• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 747
  • 350
  • 73
  • 73
  • 73
  • 73
  • 73
  • 72
  • 48
  • 31
  • 9
  • 5
  • 5
  • 4
  • 3
  • Tagged with
  • 1696
  • 1696
  • 271
  • 253
  • 238
  • 208
  • 186
  • 185
  • 174
  • 166
  • 145
  • 138
  • 137
  • 127
  • 125
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
481

A simulation of a microcomputer-based intrusion detection system

Bartholomew, John Warren January 2011 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
482

Control of a flexible link using a micro-stepper motor with acceleration feedback

Simmons, Robert Andrew. January 1985 (has links)
Call number: LD2668 .T4 1985 S565 / Master of Science
483

SWITCHED-CAPACITOR ACTIVE FILTER DESIGN AND SIMULATION

Liu, Lixin January 1981 (has links)
With the advantages of MOS monolithic technology in mind, Switched-Capacitor (SC) filter design and simulation are studied in this research. For SC circuit design, Shunt SC, bilinear, and LDI z-Transform methods are discussed. A practical design example, together with its circuit implementation, is used to check both design and simulation behaviors. For SC circuit simulation, certain methods are analyzed to compare with the Four-Port Method, from which a proposed method, STAMP, is derived. STAMP improves on the large computation time and storage space problems of other well-known programs. It has the capability of being expanded using some of the routines which are appended.
484

A GENERALIZED INTELLIGENT PROBLEM SOLVING SYSTEM BASED ON A RELATIONAL MODEL FOR KNOWLEDGE REPRESENTATION (SUPPORT SYSTEMS, EXPERT, DECISION AIDS).

PARK, SEUNG YIL. January 1986 (has links)
Over the past decade, two types of decision aids, i.e., decision support systems (DSS) and expert systems (ES), have been developed along parallel paths, showing some significant differences in their software architectures, capabilities, limitations, and other characteristics. The synergy of DSS and ES, however, has great potential for helping make possible a generalized approach to developing a decision aid that is powerful, intelligent, and friendly. This research establishes a framework for such decision aids in order to determine the elementary components and their interactions. Based on this framework, a generalized intelligent problem solving system (GIPSS) is deveolped as a decision aid generator. A relational model is designed to provide a unified logical view of each type of knowledge including factual data, modeling knowledge, and heuristic rules. In this knowledge model, a currently existing relational DBMS, with some extension, is utilized to manage each type of knowledge. For this purpose a relational resolution inference mechanism has been devised. A prototype GIPSS has been developed based on this framework. Two domain specific decision aids, COCOMO which estimates software development effort and cost, and CAPO which finds optimal process organization, have been implemented by using the GIPSS as a decision aid generator, demonstrating such features as its dynamic modeling capabilities and learning capabilities.
485

ELASTIC-PLASTIC STABILITY ANALYSIS OF A MINE TAILING SLOPE.

Collard, Leonard Bruce. January 1982 (has links)
No description available.
486

SIP-based location service provision

Wu, YanHao January 2005 (has links)
Location-based service (LBS) is a geographical location-related service that provides highly personalized services for users. It is a platform for network operators to provide new and innovative ways of increasing profits from new services. With the rapidly growing trend toward LBS, there is a need for standard LBS protocols. This thesis started with introducing the Internet Engineering Task Force GEOPRIV working group, which endeavors to provide standard LBS protocols capable of transferring geographic location information for diverse location-aware applications. Through careful observation, it was found that Session Initiation Protocol (SIP) is well suited to the GEOPRIV requirements. The aim of this research was therefore to explore the possibility of the integration of LBS and the SIP protocol and, to some extent fulfill the GEOPRIV requirements.
487

The development and evaluation of an intelligent supervisory system for process control.

Korpala, Andrzej January 1991 (has links)
A dissertation submitted to the Faculty of Engineering, University of the Witwatersrand, .Johannesburg, in fulfilment of the requirements for the degree of Master of Science in Engineering. / As industrial plants become more complex. there is a growing need for new approaches to control and supervision. This research investigates the issues involved in applying Artificial Intelligence (AI) techniques in the real-world engineering problem of process control supervision. Current AI theory is examined and some techniques modified to design a general-purpose, reactive planner. The planner forms the basis of a supervisory control system. The system is implemented and interfaced with an existing Laboratory plant, so that its performance can he tested and evaluated by comparing with a conventional feedback controller This real life testing necessitates explicit treatment of issues such as data: sampling. situation assessment and CPU scheduling. The case study shows that by combining AI techniques with conventional control, a system can be built which displays superior performance under normal operating conditions and which can deal with abnormal conditions such as equipment failures. / Andrew Chakane 2018
488

A study of the software piracy problem in corporate users of Hong Kong.

January 1990 (has links)
by Tam Kam-Mau. / Thesis (M.B.A.)--Chinese University of Hong Kong, 1990. / Bibliography: leaf 50 (2nd group). / TABLE OF CONTENTS --- p.ii / PREFACE --- p.iii / Chapter / Chapter I. --- INTRODUCTION --- p.1 / The Need for Copyright of Software --- p.1 / Software Piracy and Illicit Copying --- p.2 / Protective Measures of Software --- p.2 / The Copyright (Computer Software) Amendment Act --- p.3 / The Problem --- p.4 / The Research Problem Defined --- p.8 / Chapter II. --- METHODOLOGY --- p.9 / Chapter III. --- THE PROCESS OF THE RESEARCH PROJECT --- p.12 / Chapter IV. --- ANALYSIS OF DATA --- p.14 / Analysis of Individual Question --- p.14 / Analysis of Answer between Questions --- p.20 / Chapter V. --- RESEARCH FINDINGS --- p.29 / Chapter VI. --- CONCLUSION --- p.35 / Some Recommendation --- p.37 / Chapter VII. --- A FINAL WORD AND ACKNOWLEDGEMENT --- p.40 / Appendex / Chapter I. --- Copyright (Computer Software) Amendment Act 1985 --- p.41 / Chapter II. --- Sample Software License Agreement --- p.45 / Chapter III. --- Bibliography --- p.50 / Chapter III. --- Questionnaire --- p.51 / Chapter IV. --- SPSS Reports --- p.55
489

Privacy and security of an intelligent office form

Lee, Kum-Yu Enid January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.
490

Teleconferencing and the MARRS computer conferencing system

Stachowicz, Thomas Joseph January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries / Department: Computer Science.

Page generated in 0.0651 seconds