• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 56
  • 9
  • 7
  • 6
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 142
  • 142
  • 35
  • 35
  • 23
  • 22
  • 20
  • 19
  • 17
  • 17
  • 16
  • 16
  • 13
  • 13
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Refinement of Surface Combatant Ship Synthesis Model for Network-Based System Design

Stinson, Nicholas Taylor 17 June 2019 (has links)
This thesis describes an adaptable component level machinery system weight and size estimation tool used in the context of a ship distributed system architecture framework and ship synthesis model for naval ship concept design. The system architecture framework decomposes the system of systems into three intersecting architectures: physical, logical, and operational to describe the spatial and functional relationships of the system together with their temporal behavior characteristics. Following an Architecture Flow Optimization (AFO), or energy flow analysis based on this framework, vital components are sized based on their energy flow requirements for application in the ship synthesis model (SSM). Previously, components were sized manually or parametrically. This was not workable for assessing many designs in concept exploration and outdated parametric models based on historical data were not sufficiently applicable to new ship designs. The new methodology presented in this thesis uses the energy flow analysis, baseline component data, and physical limitations to individually calculate sizes and weights for each vital component in a ship power and energy system. The methodology allows for new technologies to be quickly and accurately implemented to assess their overall impact on the design. The optimized flow analysis combined with the component level data creates a higher fidelity design that can be analyzed to assess the impact of various systems and operational cases on the overall design. This thesis describes the SSM, discusses the AFO's contribution, and provides background on the component sizing methodology including the underlying theory, baseline data, energy conversion, and physical assumptions. / Master of Science / This thesis describes an adaptable component level machinery system weight and size estimation tool used in the context of a preliminary ship system design and naval ship concept design. The system design decomposes the system of systems into three intersecting areas: physical, logical, and operational to describe the spatial and functional relationships of the system together with their time dependent behavior characteristics. Following an Architecture Flow Optimization (AFO), or energy flow analysis based on this system design, vital components are sized based on their energy flow requirements for application in the ship synthesis model (SSM). Previously, components were sized manually or with estimated equations. This was not workable for assessing many designs in concept exploration and outdated equation models based on historical data were not sufficiently applicable to new ship designs. The new methodology presented in this thesis uses the energy flow analysis, baseline component data, and physical limitations to individually calculate sizes and weights for each vital component in a ship power and energy system. The methodology allows for new technologies to be quickly and accurately implemented to assess their overall impact on the design. The optimized flow analysis combined with the component level data creates a more accurate design that can be analyzed to assess the impact of various systems and operational cases on the overall design. This thesis describes the SSM, discusses the AFO’s contribution, and provides background on the component sizing methodology including the underlying theory, baseline data, energy conversion, and physical assumptions.
72

Comparative Assessment of Network-Centric Software Architectures

Krishnamurthy, Likhita 24 July 2006 (has links)
The purpose of this thesis is to characterize, compare and contrast four network-centric software architectures, namely Client-Server Architecture (CSA), Distributed Objects Architecture (DOA), Service-Oriented Architecture (SOA) and Peer-to-Peer Architecture (PPA) and seven associated frameworks consisting of .NET, Java EE, CORBA, DCOM, Web Services, Jini and JXTA with respect to a set of derived criteria. Network-centric systems are gaining in popularity as they have the potential to solve more complex problems than we have been able to in the past. However, with the rise of SOA, Web Services, a set of standards widely used for implementing service-oriented solutions, is being touted as the "silver bullet" to all problems afflicting the software engineering domain with the danger of making other architectures seem obsolete. Thus, there is an urgent need to study the various architectures and frameworks in comparison to each other and understand their relative merits and demerits for building network-centric systems. The architectures studied here were selected on the basis of their fundamentality and generality. The frameworks were chosen on the basis of their popularity and representativeness to build solutions in a particular architecture. The criteria used for comparative assessment are derived from a combination of two approaches — by a close examination of the unique characteristics and requirements of network-centric systems and then by an examination of the constraints and mechanisms present in the architectures and frameworks under consideration that may contribute towards realizing the requirements of network-centric systems. Not all of the criteria are equally relevant for the architectures and frameworks. Some, when relevant, are relevant in a different sense from one architecture (or framework) to another. One of the conclusions that can be drawn from this study is that the different architectures are not completely different from each other. In fact, CSA, DOA and SOA are a natural evolution in that order and share several characteristics. At the same time, significant differences do exist, so it is clearly possible to judge/differentiate one from the other. All three architectures can coexist in a single system or system of systems. However, the advantages of each architecture become apparent only when they are used in their proper scope. At the same time, a sharp difference can be perceived between these three architectures and the peer-to-peer architecture. This is because PPA aims to solve a totally different class of problems than the other three architectures and hence has certain unique characteristics not observed in the others. Further, all of the frameworks have certain unique architectural features and mechanisms not found in the others that contribute towards achieving network-centric quality characteristics. The two broad frameworks, .NET and Java EE offer almost equivalent capabilities and features; what can be achieved in one can be achieved in the other. This thesis deals with the study of all the four architectures and their related frameworks. The criteria used, while fairly comprehensive, are not exhaustive. Variants of the fundamental architectures are not considered. However, system/software architects seeking an understanding of the tradeoffs involved in using the various architectures and frameworks and their subtle nuances should benefit considerably from this work. / Master of Science
73

Wheeled autonomous mobile robots for use in harsh environments: a survey of recent publications

Larkin, Susan M. 31 January 2009 (has links)
Research in the area of autonomous mobile robots has increased over the last several years. Autonomous mobile robots are now being used in a wide variety of applications, including nuclear plant maintenance, interplanetary exploration, military missions and smart highway systems. This thesis is a survey of recent publications, 1990-1996, of wheeled autonomous mobile robots for harsh environments. Various sensing, navigation, and motion control strategies commonly used on autonomous mobile robots are compared. The integration of all three systems in a system architecture is also presented. Following a general discussion of autonomous mobile robot technology, vehicles that have entered the Unmanned Ground Robotics Competition are presented as a focused study of the application of this broad field of research. / Master of Science
74

Architectural Concepts : Implications for the Design and Implementation of Web and Mobile Applications to Support Inquiry Learning

Vogel, Bahtijar January 2012 (has links)
The integration of mobile and sensor technologies, and the design and implementation of different web-enabled visualizations to support inquiry learning in different educational scenarios encompass the main research efforts carried out in this thesis. These challenges are addressed from the perspectives of mobile and web engineering, visualization and technology-enhanced learning (TEL). Thus, the main research question investigated in this thesis relates to the identification of the main features that can guide the design and implementation of web and mobile applications to support inquiry learning in different contexts. This thesis consists of a collection of four publications that describe the research efforts conducted during a period of three years in relation to the Learning Ecology through Science with Global Outcomes (LETS GO) research project. The research questions investigated and the implemented technological solutions reported in these publications are closely related to the main goals and challenges of this thesis. The design and implementation of the proposed software system was guided, deployed and refined having the following aspects in mind: (1) System Requirements and Architectural Design, (2) System Implementation and Deployment, and (3) System Assessment and Web Usability Testing. During the three years of development efforts, three software prototypes were implemented utilizing service-oriented approaches. These efforts have been tested with more than 200 users in connection to several trials that took place during this period. The user trials allowed testing the software application throughout three development iterations on authentic settings, while new requirements continuously emerged in these activities. This process made it possible to verify that user requirements were adequately addressed while satisfying their needs. The outcomes of these activities led to the design and implementation of a system architecture that relies on service-oriented approaches and open standards. The main outcomes of this thesis are presented in the form of Architectural Concepts, as they can be used to guide the design and implementation of web and mobile applications to support inquiry learning. The idea behind architectural concepts is to provide a set of tools for supporting the overall life cycle of a software development process, such as requirements, design, implementation, deployment and testing while coping with rapid changes of technological implementations. Some of the architectural concepts identified in this thesis correspond well with the kind of support that inquiry-learning activities require. They provide solid foundations in terms of possibilities to tackle the requirements for supporting inquiry learning in a flexible manner.
75

Architecture racinaire des espèces herbacées : diversité de mise en place et plasticité / Root systems of herbaceous plants : strategy and plasticity in front of constraint : gross granulometry and mechanical impedance

Kichah, Emmanuelle 23 May 2016 (has links)
Dans de nombreux projets de végétalisation, le sol est la principale entrave à l’implantation des végétaux. Il est donc fondamental de connaitre la manière dont les systèmes racinaires se mettent en place dans le sol. La mise en place du système racinaire dans le milieu souterrain correspond à l’expression du patrimoine génétique guidé par les contraintes du sol. A travers ce document nous avons tout d’abord présenté la mise en place des systèmes racinaires des espèces herbacées résultant du patrimoine génétique puis nous avons présenté sa plasticité face à certaines contraintes du sol. Les espèces ne possèdent pas forcément un simple système racinaire mais une combinaison de systèmes racinaires qui se met progressivement en place. Nous présentons dans ce document une typologie et une classification de ces systèmes racinaires selon leur localisation et l’implication de l’organe-support dans la multiplication de l’espèce. Nous nous intéressons aussi à l’effet des contraintes du sol sur la mise en place de l’architecture racinaire : la résistance à la pénétration qui est une contrainte récurrente même dans les terres cultivées et la porosité grossière qui est une contrainte présente dans les sols remaniés. Des expérimentations ont été menées sur une diversité d’espèces herbacées afin de comparer leur architecture racinaire en présence ou non une zone de contrainte. Concernant la résistance à la pénétration, nous retrouvons et généralisons les résultats obtenus par d’autres chercheurs sur d’autres espèces herbacées tels que la diminution du taux de croissance ou l’augmentation du diamètre des racines au niveau de la contrainte. De même, nous retrouvons des traits prédictifs de capacité de pénétration tels que le diamètre apical racinaire et le taux de croissance racinaire et nous mettons en avant la teneur en matière sèche du système racinaire avec une corrélation négative. Concernant la porosité grossière, nous observons un effet sur la croissance racinaire, le diamètre apical racinaire et le développement de primordia lorsque la porosité est très grossière / In many revegetation projects, the soil is the main obstacle to the establishment of plants. It is therefore essential to know how the root systems are set up in the ground. The root systems establishment is the expression of the genetic heritage guided by the constraints of the environment. In this document we first presented the root systems development of herbaceous species resulting from genetic and then we presented its plasticity face to soil constraints. The species do not have a single root system, but a combination of root systems that are implemented gradually. We present here a typology and classification of root systems depending on their location and on the bearing-organ involvement in the vegetative multiplication of the species. We are also interested in the effect of soil constraints on the development of root architecture: the penetration resistance is a recurring stress even in cultivated land and the gross porosity is a stress present in soils reworked. Experiments were conducted on a variety of herbaceous species to compare their root architecture with or without a stress zone. Regarding the penetration resistance, we find and generalize the results obtained by other researchers on other herbaceous species such as the decreasing root growth rate or the increasing root diameter at the level of the stress. Similarly, we find the traits predicting the penetration such as root apical diameter and root growth rates and we highlight the root dry matter content with a negative correlation. Regarding the gross porosity, we observe an effect on root growth rate, root apical diameter and primordia development when the porosity is very gross
76

Robust Framework for System Architecture and Hand-offs in Wireless and Cellular Communication Systems

Varma, Vishal V. 14 January 2010 (has links)
Robustness of a system has been defined in various ways and a lot of work has been done to model the robustness of a system, but quantifying or measuring robustness has always been very difficult. In this research, we develop a framework for robust system architecture. We consider a system of a linear estimator (multiple tap filter) and then attempt to model the system performance and robustness in a graphical manner, which admits an analysis using the differential geometric concepts. We compare two different perturbation models, namely the gradient with biased perturbations (sub-optimal model) of a surface and the gradient with unbiased perturbations (optimal model), and observe the values to see which of them can alternately be used in the process of understanding or measuring robustness. In this process we have worked on different examples and conducted many simulations to find if there is any consistency in the two models. We propose the study of robustness measures for estimation/prediction in stationary and non-stationary environment using differential geometric tools in conjunction with probability density analysis. Our approach shows that the gradient can be viewed as a random variable and therefore used to generate probability densities, allowing one to draw conclusions regarding the robust- ness. As an example, one can apply the geometric methodology to the prediction of time varying deterministic data in imperfectly known non-stationary distribution. We also compare stationary to non-stationary distribution and prove that robustness is reduced by admitting residual non-stationarity. We then research and develop a robust iterative handoff algorithm, relating generally to methods, devices and systems for reselecting and then handing over a mobile communications device from a first cell to a second cell in a cellular wireless communications system (GPRS, W-CDMA or OFDMA). This algorithm results in significant decrease in amount of power and/or result is a decrease of break in communications during an established voice call or other connection, in the field, thereby outperforming prior art.
77

A system architecture centred on knowledge management processes / Sistemos architektūra, grindžiama žinių valdymo procesais

Belevičiūtė, Inga, Belevičiūte, Inga 21 November 2008 (has links)
The thesis “A system architecture centred on knowledge management processes” consists of these chapters: 1. Introduction. 2. Knowledge management and knowledge management tools. 3. Analysis of knowledge management systems, their architectures and solutions. 4. A system architecture centred on knowledge management processes. 5. Knowledge management implementations in organizations. 6. General conclusions. The introduction chapter covers relevance, tasks, object, scientific novelty and practical value of the research, and work approbation in international conferences. The first chapter presents knowledge management definitions discussed by many authors in academia and industry. To enter into this subject, knowledge determinations and interpretations widely discussed in literature are analysed. Later, tasks which knowledge management solves in organizations and tools which help to put it into practice are discussed. In the second chapter architectures of knowledge management systems suggested by other researchers in literature are investigated. Thereafter, a classification of them and an investigation of examples of such systems or solutions are made. After the analysis of knowledge management discipline and existing knowledge management system architectures, an architecture for knowledge management systems which is knowledge management processes centred is suggested in the third chapter. Then, specifications of information and communication technologies which could be used... [to full text] / Disertaciją Sistemos architektūra, grindžiamos žinių valdymo procesais sudaro šie skyriai: 1. Įvadas. 2. Žinių valdymas bei žinių valdymo technologijos. 3. Žinių valdymo sistemų ir jų architektūrų analizė. 4. Sistemos architektūra, grindžiamos žinių valdymo procesais. 5. Žinių valdymo sistemos taikymas organizacijose. 6. Bendrosios išvados. Įvadas apima tyrimo aktualumą, mokslinį naujumą, darbo tikslus ir uždavinius, praktinę tyrimo vertę bei aprobavimą tarptautinėse konferencijose ir seminaruose. Pirmame skyriuje „Žinių valdymas ir žinių valdymo technologijos“ pateikiamas žinių valdymo sąvokos apibrėžimas, apie kurį diskutuoja daugelis autorių, dirbančių mokslo ir pramonės srityse. Žinių valdymas pradedamas nagrinėti nuo žinių apibrėžimo ir jo interpretavimo, plačiai aptariamo literatūroje. Tuomet pereinama prie priemonių, padedančių įdiegti žinių valdymą praktikoje. Antrame skyriuje „Žinių valdymo sistemų ir jų architektūrų analizė“ analizuojamos kitų tyrėjų veikaluose siūlomos žinių valdymo sistemų architektūros. Klasifikuojami ir tiriami tokių sistemų arba sprendimų pavyzdžiai, suskirstant juos į komercinius ir atvirojo kodo šaltinius. Išanalizavus egzistuojančias žinių valdymo sistemų architektūras, trečiame skyriuje „Sistemos architektūra, grindžiamos žinių valdymo procesais“ siūloma žinių valdymo sistemos architektūra, sutelkta į žinių valdymo procesus. Tuomet apibūdinamos informacinės ir komunikacinės technologijos, kurias galima taikyti kiekvienam žinių valdymo... [toliau žr. visą tekstą]
78

Reducing Size and Complexity of the Security-Critical Code Base of File Systems

Weinhold, Carsten 09 July 2014 (has links) (PDF)
Desktop and mobile computing devices increasingly store critical data, both personal and professional in nature. Yet, the enormous code bases of their monolithic operating systems (hundreds of thousands to millions of lines of code) are likely to contain exploitable weaknesses that jeopardize the security of this data in the file system. Using a highly componentized system architecture based on a microkernel (or a very small hypervisor) can significantly improve security. The individual operating system components have smaller code bases running in isolated address spaces so as to provide better fault containment. Their isolation also allows for smaller trusted computing bases (TCBs) of applications that comprise only a subset of all components. In my thesis, I built VPFS, a virtual private file system that is designed for such a componentized system architecture. It aims at reducing the amount of code and complexity that a file system implementation adds to the TCB of an application. The basic idea behind VPFS is similar to that of a VPN, which securely reuses an untrusted network: The core component of VPFS implements all functionality and cryptographic algorithms that an application needs to rely upon for confidentiality and integrity of file system contents. These security-critical cores reuse a much more complex and therefore untrusted file system stack for non-critical functionality and access to the storage device. Additional trusted components ensure recoverability.
79

Assessing the maturity of information architectures for complex dynamic enterprise systems

Mykityshyn, Mark 14 November 2007 (has links)
This dissertation investigates the dynamics that underlie enterprise performance and takes a significant step toward showing how it might be predicted. In a novel approach, a comprehensive Enterprise System Architecture (ESA) is developed that introduces separate layers for strategic and operational processes, respectfully. We identify four broad dimensions that contribute to and influence enterprise performance: (1) enterprise processes, (2) technology-based support of enterprise processes [denoted information systems], (3) technology structure and deployment [denoted information technology], and (4) Enterprise Architecture (EA). Detailed interviews were conducted with ten executives, mostly from the aerospace and defense industry, along with a web-based survey of aerospace and defense industry executives. We empirically determine a value for each dimension of maturity and individually assess it as a predictor of enterprise performance. ESA maturity is calculated as the weighted summation of each of dimensional maturity, and is also evaluated as a predictor of enterprise performance. Results indicate that ESA maturity, the weighted summation of process maturity, information systems maturity, information technology maturity, and enterprise architecture maturity, is a good predictor of enterprise performance. In order to provide some practical utility to our empirical results, we outline an ESA maturity assessment framework to enable decision-makers to assess the overall maturity of an enterprise system. Two other extensions of our research results, the development of a strategic layer analysis / portrayal tool, and enterprise system simulation, are also briefly described.
80

Efficiency of hospitals : Evaluation of Cambio COSMIC system

Li, Haorui January 2007 (has links)
In this modern world, healthcare has becoming a popular word in human life. People pay their attention on their health protection and treatment, but at the same time, they need to bear the high expenditure for their healthcare processing. It is a serious problem that the government income can not afford the large expense in healthcare industry. Especially in some developing countries, healthcare problem has become the problem for the nation development. We would like to choose this basic way to solve this problem directly, to provide the channel to improve the efficiency of healthcare system, Cambio COSMIC. The aim to analysis COSMIC for my case study is to find out the conclusion that how does the architect design the system from the stakeholders requirement to achieve the success of improving the efficiency of healthcare system. And how to measure the success for the system achieving to improve the efficiency of healthcare system is still required to indicate.

Page generated in 0.1459 seconds