• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 745
  • 350
  • 73
  • 73
  • 73
  • 73
  • 73
  • 72
  • 48
  • 31
  • 9
  • 5
  • 5
  • 4
  • 3
  • Tagged with
  • 1694
  • 1694
  • 271
  • 253
  • 236
  • 208
  • 186
  • 185
  • 173
  • 166
  • 145
  • 138
  • 137
  • 126
  • 125
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
611

Historical analysis of the Battle of Little Bighorn utilizing the Joint Conflict and Tactical Simulation (JCATS)

Pecha, Keith E., Charlebois, Michael A. 06 1900 (has links)
Approved for public release; distribution is unlimited / The purpose of this thesis is to determine which of three competing theories of what occurred at the Battle of Little Bighorn is the most plausible by utilizing the Joint Conflict and Tactical Simulation (JCATS) program developed by Lawrence Livermore National Laboratory. There are many practical gains that JCATS can provide today's military with regard to training and educating soldiers for future conflicts. JCATS can be used to train soldiers in planning and executing missions in ways not feasible with conventional field training exercises utilizing live bodies and real vehicles. It is also increasingly being used for actual mission planning. However, very little has been done using JCATS to war-game past operations. There are two points to be gained by using JCATS to model a historical battle such as the Battle of Little Bighorn. First, it validates the ability of JCATS to accurately model actual historical scenarios while identifying many of the specific limitations of the program. If the military is going to use computer simulations such as JCATS in lieu of field training exercises to train soldiers, it must first be determined if the program produces realistic results. Modeling an actual battle and comparing the results of the program with what actually occurred is one means of doing so. Second, modeling historical battles, particularly defeats, may assist in discovering lessons learned. In a field training exercise, a defeated force can be brought back to life and given another opportunity to apply the lessons learned from its previous defeat. Real battles afford no such opportunity. Computer modeling of past battles would allow military planners to isolate individual events and decisions and study their impact on the outcome. / Major, United States Army
612

A vibration analysis system using spectral estimation techniques

Verser, Brick Andrew. January 1986 (has links)
Call number: LD2668 .T4 1986 V475 / Master of Science / Electrical and Computer Engineering
613

A data dictionary for the INGRES data base management system

Wilson, Loren. January 1986 (has links)
Call number: LD2668 .T4 1986 W546 / Master of Science / Computing and Information Sciences
614

ERP: a computerized geo-information data bank for environmental resource planning

Kuntz, Thomas Michael. January 1975 (has links)
Call number: LD2668 .P7 1975 K85
615

A concurrency method: an implementation on a 3B2 network

Morrell, John E. January 1986 (has links)
Call number: LD2668 .T4 1986 M67 / Master of Science / Computing and Information Sciences
616

A Prolog prototype of a module development system

Peak, Marita E. January 1986 (has links)
Call number: LD2668 .T4 1986 P42 / Master of Science / Computing and Information Sciences
617

Design of a seismic data acquisition system and automatic triggering software

Cole, Robert, Sidney John January 1991 (has links)
A dissertation submitted to the Faculty of Science, University of the Witwatersrand, Johannesburg, for the degree Master of Science / The recording of seismic signals in remote areas requires a portable, low power recording system that can be left in the field for a few weeks at a time. Three components of ground motion are generally measured, and some form of event recording, rather than continuous recording should be available. [Abbreviated abstract. Open document to view full version] / AC2017
618

A report on a C-E technical translation project using Google Translate

Mai, Guan Hui, Jennifer January 2018 (has links)
University of Macau / Faculty of Arts and Humanities. / Department of English
619

Fault tolerance and reliability patterns

Unknown Date (has links)
The need to achieve dependability in critical infrastructures has become indispensable for government and commercial enterprises. This need has become more necessary with the proliferation of malicious attacks on critical systems, such as healthcare, aerospace and airline applications. Additionally, due to the widespread use of web services in critical systems, the need to ensure their reliability is paramount. We believe that patterns can be used to achieve dependability. We conducted a survey of fault tolerance, reliability and web service products and patterns to better understand them. One objective of our survey is to evaluate the state of these patterns, and to investigate which standards are being used in products and their tool support. Our survey found that these patterns are insufficient, and many web services products do not use them. In light of this, we wrote some fault tolerance and web services reliability patterns and present an analysis of them. / by Ingrid A. Buckley. / Thesis (M.S.C.S.)--Florida Atlantic University, 2008. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2008. Mode of access: World Wide Web.
620

Towards a methodology for building reliable systems

Unknown Date (has links)
Reliability is a key system characteristic that is an increasing concern for current systems. Greater reliability is necessary due to the new ways in which services are delivered to the public. Services are used by many industries, including health care, government, telecommunications, tools, and products. We have defined an approach to incorporate reliability along the stages of system development. We first did a survey of existing dependability patterns to evaluate their possible use in this methodology. We have defined a systematic methodology that helps the designer apply reliability in all steps of the development life cycle in the form of patterns. A systematic failure enumeration process to define corresponding countermeasures was proposed as a guideline to define where reliability is needed. We introduced the idea of failure patterns which show how failures manifest and propagate in a system. We also looked at how to combine reliability and security. Finally, we defined an approach to certify the level of reliability of an implemented web service. All these steps lead towards a complete methodology. / by Ingrid A. Buckley. / Thesis (Ph.D.)--Florida Atlantic University, 2012. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2012. Mode of access: World Wide Web.

Page generated in 0.0661 seconds