• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 4
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 31
  • 6
  • 6
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Designing and implementing a system for automating the Java project analysis process

Yan, Zheng January 2008 (has links)
<p>A process for the analysis and collection of information of software systems has been defined. It extracts relevant information of project source files from an online repository and stores that meta-information in a database for further processing. Then, according to the meta-information in the database, it downloads the source files and writes the feedback information back to the database as well. Now the data can be used as input for various analysis tools, in our case a tool called VizzAnalyzer, which reads the project source code and performs a series of software quality analyses.</p><p>But actually, the process, which is mentioned above needs, a lot of manual work, makes the work inefficient and the analysis of large numbers of projects impossible.</p><p>Thus, a series of thesis projects has been devised to automate the whole process. This thesis aims at automating the information extraction and source file download work, which will make the latter preparation of the analysis task much easier and more efficient.</p>
12

Designing and implementing a system for automating the Java project analysis process

Yan, Zheng January 2008 (has links)
A process for the analysis and collection of information of software systems has been defined. It extracts relevant information of project source files from an online repository and stores that meta-information in a database for further processing. Then, according to the meta-information in the database, it downloads the source files and writes the feedback information back to the database as well. Now the data can be used as input for various analysis tools, in our case a tool called VizzAnalyzer, which reads the project source code and performs a series of software quality analyses. But actually, the process, which is mentioned above needs, a lot of manual work, makes the work inefficient and the analysis of large numbers of projects impossible. Thus, a series of thesis projects has been devised to automate the whole process. This thesis aims at automating the information extraction and source file download work, which will make the latter preparation of the analysis task much easier and more efficient.
13

Design and development of an on-line vending system for selling prepaid electricity via the Internet

Hearn, Gareth 07 March 2006 (has links)
The sale of prepaid electricity is prevalent in South Africa due to the current economic, social, and political conditions. The system currently used for the distribution of tokens for prepaid electricity, CVS, has a design flaw that leads to many security vulnerabilities. The design flaw is that the security devices that generate the tokens are distributed in the field and operate independently of centralised control. This was done because of the limited communication infrastructure in South Africa 10 years ago, but is no longer necessary. An improvement to the system is suggested that removes the security vulnerabilities by making the system on-line. By employing the communication infrastructure that is available today to provide access to the security devices, the security devices can be located in a secure environment. Changing the mode of operation to on-line also has other advantages such as simplifying auditing and removing synchronisation problems. This improved system works by communicating on-line with a centralised server and database for every transaction that a customer makes. By doing this, all of the parties involved are kept up to date with the most recent transactions. There can no longer be financial discrepancies and the risk of all parties involved is thus reduced. It is no longer meaningful to steal the vending machines because they no longer have the ability to generate tokens independently. In order to implement such a system, however, there are many security aspects that need to be addressed, such as the confidentiality of the information within the system and proving that a transaction did occur between two specific parties. To this end, cryptographic functions and protocols are selected that meet the requirements of the system. Public key cryptography was found to be a necessary ingredient in making the system work effectively and efficiently. In order to use public key cryptography in the new system, Public Key Infrastructure is required to manage public keys and provide authentication services. A suitable system is developed and described that employs certificate authorities and X.509 certificates. The procedures that are required from each party are listed. A set of messages that is required for the functions of the system is given. For each message, the contents of the message is given, the parts of the message that must be encrypted are defined and the parts of the message that must be digitally signed are given. Finally, the security of the individual parts of the system is critically analysed to show that all of the design goals have been achieved. Particular attention is given to the authentication of parties involved in the communication. The security of the system as a whole is also evaluated with respect to the X.810 security framework and it is shown that the system is robust from a security perspective. The result of the research is a system that meets the required functionality to replace the existing system, and at the same time meets all of the security requirements. It is shown that the proposed system does not have the security flaws of the existing system and thus is more effective in its purpose of vending prepaid electricity. / Dissertation (MEng (Electronic))--University of Pretoria, 2007. / Electrical, Electronic and Computer Engineering / unrestricted
14

Performance of Musicians and Nonmusicians on Dichotic Chords, Dichotic CVs, and Dichotic Digits

Nelson, M. Dawn, Wilson, Richard H., Kornhass, Suzanne 01 October 2003 (has links)
Perception of dichotic chords (free recall and directed recall), nonsense syllables (CVs), and three-pair digits was assessed on 24 musicians and 24 nonmusicians. On the dichotic-CV and dichotic-digit free-recall tasks, there was a significant right-ear advantage, but there were no group differences. With the dichotic-chords, free-recall condition, a significant left-ear advantage was observed but no group difference. For the dichotic-chords, directed-recall conditions, the musicians performed significantly better by 10 percent than the nonmusicians. Unexpectedly, for the dichotic chords, the 62-72 percent correct performances were better on the free-recall condition than the 42-55 percent performances on the directed-recall conditions. These differences between the two response modes were attributed to the difficulty of the dichotic-chord listening tasks and the probabilities associated with the closed-set response paradigms. The findings suggest that the dichotic-chord paradigm used in this study should not be included in clinical protocols used to assess auditory perceptual abilities.
15

LEVERAGING CONNECTED VEHICLE DATA FOR INFRASTRUCTURE PERFORMANCE EVALUATION AND MONITORING

Justin Anthony Mahlberg (9746357) 29 April 2023 (has links)
<p>  </p> <p>For decades, agencies have collected infrastructure condition assessment data using dedicated equipment that require substantial capital investments and staff time to operate/drive. However, these techniques are challenging to scale network wide. The United States has over 8 million lane miles of roadways which generate almost 3 trillion vehicle miles annually.  Connected vehicles can now provide real-time data on a wide range of parameters such as vehicle speed, location, lane markings, and 3 axis acceleration. This dissertation develops techniques to validate, utilize and leverage connected vehicle data for infrastructure assessment and monitoring.  </p> <p><br></p> <p>Opportunities to employ connected vehicle data were examined in the following areas: quality of lane marking edge lines, width of lanes (particularly temporary lanes in construction zones), and pavement roughness. Quality of lane markings was evaluated using embedded lane keep assist data and equipment. In 2020 and 2021 over 5000 miles of pavement markings were evaluated on Indiana interstates. Comparisons between 2020 and 2021 data showed detection increase from 80.2% to 92.3%.  Although there are no industry standards for lane keep assist data, this study demonstrated both the importance and utility of partnering with the automotive industry to develop shared vision on acceptable lane quality. </p> <p><br></p> <p>A follow-up quantitative study was performed using a LiDAR vehicle to compare LiDAR values with those that are obtained from traditional retroreflectivity measurements used for contract acceptance and maintenance decisions. A comparison of LiDAR intensity to retroreflectivity (the industry standard) on 70 miles of US-52 and US-41 in Indiana was assessed and a linear regression found that the intensity values are comparable to retroreflectivity readings with an R2 of 0.87 and 0.63 for right edge and center skip lines respectively. These results suggest that LiDAR is a viable tool for monitoring of retroreflectivity of pavement markings that are strongly correlated with existing standards, but scale much better than traditional retroreflectivity measurement techniques.</p> <p><br></p> <p>The LiDAR data also provided the opportunity to evaluate how well modern vehicles measure lane width. This dissertation reports on over 200 miles of roadway and when compared to LiDAR and field measurements had a root mean square error of 0.24 feet. This data is valuable for agencies to quickly identify system wide where lane widths fall below acceptable design standards, typically 11-feet. </p> <p> </p> <p>The final connected vehicle data set evaluated was pavement roughness and compared with traditional dedicated vehicles collecting international roughness index (IRI) data. The study evaluated a 20-mile segment in 2022, and showed a linear regression between these data sets had an R2 of over 0.7, suggesting that connected vehicle roughness data can be utilized for network level monitoring of pavement quality. Scalability of these techniques is also illustrated with graphics characterizing IRI values obtained from almost 6 million records to evaluate improvements in Indiana construction zones and over 5,800 miles of I-80 in April of 2022 and October 2022.</p> <p><br></p> <p>Although connected vehicle data for infrastructure assessment is still in its infancy, these case studies demonstrate significant opportunities for public agencies to collect selected system wide infrastructure condition in near real-time, and in many cases at a lower cost than traditional techniques. </p>
16

Automatic Visualization of the Version history of a Software System in Three Dimensions

Asokan, Ramya 15 April 2004 (has links)
Software changes constantly and continuously. It is often beneficial to record the progressive changes made to software, so that when any problems arise, it is possible to identify the change that might have caused the problem. Also, recording these changes enables recovery of the software as it was at any point of time. A version control system is used to track modifications to software. Version control systems (VCS) display when and where a change was made. In the case of multiple developers working on the same software system, version control systems also record which developer was responsible for the change. RCS, SCCS and CVS are examples of such version control systems, and they usually have a command-line interface. The widespread use of CVS has however given rise to a host of "CVS clients", which provide a two-dimensional graphical interface to CVS. While working with a version control system in two dimensions is a definite improvement over traditional command line interfaces, it is still not sufficient to display all the necessary information in a single view. Using three dimensions to display the information from a version control system like CVS is an effective and efficient way to represent multiple attributes in a single view. There are many advantages to using a third dimension for visualizing the version history and evolution of software. A three-dimensional visualization tool has been developed to provide insights into the structure and characteristics of the history of a software system. It demonstrates the benefits of three-dimensional visualization and illustrates a framework that can be used to automatically derive information from a version control system. / Master of Information Systems
17

Diagnostika kardiovaskulárního systému metodou CVS / The CVS method as a diagnostic of the cardiovascular system

Procházka, Marek January 2016 (has links)
Title: The CVS method as a diagnostic of the cardiovascular system Objective: The aim of this thesis is to introduce the CVS (cardiovascular system) method as a potential diagnostic method to detect the overloading of the heart muscle, and thereby increased susceptibility to subsequent myocardial infarction and hypertension. Method: This thesis presents a data analysis on different groups of people, which were provided to us during the development of the CVS method. These were several groups of healthy individuals (athletes) and three groups of patients suffering from problems with the cardiovascular system (colaps conditions, obesity and hypertension). The groups were measured for their values of the heart rate and blood pressure at rest and during exercise on a bicycle ergometer. Subsequently the energy required to pump blood to the heart muscle and climbing speed pulse pressure depending on the heart rate was evaluated. Results: The CVS method shows differences in the energy consumption of the heart muscle in various groups of people. The results showed that at the same level of exercise the load of the heart muscle is higher by patients than by athletes. Considering the samples that we had available, the CVS method proved its diagnostic value when evaluating the overall effectiveness of the...
18

Invazivní metody v prenatální péči z pohledu ošetřovatelství z využitím systémů NANDA, NIC a NOC / Invasive methods of prenatal care from the perspective of nursing, using the system NANDA, NIC and NOC.

ŠTEFKOVÁ, Karin January 2015 (has links)
In this thesis, we deal with the issue of invasive methods of prenatal care from a nursing perspective using standardized classification schemes NANDA, NIC and NOC, which offer many opportunities to streamline, simplify and improve the care of women who undergo invasive procedures. The theoretical part is focused on screening in prenatal care, individual invasive methods and the most common congenital malformations of the child. Furthermore, standardized classification systems NANDA, NIC and NOC, which represent a common nursing language. The empirical part of the dissertation is processed using qualitative strategy. To collect data, we selected the following research methods: content analysis of documents, evaluation using Fehring's model. The first goal was to detect and identify the problems that women face after amniocentesis (AMC), chorionic villus sampling (CVS) and cordocentesis and second goal was to assess the applicability of selected issues of classification systems NANDA, NIC and NOC with Fehring's model of validation of nursing diagnoses. Using content analysis, we have selected three nursing diagnosis from the NANDA International Taxonomy II, from publication of Nursing Interventions clasification (NIC) 3 nursing interventions and from Nursing Outcomes Clasification (NOC) 4 expected results, which are focused on the respondents after invasive methods. From selected nursing diagnoses of NANDA, NIC interventions and NOC expected results, we have developed a research form, specific questionnaire we submitted to the validation by respondents. The survey was carried out from January to March 2015 in the polyclinic GENNET Ltd. - Centrum of Medical genetics and reproductive medicine and in a private clinic OG Medical Center Ltd. The sample consisted of 34 intentionally selected respondents who underwent amniocentesis, chorionic villus sampling, or cordocentesis. The outcome of this thesis is the basic concept of the nursing diagnosis, according to NANDA-I, NIC and NOC aimed at women after invasive methods for prenatal care. Research has shown that with the the vast majority of respondents significantly exhibited symptoms of fear and anxiety. In contrast, in terms of the respondents reported that the knowledge of the issue is sufficient. This result is influenced by the fact that respondents find a lot of information on the Internet, but that may not always be true. Unfortunately, the results showed that it is more a problem of communication and interest of the medical staff.
19

Web Based Resource Management for Multi-Tiered Web Applications

Ott, Bryce Daniel 04 December 2007 (has links)
The currently emerging trend of building more complex web applications to solve increasingly more involved software problems has led to the the need for a more automated and practical means for deploying resources required by these advanced web applications. As web based applications become more complex and involve more developers, greater system redundancy, and a larger number of components, traditional means of resource deployment become painfully inadequate as they fail to scale sufficiently. The purpose of this research is to provide evidence that a more sound and scalable test and deployment process can be employed and that many of the components of this improved process can be automated and/or delegated to various system actors to provide a more usable, reliable, stable, and efficient deployment process. The deployable resources that have been included for their commonality in web based applications are versioned resources (both ASCII based and binary files), database resources, cron files, and scripting commands. In order to achieve an improved test and deployment process and test its effectiveness, a web-based code deployment tool was developed and deployed in a production environment where its effects could be accurately measured. This deployment tool heavily leverages the use of Subversion to provide the management of versioned resources because of its extensive ability to manage the creation and merging of branches.
20

La modalité et ses corrélats en birman, dans une perspective comparative

Vittrant, Alice 10 December 2004 (has links) (PDF)
Ce travail sur La modalité et ses corrélats en birman, dans une perspective comparative, s'inscrit délibérement dans une approche typologique, par la confrontation d'un modèle théo¬rique à des données langagières afin de le faire évoluer vers une plus grande universalité. <br />Nous commencerons notre étude par une première partie théorique sur les notions de modalité, de temps et d'aspect (TAM). Après avoir rappelé les liens existant entre ces trois notions, nous nous attacherons à les expliciter. Nous nous appuierons, pour ce faire, sur les travaux de Cohen (1989) et de Dik (1997) pour l'aspect. En ce qui concerne la modalité, nous nous inspirerons plus particulièrement de l'approche sémantique de Frawley (1992) et de celle, fonctionnaliste, de Dik (1997) : à la suite de Frawley, nous consi¬dérerons la négation comme faisant partie du domaine de la modalité, et utiliserons l'idée proposée par Dik d'une stratification de la phrase pour formuler un modèle hiérarchisé de la modalité à cinq niveaux. <br />Nous continuerons par une présen¬tation générale de la langue birmane, et plus particulièrement du birman vernaculaire. <br />Nous proposerons ensuite une ré-analyse du syntagme verbal birman, fondée sur la notion de constructions de verbe en séries (CVS) ; elle sera accompagnée d'une présentation des morphèmes verbaux et des valeurs qu'ils véhiculent.<br />Nous aborderons enfin l'expression de la modalité en birman, sujet principal du présent travail, en montrant, dans un premier temps, que cette dernière, bien représentée dans la langue, utilise des formes variées : morphèmes spécialisés, morphèmes grammaticalisés, constructions syntaxiques, expressions figées. Puis nous mettrons en évidence que la modalité en birman intervient à différents niveaux dans l'énon¬cé ; elle peut être inhérente au procès (niveau A), concerner la prédication (niveau B), s'inscrire dans la proposition (niveau C), porter sur la phrase entière (D) ou opérer au niveau de l'énoncé (niveau E).<br />Pour conclure, nous verrons que la modalité est une notion essentielle en birman : obligatoirement exprimée dans le syntagme verbal, elle apparaît à tous les niveaux précédemment définis, et sous des formes nombreuses et variées.

Page generated in 0.0183 seconds