• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 1
  • 1
  • Tagged with
  • 6
  • 6
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Low-cost memory analyses for efficient compilers / Analyses de mémoire à bas cout pour des compilateurs efficaces

Maalej Kammoun, Maroua 26 September 2017 (has links)
La rapidité, la consommation énergétique et l'efficacité des systèmes logiciels et matériels sont devenues les préoccupations majeures de la communauté informatique de nos jours. Gérer de manière correcte et efficace les problématiques mémoire est essentiel pour le développement des programmes de grande tailles sur des architectures de plus en plus complexes. Dans ce contexte, cette thèse contribue aux domaines de l'analyse mémoire et de la compilation tant sur les aspects théoriques que sur les aspects pratiques et expérimentaux. Outre l'étude approfondie de l'état de l'art des analyses mémoire et des différentes limitations qu'elles montrent, notre contribution réside dans la conception et l'évaluation de nouvelles analyses qui remédient au manque de précision des techniques publiées et implémentées. Nous nous sommes principalement attachés à améliorer l'analyse de pointeurs appartenant à une même structure de données, afin de lever une des limitations majeures des compilateurs actuels. Nous développons nos analyses dans le cadre général de l'interprétation abstraite « non dense ». Ce choix est motivé par les aspects de correction et d'efficacité : deux critères requis pour une intégration facile dans un compilateur. La première analyse que nous concevons est basée sur l'analyse d'intervalles des variables entières ; elle utilise le fait que deux pointeurs définis à l'aide d'un même pointeur de base n'aliasent pas si les valeurs possibles des décalages sont disjointes. La seconde analyse que nous développons est inspirée du domaine abstrait des Pentagones ; elle génère des relations d'ordre strict entre des paires de pointeurs comparables. Enfin, nous combinons et enrichissons les deux analyses précédentes dans un cadre plus général. Ces analyses ont été implémentées dans le compilateur LLVM. Nous expérimentons et évaluons leurs performances, et les comparons aux implémentations disponibles selon deux métriques : le nombre de paires de pointeurs pour lesquelles nous inférons le non-aliasing et les optimisations rendues possibles par nos analyses / This thesis was motivated by the emergence of massively parallel processing and supercomputingthat tend to make computer programming extremely performing. Speedup, the power consump-tion, and the efficiency of both software and hardware are nowadays the main concerns of theinformation systems community. Handling memory in a correct and efficient way is a step towardless complex and more performing programs and architectures. This thesis falls into this contextand contributes to memory analysis and compilation fields in both theoretical and experimentalaspects.Besides the deep study of the current state-of-the-art of memory analyses and their limitations,our theoretical results stand in designing new algorithms to recover part of the imprecisionthat published techniques still show. Among the present limitations, we focus our research onthe pointer arithmetic to disambiguate pointers within the same data structure. We develop ouranalyses in the abstract interpretation framework. The key idea behind this choice is correctness,and scalability: two requisite criteria for analyses to be embedded to the compiler construction.The first alias analysis we design is based on the range lattice of integer variables. Given a pair ofpointers defined from a common base pointer, they are disjoint if their offsets cannot have valuesthat intersect at runtime. The second pointer analysis we develop is inspired from the Pentagonabstract domain. We conclude that two pointers do not alias whenever we are able to build astrict relation between them, valid at program points where the two variables are simultaneouslyalive. In a third algorithm we design, we combine both the first and second analysis, and enhancethem with a coarse grained but efficient analysis to deal with non related pointers.We implement these analyses on top of the LLVM compiler. We experiment and evaluate theirperformance based on two metrics: the number of disambiguated pairs of pointers compared tocommon analyses of the compiler, and the optimizations further enabled thanks to the extraprecision they introduce
2

A heuristic featured based quantification framework for efficient malware detection : measuring the malicious intent of a file using anomaly probabilistic scoring and evidence combinational theory with fuzzy hashing for malware detection in portable executable files

Namanya, Anitta P. January 2016 (has links)
Malware is still one of the most prominent vectors through which computer networks and systems are compromised. A compromised computer system or network provides data and or processing resources to the world of cybercrime. With cybercrime projected to cost the world $6 trillion by 2021, malware is expected to continue being a growing challenge. Statistics around malware growth over the last decade support this theory as malware numbers enjoy almost an exponential increase over the period. Recent reports on the complexity of the malware show that the fight against malware as a means of building more resilient cyberspace is an evolving challenge. Compounding the problem is the lack of cyber security expertise to handle the expected rise in incidents. This thesis proposes advancing automation of the malware static analysis and detection to improve the decision-making confidence levels of a standard computer user in regards to a file’s malicious status. Therefore, this work introduces a framework that relies on two novel approaches to score the malicious intent of a file. The first approach attaches a probabilistic score to heuristic anomalies to calculate an overall file malicious score while the second approach uses fuzzy hashes and evidence combination theory for more efficient malware detection. The approaches’ resultant quantifiable scores measure the malicious intent of the file. The designed schemes were validated using a dataset of “clean” and “malicious” files. The results obtained show that the framework achieves true positive – false positive detection rate “trade-offs” for efficient malware detection.
3

A Heuristic Featured Based Quantification Framework for Efficient Malware Detection. Measuring the Malicious intent of a file using anomaly probabilistic scoring and evidence combinational theory with fuzzy hashing for malware detection in Portable Executable files

Namanya, Anitta P. January 2016 (has links)
Malware is still one of the most prominent vectors through which computer networks and systems are compromised. A compromised computer system or network provides data and or processing resources to the world of cybercrime. With cybercrime projected to cost the world $6 trillion by 2021, malware is expected to continue being a growing challenge. Statistics around malware growth over the last decade support this theory as malware numbers enjoy almost an exponential increase over the period. Recent reports on the complexity of the malware show that the fight against malware as a means of building more resilient cyberspace is an evolving challenge. Compounding the problem is the lack of cyber security expertise to handle the expected rise in incidents. This thesis proposes advancing automation of the malware static analysis and detection to improve the decision-making confidence levels of a standard computer user in regards to a file’s malicious status. Therefore, this work introduces a framework that relies on two novel approaches to score the malicious intent of a file. The first approach attaches a probabilistic score to heuristic anomalies to calculate an overall file malicious score while the second approach uses fuzzy hashes and evidence combination theory for more efficient malware detection. The approaches’ resultant quantifiable scores measure the malicious intent of the file. The designed schemes were validated using a dataset of “clean” and “malicious” files. The results obtained show that the framework achieves true positive – false positive detection rate “trade-offs” for efficient malware detection.
4

Determination Of The Change In Building Capacity During Earthquakes

Cevik, Deniz 01 January 2006 (has links) (PDF)
There is a great amount of building stock built in earthquake regions where earthquakes frequently occur. It is very probable that such buildings experience earthquakes more than once throughout their economic life. The motivation of this thesis arose from the lack of procedures to determine the change in building capacity as a result of prior earthquake damage. This study focuses on establishing a method that can be employed to determine the loss in the building capacity after experiencing an earthquake. In order to achieve this goal a number of frames were analyzed under several randomly selected earthquakes. Nonlinear time-history analyses and nonlinear static analyses were conducted to assess the prior and subsequent capacities of the frames under consideration. The structural analysis programs DRAIN-2DX and SAP2000 were employed for this purpose. The capacity curves obtained by these methods were investigated to propose a procedure by which the capacity of previously damaged structures can be determined. For time-history analyses the prior earthquake damage can be taken into account by applying the ground motion histories successively to the structure under consideration. In the case of nonlinear static analyses this was achieved by modifying the elements of the damaged structure in relation to the plastic deformation they experience. Finally a simple approximate procedure was developed using the regression analysis of the results. This procedure relies on the modification of the structure stiffness in proportion to the ductility demand the former earthquake imposes. The proposed procedures were applied to an existing 3D building to validate their applicability.
5

Caracterização estática e dinâmica de um banco experimental para estudo dos coeficientes dinâmicos de um mancal radial aerostático cerâmico poroso / Static and dynamic characterization of an experimental setup to study the dynamic coefficients of an aerostatic radial bearing porous ceramic

Luis Renato Chiarelli 28 May 2014 (has links)
Este trabalho apresenta o modelo numérico de um banco experimental onde foi feita uma avaliação sobre as características estáticas do eixo e a identificação das características dinâmicas de um mancal aerostático cerâmico poroso. Nos últimos anos, o uso da cerâmica estrutural tem crescido significativamente para a concepção e fabricação de peças mecânicas. O uso da cerâmica porosa como restritor em mancais aerostáticos pode melhorar o seu desempenho relacionado com o desgaste, a estabilidade térmica, a rigidez e capacidade de carga, permitindo que eixos trabalhem com precisão a uma velocidade acima de 20.000 rpm, com pequenas folgas (40 microns). A fim de investigar este tipo de mancal foram desenvolvidas análises estáticas para obter a rigidez do eixo de suporte, assim como do mancal aerostático cerâmico poroso e identificação dinâmica para o banco experimental. As análises estáticas indicaram a rigidez do eixo e do mancal aerostático de 20,1 kN/mm e 2,6 kN/mm, respectivamente. As análises dinâmicas indicaram que a primeira frequência natural do rotor está próximo de 1365,9 Hz, o que é muito mais elevada do que a primeira frequência natural da mancal aerostático cerâmico poroso cujo valor é 775,0 Hz. Pode-se concluir que a configuração geométrica e condições de suporte escolhidos permitem uma condição robusta para prosseguir com os testes experimentais para obter as características dinâmicas do mancal poroso. / This work presents the numerical model of an experimental set-up where it was made an evaluation on the static characteristics of the shaft and the identification of the dynamic characteristics for an aerostatic radial porous bearing. In recent years, the use of the structural ceramic has grown significantly for design and manufacturing of mechanical parts. The use of ceramic porous as restrictor in aerostatic bearings can improve its perform related to the wear, thermal stability, stiffness and load capacity allowing that spindles work with precision at speed above 20.000 rpm with small clearances (40 microns). In order to investigate this kind of bearing were developed static analyses to obtain the stiffness of the support shaft, as well as aerostatic porous bearing and dynamic identification for experimental set-up. The static analysis indicated stiffness of shaft and aerostatic porous bearing of 20.1 kN/mm and 2.6 kN/mm, respectively. The dynamic analysis indicated that the first natural frequency of the rotor is close to 1365.9 Hz, which is much higher than the first natural frequency of the aerostatic ceramic porous bearing whose value is 775.0 Hz. One can conclude that geometrical configuration and support conditions choosen allow a robust condition to proceed in experimental tests to obtain dynamic characteristics of the porous bearing.
6

Analýza působení větru na stavební konstrukci / Analysis of the wind effect on the construction

Tačner, Jan January 2015 (has links)
Diploma thesis deals with static and dynamic analyses of a slender bridge structure behavior. The footbridge structure model was created in ANSYS 14.5 programing system. Static and a modal analyses were made afterwards and according to these analyses dynamic wind load and dynamic pedestrian load were applied. Wind load was applied as option of deck without a handrail and as option of deck with fully airtight handrail. Pedestrians were perceived as group of pedestrians and as a sparse crowd. Both applied loads were solved by harmonic analyses. Results of these analyses are resonance curves and tables of accleration.

Page generated in 0.1161 seconds