• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1587
  • 643
  • 580
  • 284
  • 278
  • 193
  • 151
  • 75
  • 52
  • 50
  • 42
  • 39
  • 38
  • 32
  • 23
  • Tagged with
  • 4619
  • 877
  • 719
  • 689
  • 565
  • 545
  • 486
  • 458
  • 408
  • 407
  • 403
  • 364
  • 354
  • 348
  • 330
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Class-dependent features and multicategory classification

Bailey, Alex January 2001 (has links)
No description available.
62

A new face-entity model of digital topographic data for multi-purpose urban GIS

Pun-Cheng, Lilian Suk Ching January 1999 (has links)
No description available.
63

Development of software tool to perform automatic analysis and documentation for large sets of measurement data

Wantuch, Aleksandra, Zwierzyński, Marcin January 2016 (has links)
A modern car’s safety and reliability is heavily influenced by the durability of its components and subsystems. These elements’ strength and durability is evaluated with the help of Computer Aided Engineering simulations, test rides on special test tracks and thorough simulations in test rigs. These three types of simulations are sources for data which can be analysed and compared. The data analysis is currently performed using a number of commercial programs as well as manually, which makes the process lengthy and difficult. However, it can be improved by incorporating the most useful analysis tools along with the extra ones which the currently used programs lack into a new program. These tools were put together to form the scope of this master thesis. Its purpose is to deliver a Graphical User Interface based application, which will incorporate the needs of the engineers in an intuitive matter. The software is created in Python programming language together with PyQt framework for GUI implementation. The application’s main purpose is to read measurement data files, perform specific calculations on them and present the results on screen, both in the form of figures and numerical data. Additional functions of the program include creating a sequence of test events and saving the analysis results as an MS Excel file type report.
64

Experiments with Linked Data / Experiments with Linked Data

Nohejl, Pavel January 2011 (has links)
The goal of this master thesis is to create a "manual" to Linked Data technology. The first part of this thesis describes the Semantic Web and its relationship to Linked Data. Then follows a detailed explanation of Linked Data and so called "Linked Data principles" including involved technologies and tools. The second part of the thesis contains practical experiences with creation and using Linked Data. Firstly is described obtaining data on public procurement by web crawler developed for these purposes, followed by a description of transformation obtained (relational) data into Linked Data and their interlinking with external Linked Data sources. One part of this thesis is also an application consuming created Linked Data. This is compared with the traditional approach when the application consumes data from a relational database. This comparison is supplemented by a benchmark. Finally is presented a manual for the beginning developer which summarizes our experiences. The list of problems which are necessary to solve (from our point of view) for further development of Linked Data is also included.
65

Usability analysis of the channel application programming interface

Brown, Christopher A. 06 1900 (has links)
Approved for public release; distribution is unlimited / The Channel Application Programming Interface (API) provides a tool for loosely coupling components in Component Based Design (CBD) projects. In the thesis that proposed and developed the API, the author provided a technical analysis of the API's performance with respect to communication metrics. However, only the author/designer has ever used the API; hence, no analysis was accomplished with respect to Usability attributes. The project sponsor desires public release of the API. However, a usability analysis is first required to ensure wide acceptance and use of the API. In order to analyze the API, an analysis method and associated metrics are required. Little work has been done in the field of Human Computer Interface (HCI) with respect to treating an API as an interface and programmers as the end users. This thesis follows an IEEE published test protocol and well known HCI approaches to test the API for general usability attributes as well as to investigate specific features of the API. Specifically, the analysis will test the API's ability to explain itself during first-time exposure in order to gain acceptance. The results from testing the API are used to determine necessary enhancements to the API and its documentation. / Ensign, United States Navy
66

An assessment of self-regulation: the Wireless Applications Service Providers' code of conduct

Mokgoro, Itumeleng 24 November 2011 (has links)
The Wireless Applications Service Providers Association (WASPA) is a self-regulatory body for the wireless application industry in South Africa – and employs its Code of Conduct as the primary instrument in regulating the industry. The purpose of this qualitative study is to evaluate how effective the Code has been in regulating the behaviour of the wireless applications service providers in the country. The findings from the research study suggest that the WASPA Code has more weaknesses than strengths. A significant finding is that WASPA is viewed as a legitimate regulator of the WASP industry – and its Code enjoys wide support from the industry. However, there are some questions around the organisation and the Code‟s credibility in a number of important areas. Some of the more important negative findings include, amongst others, the following: WASPA might have been captured by the established players in the industry; the WASPA Code seems to have insufficient focus on business-to-business aggregators; and the WASPA regulatory regime must cover the network operators‟ VAS services in order to ensure more meaningful industry
67

My Crystal Diary (MCD) : an integrated software application for recording the observations and results of crystallisation experiments

Mooranian, Mahsa January 2008 (has links)
Recent technological advances in computer science have contributed to immense data generation in many critical areas of biology. These data can be used in intelligent information systems to better understand biological processes from the atomic details of biological molecules to the interaction of species in an ecosystem. This thesis presents My Crystal Diary (MCD), an integrated software application designed for use in an intelligent decision-support system for planning novel crystallisation experiments. PostgreSQL database server is the information repository containing both the experimental data and general knowledge. Web-based interfaces developed in Plone provide remote access to the database by utilizing a Zope Web application server.
68

Oracle Strategy in Business Development : MBA-thesis in marketing

Talebi-Taher, Hamidreza January 2010 (has links)
Aim: The aim of this research has been to answer the question of how and based on what combination of grand strategies, Oracle as a high-tech company, developed and improved its business and affected its competitors and other industries. Method: Analytical study of published literature and Oracle internal annual reports combined with personal experience of working with Oracle products and observing its strategies for more than a decade have been the essential part of this study. The main method of data collection was gathering information from those websites which include information and news around Oracle strategic movements. This research has applied that information to deliver an analysis of not only the Oracle current strategy, but its strategy for the future and tendency to expand its market and direct the information industry, moving forward. Result & Conclusion: Being around for three decades, Oracle has had a great history of successful strategies with introducing innovation, leading software industry, and directing the future of information technology. It has been survived from many uncertainties as the nature of its business. Knowing its competitors, spending billions of dollars on research and development, filling the gaps of having the best products through acquisition, and creating valuable products and services for many industries, has brought Oracle on the top in its area. Its vision of sharing information and giving the world wide access to a comprehensive knowledge of using its products and services has increased loyalty in its customers and business partners. Oracle is a crucial company in this information age, and its products and solutions have been critically useful for a wide range of businesses. These are the facts which have been concluded in this study. Contribution of the study: Understanding of Oracle strategy is important for millions of managers, developers, and users of database systems and enterprise applications throughout the world. Being successful in their career and professional positions, they have to know where the information technology is moving and they have no choice of using those software products which a major part of it, is created or at least directed by Oracle. It can guarantee the future of information management in a company.
69

Web application Security

Charpentier Rojas, Jose Enrique January 2013 (has links)
Problems related to web application security comes in many ways, one example is inexperience programmers but not only in the way they code and program but also which language and structure they use to code. Not only programmers but Software companies left holes in the software they developed of course without intention.Because is proven that most of the vulnerabilities start in the web application side, as developers we need to follow certain principles, test our code and learn as much as possible about the subject, as a foundation of web application security in order to know how to prevent issues to the most significant treats.The penetration test aimed to help the IT business to discover vulnerabilities in their system ensure their integrity and continue further in the web application security process. The vulnerability research perform in this report is the introduction of a big work that is under continuity for the company.Finally the success of following security standards, process and methodologies applied on this field is considered the best approach to ensure web application security and priceless information you can benefit from.
70

Measuring Application Availability,Usage and Performance : Implementation of EnView System

Norouzi, Foad January 2006 (has links)
The main objective for this degree project is to implement an Application Availability Monitoring (AAM) system named Softek EnView for Fujitsu Services. The aim of implementing the AAM system is to proactively identify end user performance problems, such as application and site performance, before the actual end users experience them. No matter how well applications and sites are designed and nomatter how well they meet business requirements, they are useless to the end users if the performance is slow and/or unreliable. It is important for the customers to find out whether the end user problems are caused by the network or application malfunction. The Softek EnView was comprised of the following EnView components: Robot, Monitor, Reporter, Collector and Repository. The implemented system, however, is designed to use only some of these EnView elements: Robot, Reporter and depository. Robots can be placed at any key user location and are dedicated to customers, which means that when the number of customers increases, at the sametime the amount of Robots will increase. To make the AAM system ideal for the company to use, it was integrated with Fujitsu Services’ centralised monitoring system, BMC PATROL Enterprise Manager (PEM). That was actually the reason for deciding to drop the EnView Monitor element. After the system was fully implemented, the AAM system was ready for production. Transactions were (and are) written and deployed on Robots to simulate typical end user actions. These transactions are configured to run with certain intervals, which are defined collectively with customers. While they are driven against customers’ applicationsautomatically, transactions collect availability data and response time data all the time. In case of a failure in transactions, the robot immediately quits the transactionand writes detailed information to a log file about what went wrong and which element failed while going through an application. Then an alert is generated by a BMC PATROL Agent based on this data and is sent to the BMC PEM. Fujitsu Services’ monitoring room receives the alert, reacts to it according to the incident management process in ITIL and by alerting system specialists on critical incidents to resolve problems. As a result of the data gathered by the Robots, weekly reports, which contain detailed statistics and trend analyses of ongoing quality of IT services, is provided for the Customers.

Page generated in 0.0182 seconds