• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 56
  • 9
  • 7
  • 6
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 142
  • 142
  • 35
  • 35
  • 23
  • 22
  • 20
  • 19
  • 17
  • 17
  • 16
  • 16
  • 13
  • 13
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Aligning Software Architectures of Mobile Applications on Business Requirements

Gruhn, Volker, Köhler, André 30 January 2019 (has links)
The support of mobile workers with mobile IT solutions can create dremendous improvements in mobile business processes of a company. The main charateristic of such a mobile system is the ability to connect via a (mobile) network to a central server, e.g. in order to access customer data. The frequency and the location of the use, data topicality, interaction requirements and many more are central aspects when developing a suitable system architecture. This paper provides a detailed decription of the four main software architectures for mobile systems and their main charateristics. Beyond, typical business requirements are developed, the implications for the system architecture for each of them is shown.
62

Implementation of visualizations using a server-client architecture : Effects on performance measurements

Løtvedt, Pia January 2020 (has links)
Visualizing large datasets poses challenges in terms of how to create visualization applications with good performance. Due to the amount of data, transfer speed and processing speed may lead to waiting times that cause users to abandon the application. It is therefore important to select methods and techniques that can handle the data in as efficient a way as possible. The aim of this study was to investigate if a server-client architecture had better performance in a visualization web application than a purely client-side architecture in terms of selected performance metrics and network load, and whether the selection of implementation language and tools affected the performance of the server-client architecture implementation. To answer these questions, a visualization application was implemented in three different ways: a purely client-side implementation, a server-client implementation using Node.js for the server, and a server-client implementation using Flask for the server. The results showed that the purely client-side architecture suffered from a very long page loading time and high network load but was able to process data quickly in response to user actions in the application. The server-client architecture implementations could load the page faster, but responding to requests took longer, whereas the amount of data transferred was much lower. Furthermore, the server-client architecture implemented with a Node.js server performed better on all metrics than the application implemented with a Flask server. Overall, when taking all measurements into consideration, the Node.js server architecture may be the best choice among the three when working with a large dataset, although the longer response time compared to the purely client-side architecture may cause the application to seem less responsive.
63

Parallel Memory System Architectures for Packet Processing in Network Virtualization / ネットワーク仮想化におけるパケット処理のための並列メモリシステムアーキテクチャ

Korikawa, Tomohiro 23 March 2021 (has links)
京都大学 / 新制・課程博士 / 博士(情報学) / 甲第23326号 / 情博第762号 / 新制||情||130(附属図書館) / 京都大学大学院情報学研究科通信情報システム専攻 / (主査)教授 大木 英司, 教授 守倉 正博, 教授 岡部 寿男 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM
64

TREE-BASED UNIDIRECTIONAL NEURAL NETWORKS FOR LOW-POWER COMPUTER VISION ON EMBEDDED DEVICES

Abhinav Goel (12468279) 27 April 2022 (has links)
<p>Deep Neural Networks (DNNs) are a class of machine learning algorithms that are widelysuccessful in various computer vision tasks. DNNs filter input images and videos with manyconvolution operations in each layer to extract high-quality features and achieve high ac-curacy. Although highly accurate, the state-of-the-art DNNs usually require server-gradeGPUs, and are too energy, computation and memory-intensive to be deployed on most de-vices. This is a significant problem because billions of mobile and embedded devices that donot contain GPUs are now equipped with high definition cameras. Running DNNs locallyon these devices enables applications such as emergency response and safety monitoring,because data cannot always be offloaded to the Cloud due to latency, privacy, or networkbandwidth constraints.</p> <p>Prior research has shown that a considerable number of a DNN’s memory accesses andcomputation are redundant when performing computer vision tasks. Eliminating these re-dundancies will enable faster and more efficient DNN inference on low-power embedded de-vices. To reduce these redundancies and thereby reduce the energy consumption of DNNs,this thesis proposes a novel Tree-based Unidirectional Neural Network (TRUNK) architec-ture. Instead of a single large DNN, multiple small DNNs in the form of a tree work togetherto perform computer vision tasks. The TRUNK architecture first finds thesimilaritybe-tween different object categories. Similar object categories are grouped intoclusters. Similarclusters are then grouped into a hierarchy, creating a tree. The small DNNs at every nodeof TRUNK classify between different clusters. During inference, for an input image, oncea DNN selects a cluster, another DNN further classifies among the children of the cluster(sub-clusters). The DNNs associated with other clusters are not used during the inferenceof that image. By doing so, only a small subset of the DNNs are used during inference,thus reducing redundant operations, memory accesses, and energy consumption. Since eachintermediate classification reduces the search space of possible object categories in the image,the small efficient DNNs still achieve high accuracy.</p> <p>In this thesis, we identify the computer vision applications and scenarios that are wellsuited for the TRUNK architecture. We develop methods to use TRUNK to improve the efficiency of the image classification, object counting, and object re-identification problems.We also present methods to adapt the TRUNK structure for different embedded/edge ap-plication contexts with different system architectures, accuracy requirements, and hardware constraints.</p> <p>Experiments with TRUNK using several image datasets reveal the effectiveness of theproposed solution to reduce memory requirement by∼50%, inference time by∼65%, energyconsumption by∼65%, and the number of operations by∼45% when compared with existingDNN architectures. These experiments are conducted on consumer-grade embedded systems:NVIDIA Jetson Nano, Raspberry Pi 3, and Raspberry Pi Zero. The TRUNK architecturehas only marginal losses in accuracy when compared with the state-of-the-art DNNs.</p>
65

Development and Analysis of System and Human Architectures for Critical Infrastructure Vulnerability Assessment

Huff, Johnathon Deon 06 May 2017 (has links)
The need to secure critical infrastructure (CI) systems against attacks is a topic that has been discussed recently in literature. Many examples of attacks against CI exist, such as the physical attack on the Pacific Gas and Electric Metcalf substation in 2013 that caused millions of dollars in damage or the Stuxnet cyber-attack which was identified in 2010 that caused damage to Iran’s nuclear program and alerted the world to the existence of cyber weapons. As a result of these types of events in which vulnerabilities in CI are exploited, it is important to have a comprehensive systems approach for assessing the vulnerabilities in CI systems. This dissertation seeks to provide a method for engineers to use system and human architectures to perform vulnerability assessment (VA) and decision analysis to enable decision makers to make tradeoffs on how to use their resources to protect CI against attacks.There are several gaps in literature in how to use system and human architectures to perform VA to protect CI from damage. First, no method exists that uses a model based approach and human and system architectures to perform a comprehensive analysis of CI to develop decision analysis models to aid decision makers in determining the most effective use of security resources to secure their CI systems. It is important that such models be comprehensive by including industry standards, system and human architectures, attack scenarios, subject matter expert opinion and models for analysis to help decision makers determine the best security investments. Second, there is not an established method to develop detailed mathematical models from an operational activity diagram that represents an attack scenario. This is important because the translation from architecture to high fidelity models will enable CI asset owners to make tradeoffs on security resource use. Finally, there is no method to evaluate the role of humans in a CI VA based on human views of the system. This dissertation provides an approach to use human and system architectures to perform VA and decision analysis to fill these gaps.
66

Emerging AI-Powered Technologies for Plant Tissue Imaging and Phenomics

Lube, Vinicius 20 December 2022 (has links)
Monitoring, tracking, and analyzing the dynamic growth of a living organism is essential to understanding its response to changes in its surrounding environment. Imaging tools to study these dynamics at spatial and temporal scales with optimal resolution rely on high-performance instrumentations. These systems are generally costly, stationary, and not flexible. In addition, performing non-destructive high-throughput phenotyping to extract roots' structural and morphological features remains challenging. We developed the MultipleXLab: a modular, mobile, and cost-effective robotic root imager to tackle these limitations. Among its advantages associated with a large field-of-view, integrated programmable plant-growth lighting, and high magnification with a high resolving power, the system is useful for a wide range of biological applications. We have also created the MultipleXLab Advanced; this configuration turns the system into a mobile environmental chamber by also featuring temperature control and automated irrigation. Another system we developed was the MultipleXLab Advanced Fluorescence to allow fluorescence imaging with a resolution that competes with a fluorescence binocular or even a fluorescence microscope. Furthermore, we have implemented various technologies and techniques to facilitate 3D imaging and quantification, ranging from X-ray micro-Computed Tomography to 3D segmentation of tissues, cells, and cellular compartments within the cell imaged using Confocal Laser Scanning Microscopy. For future research, we have conceptualized an upscaled system named MultipleXLabXL. This larger system will allow tracking, monitoring, and quantifying root growth of a much higher number of seedlings for more extended periods.
67

Analysis and Design Tools for Structured Feedback Systems

Rai, Anurag 21 June 2012 (has links) (PDF)
As we begin to analyze and construct extremely complex systems, a theory for understanding and designing the underlying architecture becomes very important. To move in the direction of a precise theory of architecture, this thesis will provide some concrete tools to analyze and design complex systems with a given network structure. The first main result of this thesis analyzes the vulnerability of a system and shows that a system's vulnerability depends on its network structure. We will consider destabilization attacks acting on a single link in a system's logical interconnection structure. The concept of a vulnerable link is characterized and necessary and sufficient conditions for identifying these links are provided. The vulnerability of various system architectures are then characterized by the vulnerability of their weakest link, and it is shown that every transfer function has a completely secure architecture with no vulnerable links. The second part of this thesis focuses on synthesizing controllers with a specified network structure. It presents a new approach to distributed controller design that exploits the dynamical structure function representation of linear time invariant systems to characterize the structure of a system. The design technique sequentially constructs each link in an arbitrary controller signal structure, and the main theorem proves that either the resulting controller is stabilizing or that no controller with the desired structure can stabilize the system.
68

Development of an Integrated Interface Modelling Methodology to Support System Architecture Analysis

Uddin, Amad January 2016 (has links)
This thesis presents the development and validation of a novel interface modelling methodology integrated with a system architectural analysis framework that emphasises the need to manage the integrity of deriving and allocating requirements across multiple levels of abstraction in a structured manner. The state of the art review in this research shows that there is no shared or complete interface definition model that could integrate diverse interaction viewpoints for defining system requirements with complete information. Furthermore, while existing system modelling approaches define system architecture with functions and their allocation to subsystems to meet system requirements, they do not robustly address the importance of considering well-defined interfaces in an integrated manner at each level of systems hierarchy. This results in decomposition and integration issues across the multiple levels of systems hierarchy. Therefore, this thesis develops and validates following: -Interface Analysis Template as a systematic tool that integrates diverse interaction viewpoints for modelling system interfaces with intensive information for deriving requirements. -Coupling Matrix as an architecture analysis framework that not only allocates functions to subsystems to meet requirements but also promotes consistent consideration of well-defined interfaces at each level of design hierarchy. Insights from the validation of developed approach with engineering case studies within an automotive OEM are discussed, reflecting on the effectiveness, efficiency and usability of the methods.
69

Design and Fabrication of a Controllable Underwater Towed Vehicle for Shallow Coral Reef Inspection

Alsalamah, Ibrahim 07 1900 (has links)
Monitoring the health status of coral reefs is a crucial activity in protecting the environment. One way is by conducting "Manta tow surveys." For a long time, these surveys were conducted by a diver holding a board being towed by a boat. In this thesis, we propose a new vehicle design that works as a platform to help conduct the "towboard" activities for underwater coral reef surveys. It utilizes paravane or depressor features which is a common tool used by fishermen to catch fish at a specified depth. The vehicle offers a compact size, modular design, and control surfaces to maneuver around and close to reef walls. The thesis describes the architecture of the overall system and its components, the design decisions, the mechanical interfaces, and a brief description of the dynamics. An experiment is conducted to validate the design and verify system performance, measuring pressure, speed, and orientation. The prototype is presented as a proof of concept.
70

SYSTEM ARCHITECTURE FOR A DATA-INTEGRATED IMAGER

HICKEY, DOUGLAS R. 02 July 2007 (has links)
No description available.

Page generated in 0.1097 seconds