Добірка наукової літератури з теми "Architecture IdO"

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Architecture IdO".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Статті в журналах з теми "Architecture IdO":

1

Beaudoin, Luc, Monika Pudło, and Sylwia Hyniewska. "Mental Perturbance." SFU Educational Review 13, no. 1 (August 21, 2020): 29–58. http://dx.doi.org/10.21810/sfuer.v13i1.1282.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Understanding intrusive mentation, rumination, obsession, and worry, known also as "repetitive thought" (RT), is important for understanding cognitive and affective processes in general. RT is of transdiagnostic significance—for example obsessive-compulsive disorder, insomnia and addictions involve counterproductive RT. It is also a key but under-acknowledged feature of emotional episodes. We argue that RT cannot be understood in isolation but must rather be considered within models of whole minds and for this purpose we suggest an integrative design-oriented (IDO) approach. This approach involves the design stance of theoretical Artificial Intelligence (the central discipline of cognitive science), augmented by systematic conceptual analysis, aimed at explaining how autonomous agency is possible. This requires developing, exploring and implementing cognitive-affective-conative information-processing architectures. Empirical research on RT and emotions needs to be driven by such theories, and theorizing about RT needs to consider such data. Mental perturbance is an IDO concept that, we argue, can help characterize, explain, and theoretically ground the concept of RT. Briefly, perturbance is a mental state in which motivators tend to disrupt, or otherwise influence, executive processes even if reflective processes were to try to prevent or minimize the motivators’ influence. We draw attention to an IDO architecture of mind, H-CogAff, to illustrate the IDO approach to perturbance. We claim, further, that the intrusive mentation of some affective states— including grief and limerence (the attraction phase of romantic love) — should be conceptualized in terms of perturbance and the IDO architectures that support perturbance. We call for new taxonomies of RT and emotion in terms of IDO architectures such as H-CogAff. We point to areas of research in psychology that would benefit from the concept of perturbance.
2

González Moreno-Navarro, José Luis. "¿Y si Gaudí hubiera ido a Nueva York? Una ficción constructiva." Informes de la Construcción 56, no. 496 (April 30, 2005): 47–55. http://dx.doi.org/10.3989/ic.2005.v57.i496.462.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Imai, Yohsuke, Takayuki Aoki, and Magdi Shoucri. "Comparison of Efficient Explicit Schemes for Shallow-Water Equations—Characteristics-Based Fractional-Step Method and Multimoment Eulerian Scheme." Journal of Applied Meteorology and Climatology 46, no. 3 (March 1, 2007): 388–95. http://dx.doi.org/10.1175/jam2474.1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Abstract Two explicit schemes for the numerical solution of the shallow-water equations are examined. The directional-splitting fractional-step method permits relatively large time steps without an iterative process by using a treatment based on the characteristics of the governing equations. The interpolated differential operator (IDO) scheme has fourth-order accuracy in time and space by using a Hermite interpolation function covering local domains, and accurate results are obtained with coarse meshes. It is shown that the two schemes are very efficient for hydrostatic meteorological models from the viewpoints of numerical accuracy and central processing unit time, and the fact that they are explicit makes them suitable for computers with parallel architecture.
4

García Hermida, Alejandro. "El papel de lo vernáculo en la arquitectura moderna: cuestiones de forma, identidad y adecuación al contexto." Cuaderno de Notas, no. 20 (July 31, 2019): 29. http://dx.doi.org/10.20868/cn.2019.4258.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
ResumenA menudo se perciben las vanguardias arquitectónicas como movimientos opuestos a la tradición. Sin embargo, y pese a que parte de ellas nacieron con esa voluntad de ruptura, existen y han existido múltiples conexiones entre tradición y modernidad, entre las que puede desatacarse el valor asignado a determinadas tradiciones vernáculas por sucesivas generaciones de arquitectos. Entre estas últimas, han destacado históricamente las tradiciones mediterráneas, que se convertirían en fuente de modelos para algunas de estas nuevas arquitecturas. Desde apreciaciones puramente formales, desligadas de los condicionantes culturales y funcionales que las habían ido configurando generación tras generación, se llegó a menudo a una valoración más amplia de las mismas y, partiendo de ésta, surgirían importantes debates que contribuirían de forma significativa a la evolución de la arquitectura moderna. AbstractThe architectural vanguards are often understood as movements opposing tradition. Nevertheless, and in spite of part of them having been born under such a will, multiple links between tradition and modernity exist and have existed. Among them, the way successive generations of architects have valued particular vernacular traditions stands out, especially those belonging to the Mediterranean regions. These last traditions would historically become a source of references for some of those new architectural trends. From purely formal appreciations, disconnected from the cultural and functional conditioning factors which shaped them generation after generation, often a wider understanding of them was reached. From that starting point important debates would come up and they would significantly contribute to the evolution of modern architecture.
5

Sainz Gutiérrrez, Victoriano. "Sevilla y el río Guadalquivir en la planificación reciente: encuentros y desencuentros." ZARCH, no. 15 (January 27, 2021): 96–109. http://dx.doi.org/10.26754/ojs_zarch/zarch.2020154679.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
La relación de Sevilla con el Guadalquivir presenta una doble vertiente: de una parte, el río ha sido para la ciudad una importante fuente riqueza gracias a la actividad comercial desarrollada en su puerto y, de otra, una causa de problemas por las frecuentes riadas que han venido dañando con regularidad su tejido edificado. La ingente obra hidráulica realizada desde finales del siglo XIX para mejorar la accesibilidad de las embarcaciones al puerto y defender la ciudad de las inundaciones no ha dejado de provocar conflictos tanto a nivel urbano como territorial. El artículo repasa la historia de esos conflictos dominados por una neta hegemonía portuaria, centrándose a continuación en los retos y oportunidades a los que se enfrenta la Sevilla metropolitana para dar un nuevo significado a los espacios vinculados al cauce vivo del río Guadalquivir y su llanura de inundación. La construcción de la ciudad-territorio contemporánea se presenta como una ocasión para integrarlos en la infraestructura verde metropolitana. En esa dirección han ido tanto el planeamiento urbano como el territorial vigente, pero el camino no está exento de dificultades, que aquí se ilustran con los debates recientes respecto al futuro de la dehesa de Tablada como gran parque periurbano.
6

Solaguren-Beascoa de Corral, Félix. "Conversando con...Alberto Campo Baeza." EGA Revista de Expresión Gráfica Arquitectónica 26, no. 42 (July 16, 2021): 18. http://dx.doi.org/10.4995/ega.2021.15842.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
<p>Creo que sería redundante presentar al profesor Alberto Campo Baeza. Su currículum es lo suficientemente conocido como para volverlo a narrar una vez más. También se le han hecho múltiples entrevistas donde muchas veces se repiten preguntas y aspectos referentes a su obra y a su persona.</p><p>Por ello cuando Angela García, directora de EGA, me pidió realizarle una entrevista, lo hablé con Alberto y le propuse realizar una especie de diálogo sobre temáticas que sabía que a él le interesan.</p><p>Él nunca tiene un no como respuesta debido a su gran generosidad.</p><p>Empezaré explicando que conocí a Alberto alrededor de 1990 cuando él bajaba por las escaleras de la ETSAB. Creo que estaba en un tribunal de oposiciones y lo abordé en un descanso de la prueba. Por aquél entonces él ya era una persona conocida como profesor y como arquitecto.</p><p>Con el paso de los años hemos ido coincidiendo puntualmente en actos y conferencias, relación que se ha ido intensificando con el tiempo.</p><p>La escena era siempre más o menos la misma, pero con sutiles e intensos momentos que me llenan, ciertamente, de admiración: él hablando de luz y espacio, de poesía (no olvidemos que su pasión por los clásicos es manifiesta y conocida), y que materializa con proyectos claros y sencillos donde nada sobra y donde nada falta, explicándolos con una infinita paciencia y una emoción que siempre trasmite a los asistentes. ¿Se puede pedir más?</p><p>Ajeno a las modas, pero atento siempre a cualquier inquietud intelectual.</p><p>Jovencísimo catedrático. Actualmente emérito de la ETSAM, miembro de la Real Academia de Bellas Artes de San Fernando, y tantas cosas más… </p><p>Pero hay dos hechos que para mi tienen especial significado. El primero, su intento por trabajar con Arne Jacobsen justo antes de su fallecimiento. El segundo, siendo yo el director de la Escuela, cuando fue profesor invitado de la ETSAB llevando a su cargo un Taller de Proyectos de 5º curso durante el primer cuatrimestre del período 2018-2019. No faltó a ninguna clase. Venía de Madrid todas las semanas. Un regalo.</p><p>Estos aspectos están implícitos en el texto que compartimos a continuación. Realizado, como dice Alberto, “tacita a tacita”, en una época invadida por la pandemia y en un ir y venir de correos electrónicos. </p><p>Preguntas y respuestas, comprobaciones, donde cada dos o tres días recibía sus noticias. Nos íbamos intercambiando preguntas y respuestas en ambas direcciones en un enriquecedor diálogo que ha sido otra lección particular que él me ha dado.</p><p>Sólo me queda por agradecer esta posibilidad, la de una “entrevista atípica”, como la califica Ángela García, y que se ha ido retrasando en el tiempo hasta que llegamos a encontrar esta fórmula que gracias a la tecnología se nos ha permitido realizar.</p><p>Muchas gracias Alberto.</p>
7

Blanco-Rotea, Rebeca, Sonia García-Rodríguez, Alberto Rodríguez-Costas, and Anxo Rodríguez Paz. "Análisis y recuperación de un paisaje urbano fortificado en la villa de Verín (Orense, Galicia)." Arqueología de la Arquitectura, no. 5 (December 30, 2008): 223. http://dx.doi.org/10.3989/arq.arqt.2008.97.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
La villa de Verín se localiza en el SE de Galicia, muy próxima a la frontera de Portugal y a los pies del castillo de Monterrei. Durante la Guerra de la Restauración Portuguesa (1640-1668) su localización la convierte en un importante enclave defensivo relacionado con la protección del castillo de Monterrei y el paso desde Portugal hacia la provincia de Ourense desde Chaves. La venta de los terrenos de la muralla moderna a mediados del siglo XIX y la fuerte transformación urbanística que sufre en la segunda mitad del siglo XX, enmascaran su trazado fortificado. A través de los trabajos que aquí se presentan se pretende recuperar el papel que la villa jugó en aquel periodo y las transformaciones que Verín ha ido sufriendo desde época bajomedieval.
8

Benedito Nuez, Josep, and José Manuel Melchor Monserrat. "Evidencias, aspectos materiales y técnicas constructivas del recinto amurallado de la madīna Buryāna (Burriana, Castellón)." Arqueología de la Arquitectura, no. 17 (November 18, 2020): e097. http://dx.doi.org/10.3989/arq.arqt.2020.006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
La ciudad de Burriana se localiza frente a la costa del mar Mediterráneo, muy próxima al río Anna, a los pies de las principales vías de comunicación que vertebran el levante peninsular, con puerto marítimo y sobre un terreno fértil. Su localización la convierte en un importante enclave defensivo relacionado con la protección del paso hacia Murbāṭir (Sagunto) desde el río Millars. Pero la fuerte transformación urbanística que sufre desde la segunda mitad del siglo XIX ha enmascarado su trazado fortificado. A partir del trabajo que aquí se presenta se pretende recuperar información de la ciudad en época islámica, sobre todo lo concerniente a su sistema de fortificación y las transformaciones que esta ha ido sufriendo. Se presenta también un análisis de las técnicas constructivas. Una vez analizados los datos, se proyecta una restitución del trazado de la muralla, torres y portales.
9

Urruchi-Rojo, J. R., J. A. Martínez-Martínez, and R. Serrano-López. "De la bóveda de medio punto a la bóveda escarzana en los puentes de piedra. Influencia del rebajamiento y del relleno rígido en la variación de la carga de rotura." Informes de la Construcción 69, no. 545 (April 5, 2017): 187. http://dx.doi.org/10.3989/ic.15.107.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
La forma de las bóvedas de los puentes de piedra ha ido evolucionando con el tiempo, existiendo bibliografía en la que además de recomendarse una tipología frente a otra, según la época, se prescribía la manera de ejecutar el relleno del trasdós. Todo ello surgía en un principio como fruto de las experiencias adquiridas durante la construcción y observación de los puentes. Así fueron emergiendo, a partir del siglo xviii, formulaciones que en unos casos aportaban un resultado y en otros el contrario. Este artículo pretende realizar una comparación entre varias de estas formulaciones, así como efectuar un análisis de la influencia en la variación de la carga de rotura, tanto del rebajamiento de la bóveda como de la participación del relleno rígido en el trasdós del mismo.
10

Martín del Toro, E. "La influencia de la correcta consideración climática en los certificados energéticos realizados en Canarias." Informes de la Construcción 71, no. 556 (November 19, 2019): 310. http://dx.doi.org/10.3989/ic.66351.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
El certificado energético se presenta como una herramienta de gran utilidad al ofrecer información sobre la eficiencia energética, los consumos energéticos asociados y las emisiones de CO2 que dichos consumos generan. Pero su aplicación en Canarias se ha encontrado con problemas, ya que las particularidades propias del archipiélago dan lugar, por un lado a que el clima de las islas sea muy diferente del resto de España y por otro lado el encontrarse marcado por microclimas que originan una importante variedad climática en una pequeña extensión de superficie. Este aspecto, que no se vio recogido en un primer momento por el CTE, ha ido posteriormente ajustándose. Este trabajo analiza las discrepancias producidas entres las distintas zonas climáticas propuestas en las diferentes áreas del archipiélago para conocer cuáles se acercan más a las condiciones reales de las islas y las implicaciones que estas divergencias han provocado, como situaciones con resultados incoherentes.

Дисертації з теми "Architecture IdO":

1

Amaro, da Cruz Mauro. "An enhanced multi-protocol middleware solution for Internet of things." Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Dans l'Internet des objets (IoT), les données sont gérées et stockées par un logiciel appelé middleware (situé sur un serveur). L'évolution du concept IoT a conduit à la construction de nombreux intergiciels IoT, des logiciels qui jouent un rôle clé car ils prennent en charge la communication entre les appareils, les utilisateurs et les applications. Plusieurs aspects peuvent impacter les performances d'un middleware. Basée sur une revue approfondie de la littérature associée et sur la proposition d'un modèle de référence pour le middleware IoT, cette thèse propose un nouveau middleware IoT, appelé In.IoT, une solution middleware évolutive, sécurisée et innovante basée sur une revue approfondie du état de l'art et suivant l'architecture middleware de référence proposée dans le cadre de ce travail de recherche. In.IoT répond aux préoccupations middleware des solutions les plus populaires (sécurité, convivialité et performances) qui ont été évaluées, démontrées et validées tout au long de cette étude, et il est prêt et disponible à l'utilisation. Les recommandations et les exigences architecturales d'In.IoT sont détaillées et peuvent être reproduites par des solutions nouvelles et disponibles. Il prend en charge les protocoles de couche application les plus populaires (MQTT, CoAP et HTTP). Ses performances sont évaluées en comparaison avec les solutions les plus prometteuses disponibles dans la littérature et les résultats obtenus par la solution proposée sont extrêmement prometteurs. De plus, cette thèse étudie l'impact du langage de programmation sous-jacent sur les performances globales de la solution grâce à une étude d'évaluation des performances incluant Java, Python et Javascript, identifiant que globalement, Java s'avère être le choix le plus robuste pour le middleware IoT. Les appareils IoT communiquent avec le middleware via un protocole de couche application qui peut différer de ceux pris en charge par le middleware, en particulier lorsque l'on considère que les ménages auront divers appareils de différentes marques. La thèse offre une alternative pour de tels cas, en proposant une passerelle de couche application, appelée MiddleBridge. MiddleBridge traduit les messages CoAP, MQTT, DDS et Websockets en HTTP (HTTP est pris en charge par la plupart des intergiciels IoT). Avec MiddleBridge, les appareils peuvent envoyer un message plus petit à un intermédiaire (MiddleBridge), qui le restructure et le transmet à un middleware, réduisant ainsi le temps qu'un appareil passe à transmettre. Les solutions proposées ont été évaluées par rapport à d'autres solutions similaires disponibles dans la littérature, en tenant compte des métriques liées à la taille des paquets, aux temps de réponse, aux requêtes par seconde et au pourcentage d'erreur, démontrant leurs meilleurs résultats et leur énorme potentiel. En outre, l'étude a utilisé XGBoost (une technique d'apprentissage automatique) pour détecter l'occurrence d'attaques de réplication lorsqu'un attaquant obtient les informations d'identification de l'appareil, en l'utilisant pour générer de fausses données et perturber l'environnement IoT. Les résultats obtenus sont extrêmement prometteurs. Ainsi, il est conclu que l'approche proposée contribue à l'état de l'art des solutions middleware IoT
In Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
2

Gunji, Akira. "Inferring Design Environment (IDE) : "(re) shaping a design pattern as a learning process"." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33035.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Architecture, 2005.
Includes bibliographical references (leaves 14-16).
This proposal examines the Design process through developing a dialog or game-like graphic software environment. Inferring Design Environment (IDE) is a concept sketch that assimilates a dialog or turn-taking game onto a two dimensional digital canvas, which in turn helps designers learn about their learning processes. This turn-taking process eventually gives rise to meaningful expression through the use of a rule the Designer has made previously. Henceforth, learning is not something that has a goal and purpose such as teaching does, but is rather the emergence and discovery of an interaction of finite elements and the "self"' in an Environment.
by Akira Gunji.
S.M.
3

Kim, Taekyu. "Ontology/Data Engineering Based Distributed Simulation Over Service Oriented Architecture For Network Behavior Analysis." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/193678.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As network uses increase rapidly and high quality-of-service (QoS) is required, efficient network managing methods become important. Many previous studies and commercial tools of network management systems such as tcpdump, Ethereal, and other applications have weaknesses: limited size of files, command line execution, and large memory and huge computational power requirement. Researchers struggle to find fast and effective analyzing methods to save maintenance budgets and recover from systematic problems caused by the rapid increment of network traffic or intrusions. The main objective of this study is to propose an approach to deal with a large amount of network behaviors being quickly and efficiently analyzed. We study an ontology/data engineering methodology based network analysis system. We design a behavior, which represents network traffic activity and network packet information such as IP addresses, protocols, and packet length, based on the System Entity Structure (SES) methodology. A significant characteristic of SES, a hierarchical tree structure, enables systems to access network packet information quickly and efficiently. Also, presenting an automated system design is the secondary purpose of this study. Our approach shows adaptive awareness of pragmatic frames (contexts) and makes a network traffic analysis system with high throughput and a fast response time that is ready to respond to user applications. We build models and run simulations to evaluate specific purposes, i.e., analyzing network protocols use, evaluating network throughput, and examining intrusion detection algorithms, based on Discrete Event System Specification (DEVS) formalism. To study speed up, we apply a web-based distributed simulation methodology. DEVS/Service Oriented Architecture (DEVS/SOA) facilitates deploying workloads into multi-servers and consequently increasing overall system performance. In addition to the scalability limitations, both tcpdump and Ethereal have a security issue. As well as basic network traffic information, captured files by these tools contain secure information: user identification numbers and passwords. Therefore, captured files should not allow to be leaked out. However, network analyses need to be performed outside target networks in some cases. The distributed simulation--allocating distributing models inside networks and assigning analyzing models outside networks--also allows analysis of network behaviors out of networks while keeping important information secured.
4

Kourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vul­nerabilities in order to penetrate into the system internals and cause damage. Having a standard architecture/configuration supporting the needed services saves time and re­sources while it reduces security risks. A server architecture protected by a security policy can secure the integrity and quality of the overall services. This research demon­strates building a secure server architecture protected by a security policy. To achieve this a security policy and a checklist was designed and combined with a host based IDPS, a NMS and a WAF.
5

Pollet, Damien. "Une architecture pour les transformations de modèles et la restructuration de modèles uml." Phd thesis, Université Rennes 1, 2005. http://tel.archives-ouvertes.fr/tel-00538536.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Avec l'ingénierie des modèles on cherche à résoudre le problème de l'évolution des grands systèmes informatiques. En effet, ces systèmes doivent s'adapter à l'évolution des besoins et des technologies, et cette évolution est de plus en plus rapide par rapport à celle du domaine métier. On souhaite donc réutiliser l'expertise de ce domaine indépendamment des technologies sur lesquelles on s'appuie, grâce à des techniques de manipulation de modèles. La contribution présentée dans ce manuscrit est une architecture de manipulation de modèles indépendante d'un quelconque métamodèle. Cette architecture favorise la réutilisation des techniques reconnues de génie logiciel orienté objet pour le développement de transformations de modèles. La sémantique de l'interface d'accès aux modèles est spécifiée par une implémentation de référence en langage fonctionnel. Notre approche est fondée sur une interface de niveau mof (Meta-Object Facility) pour la manipulation de modèles. Le langage associé permet de manipuler des éléments de modèle directement, car la structure du métamodèle étend dynamiquement l'ensemble des types accessibles au programme de transformation. D'un point de vue méthodologique, on montre que les transformations de modèles synthétisent l'expertise d'implantation d'un domaine métier vers une technologie donnée ; il est donc utile de modéliser les transformations les plus complexes pour les développer en appliquant récursivement les techniques de génie logiciel et d'ingénierie des modèles. La mise en pratique illustre ce point et montre le fonctionnement de l'architecture de manipulation de modèles avec des transformations pour l'introduction de design patterns et la restructuration de modèles uml (Unified Modeling Language).
6

Akhlaq, Monis. "Improved performance high speed network intrusion detection systems (NIDS) : a high speed NIDS architectures to address limitations of packet loss and low detection rate by adoption of dynamic cluster architecture and traffic anomaly filtration (IADF)." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5377.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Intrusion Detection Systems (IDS) are considered as a vital component in network security architecture. The system allows the administrator to detect unauthorized use of, or attack upon a computer, network or telecommunication infrastructure. There is no second thought on the necessity of these systems however; their performance remains a critical question. This research has focussed on designing a high performance Network Intrusion Detection Systems (NIDS) model. The work begins with the evaluation of Snort, an open source NIDS considered as a de-facto IDS standard. The motive behind the evaluation strategy is to analyze the performance of Snort and ascertain the causes of limited performance. Design and implementation of high performance techniques are considered as the final objective of this research. Snort has been evaluated on highly sophisticated test bench by employing evasive and avoidance strategies to simulate real-life normal and attack-like traffic. The test-methodology is based on the concept of stressing the system and degrading its performance in terms of its packet handling capacity. This has been achieved by normal traffic generation; fussing; traffic saturation; parallel dissimilar attacks; manipulation of background traffic, e.g. fragmentation, packet sequence disturbance and illegal packet insertion. The evaluation phase has lead us to two high performance designs, first distributed hardware architecture using cluster-based adoption and second cascaded phenomena of anomaly-based filtration and signature-based detection. The first high performance mechanism is based on Dynamic Cluster adoption using refined policy routing and Comparator Logic. The design is a two tier mechanism where front end of the cluster is the load-balancer which distributes traffic on pre-defined policy routing ensuring maximum utilization of cluster resources. The traffic load sharing mechanism reduces the packet drop by exchanging state information between load-balancer and cluster nodes and implementing switchovers between nodes in case the traffic exceeds pre-defined threshold limit. Finally, the recovery evaluation concept using Comparator Logic also enhance the overall efficiency by recovering lost data in switchovers, the retrieved data is than analyzed by the recovery NIDS to identify any leftover threats. Intelligent Anomaly Detection Filtration (IADF) using cascaded architecture of anomaly-based filtration and signature-based detection process is the second high performance design. The IADF design is used to preserve resources of NIDS by eliminating large portion of the traffic on well defined logics. In addition, the filtration concept augment the detection process by eliminating the part of malicious traffic which otherwise can go undetected by most of signature-based mechanisms. We have evaluated the mechanism to detect Denial of Service (DoS) and Probe attempts based by analyzing its performance on Defence Advanced Research Projects Agency (DARPA) dataset. The concept has also been supported by time-based normalized sampling mechanisms to incorporate normal traffic variations to reduce false alarms. Finally, we have observed that the IADF has augmented the overall detection process by reducing false alarms, increasing detection rate and incurring lesser data loss.
7

Martin, Kyle A. "Harmony oriented architecture." Master's thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4795.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This thesis presents Harmony Oriented Architecture: a novel architectural paradigm that applies the principles of Harmony Oriented Programming to the architecture of scalable and evolvable distributed systems. It is motivated by research on Ultra Large Scale systems that has revealed inherent limitations in human ability to design large-scale software systems that can only be overcome through radical alternatives to traditional object-oriented software engineering practice that simplifies the construction of highly scalable and evolvable system. HOP eschews encapsulation and information hiding, the core principles of object-oriented design, in favor of exposure and information sharing through a spatial abstraction. This helps to avoid the brittle interface dependencies that impede the evolution of object-oriented software. HOA extends these concepts to distributed systems resulting in an architecture in which application components are represented by objects in a spatial database and executed in strict isolation using an embedded application server. Application components store their state entirely in the database and interact solely by diffusing data into a space for proximate components to observe. This architecture provides a high degree of decoupling, isolation, and state exposure allowing highly scalable and evolvable applications to be built. A proof-of-concept prototype of a non-distributed HOA middleware platform supporting JavaScript application components is implemented and evaluated. Results show remarkably good performance considering that little effort was made to optimize the implementation.
ID: 031001554; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Title from PDF title page (viewed August 26, 2013).; Thesis (M.S.)--University of Central Florida, 2011.; Includes bibliographical references (p. 79-84).
M.S.
Masters
Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science
8

Stead, Sarah. "PLACE, SPACE, AND FORM CAPTURED THROUGH PHOTOGRAPHIC MEDITATION." Master's thesis, University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4193.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Inspired by Buddhist philosophy, the photographic series Architectural Zen attempts to beautify banal and pragmatic architecture through limiting and preexisting artificial light conditions. The selective illumination of artificial light eliminates the non-essential details and enhances the pure forms and saturated color presented by the camera lens. This encourages the photographer and the viewer to enter a state of meditation. The resulting process is similar to a Zen approach to image making. The ancient Zen artist s compositions are strengthened by a meditation on form and subsequent elimination of the non-essential elements of the subject. Through embracing this Zen mentality and mindfulness,aspects of Eastern aesthetic and balance also appear through the work. The warm glow of artificial lights, long recessed shadows, and surreal colors contribute to the feeling of rest, contemplation, isolation, and solitude. Although the work in Architectural Zen is not directly about Buddhist doctrines, the process of creating the art parallels the ideas and practices of Zen Buddhism and meditation, finding the Buddha nature of typically unappealing architectural forms during a different time of day.
M.F.A.
Department of Art
Arts and Humanities
Studio Art and the Computer MFA
9

Joanne, Pascal. "L'espace sensible du monastère cistercien aux origines : essai de caractérisation des ambiances architecturales." Nantes, 2003. http://portaildocumentaire.citechaillot.fr/search.aspx?SC=theses&QUERY=cour+ouverte#/Detail/%28query:%28Id:%270_OFFSET_0%27,Index:1,NBResults:1,PageRange:3,SearchQuery:%28CloudTerms:!%28%29,ForceSearch:!t,Page:0,PageRange:3,QueryString:Joanne,ResultSize:10,ScenarioCode:theses,ScenarioDisplayMode:display-standard,SearchLabel:%27%27,SearchTerms:Joanne,SortField:!n,SortOrder:0,TemplateParams:%28Scenario:%27%27,Scope:%27%27,Size:!n,Source:%27%27,Support:%27%27%29%29%29%29.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

PALCZYNSKI, MATTHEW JOSEPH. "ROTHKO AND ARCHITECTURE." Diss., Temple University Libraries, 2011. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/213124.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Art History
Ph.D.
The overall goal of this dissertation is to identify and examine the neglected aspects of the literature on Mark Rothko's 1958-1959 project to make murals for the Four Seasons restaurant (see Figs. 1-12) in the then-newly opened Seagram Building in Manhattan. These include Rothko's attempts to merge the mediums of painting and architecture in order to create an antagonistic environment in the restaurant; how his visits to Italy before and during the project reinforced this goal; how a good deal of the figurative paintings from Rothko's earliest career anticipated his blend of aggression and architecturally-related themes; the connection between Rothko and Mies van der Rohe, the architect of the building, in regard to the theme of transcendence; and how his experiments with architectural subjects and motifs aligned Rothko with some of the most influential vanguard artists in New York in the late 1950s and early 1960s. Discussions of these topics will suggest that his career-long references to architecture functioned, for him, as something intended to produce discomfort in the viewer. I will show that his acceptance of a lucrative commission to make paintings for a lavish restaurant that might seem at first to suggest pandering to an élite audience had the paradoxical effect of condemning that audience. I intend also to demonstrate that Rothko understood that the project was not merely about making paintings. Instead, for him, it dealt more with the challenge of uniting architecture and painting.
Temple University--Theses

Книги з теми "Architecture IdO":

1

Parisi, Ico. Ico Parisi. Lugano: Fidia edizioni d'arte, 1991.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Parisi, Ico. Ico Parisi, & architetture. [Modena]: Nuova Alfa Editoriale, 1990.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Gualdoni, Flaminio. Ico Parisi: La casa. Milano: Electa, 1999.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Carrilho, Júlio. Ibo: A casa e o tempo. Maputo: Edições FAPF, 2005.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Lorentzen, Ida. Ida Lorentzen: The story of seven paintings = Ida Lorentzen : historien om syv bilder. Oslo: Gyldendal norsk forlag, 1994.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Lewis, Geoff. Programming with Java IDL. New York: Wiley Computer Pub., 1998.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Yi, Sŏng-mi. Uri chip ŭn hanok ida: Che 1-hoe Han'guk Naesyŏnŏl Tŭrŏsŭtŭ hanokchŏn. Sŏul-si: Han'guk Naesyŏnŏl Tŭrŏsŭtŭ, 2007.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Lorentzen, Ida. Ida Lorentzen: Huset, rommene, fortellingen : utstilling på Nyfossum, Blaafarveværket 18. mai-22. september 2002. [Modum, Norway]: Stiftelsen Modums Blaafarveværk, 2002.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Nelson, Charles. Managing quality in architecture: A handbook for creators of the built environment. Oxford, UK: Elsevier, 2006.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Dumarçay, Jacques. Cambodian architecture: Eighth to thirteenth centuries. Leiden: Brill, 2001.

Знайти повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Частини книг з теми "Architecture IdO":

1

Laksmana, Evan A. "Fracturing architecture?" In Quad Plus and Indo-Pacific, 111–23. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003206408-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Usländer, Thomas, and Andreas Teuscher. "Industrial Data Spaces." In Designing Data Spaces, 313–27. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_19.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractThis chapter describes the application of the IDS principles, architectural artifacts, and technologies to the application domain of industrial production and smart manufacturing, in particular as drafted by the Platform Industrie 4.0 in their Reference Architecture Model Industrie 4.0 (RAMI4.0) and follow-on specifications about the Asset Administration Shell (AAS). It elaborates on the working approach of the IDS-Industrial Community (IDS-I) for the analysis of requirements on data sovereignty. This activity is motivated by the vision 2030 of the Platform Industrie 4.0 that states autonomy, including data sovereignty, as one strategic field of action.The chapter presents how IDS-I aims at systematically deriving and analyzing data sovereignty aspects from the two reference use cases, Collaborative Condition Monitoring (CCM) and Smart Factory Web (SFW), in order to identify architectural and technological synergies and gaps between the International Data Spaces (IDS) and the specifications of the Platform Industrie 4.0.
3

Pettenpohl, Heinrich, Markus Spiekermann, and Jan Ruben Both. "International Data Spaces in a Nutshell." In Designing Data Spaces, 29–40. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_3.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractInternational Data Spaces (IDS) enable the sovereign and self-determined exchange of data via a standardized connection across company boundaries. They address the many challenges in the overarching use of data in terms of interoperability, transparency, trust, security, and adaptation by a critical mass. For this purpose, the IDS develops a standardized architecture, which is described and continuously updated in the IDSA Reference Architecture Model (RAM) document. The core of the underlying concept is the linkage of data and usage conditions and their organizational and technical processing and enforcement. Organizational roles and responsibilities are considered on the one hand, and various technical components are defined on the other. The core of the architecture thereby, in contrast to existing solutions and approaches of completely centralized or decentralized architectures, is the paradigm of a federated structure. This enables the actual (raw) data to be exchanged exclusively between the participants without the need for a third party or a central data store. The chapter gives an overview of this approach and provides insights in terms of objectives, roles, and components that are used to enable sovereign data exchange. It enables a basic understanding of the core concept and assessing the impact of such an architecture approach.
4

Puttini, Ricardo S., Jean-Marc Percher, Ludovic Mé, Olivier Camp, Rafael de Sousa, Cláudia J. Barenco Abbas, and L. Javier García-Villalba. "A Modular Architecture for Distributed IDS in MANET." In Computational Science and Its Applications — ICCSA 2003, 91–113. Berlin, Heidelberg: Springer Berlin Heidelberg, 2003. http://dx.doi.org/10.1007/3-540-44842-x_11.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Essid, Mondher, Farah Jemili, and Ouajdi Korbaa. "Distributed Architecture of Snort IDS in Cloud Environment." In Advances in Intelligent Systems and Computing, 100–111. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-49342-4_10.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Ram, Vignesh. "ASEAN Centrality in the Indo-Pacific Security Architecture." In Multilateralism in the Indo-Pacific, 60–72. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003278719-6.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Kirstein, Fabian, and Vincent Bohlen. "IDS as a Foundation for Open Data Ecosystems." In Designing Data Spaces, 225–40. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93975-5_14.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
AbstractOpen data is a popular and flourishing concept. The availability of open and structured data is the foundation of new business models, citizen engagement, and scientific research. However, open data still faces many issues to unfold its full potential, including usability, quality, legal, privacy, strategic, and technical barriers. In addition, the public sector remains its main provider, while industry stakeholders are still reluctant to participate in open data ecosystems. In this article, we present an architecture to overcome these drawbacks by utilizing the concepts, specifications, and technologies provided by International Data Spaces. We developed a prototype to demonstrate and evaluate the practical adoption of our architecture. Our work shows that IDS can act a vital foundation for open data ecosystems. The presented solution is available as open source software.
8

Mbaye, Maïssa, and Cheikh Ba. "A Pub-Sub Based Architecture for IDS as Service." In Lecture Notes in Electrical Engineering, 259–71. Singapore: Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-1627-1_20.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Jha, Pankaj K., and Vo Xuan Vinh. "India, Vietnam and the Indo-Pacific security architecture." In India, Vietnam and the Indo-Pacific, 1–17. Names: Jha, Pankaj, author. | Vo, Xuan Vinh, author.Title: India, Vietnam and the Indo-Pacific : expanding horizons / Pankaj K Jha and Vo Xuan Vinh.Description: Abingdon, Oxon ; New York, NY : Routledge, 2020.: Routledge India, 2020. http://dx.doi.org/10.4324/9780429281877-1.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Xiao, Junchao, Hao Wu, Xiangxue Li, and Yuan Linghu. "Practical IDS on In-vehicle Network Against Diversified Attack Models." In Algorithms and Architectures for Parallel Processing, 456–66. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-38961-1_40.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Тези доповідей конференцій з теми "Architecture IdO":

1

Benlloch Marco, Javier, and Vicente López Mateu. "ARCHITECTURE IN PRACTICE: ELABORATION AND CONSTRUCTIVE PROJECTS DEFINITION." In IN-RED 2018: IV Congreso Nacional de Innovación Educativa y Docencia en Red. Valencia: Universitat Politècnica València, 2018. http://dx.doi.org/10.4995/inred2018.2018.8801.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
La resolución de ejercicios o prácticos que se aproxime a casos reales conocido por Aprendizaje Basado en Problemas o bien su para realizar un Proyecto más general es algo bastante conocido y aplicado actualmente en la formación de las ingenierías, pero tiene particularidades en arquitectura. Este artículo presenta la experiencia desarrollada recientemente en la asignatura Proyecto Constructivo del Master Habilitante de la ETSAV. En ella los estudiantes deben desarrollar un Proyecto Arquitectónico completo, aproximándose lo máximo posible a un “Proyecto de Ejecución”. Este proceso plantea la dificultad de recopilar y repasar los distintos conociminentos que los estudiantes han ido adquiriendo en su formación en el grado, desde los aspectos creativos y técnicos a otros transversales como la organización y gestión del tiempo o el trabajo en equipo. El hilo conductor es un proyecto técnico, con un grado de complejidad que permitiera su desarrollo posterior. Los estudiantes deben elaborar sus distintas propuestas y justificar las soluciones desde el punto de vista técnico, así como el cumplimento de la diversa normativa. El desarrollo de esta metodología ha sido un desafío importante, tanto para profesores como para estudiantes. Los resultados son positivos, a pesar de que hay diferentes aspectos que deben mejorarse poco a poco, pero el principal beneficio está claro, llevar mejor a los estudiantes su futuro profesional. Palabras clave: Aprendizaje basado en problemas (ABP) en Arquitectura, Aprendizaje y enseñanza en construcción arquitectónica, formación en Máster de Arquitectura.
2

Miralles Jori, Roger. "FLC 4932. Lo inesperado en la obra de Le Corbusier. Consideraciones en torno al origen de la promenade." In LC2015 - Le Corbusier, 50 years later. Valencia: Universitat Politècnica València, 2015. http://dx.doi.org/10.4995/lc2015.2015.976.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Resumen: Entender la evolución de la idea de la promenade en la crítica corbuseriana. Cómo la idea ha ido pasando de la idea del movimiento al pintoresquismo, a lo cinematográfico y finalmente a la idea de montaje. Leyendo Le Corbusier entender que lo mas relevante de la promenade es la idea de lo inesperado para el espectador. Entender de dónde viene esta idea de lo inesperado a través de la formación de Le Corbusier y, sobretodo, a partir de su formación en la crítica del S.XIX. Especialmente importante para entender la idea de lo inesperado es el libro de Mornings in Florence de Ruskin, en especial su descripción de la capilla de los españoles. Esta capilla también será objeto de estudio por Le Corbusier y, en ella, reconoce la importancia de lo inesperado en arquitectura. Abstract: The first objective of this paper is to understand the evolution of the idea of promenade in Le Corbusier’s critic. The paper follows how the idea has changed from the movement to the picturesque, to the cinematographic and finally to the idea of montage. The second objective is to understand that the idea of the unexpected for the spectator is key for the promenade. Then we try to understand where does the idea of the unexpected come in Le Corbusier’s formation with special interest in his formation in the nineteenth century critics. And how important to understand the idea of the unexpected is Ruskin’s Mornings in Florence, specially his description of the Spanish Chapel. This chapel will be case study for Le Corbusier and in his study he recognises the importance of the unexpected in architecture. Palabras clave: Promenade, Espacio inesperado, Formación de Le Corbusier, Viajes de Le Corbusier, Capilla de los españoles. Keywords: Promenade, Unexpected space, Le Corbusier formation, Le Corbusier Travels, Spanish Chapel. DOI: http://dx.doi.org/10.4995/LC2015.2015.976
3

Yu, Bo Yang, Tomonori Honda, Syed Zubair, Mostafa H. Sharqawy, and Maria C. Yang. "Multi-Disciplinary Design Optimization for Large-Scale Reverse Osmosis Systems." In ASME 2014 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/detc2014-35032.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
Large-scale desalination plants are complex systems with many inter-disciplinary interactions and different levels of sub-system hierarchy. Advanced complex systems design tools have been shown to have a positive impact on design in aerospace and automotive, but have generally not been used in the design of water systems. This work presents a multi-disciplinary design optimization approach to desalination system design to minimize the total water production cost of a 30,000m3/day capacity reverse osmosis plant situated in the Middle East, with a focus on comparing monolithic with distributed optimization architectures. A hierarchical multi-disciplinary model is constructed to capture the entire system’s functional components and subsystem interactions. Three different multi-disciplinary design optimization (MDO) architectures are then compared to find the optimal plant design that minimizes total water cost. The architectures include the monolithic architecture multidisciplinary feasible (MDF), individual disciplinary feasible (IDF) and the distributed architecture analytical target cascading (ATC). The results demonstrate that an MDF architecture was the most efficient for finding the optimal design, while a distributed MDO approach such as analytical target cascading is also a suitable approach for optimal design of desalination plants, but optimization performance may depend on initial conditions.
4

Saad, En Niari, Khalil El Mahdi, and Mostapha Zbakh. "Cloud computing architectures based IDS." In 2012 International Conference on Complex Systems (ICCS). IEEE, 2012. http://dx.doi.org/10.1109/icocs.2012.6458581.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Polovova, Tatyana, and Yuri Gusev. "Cluster development of innovative architecture of territorial and spatial entities." In SPBPU IDE '20: SPBPU IDE-2020. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3444465.3444493.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Perhac, Jan, Daniel Mihalyi, and Lukas Matas. "Resource oriented BDI architecture for IDS." In 2017 IEEE 14th International Scientific Conference on Informatics. IEEE, 2017. http://dx.doi.org/10.1109/informatics.2017.8327263.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Pecinovsky, Rudolf, and Jarmila Pavlíčková. "BLUEJ IDE AND ARCHITECTURE FIRST METHODOLOGY." In International Technology, Education and Development Conference. IATED, 2017. http://dx.doi.org/10.21125/inted.2017.0668.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Bigotto, Francesco, Luca Boero, Mario Marchese, and Sandro Zappatore. "Statistical Fingerprint-Based Ids In Sdn Architecture." In 2018 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS). IEEE, 2018. http://dx.doi.org/10.1109/spects.2018.8574140.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Salman, Alaa, Imad H. Elhajj, Ali Chehab, and Ayman Kayssi. "DAIDS: An Architecture for Modular Mobile IDS." In 2014 28th International Conference on Advanced Information Networking and Applications Workshops (WAINA). IEEE, 2014. http://dx.doi.org/10.1109/waina.2014.54.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

"Statistical Fingerprint-Based IDS in SDN Architecture." In 2018 Summer Simulation Multi-Conference. Society for Modeling and Simulation International (SCS), 2018. http://dx.doi.org/10.22360/summersim.2018.spects.006.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.

Звіти організацій з теми "Architecture IdO":

1

Mendonsa, D., F. Nekoogar, and H. Martz. IDD Archival Hardware Architecture and Workflow. Office of Scientific and Technical Information (OSTI), October 2008. http://dx.doi.org/10.2172/950634.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Burns, John F. IDC Re-Engineering Phase 2 Architecture Document. Office of Scientific and Technical Information (OSTI), December 2015. http://dx.doi.org/10.2172/1234565.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Burns, John F. IDC Re-Engineering Phase 2 Architecture Document. Office of Scientific and Technical Information (OSTI), January 2017. http://dx.doi.org/10.2172/1433590.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Burns, John F., Benjamin R. Hamlet, and Ryan Prescott. IDC Re-Engineering Phase 2 Architecture Document Version 1.5. Office of Scientific and Technical Information (OSTI), July 2016. http://dx.doi.org/10.2172/1561719.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Hamlet, Benjamin R. IDC Reengineering Iteration I2 Architectural Prototype Reports. Office of Scientific and Technical Information (OSTI), December 2014. http://dx.doi.org/10.2172/1173200.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Tayeb, Shahab. Taming the Data in the Internet of Vehicles. Mineta Transportation Institute, January 2022. http://dx.doi.org/10.31979/mti.2022.2014.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
As an emerging field, the Internet of Vehicles (IoV) has a myriad of security vulnerabilities that must be addressed to protect system integrity. To stay ahead of novel attacks, cybersecurity professionals are developing new software and systems using machine learning techniques. Neural network architectures improve such systems, including Intrusion Detection System (IDSs), by implementing anomaly detection, which differentiates benign data packets from malicious ones. For an IDS to best predict anomalies, the model is trained on data that is typically pre-processed through normalization and feature selection/reduction. These pre-processing techniques play an important role in training a neural network to optimize its performance. This research studies the impact of applying normalization techniques as a pre-processing step to learning, as used by the IDSs. The impacts of pre-processing techniques play an important role in training neural networks to optimize its performance. This report proposes a Deep Neural Network (DNN) model with two hidden layers for IDS architecture and compares two commonly used normalization pre-processing techniques. Our findings are evaluated using accuracy, Area Under Curve (AUC), Receiver Operator Characteristic (ROC), F-1 Score, and loss. The experimentations demonstrate that Z-Score outperforms no-normalization and the use of Min-Max normalization.
7

Brenner, Alfred E., and Herbert R. Brown. Federated Architecture in the Defense Business Transformation. Selected IDA Papers and Briefings. Fort Belvoir, VA: Defense Technical Information Center, February 2006. http://dx.doi.org/10.21236/ada458517.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Szybinska Matusiak, Barbara, Sergio Sibilio, Justyna Martyniuk-Peczek, Claudia Naves David Amorim, Marie Boucher, Marzieh Nazari, Michelangelo Scorpio, et al. Subtask A: User perspective and requirements - A.2 Use cases. IEA SHC Task 61, October 2021. http://dx.doi.org/10.18777/ieashc-task61-2021-0008.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
The report starts with the introduction, chapter 1, where the main objective of the work is formulated, namely, to examine how the public buildings are used regarding lighting; both daylight and electric light is considered. In the chapter 2 a review of codes and requirements has been done. It starts with a discussion about general aspects of codes (subchapter 2.1) and presentation of international standards CEN and ISO (2.2) and follows with description of CIE reports and other internationally recognized guidance books (2.3). Then national recommendations are also presented (2.4). Finally, the impact of codes on architectural design is elaborated based on the interviews with architectural offices (2.5).
9

Mazorchuk, Mariia S., Tetyana S. Vakulenko, Anna O. Bychko, Olena H. Kuzminska, and Oleksandr V. Prokhorov. Cloud technologies and learning analytics: web application for PISA results analysis and visualization. [б. в.], June 2021. http://dx.doi.org/10.31812/123456789/4451.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
Анотація:
This article analyzes the ways to apply Learning Analytics, Cloud Technologies, and Big Data in the field of education on the international level. This paper provides examples of international analytical researches and cloud technologies used to process the results of those researches. It considers the PISA research methodology and related tools, including the IDB Analyzer application, free R intsvy environment for processing statistical data, and cloud-based web application PISA Data Explorer. The paper justifies the necessity of creating a stand-alone web application that supports Ukrainian localization and provides Ukrainian researchers with rapid access to well-structured PISA data. In particular, such an application should provide for data across the factorial features and indicators applied at the country level and demonstrate the Ukrainian indicators compared to the other countries’ results. This paper includes a description of the application core functionalities, architecture, and technologies used for development. The proposed solution leverages the shiny package available with R environment that allows implementing both the UI and server sides of the application. The technical implementation is a proven solution that allows for simplifying the access to PISA data for Ukrainian researchers and helping them utilize the calculation results on the key features without having to apply tools for processing statistical data.

До бібліографії