active Directory log entries that relate to each other, with a similar workstation, IP, or account name. These features are the basis of a semi-synthetic dataset, which consists of a multiclass classification problem. The experiment concludes that all five algorithms perform with an accuracy of 0.998. RF displays the highest f1-score (0.88) and recall (0.858), SVM performs the best with the performance metric precision (0.972), and DT has the lowest computational cost (1237ms). Based on these results, the thesis concludes that the algorithms RF, SVM, and DT perform best in different scenarios. For instance, SVM should be used if a low amount of false positives is favoured. If the general and balanced performance of multiple metrics is preferred, then RF will perform best. The results also conclude that a significant amount of the examined features can be disregarded in future experiments, as they do not impact the performance of either classifier.
APA, Harvard, Vancouver, ISO, and other styles
15

McCaughey, John Paul Jr. "Smarter Than We Are Wise." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339644686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Viktorin, Martin. "Programová podpora definování projektu s využitím LFM (Logical Frame Method)." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235896.

Full text
Abstract:
The purpose of this work is to design and implement software support for Project Definition of LFM (Logical Frame Method). The first part is about project management and about necessity to use it for solving projects. There is description of phases of project and detailed description of logical frame method. In the second part there is system requirements analysis, description of the application via UML and implementation of application which was created in development environment Microsoft Visual Studio 2005 in C# language. There is a short summary, possible extensions and comparing with existing applications in the end of the work.
APA, Harvard, Vancouver, ISO, and other styles
17

Hsu, Feng-chih, and 許峰誌. "Steganographic Research on Commonly-Used Document - Microsoft Word Document File." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/62426964015311705764.

Full text
Abstract:
碩士
逢甲大學
資訊工程所
96
Many results have been obtained for data hiding in some specific files, especially for different image file formats. On the other hand, there is very few work on document files. In this work, we plan to study data hiding on Word file; this is most common document file used in our daily life. We propose some new schemes that allow us to hide data in this type of file. Together with those known techniques for images, our work will provide a data hiding frame that makes detection much more difficult for Word document file.
APA, Harvard, Vancouver, ISO, and other styles
18

Joubert, Tinus. "Auditing Windows 2000 : methodologies and issues." Thesis, 2012. http://hdl.handle.net/10210/4338.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Johnston, James. "A framework for secure human computer interaction." Thesis, 2008. http://hdl.handle.net/10210/493.

Full text
Abstract:
This research is concerned with the development of a framework for the analysis and design of interfaces found in a security environment. An example of such an interface is a firewall. The purpose of this research is to use the framework as a method to improve the usability of an interface, thus aiding the user to implement the correct security features. The purpose is also to use the framework to assist in the development of trust between a user and a computer system. In this research the framework comprises six criteria which are used to analyse interfaces found in the traditional software environment, Internet banking environment and e-commerce environment. In order to develop the framework an overview of the fields of information security and human computer interfaces (HCI) is given. The overview provides background information and also establishes the existing research which has been done in these fields. Due to its popularity, the Windows Internet Connection Firewall is analysed in this research. Based on the criteria a level of trust fostered between the user and interface is calculated for the firewall. It is then shown how this level of trust can be improved by modifying the interface. A proposed interface for the firewall is presented according to the criteria. Interfaces found in the online Internet environment are discussed. This is important in order to identify the similarities and differences between traditional software interfaces and web interfaces. Due to these differences the criteria are modified to be relevant in the analysis and design of security interfaces found on the Internet. Three South African online banking websites are analysed according to the modified framework. Each interface is broken down into a number of components which are then analysed individually. The results of the analysis are compared between the three banking sites to identify the elements which make up a successful interface in an online banking environment. Lastly, three interfaces of e-commerce websites are analysed. Recommendations are made on how the interfaces can be improved, thus leading to a higher level of trust.
Labuschagne, L., Prof.
APA, Harvard, Vancouver, ISO, and other styles
20

Zhang, Weiwei. "Technology in college classrooms : an action research examining the use of PowerPoint in ELL classrooms." Thesis, 2012. http://hdl.handle.net/1957/29048.

Full text
Abstract:
This research looks at the use of PowerPoint as an instructional tool for teaching English language learners (ELL) who studied in a language program at a state university in the Pacific Northwest. The purpose of the research was to discover and to explore the perceptions of PowerPoint supported teaching and learning that were held by the students, the instructors, and the student researcher. PowerPoint is one of the most commonly used technologies in classrooms, and its projection on screens has become a fundamental part of many students' daily routine. The basic design of this research study is based on Stringer's (2004) action research model, which operates on a repeated circle of reflecting, planning, acting and observing. This action research was generated by all participants, guided by instructors, and monitored by the planned objectives of the study's outcomes. A constructivist approach was used to understand the process of teaching and learning with PowerPoint, and feedback (questionnaires, interviews, and personal communications) was collected from the students in order to help instructors and the student researcher to determine the students' needs. There are four main sets of data in this study—data from students' questionnaires, from students' interviews, from instructors' interviews, and from the student researcher's classroom observations. Students were given questionnaires at the ends of weeks two to ten, and two students from each class were selected to be interviewed. Instructors were interviewed both at the beginning and at the end of the term. The student researcher observed all classes starting week two, and wrote notes which were included as part of the data.
Graduation date: 2012
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography