Siga este link para ver outros tipos de publicações sobre o tema: Electronic digital computers Evaluation.

Teses / dissertações sobre o tema "Electronic digital computers Evaluation"

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "Electronic digital computers Evaluation".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.

1

Fernandez, Sepulveda Antonio. "Evaluation of digital identity using Windows CardSpace." Thesis, Edinburgh Napier University, 2008. http://researchrepository.napier.ac.uk/output/4032/.

Texto completo da fonte
Resumo:
The Internet was initially created for academic purposes, and due to its success, it has been extended to commercial environments such as e-commerce, banking, and email. As a result, Internet crime has also increased. This can take many forms, such as: personal data theft; impersonation of identity; and network intrusions. Systems of authentication such as username and password are often insecure and difficult to handle when the user has access to a multitude of services, as they have to remember many different authentications. Also, other more secure systems, such as security certificates and
Estilos ABNT, Harvard, Vancouver, APA, etc.
2

Grove, Duncan A. "Performance modelling of message-passing parallel programs." Title page, contents and abstract only, 2003. http://web4.library.adelaide.edu.au/theses/09PH/09phg8832.pdf.

Texto completo da fonte
Resumo:
This dissertation describes a new performance modelling system, called the Performance Evaluating Virtual Parallel Machine (PEVPM). It uses a novel bottom-up approach, where submodels of individual computation and communication events are dynamically constructed from data-dependencies, current contention levels and the performance distributions of low-level operations, which define performance variability in the face of contention.
Estilos ABNT, Harvard, Vancouver, APA, etc.
3

Surma, David Ray 1963. "Design and performance evaluation of parallel architectures for image segmentation processing." Thesis, The University of Arizona, 1989. http://hdl.handle.net/10150/277042.

Texto completo da fonte
Resumo:
The design of parallel architectures to perform image segmentation processing is given. In addition, the various designs are evaluated as to their performance, and a discussion of an optimal design is given. In this thesis, a set of eight segmentation algorithms has been provided as a starting point. Four of these algorithms will be evaluated and partitioned using two techniques. From this study of partitioning and considering the data flow through the total system, architectures utilizing parallel techniques will be derived. Timing analysis using pen and paper techniques will be given on the
Estilos ABNT, Harvard, Vancouver, APA, etc.
4

Parker, Brandon S. "CLUE: A Cluster Evaluation Tool." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5444/.

Texto completo da fonte
Resumo:
Modern high performance computing is dependent on parallel processing systems. Most current benchmarks reveal only the high level computational throughput metrics, which may be sufficient for single processor systems, but can lead to a misrepresentation of true system capability for parallel systems. A new benchmark is therefore proposed. CLUE (Cluster Evaluator) uses a cellular automata algorithm to evaluate the scalability of parallel processing machines. The benchmark also uses algorithmic variations to evaluate individual system components' impact on the overall serial fraction and efficie
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

Shultes, Bruce Chase. "Regenerative techniques for estimating performance measures of highly dependable systems with repairs." Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/25035.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
6

Demir, Ali. "Real-time 2d/3d Display Of Dted Maps And Evaluation Of Interpolation Algorithms." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/3/12611729/index.pdf.

Texto completo da fonte
Resumo:
In Geographic Information System (GIS) applications, aster data constitutes one of the major data types. The displaying of the raster data has an important part in GIS applications. Digital Terrain Elevation Data (DTED) is one of the raster data types, which is used as the main data source in this thesis. The DTED data is displayed on the screen as digital images as a pixel value, which is represented in gray scale, corresponding to an elevation (texel). To draw the images, the texel values are mostly interpolated in order to perform zoom-in and/or zoom-out operations on the concerned area. W
Estilos ABNT, Harvard, Vancouver, APA, etc.
7

Codrescu, Lucian. "An evaluation of the Pica architecture for an object recognition application." Thesis, Georgia Institute of Technology, 1998. http://hdl.handle.net/1853/15483.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
8

Weingartner, Stephan G. "System development : an algorithmic approach." Virtual Press, 1987. http://liblink.bsu.edu/uhtbin/catkey/483077.

Texto completo da fonte
Resumo:
The subject chosen to develop this thesis project on is developing an algorithm or methodology for system selection. The specific problem studied involves a procedure to determine anion computer system alternative is the best choice for a given user situation.The general problem to be addressed is the need for one to choose computing hardware, software, systems, or services in a -Logical approach from a user perspective, considering cost, performance and human factors. Most existing methods consider only cost and performance factors, combining these factors in ad hoc, subjective fashions to re
Estilos ABNT, Harvard, Vancouver, APA, etc.
9

Ali, Muhammad Usman, and Muhammad Aasim. "Usability Evaluation of Digital Library BTH a case study." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6140.

Texto completo da fonte
Resumo:
Libraries have for hundreds of years been an important entity for every kind of institute, especially in the educational sector. So now it is an age of computers and internet. People are now using electronic resources to fulfill their needs and requirements of their life. Therefore libraries have also converted to computerized systems. People can access and use library resources just sitting at their computers by using the internet. This modern way of running a library has been called or given the name of digital libraries. Digital libraries are getting famous for flexibility of use and becaus
Estilos ABNT, Harvard, Vancouver, APA, etc.
10

Piotrowski, Kathleen Ann. "A Feasibility Evaluation of a Digital Pen and Paper System for Accomplishing Electronic Anesthesia Record-keeping." Diss., The University of Arizona, 2011. http://hdl.handle.net/10150/202988.

Texto completo da fonte
Resumo:
In 2001, the Institute of Medicine stated that one of the parameters needing to be addressed to improve health care was the creation of electronic health records for all patients. This goal has proven to be very challenging to health care providers. Many barriers exist that prevent the goal of computerizing health records such as high costs, usability problems, interface incompatibility, and fear of change. The purpose of this feasibility project was to evaluate the usefulness and acceptability of a digital pen and paper (DPP) system for anesthesia documentation. The specific DPP technology u
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

De, Pellegrini Martin. "Mobile-based 3D modeling : An indepth evaluation for the application to maintenance and supervision." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-298024.

Texto completo da fonte
Resumo:
Indoor environment modeling has become a relevant topic in several applications fields including Augmented, Virtual and Mixed Reality. Furthermore, with the Digital Transformation, many industries have moved toward this technology trying to generate detailed models of an environment allowing the viewers to navigate through it or mapping surfaces to insert virtual elements in a real scene. Therefore, this Thesis project has been conducted with the purpose to review well- established deterministic methods for 3D scene reconstruction and researching the state- of- the- art, such as machine learni
Estilos ABNT, Harvard, Vancouver, APA, etc.
12

Thakar, Aniruddha. "Visualization feedback from informal specifications." Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-03242009-040810/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
13

Khayeat, Ali. "Copy-move forgery detection in digital images." Thesis, Cardiff University, 2017. http://orca.cf.ac.uk/107043/.

Texto completo da fonte
Resumo:
The ready availability of image-editing software makes it important to ensure the authenticity of images. This thesis concerns the detection and localization of cloning, or Copy-Move Forgery (CMF), which is the most common type of image tampering, in which part(s) of the image are copied and pasted back somewhere else in the same image. Post-processing can be used to produce more realistic doctored images and thus can increase the difficulty of detecting forgery. This thesis presents three novel methods for CMF detection, using feature extraction, surface fitting and segmentation. The Dense Sc
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Groves, Michael Peter. "A soliton circuit design system /." Title page, contents and summary only, 1987. http://web4.library.adelaide.edu.au/theses/09PH/09phg884.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
15

Ghahroodi, Massoud. "Variation and reliability in digital CMOS circuit design." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/365136/.

Texto completo da fonte
Resumo:
The silicon chip industry continues to provide devices with feature sizes at Ultra-Deep-Sub-Micron (UDSM) dimensions. This results in higher device density and lower power and cost per function. While this trend is positive, there are a number of negative side effects, including the increased device parameter variation, increased sensitivity to soft errors, and lower device yields. The lifetime of next- generation devices is also decreasing due to lower reliability margins and shorter product lifetimes. This thesis presents an investigation into the challenges of UDSM CMOS circuit design, with
Estilos ABNT, Harvard, Vancouver, APA, etc.
16

Brower, Bernard V. "Evaluation of digital image compression algorithms for use on laptop computers /." Online version of thesis, 1992. http://hdl.handle.net/1850/11893.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
17

Williams, Dewi L. (Dewi Lloyd) Carleton University Dissertation Engineering Electrical. "A Functional-test specification language." Ottawa, 1988.

Encontre o texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Lima, Antonio. "Digital traces of human mobility and interaction : models and applications." Thesis, University of Birmingham, 2016. http://etheses.bham.ac.uk//id/eprint/6833/.

Texto completo da fonte
Resumo:
In the last decade digital devices and services have permeated many aspects of everyday life. They generate massive amounts of data that provide insightful information about how people move across geographic areas and how they interact with others. By analysing this detailed information, it is possible to investigate aspects of human mobility and interaction. Therefore, the thesis of this dissertation is that the analysis of mobility and interaction traces generated by digital devices and services, at different timescales and spatial granularity, can be used to gain a better understanding of h
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Betts, Thomas. "An investigation of the digital sublime in video game production." Thesis, University of Huddersfield, 2014. http://eprints.hud.ac.uk/id/eprint/25020/.

Texto completo da fonte
Resumo:
This research project examines how video games can be programmed to generate the sense of the digital sublime. The digital sublime is a term proposed by this research to describe experiences where the combination of code and art produces games that appear boundless and autonomous. The definition of this term is arrived at by building on various texts and literature such as the work of Kant, Deleuze and Wark and on video games such as Proteus, Minecraft and Love. The research is based on the investigative practice of my work as an artist-programmer and demonstrates how games can be produced to
Estilos ABNT, Harvard, Vancouver, APA, etc.
20

Ligon, Walter Batchelor III. "An empirical evaluation of architectural reconfigurability." Diss., Georgia Institute of Technology, 1992. http://hdl.handle.net/1853/8204.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
21

Jayasinghe, U. U. K. "Trust evaluation in the IoT environment." Thesis, Liverpool John Moores University, 2018. http://researchonline.ljmu.ac.uk/9451/.

Texto completo da fonte
Resumo:
Along with the many benefits of IoT, its heterogeneity brings a new challenge to establish a trustworthy environment among the objects due to the absence of proper enforcement mechanisms. Further, it can be observed that often these encounters are addressed only concerning the security and privacy matters involved. However, such common network security measures are not adequate to preserve the integrity of information and services exchanged over the internet. Hence, they remain vulnerable to threats ranging from the risks of data management at the cyber-physical layers, to the potential discri
Estilos ABNT, Harvard, Vancouver, APA, etc.
22

Pattanaphanchai, Jarutas. "Trustworthiness of Web information evaluation framework." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/370596/.

Texto completo da fonte
Resumo:
Assessing the quality of information on the Web is a challenging issue for at least two reasons. Firstly, there is little control over publishing quality. Secondly, when assessing the trustworthiness of Web pages, users tend to base their judgements upon subjective criteria such as the visual presentation of the website, rather than rigorous criteria such as the author's qualifications or the source's review process. As a result, Web users tend to make incorrect assessments of the trustworthiness of the Web information they are consuming. Also, they are uncertain of their ability to make a dec
Estilos ABNT, Harvard, Vancouver, APA, etc.
23

Ho, Chun-yin. "Group-based checkpoint/rollback recovery for large scale message-passing systems." Click to view the E-thesis via HKUTO, 2008. http://sunzi.lib.hku.hk/hkuto/record/B39794052.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Vasudevan, Vivek. "Evaluation of the separation involved in recycling end-of-life (EOL) electronic equipment." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=45.

Texto completo da fonte
Resumo:
Thesis (M.S.)--West Virginia University, 2004.<br>Title from document title page. Document formatted into pages; contains xi, 92 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 74-76).
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Saliou, Lionel. "Network firewall dynamic performance evaluation and formalisation." Thesis, Edinburgh Napier University, 2009. http://researchrepository.napier.ac.uk/Output/2599.

Texto completo da fonte
Resumo:
Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to computer network security, but equally an organisation must be able to determine whether its security policy is achievable and under which criteria. Yet, it is not often possible for an organisation: to define its security policy, especially to fully comply with the laws of the land; ensure the actual implementation on network devices; and finally audit the overall system for compliance. This thesis argues that one of th
Estilos ABNT, Harvard, Vancouver, APA, etc.
26

Pelletingeas, Christophe. "Performance evaluation of virtualization with cloud computing." Thesis, Edinburgh Napier University, 2010. http://researchrepository.napier.ac.uk/Output/4010.

Texto completo da fonte
Resumo:
Cloud computing has been the subject of many researches. Researches shows that cloud computing permit to reduce hardware cost, reduce the energy consumption and allow a more efficient use of servers. Nowadays lot of servers are used inefficiently because they are underutilized. The uses of cloud computing associate to virtualization have been a solution to the underutilisation of those servers. However the virtualization performances with cloud computing cannot offers performances equal to the native performances. The aim of this project was to study the performances of the virtualization with
Estilos ABNT, Harvard, Vancouver, APA, etc.
27

Celestini, Alessandro. "On the analysis and evaluation of trust and reputation systems." Thesis, IMT Alti Studi Lucca, 2013. http://e-theses.imtlucca.it/114/1/Celestini_phdthesis.pdf.

Texto completo da fonte
Resumo:
In recent years, we have witnessed an increasing use of trust and reputation systems in different areas of ICT. The idea at the base of trust and reputation systems is of letting users to rate the provided services after each interaction. Other users may use aggregate ratings to compute reputation scores for a given party. The computed reputation scores are a collective measure of parties trustworthiness and are used to drive parties interactions. Due to the widespread use of reputation systems, research work on them is intensifying and several models have been proposed. This calls for a me
Estilos ABNT, Harvard, Vancouver, APA, etc.
28

Rudman, Hannah. "A framework for the transformation of the creative industries in a digital age." Thesis, Edinburgh Napier University, 2015. http://researchrepository.napier.ac.uk/Output/8866.

Texto completo da fonte
Resumo:
The creative industries sector faces a constantly changing context characterised by the speed of the development and deployment of digital information systems and Information Communications Technologies (ICT) on a global scale. This continuous digital disruption has had significant impact on the whole value chain of the sector: creation and production; discovery and distribution; and consumption of cultural goods and services. As a result, creative enterprises must evolve business and operational models and practices to be sustainable. Enterprises of all scales, type, and operational model are
Estilos ABNT, Harvard, Vancouver, APA, etc.
29

Kwon, Hyosun. "From ephemerality to delicacy : applying delicacy in the design space of digital gifting." Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/46705/.

Texto completo da fonte
Resumo:
We encounter uncountable ephemeral phenomena in everyday life. Some of them are particularly appreciated for their ungraspable beauty and limited availability. From the outset, one strand of computing technology has evolved to encapsulate and preserve this transient experience. A myriad of digital devices has been developed to capture the fleeting moments and to store as digital files for later use, edit, share, and distribute. On the other hand, a portion of Human-Computer Interaction (HCI) research has engaged in adopting the transience of temporal phenomena in the design of interactive comp
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Blair, Stuart Andrew. "On the classification and evaluation of prefetching schemes." Thesis, University of Glasgow, 2003. http://theses.gla.ac.uk/2274/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
31

Miehling, Mathew J. "Correlation of affiliate performance against web evaluation metrics." Thesis, Edinburgh Napier University, 2014. http://researchrepository.napier.ac.uk/Output/7250.

Texto completo da fonte
Resumo:
Affiliate advertising is changing the way that people do business online. Retailers are now offering incentives to third-party publishers for advertising goods and services on their behalf in order to capture more of the market. Online advertising spending has already over taken that of traditional advertising in all other channels in the UK and is slated to do so worldwide as well [1]. In this highly competitive industry, the livelihood of a publisher is intrinsically linked to their web site performance. Understanding the strengths and weaknesses of a web site is fundamental to improving its
Estilos ABNT, Harvard, Vancouver, APA, etc.
32

Maguire, Joseph Noel. "An ecologically valid evaluation of an observation-resilient graphical authentication mechanism." Thesis, University of Glasgow, 2013. http://theses.gla.ac.uk/4708/.

Texto completo da fonte
Resumo:
Alphanumeric authentication, by means of a secret, is not only a powerful mechanism, in theory, but prevails over all its competitors in reality. Passwords, as they are more commonly known, have the potential to act as a fairly strong gateway. In practice, though, password usage is problematic. They are (1) easily shared, (2) trivial to observe and (3) maddeningly elusive when forgotten. Moreover, modern consumer devices only exacerbate the problems of passwords as users enter them in shared spaces, in plain view, on television screens, on smartphones and on tablets. Asterisks may obfuscate al
Estilos ABNT, Harvard, Vancouver, APA, etc.
33

Almutiq, Mutiq Mohammed. "An evaluation model for information security strategies in healthcare data systems." Thesis, Keele University, 2018. http://eprints.keele.ac.uk/5595/.

Texto completo da fonte
Resumo:
This thesis presents a newly developed evaluation model, EMISHD (An "Evaluation Model for Information Security Strategies in Healthcare Data Systems") which can address the specific requirements of information security in healthcare sector. Based on a systematic literature review and case study, the information security requirements and the existing evaluation models used to examine the information security strategies of healthcare data systems have been analysed. The requirements of information security in any sector generally vary in line with changes in laws and regulations, and the emergen
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Ho, Chun-yin, and 何俊賢. "Group-based checkpoint/rollback recovery for large scale message-passing systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B39794052.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
35

Leelanupab, Teerapong. "A ranking framework and evaluation for diversity-based retrieval." Thesis, University of Glasgow, 2012. http://theses.gla.ac.uk/3442/.

Texto completo da fonte
Resumo:
There has been growing momentum in building information retrieval (IR) systems that consider both relevance and diversity of retrieved information, which together improve the usefulness of search results as perceived by users. Some users may genuinely require a set of multiple results to satisfy their information need as there is no single result that completely fulfils the need. Others may be uncertain about their information need and they may submit ambiguous or broad (faceted) queries, either intentionally or unintentionally. A sensible approach to tackle these problems is to diversify sear
Estilos ABNT, Harvard, Vancouver, APA, etc.
36

Song, Chunlin. "A robust region-adaptive digital image watermarking system." Thesis, Liverpool John Moores University, 2012. http://researchonline.ljmu.ac.uk/6122/.

Texto completo da fonte
Resumo:
Digital image watermarking techniques have drawn the attention of researchers and practitioners as a means of protecting copyright in digital images. The technique involves a subset of information-hiding technologies, which work by embedding information into a host image without perceptually altering the appearance of the host image. Despite progress in digital image watermarking technology, the main objectives of the majority of research in this area remain improvements in the imperceptibility and robustness of the watermark to attacks. Watermark attacks are often deliberately applied to a wa
Estilos ABNT, Harvard, Vancouver, APA, etc.
37

Chen-Wilson, Lisha. "eCert : a secure and user centric edocument transmission protocol : solving the digital signing practical issues." Thesis, University of Southampton, 2013. https://eprints.soton.ac.uk/369983/.

Texto completo da fonte
Resumo:
Whilst our paper-based records and documents are gradually being digitized, security concerns about how such electronic data is stored, transmitted, and accessed have increased rapidly. Although the traditional digital signing method can be used to provide integrity, authentication, and non-repudiation for signed eDocuments, this method does not address all requirements, such as fine-grained access control and content status validation. What is more, information owners have increasing demands regarding their rights of ownership. Therefore, a secure user-centric eDocument management system is e
Estilos ABNT, Harvard, Vancouver, APA, etc.
38

Lee, Sae Hun. "A unified approach to optimal multiprocessor implementations from non-parallel algorithm specifications." Diss., Georgia Institute of Technology, 1986. http://hdl.handle.net/1853/16745.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Blanke, Tobias. "Theoretical evaluation of XML retrieval." Thesis, University of Glasgow, 2011. http://theses.gla.ac.uk/2828/.

Texto completo da fonte
Resumo:
This thesis develops a theoretical framework to evaluate XML retrieval. XML retrieval deals with retrieving those document parts that specifically answer a query. It is concerned with using the document structure to improve the retrieval of information from documents by only delivering those parts of a document an information need is about. We define a theoretical evaluation methodology based on the idea of `aboutness' and apply it to XML retrieval models. Situation Theory is used to express the aboutness proprieties of XML retrieval models. We develop a dedicated methodology for the evaluatio
Estilos ABNT, Harvard, Vancouver, APA, etc.
40

Suh, Taeweon. "Integration and Evaluation of Cache Coherence Protocols for Multiprocessor SoCs." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14065.

Texto completo da fonte
Resumo:
System-on-a-chip (SoC) designs is characterized by heavy reuse of IP blocks to satisfy specific computing needs for target applications, reduce overall design cost, and expedite time-to-market. To meet their performance goal and cost constraint, SoC designers integrate multiple, sometimes heterogeneous, processor IPs to perform particular functions. This design approach is called Multiprocessor SoC (MPSoC). In this thesis, I investigated generic methodologies for enabling efficient communication among heterogeneous processors and quantified the efficiency of coherence traffic. Hardware techniq
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Corus, Dogan. "Runtime analysis of evolutionary algorithms with complex fitness evaluation mechanisms." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/48421/.

Texto completo da fonte
Resumo:
Evolutionary algorithms (EAs) are bio-inspired general purpose optimisation methods which are applicable to a wide range of problems. The performance of an EA can vary considerably according to the problem it tackles. Runtime analyses of EAs rigorously prove bounds on the expected computational resources required by the EA to solve a given problem. A crucial component of an EA is the way it evaluates the quality (i.e. fitness) of candidate solutions. Different fitness evaluation methods may drastically change the efficiency of a given EA. In this thesis, the effects of different fitness evalua
Estilos ABNT, Harvard, Vancouver, APA, etc.
42

Abdulla, Alan Anwer. "Exploiting similarities between secret and cover images for improved embedding efficiency and security in digital steganography." Thesis, University of Buckingham, 2015. http://bear.buckingham.ac.uk/149/.

Texto completo da fonte
Resumo:
The rapid advancements in digital communication technology and huge increase in computer power have generated an exponential growth in the use of the Internet for various commercial, governmental and social interactions that involve transmission of a variety of complex data and multimedia objects. Securing the content of sensitive as well as personal transactions over open networks while ensuring the privacy of information has become essential but increasingly challenging. Therefore, information and multimedia security research area attracts more and more interest, and its scope of application
Estilos ABNT, Harvard, Vancouver, APA, etc.
43

Cooper, Simon. "DISE : a game technology-based digital interactive storytelling framework." Thesis, Liverpool John Moores University, 2011. http://researchonline.ljmu.ac.uk/6101/.

Texto completo da fonte
Resumo:
This thesis details the design and implementation of an Interactive Storytelling Framework. Using software engineering methodology and framework development methods, we aim to design a full Interactive Storytelling system involving a story manager, a character engine, an action engine, a planner, a 3D game engine and a set of editors for story data, world environment modelling and real-time character animation. The framework is described in detail and specified to meet the requirement of bringing a more dynamic real-time interactive story experience to the medium of computer games. Its core co
Estilos ABNT, Harvard, Vancouver, APA, etc.
44

Majeed, Taban Fouad. "Segmentation, super-resolution and fusion for digital mammogram classification." Thesis, University of Buckingham, 2016. http://bear.buckingham.ac.uk/162/.

Texto completo da fonte
Resumo:
Mammography is one of the most common and effective techniques used by radiologists for the early detection of breast cancer. Recently, computer-aided detection/diagnosis (CAD) has become a major research topic in medical imaging and has been widely applied in clinical situations. According to statics, early detection of cancer can reduce the mortality rates by 30% to 70%, therefore detection and diagnosis in the early stage are very important. CAD systems are designed primarily to assist radiologists in detecting and classifying abnormalities in medical scan images, but the main challenges hi
Estilos ABNT, Harvard, Vancouver, APA, etc.
45

Koutsouras, Panagiotis. "Crafting content : the discovery of Minecraft's invisible digital economy." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/51744/.

Texto completo da fonte
Resumo:
This thesis presents an ethnographic study that aims at explicating the work of creating content in Minecraft. The existing literature paves the way in understanding Minecraft’s community by providing fragments of what players do. However, the game is studied mainly from a ludic perspective or is treated as a resource to explore distinct research agendas, instead of a field of study in itself. As such, particular phenomena that are situated inside Minecraft’s community are lost. The conducted fieldwork discovered the invisible digital economy that is part of this community. More specifically,
Estilos ABNT, Harvard, Vancouver, APA, etc.
46

Moss, William B. "Evaluating inherited attributes using Haskell and lazy evaluation." Diss., Connect to the thesis, 2005. http://hdl.handle.net/10066/1486.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
47

Pettitt, Michael Andrew. "Visual demand evaluation methods for in-vehicle interfaces." Thesis, University of Nottingham, 2008. http://eprints.nottingham.ac.uk/10436/.

Texto completo da fonte
Resumo:
Advancements in computing technology have been keenly felt in the automotive industry. Novel in-car systems have the potential to substantially improve the safety, efficiency and comfort of the driving experience. However, they must be carefully designed, so their use does not dangerously distract drivers from fundamental, safety-critical driving tasks. Distraction is a well-established causal factor in road accidents. A concern is that the introduction of new in-vehicle technology may increase exposure to distraction, and lead to an increase in distraction-related accidents. The range of syst
Estilos ABNT, Harvard, Vancouver, APA, etc.
48

Greenwood, Rob. "Semantic analysis for system level design automation." Thesis, This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-10062009-020216/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
49

Maache, Ahmed. "A prototype parallel multi-FPGA accelerator for SPICE CMOS model evaluation." Thesis, University of Southampton, 2011. https://eprints.soton.ac.uk/173435/.

Texto completo da fonte
Resumo:
Due to ever increasing complexity of circuits, EDA tools and algorithms are demanding more computational power. This made transistor-level simulation a growing bottleneck in the circuit development process. This thesis serves as a proof of concept to evaluate and quantify the cost of using multi-FPGA systems in SPICE-like simulations in terms of acceleration, throughput, area, and power. To this end, a multi-FPGA architecture is designed to exploit the inherent parallelism in the device model evaluation phase within the SPICE simulator. A code transformation flow which converts the high-level
Estilos ABNT, Harvard, Vancouver, APA, etc.
50

Newman, Kimberly Eileen. "A parallel digital interconnect test methodology for multi-chip module substrate networks." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/13847.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Oferecemos descontos em todos os planos premium para autores cujas obras estão incluídas em seleções literárias temáticas. Contate-nos para obter um código promocional único!