391 |
An integrated VLSI design environment based on behavioral description.January 1989 (has links)
by Teresa W.M. Ng. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1989. / Bibliography: leaves 97-100.
|
392 |
Expert decision support system for two stage operations planning.January 1999 (has links)
by Tam Chi-Fai. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1999. / Includes bibliographical references (leaves 87-88). / abstract --- p.I / table of content --- p.II / list of figures --- p.V / acknowledgments --- p.VII / Chapter chapter 1 --- introduction --- p.1 / Chapter 1.1 --- Two Stage Operations Planning --- p.1 / Chapter 1.2 --- Iterative Activities in the Two Stage Planning Approach --- p.3 / Chapter 1.3 --- Expert Decision Support System for Two Stage Planning --- p.4 / Chapter 1.4 --- Scope of the Study --- p.5 / Chapter 1.5 --- Organization of the Thesis --- p.6 / Chapter chapter 2 --- literature review --- p.7 / Chapter 2.1 --- Network Design for Air Express Service --- p.7 / Chapter 2.2 --- Integrative Use of Optimization and Simulation Model --- p.8 / Chapter 2.3 --- Expert System & Decision Support System --- p.11 / Chapter 2.3.1 --- Expert System --- p.11 / Chapter 2.3.2 --- Decision Support System --- p.13 / Chapter 2.3.3 --- ES / DSS Integration --- p.14 / Chapter chapter 3 --- research methodology --- p.19 / Chapter 3.1 --- Review on DSS / ES Integration --- p.19 / Chapter 3.2 --- System Design --- p.20 / Chapter 3.3 --- Prototyping --- p.22 / Chapter 3.4 --- Analysis and Evaluation --- p.23 / Chapter chapter 4 --- system architecture and knowledge modeling --- p.24 / Chapter 4.1 --- Architecture Overview --- p.24 / Chapter 4.1.1 --- System Architecture and Interactions --- p.26 / Chapter 4.1.2 --- Decision Support System --- p.27 / Chapter 4.1.3 --- Expert System --- p.32 / Chapter 4.2 --- System Operations --- p.35 / Chapter 4.2.1 --- Operations Flow --- p.35 / Chapter chapter 5 --- case study and prototyping --- p.38 / Chapter 5.1 --- Case Background --- p.38 / Chapter 5.1.1 --- The Service Network --- p.38 / Chapter 5.1.2 --- Objectives of the Project --- p.40 / Chapter 5.1.3 --- Network Design Methodology --- p.41 / Chapter 5.2 --- Iterative Network Planning --- p.49 / Chapter 5.2.1 --- Multi-period Network Planning Feedback --- p.50 / Chapter 5.2.2 --- Feedback in Validation and Evaluation --- p.51 / Chapter 5.3 --- The System Prototype --- p.57 / Chapter 5.3.1 --- Data Management and Model Manipulation --- p.57 / Chapter 5.3.2 --- Intelligent Guidance for the Iterations --- p.65 / Chapter chapter 6 --- evaluation and analysis --- p.75 / Chapter 6.1 --- Test Scenario for Network Planning --- p.75 / Chapter 6.1.1 --- Consultation Process --- p.75 / Chapter 6.1.2 --- Consultation Results --- p.78 / Chapter 6.2 --- Effectiveness of EDSS in Network Planning --- p.81 / Chapter 6.3 --- Generalized Advancement and Limitation --- p.82 / Chapter chapter 7 --- conclusion --- p.85 / bibliography --- p.87 / appendices --- p.89
|
393 |
Knowledge-based system for diagnosis of microprocessor system.January 1998 (has links)
Yau Po Chung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 91-92). / Abstract also in Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 2 --- Background --- p.3 / Chapter 2.1 --- Temporal Theories --- p.3 / Chapter 2.2 --- Related Works --- p.4 / Chapter 2.2.1 --- Consistency and Satisfiability of Timing Specifications --- p.4 / Chapter 2.2.2 --- Symbolic Constraint Satisfaction --- p.5 / Chapter 3 --- Previous Developed Work --- p.7 / Chapter 3.1 --- Previous Problem Domain --- p.7 / Chapter 3.1.1 --- Basics of MC68000 Read Cycle --- p.7 / Chapter 3.2 --- Knowledge-based System Structure --- p.9 / Chapter 3.3 --- Diagnostic Reasoning Mechanisms --- p.10 / Chapter 3.4 --- Time Range Approach --- p.11 / Chapter 3.4.1 --- Time Range Representation --- p.11 / Chapter 3.4.2 --- Constraint Satisfaction of Time Ranges --- p.12 / Chapter 3.4.3 --- Constraint Propagation of Time Ranges --- p.13 / Chapter 3.5 --- Fuzzy Time Point Approach --- p.14 / Chapter 3.5.1 --- Fuzzy Time Point Models --- p.14 / Chapter 3.5.2 --- Definition of Fuzzy Time Points --- p.15 / Chapter 3.5.3 --- Constraint Propagation of Fuzzy Time Points --- p.17 / Chapter 3.5.4 --- Constraint Satisfaction of Fuzzy Time Points --- p.18 / Chapter 4 --- The Proposed Segmented Time Range Approach --- p.20 / Chapter 4.1 --- Introduction --- p.20 / Chapter 4.2 --- The Insufficiency of The Existing Time Range Approach --- p.22 / Chapter 4.3 --- Segmented Time Range Approach --- p.23 / Chapter 4.3.1 --- The Representation --- p.23 / Chapter 4.3.2 --- Constraint Propagation and Satisfaction --- p.25 / Chapter 4.3.3 --- Contributions --- p.25 / Chapter 4.3.4 --- Limitations --- p.29 / Chapter 4.4 --- Conclusion --- p.30 / Chapter 5 --- New Problem Domain and Our New System --- p.31 / Chapter 5.1 --- Introduction --- p.31 / Chapter 5.2 --- Pentium-SRAM Interfacing Problem --- p.31 / Chapter 5.2.1 --- Asynchronous SRAM Solution --- p.32 / Chapter 5.2.2 --- Synchronous SRAM Solution --- p.33 / Chapter 5.3 --- The Knowledge Base --- p.35 / Chapter 5.4 --- Characteristics of Our New System --- p.35 / Chapter 6 --- Burst Read Cycle --- p.37 / Chapter 6.1 --- Introduction --- p.37 / Chapter 6.2 --- Asynchronous SRAM Solution --- p.37 / Chapter 6.2.1 --- Implementation --- p.39 / Chapter 6.2.2 --- Implementation Results --- p.45 / Chapter 6.3 --- Synchronous SRAM Solution --- p.48 / Chapter 6.3.1 --- Implementation --- p.49 / Chapter 6.3.2 --- Implementation Results --- p.56 / Chapter 6.4 --- Conclusion --- p.58 / Chapter 7 --- Burst Write Cycle --- p.60 / Chapter 7.1 --- Introduction --- p.60 / Chapter 7.2 --- Asynchronous SRAM Solution --- p.60 / Chapter 7.2.1 --- Implementation --- p.61 / Chapter 7.2.2 --- Implementation Results --- p.67 / Chapter 7.3 --- Synchronous SRAM Solution --- p.71 / Chapter 7.3.1 --- Implementation --- p.71 / Chapter 7.3.2 --- Implementation Results --- p.79 / Chapter 7.4 --- Conclusion --- p.82 / Chapter 8 --- Conclusion --- p.83 / Chapter 8.1 --- Summary of Achievements --- p.83 / Chapter 8.2 --- Future Development --- p.86 / Appendix Some Characteristics of Our New System --- p.89 / Bibliography --- p.91
|
394 |
Knowledge Elicitation for Design Task Sequencing KnowledgeBurge, Janet E. 13 October 1999 (has links)
"There are many types of knowledge involved in producing a design (the process of specifying a description of an artifact that satisfies a collection of constraints [Brown, 1992]). Of these, one of the most crucial is the design plan: the sequence of steps taken to create the design (or a portion of the design). A number of knowledge elicitation methods can be used to obtain this knowledge from the designer. The success of the elicitation depends on the match between the knowledge elicitation method used and the information being sought. The difficulty with obtaining design plan information is that this information may involve implicit knowledge, i.e. knowledge that can not be expressed explicitly. In this thesis, an approach is used that combines two knowledge elicitation techniques: one direct, to directly request the design steps and their sequence, and one indirect, to refine this knowledge by obtaining steps and sequences that may be implicit. The two techniques used in this thesis were Forward Scenario Simulation (FSS), a technique where the domain expert describes how the procedure followed to solve it, and Card Sort, a technique where the domain expert is asked to sort items (usually entities in the domain) along different attributes. The Design Ordering Elicitation System (DOES) was built to perform the knowledge elicitation. This system is a web-based system designed to support remote knowledge elicitation: KE performed without the presence of the knowledge engineer. This system was used to administer knowledge elicitation sessions to evaluate the effectiveness of these techniques at obtaining design steps and their sequencing. The results indicate that using an indirect technique together with a direct technique obtains more alternative sequences for the design steps than using the direct technique alone."
|
395 |
DAVE, an expert system for the analysis of the Wechsler adult intelligence scales and related informationPierce, Richard Craig January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
396 |
Expert systems in medical diagnosis : a design study in dermatophyte diseasesOh, Kyung Na January 2010 (has links)
Typescript (photocopy). / Digitized by Kansas Correctional Industries
|
397 |
Process to Build an Efficient Decision Support SystemGalipalli, Ashwin Kumar, Madyala, Haritha Jyothi January 2012 (has links)
Decision support systems will be an asset dealing with the complexity involved in many decision situations for companies, organizations and societies by integrating different aspects into a holistic pattern. That creates a close relationship to systems science since systems thinking promote holism as a profitable way to handle complexity. The ideal decision support system should not be used to make automatic decisions but to assist a human being in the decision process. That process is sometimes described as a model consisting of the phases, intelligence, design and choice. Intelligence is needed to understand the situation and find the information that is needed to continue the process. Design means designing different alternatives and in the last phase, choice, the alternatives are evaluated and the best alternative is chosen. A good decision support system should give the user assistance through the whole process. The main purpose of our research is identifying the process of building an efficient Decision Support System. The target groups are the people who are working with multinational companies that are specialized in constructing and delivering decision support systems to end users. The number of target companies involved in this study is only two and is limited Indian Multinational companies. The theoretical study helps in identifying the basic characteristics of a decision support system, exploring the types of decision support systems used in current organizations, resulting if there is any particular standard for constructing DSS today and signifying approach for constructing a user friendly decision support system by analyzing the existing literature related to DSS. At the same time, empirical study advances the research problem from a practical angle. The conclusion for this research is a comprehensive report in relation to the varieties of Decision Support Systems used in today’s organizations, qualities that a decision support system ought to possess and suggested process to be implemented for building an efficient decision support system. / Program: Magisterutbildning i informatik
|
398 |
Confiança, incertezas e discursos sobre os riscos de colapso de barragem na UHE Itaipu Binacional: o processo de vulnerabilização dos moradores a jusante / Confidence, uncertainties and speeches about dam collapse risk in \"Itaipu Binacional\" hydroelectric power plant: increase of vulnerability for downstream inhabitantsSoriano, Érico 13 June 2012 (has links)
Vivemos numa sociedade onde os riscos e as ameaças atingiram elevados níveis de abrangência, assim como de ineditismo, através do surgimento de novos riscos sinérgicos. Para corresponder a essa situação, emergiu uma cultura de segurança, caracterizada pela crença na racionalidade técnica, de base científica. Esta cultura apresenta, como atores reguladores, os chamados sistemas peritos, que gabam de grande confiança por parte expressiva da sociedade, e da autoridade de discursos institucionais com status de inquestionabilidade e infalibilidade. Uma produção social de risco, no Brasil, é a construção de barragens, ilustrado, dentre outros, pelo elevado número de acidentes envolvendo estes empreendimentos. No caso da UHE de Itaipu Binacional, foram analisadas algumas variáveis de risco de colapso da barragem, dentre elas: as de caráter ecossistêmico, considerando, principalmente, a presença e reprodução do mexilhão dourado no lago da UHE; as relacionadas a eventos climáticos críticos, uma vez que os cálculos estruturais das obras civis foram baseados em séries históricas que desconsideraram as mudanças no clima; e, as associados ao terrorismo, considerando a presença de uma comunidade local tida como suspeita, no imaginário social, na região da tríplice fronteira. A partir da síntese do estado da arte no debate das ciências sociais e humanas, analisou-se, as similaridades, diferenças e conflitos entre o discurso institucional de segurança da UHE Itaipu Binacional e o das autoridades públicas, com as representações dos grupos sociais inseridos imediatamente à jusante do empreendimento. / In our society, risks and threats reach high coverage levels, as well as unheard scope, through the combination of different risks. To face this situation, it has been developed a security culture, which is characterized by belief on technical rationality and on scientific basis. This culture presents the expert systems as regulating actors, who receive confidence from most of society, and also shows authority in institutional speeches, claiming a status of undoubted and unfailing system. In Brazil, the construction of dams implies a social risk and a high number of related accidents. Some variables for dam collapse risk in \"Itaipu Binacional\" were analyzed in this work, including ecosystem variables, considering as the main factor the existence and reproduction of golden mussels in the plant reservoir; variables related to critical climatic events, considering that structural calculation for civil construction was based on historical series that do not consider climate changes; and, at least, variables related to terrorism, considering the existence of a supposed suspect local community in the triple border (Brazil, Paraguay, Argentina). From a state-of-art overview on social and human sciences discussion, the similarities, differences and conflicts among \"Itaipu Binacional\" security speech and public authorities\' speeches were analyzed, considering representations of social groups installed in the plant downstream.
|
399 |
Finite safety models for high-assurance systemsUnknown Date (has links)
Preventing bad things from happening to engineered systems, demands improvements to how we model their operation with regard to safety. Safety-critical and fiscally-critical systems both demand automated and exhaustive verification, which is only possible if the models of these systems, along with the number of scenarios spawned from these models, are tractably finite. To this end, this dissertation ad dresses problems of a model's tractability and usefulness. It addresses the state space minimization problem by initially considering tradeoffs between state space size and level of detail or fidelity. It then considers the problem of human interpretation in model capture from system artifacts, by seeking to automate model capture. It introduces human control over level of detail and hence state space size during model capture. Rendering that model in a manner that can guide human decision making is also addressed, as is an automated assessment of system timeliness. Finally, it addresses state compression and abstraction using logical fault models like fault trees, which enable exhaustive verification of larger systems by subsequent use of transition fault models like Petri nets, timed automata, and process algebraic expressions. To illustrate these ideas, this dissertation considers two very different applications - web service compositions and submerged ocean machinery. / by John C. Sloan. / Thesis (Ph.D.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
|
400 |
A pattern-driven process for secure service-oriented applicationsUnknown Date (has links)
During the last few years, Service-Oriented Architecture (SOA) has been considered to be the new phase in the evolution of distributed enterprise applications. Even though there is a common acceptance of this concept, a real problem hinders the widespread use of SOA : A methodology to design and build secure service-oriented applications is needed. In this dissertation, we design a novel process to secure service-oriented applications. Our contribution is original not only because it applies the MDA approach to the design of service-oriented applications but also because it allows their securing by dynamically applying security patterns throughout the whole process. Security patterns capture security knowledge and describe security mechanisms. In our process, we present a structured map of security patterns for SOA and web services and its corresponding catalog. At the different steps of a software lifecycle, the architect or designer needs to make some security decisions. / An approach using a decision tree made of security pattern nodes is proposed to help making these choices. We show how to extract a decision tree from our map of security patterns. Model-Driven Architecture (MDA) is an approach which promotes the systematic use of models during a system's development lifecycle. In the dissertation we describe a chain of transformations necessary to obtain secure models of the service-oriented application. A main benefit of this process is that it decouples the application domain expertise from the security expertise that are both needed to build a secure application. Security knowledge is captured by pre-defined security patterns, their selection is rendered easier by using the decision trees and their application can be automated. A consequence is that the inclusion of security during the software development process becomes more convenient for the architects/designers. / A second benefit is that the insertion of security is semi-automated and traceable. Thus, the process is flexible and can easily adapt to changing requirements. Given that SOA was developed in order to provide enterprises with modular, reusable and adaptable architectures, but that security was the principal factor that hindered its use, we believe that our process can act as an enabler for service-oriented applications. / by Nelly A. Delessy. / Thesis (Ph.D.)--Florida Atlantic University, 2008. / Includes bibliography. / Electronic reproduction. Boca Raton, FL : 2008 Mode of access: World Wide Web.
|
Page generated in 0.0216 seconds