• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 117
  • 32
  • 20
  • 14
  • 14
  • 11
  • 8
  • 5
  • 4
  • 2
  • 2
  • 1
  • Tagged with
  • 276
  • 50
  • 31
  • 27
  • 24
  • 19
  • 18
  • 18
  • 18
  • 16
  • 16
  • 16
  • 15
  • 15
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
101

Investigation and Implementation of a Log Management and Analysis Framework for the Treatment Planning System RayStation

Norrby, Elias January 2018 (has links)
The purpose of this thesis is to investigate and implement a framework for log management and analysis tailored to the treatment planning system (TPS) RayStation. A TPS is a highly advanced software package used in radiation oncology clinics, and the complexity of the software makes writing robust code challenging. Although the product is tested rigorously during development, bugs are present in released software. The purpose of the the framework is to allow the RayStation development team insight into errors encountered in clinics by centralizing log file data recorded at clinics around the world. A framework based on the Elastic stack, a suite of open-source products, is proposed, addressing a set of known issues described as the access problem, the processing problem, and the analysis problem. Firstly, log files are stored locally on each machine running RayStation, some of which may not be connected to the Internet. Gaining access to the data is further complicated by legal frameworks such as HIPAA and GDPR that put constraints on how clinic data can be handled. The framework allows for access to the files while respecting these constraints. Secondly, log files are written in several different formats. The framework is flexible enough to process files of multiple different formats and consistently extracts relevant information. Thirdly, the framework offers comprehensive tools for analyzing the collected data. Deployed in-house on a set of 38 machines used by the RayStation development team, the framework was demonstrated to offer solutions to each of the listed problems.
102

Controle ativo de vibrações em estruturas espaciais tipo treliças usando controladores IMSC

Carvalhal, Ricardo [UNESP] 31 October 2005 (has links) (PDF)
Made available in DSpace on 2014-06-11T19:27:14Z (GMT). No. of bitstreams: 0 Previous issue date: 2005-10-31Bitstream added on 2014-06-13T19:55:36Z : No. of bitstreams: 1 carvalhal_r_me_ilha.pdf: 892699 bytes, checksum: 6654a8de1bfad0655527d3268f00f2f1 (MD5) / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / Fundação de Amparo à Pesquisa do Estado de São Paulo (FAPESP) / Este trabalho apresenta o desenvolvimento analítico da modelagem de estruturas flexíveis do tipo treliça com o objetivo de atenuação de vibrações através do uso de técnicas de controle ativo. Atuadores de pilha piezelétricos são usados para exercer as forças de controle na estrutura, os quais substituem barras inteiras ou somente uma parte delas. Estes tipos de atuadores, também, satisfazem a necessidade de obtenção de estruturas leves. O posicionamento ótimo desses atuadores e de sensores é encontrado através da norma Hx, que é usada como função objetivo. Como técnica de controle é aplicado o Controle no Espaço Modal Independente (IMSC), no qual os estados são estimados por um estimador modal e são realimentados de acordo com a teoria de controle ótimo, o Regulador Linear Quadrático (LQR). O IMSC é eficiente computacionalmente mesmo aplicado a sistemas de alta ordem e também reduz os efeitos de spillover. Uma melhoria do IMSC, o Controle Modal Eficiente (EMC) também é apresentado com o propósito de reduzir as amplitudes das forças de controle. O modelo matemático da estrutura inteligente é obtido a partir do Método dos Elementos Finitos (MEF) considerando o acoplamento eletromecânico entre os atuadores de pilhas piezelétricos e a estrutura base. O projeto de uma treliça espacial, o posicionamento ótimo dos atuadores e sensores e o controle ativo de vibração são apresentados em simulações numéricas. Os resultados mostram que ambos os controladores aumentam o amortecimento da estrutura e, ainda, o EMC reduz as amplitudes das forças de controle. / This work presents the analytic development of the modeling of flexible truss structures with the aim to suppress the mechanical vibration using active control techniques. Piezoelectric stack actuators are used to produce control force in the structure, which can replace an entire bar or can be coupled to structural members. They also satisfy the necessity to obtain lighter structures. The optimal placement of actuators and sensors is found through the Hã norm as objective function. As control technique is presented the Independent Modal Space Control (IMSC), in which a modal estimator is used and the Linear Quadratic Regulator (LQR) feedback the estimated states according the optimal control theory. IMSC is computationally efficient also applied in high order system and reduces the negative effects of the control and observer spillover. An improvement in the IMSC is the Efficient Modal Control (EMC) that is proposed to reduce the amplitudes of control forces. The mathematical model of the intelligent structure is obtained from Finite Elements Method (FEM) considering the electromechanical coupling between the piezoelectric stack actuators and the base structure. The design of a space truss structure, the optimal placement of active members and the active damping vibration control is numerically implemented. Two control techniques are tested and compared: IMSC and EMC. Results show that the controllers increase the damping of the structure noticeably. The EMC controller provides better performance, reducing the amplitudes of control forces.
103

ExMinerSOF: minerando informa??es excepcionais do Stackoverflow / ExMinerSOF: mining exceptional information from StackOverflow

Fernandes, Teresa do Carmo Barr?to 30 June 2017 (has links)
Submitted by Automa??o e Estat?stica (sst@bczm.ufrn.br) on 2017-11-01T21:17:48Z No. of bitstreams: 1 TeresaDoCarmoBarretoFernandes_DISSERT.pdf: 5261298 bytes, checksum: 1a7e32ec8483e6e7e31101df7f8675f9 (MD5) / Approved for entry into archive by Arlan Eloi Leite Silva (eloihistoriador@yahoo.com.br) on 2017-11-07T21:08:03Z (GMT) No. of bitstreams: 1 TeresaDoCarmoBarretoFernandes_DISSERT.pdf: 5261298 bytes, checksum: 1a7e32ec8483e6e7e31101df7f8675f9 (MD5) / Made available in DSpace on 2017-11-07T21:08:03Z (GMT). No. of bitstreams: 1 TeresaDoCarmoBarretoFernandes_DISSERT.pdf: 5261298 bytes, checksum: 1a7e32ec8483e6e7e31101df7f8675f9 (MD5) Previous issue date: 2017-06-30 / Exce??es n?o capturadas (do ingl?s: uncaught) n?o s?o cen?rios excepcionais nas aplica??es Java atuais. Eles s?o, na verdade, uma das principais causas de falha das aplica??es Java - que podem originar-se de erros de programa??o (e.g., acesso a refer?ncias nulas); falhas no hardware ou em APIs utilizadas. Essas exce??es uncaught resultam em stack traces que s?o frequentemente usados pelos desenvolvedores como fonte de informa??es para a depura??o. Atualmente, essa informa??o ? frequentemente usada pelos desenvolvedores em mecanismos de busca ou sites de perguntas e respostas (do ingl?s: Question and Answer - Q&A) para tentar compreender melhor a causa do crash e assim poder resolv?lo. Este estudo fez a minera??o de stack traces inclu?das nas perguntas e respostas do StackOverflow (SOF). O objetivo deste estudo foi: (i) identificar caracter?sticas das stack traces mineradas do SOF e (ii) investigar como tais informa??es podem ser usadas para evitar exce??es uncaught durante o desenvolvimento de software. Neste estudo, 121.253 stack traces foram extra?das e analisadas em combina??o com inspe??es de postagens do SOF. Tamb?m ? proposta a ferramenta ExMinerSOF, que alerta o desenvolvedor sobre as exce??es que podem ser potencialmente sinalizadas por um m?todo de API. Essas informa??es s?o descobertas aplicando uma estrat?gia de minera??o apresentada neste trabalho. Ao faz?-lo, a ferramenta permite que o desenvolvedor evite falhas com base em falhas relatadas por outros desenvolvedores. / Uncaught exceptions are not an exceptional sce- nario in current Java applications. They are actually one of the main causes of applications crashes, which can originate from programming errors on the application itself (null pointer dereferences); faults in underlying hardware or re-used APIs. Such uncaught exceptions result in exception stack traces that are often used by developers as a source of information for debugging. Currently, this information is ofttimes used by developers on search engines or Question and Answer sites while the developer tries to: better understand the cause of the crash and solve it. This study mined the exception stack traces embedded on StackOverflow (SOF) questions and answers. The goal of this work was to two-fold: to identify characteristics of stack traces mined from SOF and to investigate how such information can be used to prevent uncaught exceptions during software development. Overall 121.253 exception stack traces were extracted and analyzed in combination with Q&A inspections. Hence, this study proposes ExMinerSOF tool, which alerts the developer about the exceptions that can be potentially signaled by an API method but are not part of the API documentation - and was discovered by applying a mining strategy in SOF repository. Doing so, the tool enable the developer to prevent faults based on failures reported by the crowd.
104

Tolerance Analysis of Parallel Assemblies using Tolerance-Maps® and a Functional Map Derived from Induced Deformations

January 2012 (has links)
abstract: This thesis concerns the role of geometric imperfections on assemblies in which the location of a target part is dependent on supports at two features. In some applications, such as a turbo-machine rotor that is supported by a series of parts at each bearing, it is the interference or clearance at a functional target feature, such as at the blades that must be controlled. The first part of this thesis relates the limits of location for the target part to geometric imperfections of other parts when stacked-up in parallel paths. In this section parts are considered to be rigid (non-deformable). By understanding how much of variation from the supporting parts contribute to variations of the target feature, a designer can better utilize the tolerance budget when assigning values to individual tolerances. In this work, the T-Map®, a spatial math model is used to model the tolerance accumulation in parallel assemblies. In other applications where parts are flexible, deformations are induced when parts in parallel are clamped together during assembly. Presuming that perfectly manufactured parts have been designed to fit perfectly together and produce zero deformations, the clamping-induced deformations result entirely from the imperfect geometry that is produced during manufacture. The magnitudes and types of these deformations are a function of part dimensions and material stiffnesses, and they are limited by design tolerances that control manufacturing variations. These manufacturing variations, if uncontrolled, may produce high enough stresses when the parts are assembled that premature failure can occur before the design life. The last part of the thesis relates the limits on the largest von Mises stress in one part to functional tolerance limits that must be set at the beginning of a tolerance analysis of parts in such an assembly. / Dissertation/Thesis / M.S. Mechanical Engineering 2012
105

ULTRA: Universal Grammar as a Universal Parser

Medeiros, David P. 15 February 2018 (has links)
A central concern of generative grammar is the relationship between hierarchy and word order, traditionally understood as two dimensions of a single syntactic representation. A related concern is directionality in the grammar. Traditional approaches posit process-neutral grammars, embodying knowledge of language, put to use with infinite facility both for production and comprehension. This has crystallized in the view of Merge as the central property of syntax, perhaps its only novel feature. A growing number of approaches explore grammars with different directionalities, often with more direct connections to performance mechanisms. This paper describes a novel model of universal grammar as a one-directional, universal parser. Mismatch between word order and interpretation order is pervasive in comprehension; in the present model, word order is language-particular and interpretation order (i.e., hierarchy) is universal. These orders are not two dimensions of a unified abstract object (e.g., precedence and dominance in a single tree); rather, both are temporal sequences, and UG is an invariant real-time procedure (based on Knuth's stack-sorting algorithm) transforming word order into hierarchical order. This shift in perspective has several desirable consequences. It collapses linearization, displacement, and composition into a single performance process. The architecture provides a novel source of brackets (labeled unambiguously and without search), which are understood not as part-whole constituency relations, but as storage and retrieval routines in parsing. It also explains why neutral word order within single syntactic cycles avoids 213-like permutations. The model identifies cycles as extended projections of lexical heads, grounding the notion of phase. This is achieved with a universal processor, dispensing with parameters. The empirical focus is word order in noun phrases. This domain provides some of the clearest evidence for 213-avoidance as a cross-linguistic word order generalization. Importantly, recursive phrase structure "bottoms out" in noun phrases, which are typically a single cycle (though further cycles may be embedded, e.g., relative clauses). By contrast, a simple transitive clause plausibly involves two cycles (vP and CP), embedding further nominal cycles. In the present theory, recursion is fundamentally distinct from structure-building within a single cycle, and different word order restrictions might emerge in larger domains like clauses.
106

Utveckling av en metod för att implementera IPv6 i en existerande nätverksmiljö / Development of a method to implement IPv6 in a existing network environment

Svensson, Jonas, Bergman, Joel January 2011 (has links)
Den här rapporten tog sin början i det faktum att många företag och organisationer idag inte är insatta i vad IPv6 innebär och hur de ska gå tillväga för att implementera IPv6. Det fanns vid tillfället ingen komplett metod för hur en analys av ett nätverk gick till, vad som var viktigt att tänka på, vilka tekniker som fanns tillgängliga och hur dessa implementerades. För att underlätta framtida övergångar till IPv6 bestämde vi oss för att utveckla en generell metod som användaren kan följa och läsa sig till vad de behöver tänka på vid varje steg. Metoden ger också exempel på hur användaren kan göra analyser och undersökningar som leder fram till en lösning som kan fungera för deras behov. Metoden besvarade frågeställningen ”Vad behöver ett företag göra för att kunna implementera IPv6 i en existerande nätverksmiljö?” Övergången till IPv6 är igång och många tekniker är inte färdigutvecklade. För att ta fram lösningar som fungerar för olika scenarier gjordes efterforskningar på både IP version fyra och version sex samt vilka övergångs-tekniker som är att rekommendera. Ett antal övergångs-tekniker valdes ut och sattes upp i ett testlabb där IPv6-funktionaliteten verifierades. För att ta fram en metod som täckte upp de vanligaste scenarierna diskuterades frågan med Empir AB, ett företag som arbetar med IT-lösningar och som tillhandahåller egna tjänster. Deras nätverk analyserades och det arbetet låg till grund för utformningen av metoden. Eftersom alla tekniker i metoden testades i laborations-nätverket fastställdes IPv6-funktionalitet genom att testa olika tjänster över nätverket. Testerna visade att det var fullt möjligt att implementera IPv6 efter en steg för steg-modell. Resultatet av arbetet kan användas för att initiera och fullfölja en övergång till IPv6 då användaren har en metod att följa, rekommendationer på vad som behöver göras och föreslagna lösningar som kan implementeras enligt anvisningar. / This report began with the fact that many companies and organizations today do not have any or little knowledge about IPv6 and what it means, nor do they know how to implement it. At the time of writing there were no complete method for how an analysis of a network were done, what was important to think on and which techniques were available. To ease future transitions to IPv6, we decided to develop a general method that a user could follow step by step, with instructions for what to think on at each step. The method also gives examples on how the user could do an analysis and examinations, and it eventually leads to a solution based on their needs. The method answers the question "what does a company need to do to be able to implement IPv6 in an already existing network?" The transition to IPv6 is happening and many techniques is still in development. To be able to present solutions that work with different needs, research in IP version four, version six and in transfer techniques were done as well. A set of transfer techniques was chosen and set up in a lab network where IPv6 functionality was verified. To develop a method that covered most of the common scenarios, the question were discussed with Empir AB, a company that works with IT solutions that hosts their own services. Their network was analyzed and the result was the foundation for the method. Since all techniques in the method were tested in the lab network, the IPv6 functionality was verified by testing different services over the network. The tests showed that it was possible to implement IPv6 after a step by step model. The result of this work can be used to initiate and follow through with a transition to IPv6 since the user have a method to follow, recommendations to what needs to be done and proposed solutions that can be implemented after instructions.
107

Business intelligence application in online retail / Aplikace Business Intelligence v online retailu

Haloun, Petr January 2017 (has links)
The thesis focuses on application of business intelligence in online retail. The work summarizes the benefits of BI usage in online retail and provides an overview of the areas, where BI and Analytics is commonly used. Further, the thesis includes theoretical research with primary focus on business performance evaluation metrics and describes BI market leaders. The performance metrics theoretical research is supported by a survey in a global online fashion retail company that author conducted and summarized. Moreover, a practical design and implementation of a specific real-life BI solution is proposed and presented. The thesis added value is mainly author s proposal of BI solution design and its implementation for a global online retail company, which was successfully deployed as a main BI reporting system of the company. The description includes data integration part, data modelling part and the presentation layer. Thesis includes also practical examples of the outputs based on the final solution. Besides, highly valuable is also author s theoretical research in the field.
108

Electrodialysis of salts, acids and bases by electro-osmotic pumping

Schoeman, Jakob Johannes 09 March 2010 (has links)
Please read the abstract in the section 00front of this document. / Thesis (DPhil)--University of Pretoria, 2010. / Chemistry / unrestricted
109

Aplikace akustické analýzy hovoru pro systém Android / Acoustic call analysis application for Android system

Hejda, Jakub January 2018 (has links)
The telemedicine’s capabilities are rapidly expanding due to technological advances in a smarphone development. The goal of this thesis was to suggest the architecture and prepare the design providing acquisition, processing and synchronization of voice para- meters recorded by patients with Parkinson’s disease and to implement such system. The architecture was completed successfully, it consists of the mobile application able to record patient’s calls, the server application introducing an interface to store and synchronize the data and to provide them to the web application, where doctors can see the data and analyze it. Implementation of the server application was finished according to the design and to the requirements for robustness and security as well as the web application. By an extension of the existing mobile application for recording voice calls there was developed a huge system for the analysis of this disease.
110

Návrh monitoringu kritické komunikační infrastruktury pro energetickou společnost / A concept of monitoring critical information infrastructure for energetic company

Ševčík, Michal January 2018 (has links)
Diploma thesis deals with monitoring critical infrastructure, critical information infrastructure and network monitoring in energetic industry. The goal is to create analytical environment for processing logs from the network, to map the most critical segments of the network and implementation of monitoring and network devices, that increase security and mitigate risks of security events or security incidents

Page generated in 0.1312 seconds