Spelling suggestions: "subject:"computer atemsystem"" "subject:"computer systsystem""
131 |
DESENVOLVIMENTO DE SISTEMA COMPUTACIONAL UTILIZANDO GEOTECNOLOGIAS APLICADAS À ROTEIRIZAÇÃO DA ENTREGA DE CARGAS / DEVELOPMENT OF COMPUTER SYSTEM USING GEOTECNOLOGY ROUTING APPLIED TO THE DELIVERY OF CHARGEGirotto, Júnior 04 March 2011 (has links)
This work is to develop a computer system and with the help of Geo-routing for application in the delivery of charge, with a focus on food distribution segment of poultry production. The region used for the development of this work was the middle region west of Santa Catarina, with poultry company Aurora Foods. The project was divided into five modules: data collection in the field, issue of roads, adding relief, routing and data transmission. The first three modules were needed to structure the road network, "raw material" for routing. In the routing module, emphasis of this project, the system with features designed routing itself. It was created by sequential logic of 06 (six) algorithms for closing phase loads and also tools with automatic functions of spatial data in the auxiliary lock phase loads (manual phase) following defined parameters. For each load was verified the logic of filling the compartments of the transport vehicle of diet for proper distribution of load on it. The system had features on the map as plot aviaries projection clickable route between points on the road network and visualization of spatial filters. This project enabled us to verify that, using geo linked to the development of a custom computer system, you can perform the routing and closing loads optimized, with management control and reduce the possibility of errors due to human interference. / Este trabalho consistiu em desenvolver um sistema computacional contando com o auxílio de Geotecnologias para aplicação na roteirização de entrega de cargas, com foco na distribuição de ração do segmento avicultura de corte. A região utilizada para o desenvolvimento do trabalho foi a mesorregião Oeste Catarinense com avicultores da empresa Aurora Alimentos. O projeto foi dividido em cinco módulos: coleta de dados a campo, edição de estradas, adição do relevo, roteirização e transmissão de dados. Os três primeiros módulos foram necessários para a estruturação da rede viária, matéria-prima para a roteirização. No módulo roteirização, ênfase deste projeto, o sistema com as funcionalidades de roteirização foi desenvolvido propriamente dito. Foi criada a lógica sequencial de 06 (seis) algoritmos para fechamento de cargas na fase automática e também ferramentas com funções de espacialização de dados na fase auxiliar do fechamento de cargas (fase manual), seguindo parâmetros definidos. Para cada carga foi verificada a lógica de enchimento dos compartimentos do veículo de transporte de ração para distribuição adequada da carga no mesmo. O sistema dispõe de funcionalidades no mapa como plotagem de aviários, projeção de percurso entre pontos clicáveis sobre a rede viária e visualização de filtros espaciais. Este projeto possibilitou verificar que, utilizando geotecnologias atreladas ao desenvolvimento de um sistema computacional personalizado, é possível realizar a roteirização e fechamento de cargas otimizadas, com controle gerencial e reduzir a possibilidade de erros devido à interferência humana.
|
132 |
Information systems project failure : a managerial approachDe Beer, André 24 November 2011 (has links)
M.Ing. / Failure is a part of every day life. Information systems project failures are reported regularly in the media. The growth of the information technology industry in its entirety has been very dramatic over the last decade. Large information systems projects have always posed as a challenge for development teams and organizations. The nature of these challenges have increased with the growth of information systems projects over the last decade. With the critical role that information systems have in organizations, it is critical that information systems are delivered on time within budget and according to the requirements. Unfortunately many of the information systems projects that have been started, are cancelled, not on time or over budget. It is the purpose of this dissertation to discuss some of the managerial causes of why information systems projects fail, and also to address issues that could prevent the failure of information systems projects.
|
133 |
Cogitator : a parallel, fuzzy, database-driven expert systemBaise, Paul 08 October 2012 (has links)
The quest to build anthropomorphic machines has led researchers to focus on knowledge and the manipulation thereof. Recently, the expert system was proposed as a solution, working well in small, well understood domains. However these initial attempts highlighted the tedious process associated with building systems to display intelligence, the most notable being the Knowledge Acquisition Bottleneck. Attempts to circumvent this problem have led researchers to propose the use of machine learning databases as a source of knowledge. Attempts to utilise databases as sources of knowledge has led to the development Database-Driven Expert Systems. Furthermore, it has been ascertained that a requisite for intelligent systems is powerful computation. In response to these problems and proposals, a new type of database-driven expert system, Cogitator is proposed. It is shown to circumvent the Knowledge Acquisition Bottleneck and posess many other advantages over both traditional expert systems and connectionist systems, whilst having non-serious disadvantages. / KMBT_223
|
134 |
A distributed object-oriented discrete event-driven simulation environment-DODESEChen, Min 22 November 1991 (has links)
A new distributed object-oriented discrete event-driven simulation environment, DODESE, is developed to provide a common framework for simulation model design and implementation. The DODESE can be used to define a simulation including all the simulation objects participating in the simulation while the execution of the simulation can be interactively monitored on DODESE. The DODESE system has combined the strengths of both object-oriented paradigms and data base technology to make computer simulation more powerful and has achieved the goals of object-orientation, distribution, reusability, maintainability and extensibility. The system runs on two Sun workstations concurrently connected by an Ethernet. One of the workstations performs the simulation tasks while the other workstation displays the status of the simulation interactively. Both workstations communicate through the GemStone data base, thus a mechanism is designed for synchronization and concurrency control. The DODESE is implemented using OPAL, GemStone’s data definition and manipulation language, C and Xlib.
|
135 |
An interface between the GRASS geographic information system and ORACLE relational detabase management systemBuker, David Gordon 30 November 1993 (has links)
A query and display interface has been developed between the GRASS geographic information system and the SQL-based ORACLE relational database management system (DBMS) . This interface enables multiple non-spatial attributes of GRASS map features to be maintained with the DBMS. GRASS alone is capable of storing only one attribute per feature. The interface allows the user to provide both spatial (GRASS) and non-spatial (SQL) selection criteria for any query. Spatial selection methods include picking items from the GRASS map with a mouse, and specifying areas of interest with user-drawn (via a mouse) polygons and transects. The results of the combined query are displayed both graphically (the selected GRASS map features are highlighted in a graphics window) and textually (the DBMS attribute data are shown in a text display window). Options include creating reclassified maps based on the DBMS output, and updating the attributes retrieved by a query.
|
136 |
An investigation into the learnability of object-oriented case tools for computing educationScholtz, Brenda Mary January 2007 (has links)
The use of Computer Aided Software Engineering (CASE) tools for teaching object-oriented systems analysis and design (OOSAD) has many potential benefits, but there are also several problems associated with the usage of these tools. A large portion of these problems relate to the usability and learnability of these tools. Learnability is one of the most important attributes of usability and refers to the capability of the system to enable the user to learn its application. The main research question that this study aims to address is “How can the learnability of OO CASE tools for computing education in South Africa be evaluated?”. In order to answer this question several frameworks for evaluating CASE tool usability and learnability were investigated. One of these frameworks, as proposed by Senapathi, was selected as being the most appropriate for evaluating CASE tool learnability for computing education. This framework maintains that the learnability of a CASE tool is dependent on context of use factors such as the tool used, as well as user characteristics such as gender. The primary aim of this research was thus to validate Senapathi's framework for CASE tool learnability in a South African context. A secondary aim of the research was to extend the implementation of the framework in order to enable the comparison of two CASE tools and to support the inclusion of other user characteristics. An experiment was performed at the Nelson Mandela Metropolitan University (NMMU) in 2006. The participants recruited for this experiment were second year computing students at NMMU. During this experiment, the learnability of two OO CASE tools, namely IBM's Rational Software Modeller and Microsoft's Visio, was evaluated and compared. The quantitative and qualitative results supported Senapathi's results and showed that her framework could be used to evaluate CASE tool learnability and could be adapted to evaluate two CASE tools. The results also showed that the majority of the participants rated the learnability of Microsoft Visio higher for both tasks and that the main reasons participants preferred Visio was due to its simplicity, familiarity and recoverability.
|
137 |
Audit risks in a database environment with specific reference to Oracle7Wiid, Liné Cornette 13 February 2014 (has links)
M.Com. (Computer Auditing) / The objective of an independent audit of financial statements is to express an opinion on the fair presentation of the financial statements. The auditor should obtain sufficient audit evidence to enable him to draw conclusions to support the content of his report. The auditor should obtain an understanding of the entity's accounting system and related internal controls to assess their adequacy as a basis for the preparation of financial information and to assist in the designing of his audit procedures. If the auditor intends to rely on any internal controls, he should study and evaluate those controls. If a database system is used, it is logical that all the financial data reside in the database. In order for an auditor to express an opinion on the financial statements, he has to determine to what extent he can rely on the integrity of the financial data that resides in the database. The objective of this research was to identify the risks and controls present in a general database environment as well as those present in the Oracle? database management system environment, to develop a comparison table between these environments and to develop an Oracle? internal control questionnaire.
|
138 |
Linked biology = from phenotypes towards phylogenetic trees / Conectando dados biológicos : dos fenótipos às árvores filogenéticasMiranda, Eduardo de Paula, 1984- 24 August 2018 (has links)
Orientador: André Santanchè / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-24T12:38:30Z (GMT). No. of bitstreams: 1
Miranda_EduardodePaula_M.pdf: 3021722 bytes, checksum: 93a67943f673753c003a021060a55b6c (MD5)
Previous issue date: 2013 / Resumo: Um grande número de estudos em biologia, incluindo os que envolvem a reconstrução de árvores filogenéticas, resultam na produção de uma enorme quantidade de dados -- por exemplo, descrições fenotípicas , matrizes de dados morfológicos , árvores filogenéticas, etc. Biólogos enfrentam cada vez mais o desafio e a oportunidade de efetivamente descobrir conhecimento a partir do cruzamento e comparação de vários conjuntos de dados, nem sempre conectados e integrados. Neste trabalho, estamos interessados em um contexto específico da biologia em que biólogos aplicam ferramentas computacionais para construir e compartilhar descrições digitais dos seres vivos. Nós propomos um processo que parte de fontes de dados fragmentadas, que nós mapeamos para grafos, em direção a uma plena integração das descrições através de ontologias. Os bancos de dados de grafos intermediam o processo de evolução. Eles são menos dependentes de esquema e, uma vez que ontologias também são grafos, o processo de mapeamento do grafo inicial para uma ontologia torna-se uma sequência de transformações no grafo. Nossa motivação parte da ideia de que a conversão de descrições fenotípicas em uma rede de relações e a busca de conexões entre elementos relacionados irá aumentar a capacidade de resolver problemas mais complexos suportados por computadores. Este trabalho detalha os princípios de concepção por trás do nosso processo e duas implementações práticas como prova de conceito / Abstract: A large number of studies in biology, including those involving phylogenetic trees reconstruction, result in the production of a huge amount of data -- e.g., phenotype descriptions, morphological data matrices, phylogenetic trees, etc. Biologists increasingly face a challenge and opportunity of effectively discovering useful knowledge crossing and comparing several pieces of information, not always linked and integrated. In this work, we are interested in a specific biology context, in which biologists apply computational tools to build and share digital descriptions of living beings. We propose a process that departs from fragmentary data sources, which we map to graphs, towards a full integration of descriptions through ontologies. Graph databases mediate this evolvement process. They are less schema dependent and, since an ontology is also a graph, the mapping process from the initial graph towards an ontology becomes a sequence of graph transformations. Our motivation stems from the idea that transforming phenotypical descriptions in a network of relationships and looking for links among related elements will enhance the ability of solving more complex problems supported by machines. This work details the design principles behind our process and two practical implementations as proof of concept / Mestrado / Ciência da Computação / Mestre em Ciência da Computação
|
139 |
REACTIONS TO RANSOMWARE VARIANTS AMONG INTERNET USERS: MEASURING PAYMENT EVOCATIONJason Cameron Bays (6613361) 15 May 2019 (has links)
<p>Ransomware,
a form of malicious software, takes users’ files hostage via encryption and
demands payment for their return. Since its inception, ransomware has branched
into many different variants, some of which threaten users with scare tactics
in order to evoke payment. For this study, four variants of ransomware were
examined by presenting vignettes via an anonymous online survey. No actual malware was installed on
any devices throughout this study. Their
emotional responses were captured as well as their level of familiarity with
information security. Responses to the survey after the simulated ransomware
vignette were recorded to gauge how users would react to a ransomware attack.
Data was analyzed to discover which types of ransomware evoked payment as well as if information security knowledge also
had an effect on likelihood to pay. This
data is intended to be used to develop better prevention methods and messaging, with an emphasis
on promoting training
on malware avoidance. The study found most
individuals did not choose to pay, and
this could be attributed to a distrust of the ransomware threat. Self-reported
information security behavior appeared to decrease payment evocation, however, peer information security
experience and prior exposure to malware appeared to increase payment evocation.</p>
|
140 |
Generation of cyber attack data using generative techniquesNidhi Nandkishor Sakhala (6636128) 15 May 2019 (has links)
<div><div><div><p>The presence of attacks in day-to-day traffic flow in connected networks is considerably less compared to genuine traffic flow. Yet, the consequences of these attacks are disastrous. It is very important to identify if the network is being attacked and block these attempts to protect the network system. Failure to block these attacks can lead to loss of confidential information and reputation and can also lead to financial loss. One of the strategies to identify these attacks is to use machine learning algorithms that learn to identify attacks by looking at previous examples. But since the number of attacks is small, it is difficult to train these machine learning algorithms. This study aims to use generative techniques to create new attack samples that can be used to train the machine learning based intrusion detection systems to identify more attacks. Two metrics are used to verify that the training has improved and a binary classifier is used to perform a two-sample test for verifying the generated attacks.</p></div></div></div>
|
Page generated in 0.0527 seconds