• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 48
  • 19
  • 17
  • 16
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 125
  • 125
  • 37
  • 29
  • 28
  • 28
  • 27
  • 23
  • 23
  • 22
  • 21
  • 20
  • 18
  • 18
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Využití SIEM systémů při monitorování síťových událostí / Utilization of SIEM systems for network events monitoring

Kopřiva, Milan January 2015 (has links)
In the last years we can observe an increasing number of security incidents varying in their focus, motives and success rate. Attacks are often conducted by very skilled organized groups with high knowledge base and they are increasing in their sophistication and efficiency. Because of those reasons information security is now one of the main fields of interest of IT experts. This thesis deals with Security information and Event Management technology and its usage for the detection of potentially harmful activity in a company's internal network. In the first chapter the elementary concepts of security are placed into the context of this thesis. Next chapter deals with security information and event management technology itself, its clear definition and describing the main functionality. The end of the theoretical part is dedicated to the author's view of the future and also to the problems concerning the implementation of SIEM solutions including return on investment calculation which has certain specifics in security field. Main benefit coming from this thesis is a clear description and creation of use cases aimed at the detecting suspicious activity in internal computer networks combined with their deployment in SIEM solution in real environment. The practical part of this thesis is dedicated to the configuration of the chosen device and its connection to the SIEM solution, and the assessment of usability of security events generated by the threat detecting device. Based on this assessment the use cases will be modelled and then deployed in the test environment. This thesis aims to bring on overall view into the security information and event management technology, starting with its definition and base functions. The primary goal of this thesis is use case designing for real time threat detection in a practical environment.
72

The NORMAP Methodology: Non-functional Requirements Modeling for Agile Processes

Farid, Weam Mohamed 01 January 2011 (has links)
Agile software development methodologies, such as Scrum, have gained tremendous popularity and proven successful in quickly delivering quality Functional Requirements (FRs). However, agile methodologies have not adequately identified, modeled, and linked Non-Functional Requirements (NFRs) with FRs in early development phases. Researchers agree that NFRs have been generally ignored in conventional methodologies, especially ignored in agile environments. This dissertation develops a conceptual framework for NFR modeling in agile processes. The proposed Non-functional Requirements Modeling for Agile Processes (NORMAP) Methodology investigated the feasibility of identifying, linking, and modeling Agile Loose Cases (ALCs) with Agile Use Cases (AUCs) and Agile Choose Cases (ACCs). AUCs are newly proposed hybrid of use cases and agile user stories. ALCs are proposed—loosely—defined agile NFRs. ACCs are proposed potential solutions (operationalizations) for ALCs. A lightweight adapted version of the NFR Framework was developed including 25 important NFRs selected out of 161 for this study. Further, an enhanced risk-driven agile requirements implementation sequence (NORPLAN) was developed and visualized as a tree-like view (NORVIEW). The NORMAP Methodology was validated through developing NORMATIC--a Java-based agile visual modeling simulation tool and two case studies. NORMATIC utilized Natural Language Processing (NLP) tools to parse requirement sentences and identify potential ALCs. The first case study utilized the Predictor Models in Software Engineering (PROMISE) dataset used in NFRs classification. NORMAP successfully parsed and classified ALCs for 529 out of 607 (87.15%) independent user requirements. The second case study utilized the European Union eProcurement System’s 26 functional requirements. NORMAP successfully parsed and classified ALCs for 50 out of 57 sentences that included possible ALCs (87.71%). Furthermore, requirements quality and project management metrics were used to calculate a risk-driven requirements implementation sequence using three priority schemes. Results showed that Riskiest-Requirements-First priority scheme planned requirements in 17 sprints--two months earlier than the Highest-Business-Value-First scheme (21 sprints) and one month earlier than the Riskiest-Requirements-Last scheme (19 sprints). Agile communities can potentially benefit from the NORMAP Methodology by utilizing a systematic and risk-driven lightweight engineering process to visually model and plan NFRs as first-class artifacts in agile environments.
73

Développement de méthodes et outils basés sur la réalité augmentée et virtuelle pour l'assistance ou l'apprentissage d'opérations dans un contexte industriel / Development of methods and tools based on augmented and virtual reality for the assistance and learning of operations in an industrial environment

Havard, Vincent 09 February 2018 (has links)
L’adoption du numérique au sein des industries et les évolutions des technologies ouvrent de nouvelles perspectives d’usages de la réalité augmentée (RA) et de la réalité virtuelle (RV). Ainsi, ces technologies peuvent faciliter l’assistance des opérateurs travaillant sur des systèmes industriels complexes en utilisant la RA et permettre la mise en œuvre de formations en RV, améliorant donc leur efficience. Cependant, intégrer ces nouveaux outils aux processus existants de l’entreprise reste complexe, de par les aspects technologiques et le continuum de données à mettre en œuvre, de par l’identification des cas d’usages et des gains associés et de par la diversité d’acteurs et d’experts métiers à impliquer dans ce processus : l’expert du système industriel, l’opérateur, le concepteur et le développeur informatique.Afin d’aborder ces différentes problématiques industrielles et en se basant sur un état de l’art scientifique et technologique, nos travaux de recherche ont porté sur la proposition d’un modèle de données permettant de faciliter la création de contenu en réalité augmentée pour les opérations sur des systèmes industriels. Ces travaux ont également permis de mettre en place un environnement expérimental basé sur une chaîne de production didactique et une application créée grâce à ce modèle.Dans une seconde partie de ce travail, afin d’évaluer l’efficacité de cette technologie, nous avons mis en place une méthode permettant d’évaluer l’usage de la réalité augmentée pour la maintenance de systèmes industriels complexes selon des critères de performances et de satisfactions. L’analyse de deux études de cas montre que la contextualisation de l’information en réalité augmentée permet à l’opérateur de comprendre plus rapidement l’opération à effectuer qu’avec guide papier tout en réduisant certains types d’erreur. De plus, nous proposons des recommandations pour améliorer la pertinence de l’information fournie en réalité augmentée et identifions le type d’opération permettant d’obtenir un gain significatif, grâce à la réalité augmentée. Ces travaux s’intéressent également à l’influence et à la sélection des dispositifs de rendus.Enfin, en nous basant sur le modèle de données de RA, nous proposons une ontologie permettant d’unifier la création de contenu en réalité augmentée et virtuelle afin de former et guider un opérateur dans ses tâches. Nous étudions l’usage de cette ontologie pour exploiter d’autres données et connaissances de l’entreprise telles que celles liées à la maintenance. Cette ontologie est utilisée pour des scénarios de formation dans des environnements industriels et pour l’assistance sur des opérations. / The adoption of digital technologies within industries and the evolution of technologies are opening new perspectives for using augmented reality (AR) and virtual reality (VR). Therefore, those technologies can facilitate the operators’ tasks working on complex industrial systems, either by bringing them some contextualised information in AR or by helping them with VR trainings. Thus they would improve their efficiency. However, integrating these new tools into existing processes of the company remains complex, due to the technologies and the data continuum needed, through the identification of use cases and the associated gains and by the diversity of actors and business experts involved in this process: the expert of the industrial system, the operator, the designer and the computer scientist.In order to develop those different industrial problematics, we first study the state of the art of scientific publications and existing technologies. Then, our research work has proposed a data modelling facilitating content authoring of augmented reality operations on industrial system. This work has also allowed to set up an experimental environment based on an educational production line and an augmented reality application developed thanks to that model.In a second part of this work, and in order to evaluate the efficiency of this technology, we have proposed a methodology allowing to evaluate augmented reality usage for maintenance, repair and operations on industrial systems according to performance, satisfaction and behavioural criteria. We analyse two case studies. They shows that contextualisation of information with augmented reality allows the operator to faster understand the task he needs to carry out than with paper instructions while reducing some kind of errors. Moreover we are proposing some guidelines in order to improve the augmented reality information efficiency. Besides, we are identifying which types of operation are improved with augmented reality. The work is also describing the rendering device influence on the use of augmented reality.Finally, and based on the augmented reality modelling, we are proposing an ontology allowing to unify content authoring of augmented and virtual reality so as to train or guide operator in their tasks. We are studying the use of this ontology for exploiting others data and company knowledge, as maintenance. This ontology is used for training scenarios in industrial environment and for guiding operator during their work.
74

Förstudie för implementering av affärssystemet Oracles tidrapporteringsmodul OTL (Oracle Time and Labor) : Kravhantering och GAP analys för tidrapporteringsprocess i Oracle EBS R12

Johansson, Ida, Örnjäger, Maria January 2012 (has links)
This is a report for our thesis that was conducted as a conclusion of our bachelor degree in Business engineering at the Royal Institute of Technology (KTH). The work is done in cooperation with the firm Navigate Consulting Business Solutions AB. They have their leading expertise in Oracle E-Business Suite and has previously chosen to implement Oracle EBS R12. The modules that are planned to be implemented are general ledger (GL), accounts payable (AP), accounts receivable (AR), project module (PA), purchases, and CRM. For a consulting company like Navigate, it is particularly important to have a simple and effective time reporting process. We were therefore asked to provide new tabs with a decision-making process to determine if Oracle Time & Labor (OTL) is a useful time tracking system for their business. In order to achieve the company´s aim and objective we decided to follow a development method with five different phases. The phases included a set of work steps that generated various documents, which gave us enough information to structure the entire company and helped us to create a clear picture of the organization and its structure. From this, we could work out a requirements document and then map those requirements to OTL. This resulted in a gap analysis where you can read the requirements that are handled by OTL and possible solutions to the requirements that OTL doesn´t handle. The result of this work is presented in process maps, a requirement specification, an use case documents, and a GAP analysis. / Detta är en rapport för vårt examensarbete som har genomförts som en avslutning på vår kandidatutbildning Affärssystem vid Kungliga Tekniska Högskolan (KTH). Arbetet är utfört i samarbete med företaget Navigate Consulting Business Solutions AB (Navigate). De har sin främsta expertis inom Oracle E-Business Suite och har sedan tidigare valt att implementera Oracle EBS R12 i sin verksamhet. De tänkta modulerna är Huvudbok(GL), Leverantörsreskontra(AP), Kundreskontra(AR), Projektmodul(PA), Inköp och CRM. För ett konsultföretag som Navigate är det särskilt viktigt att ha en enkel och fungerande tidrapportering. Vi fick därför i uppdrag att förse Navigate med ett beslutsunderlag för att de ska kunna avgöra om Oracle Time & Labor (OTL) är ett lämpligt tidrapporteringssystem för deras verksamhet. För att uppnå arbetets syfte och mål beslutade vi att följa en utvecklingsmetod med fem olika faser. Faser med arbetssteg som genererade olika dokument, som gav oss tillräcklig information för att strukturera upp hela företaget och lättare skapa en klar bild över organisationen och dess struktur. Utifrån detta kunde vi arbeta fram ett kravdokument och sedan mappa dessa krav mot OTL. Detta resulterade i en GAP analys där man kan läsa vilka krav som hanteras utav OTL samt eventuella lösningar till de krav som ej hanteras. Resultatet av detta arbete presenteras i processkartor, en kravspecifikation, ett användningsfallsdokument samt en GAP analys.
75

Security Threats and Countermeasures for Connected Vehicles

Gong, Xuwei January 2019 (has links)
With the rapid development of connected vehicles, automotive security has become one of the most important topics. To study how to protect the security of vehicle communication, we analyze potential threats for connected vehicles and discuss countermeasures to mitigate these threats. In this thesis, we examine 25 services that connected vehicles can provide. Entities, connections, and message flows in these services are investigated and synthesized into a vehicle network structure. The 25 services are divided into six use cases including: infotainment service, remote monitoring, device control, Vehicle-toeverything (V2X), diagnostics service, and in-vehicle Intrusion Detection System (IDS). We establish communication models for these use cases and analyze the potential threats based on Confidentiality, Integrity and Availability (CIA) criteria. We discuss possible countermeasures that can mitigate these threats based on existing network security techniques. Each alternative countermeasure’s advantages and limitations are presented. To filter possible attacks, we investigate and design firewalls in four components of a vehicle: Dedicated Short-Range Communications (DSRC) module, gateway, Telematic Control Unit (TCU), and Human-Machine Interface (HMI). We also simulate a firewall for an HMI application by building a communication model in Python. / Med den snabba utvecklingen av anslutna fordon har bilsäkerhet blivit ett av de viktigaste ämnena. För att studera hur man skyddar säkerheten för fordonskommunikation analyserar vi potentiella hot mot anslutna fordon och diskuterar motåtgärder för att mildra dessa hot. I denna avhandling undersöker vi 25 tjänster som anslutna fordon kan tillhandahålla. Entiteter, anslutningar och meddelandeflöden i dessa tjänster undersöks och syntetiseras i en fordonsnätverksstruktur. De 25 tjänsterna är indelade i sex användarvägar, inklusive: infotainment service, fjärrövervakning, enhetskontroll, Fordon-tillallt (V2X), diagnostikservice och IDS-system (Intrusion Detection System). Vi etablerar kommunikationsmodeller för dessa användningsfall och analyserar de potentiella hot som baseras på CIA-kriterier (Confidentiality, Integrity and Availability). Vi diskuterar eventuella motåtgärder som kan mildra dessa hot baserat på befintliga nätverkssäkerhetstekniker. Varje alternativ motåtgärds fördelar och begränsningar presenteras. För att filtrera eventuella attacker undersöker vi och utformar brandväggar i fyra delar av ett fordon: Dedicated Short-Range Communications (DSRC) -modul, gateway, Telematic Control Unit (TCU) och Human Machine Interface (HMI). Vi simulerar också en brandvägg för en HMI-applikation genom att bygga en kommunikationsmodell i Python.
76

A New Paradigm Integrating Business Process Modeling and Use Case Modeling

Brown, Barclay 01 January 2015 (has links)
The goal of this research is to develop a new paradigm integrating the practices of business process modeling and use case modeling. These two modeling approaches describe the behavior of organizations and systems, and their interactions, but rest on different paradigms and serve different needs. The base of knowledge and information required for each approach is largely common, however, so an integrated approach has advantages in efficiency, consistency and completeness of the overall behavioral model. Both modeling methods are familiar and widely used. Business process modeling is often employed as a precursor to the development of a system to be used in a business organization. Business process modeling teams and stakeholders may spend months or years developing detailed business process models, expecting that these models will provide a useful base of information for system designers. Unfortunately, as the business process model is analyzed by the system designers, it is found that information needed to specify the functionality of the system does not exist in the business process model. System designers may then employ use case modeling to specify the needed system functionality, again spending significant time with stakeholders to gather the needed input. Stakeholders find this two-pass process redundant and wasteful of time and money since the input they provide to both modeling teams is largely identical, with each team capturing only the aspects relevant to their form of modeling. Developing a new paradigm and modeling approach that achieves the objectives of both business process modeling and use case modeling in an integrated form, in one analysis pass, results in time savings, increased accuracy and improved communication among all participants in the systems development process. Analysis of several case studies will show that inefficiency, wasted time and overuse of stakeholder resource time results from the separate application of business process modeling and use case modeling. A review of existing literature on the subject shows that while the problem of modeling both business process and use case information in a coordinated fashion has been recognized before, there are few if any approaches that have been proposed to reconcile and integrate the two methods. Based on both literature review and good modeling practices, a list of goals for the new paradigm and modeling approach forms the basis for the paradigm to be created. A grounded theory study is then conducted to analyze existing modeling approaches for both business processes and use cases and to provide an underlying theory on which to base the new paradigm. The two main innovations developed for the new paradigm are the usage process and the timebox. Usage processes allow system usages (use cases) to be identified as the business process model is developed, and the two to be shown in a combined process flow. Timeboxes allow processes to be positioned in time-relation to each other without the need to combine processes into higher level processes using causal relations that may not exist. The combination of usage processes and timeboxes allows any level of complex behavior to be modeled in one pass, without the redundancy and waste of separate business process and use case modeling work. Several pilot projects are conducted to test the new modeling paradigm in differing modeling situations with participants and subject matter experts asked to compare the traditional models with the new paradigm formulations.
77

UNDERSTANDING BEHAVIORAL INTENTION AND ADOPTION OF AUTOMATED VEHICLES IN CANADIAN CENSUS METROPOLITAN AREAS

Hamiditehrani, Samira January 2023 (has links)
Sharing automated vehicles (AVs) is a possible future, where shared automated vehicles (SAVs) and pooled automated vehicles (PooledAVs) are prospective on-demand AV configurations. While SAVs and PooledAVs can contribute to the sustainability of transport systems, the success of on-demand AVs depends on whether and how the public adopts them as regular travel modes. As such, this dissertation investigates five objectives: (1) to scrutinize the essential steps of designing a future mobility survey , while the primary focus of the survey is on respondents’ intentions to adopt various AV configurations (2) to propose and validate a theoretical model for on-demand AV adoption by extending the Theory of Planned Behavior (TPB), (3) to identify the prospective use cases of SAVs as the potential precursor of on-demand AVs, (4) to identify individual characteristics that may trigger different behavioral intentions among the on-demand AV service types, and finally (5) to investigate Canadians’ intentions to adopt on-demand AVs. A nationwide Canadian survey was designed and administered in fall 2021 (n = 5002) among adults (18 to 75 years old) residing in six major Canadian metropolitan areas: Toronto, Vancouver, Ottawa-Gatineau, Montréal, Calgary, and Hamilton. The findings of this dissertation paint a complex picture of on-demand AV adoption in the Canadian context with respect to the application of constructs from common technology adoption models and will help researchers investigating the characteristics of prospective consumers of on-demand AVs to identify the importance of affective motivations regarding adopting such emerging travel modes. The results reveal that many Canadians are yet either uncertain or reluctant to adopt AV technology in shared mobility services. In this light, policymakers and planners should adjust and moderate their expectations regarding the future market for on-demand AVs and be prepared for potential changes in travel behavior by examining incremental changes in existing on-demand ride-hailing services. / Dissertation / Doctor of Philosophy (PhD) / This dissertation assesses the conditions under which Canadians are willing to use fully automated vehicles (AVs) and investigates public perceptions and intentions to use “automated ride-hailing services,” which function as a taxi or Uber/Lyft service without a driver, and “pooled automated ride-hailing services,” which are a form of ride-hailing services, where passengers share a ride with someone they do not know to save on the cost of travel. To this end, an online survey (n = 5002) was designed and administered in October and November 2021 across six major Canadian metropolitan areas: Toronto, Vancouver, Ottawa-Gatineau, Montreal, Calgary, and Hamilton. Overall, results suggest that expectations towards AVs suddenly transforming the entire transportation sector, should be moderated and “automated ride-hailing services” and “pooled automated ride-hailing services” (when they are available in the entire Canadian market) are likely to be adopted as a supplementary mobility tool rather than a substitution for current travel modes.
78

Drying up the bedwetting : retelling of a narrative journey

Fisher, Gweneth 12 1900 (has links)
Thesis (MEdPsych (Educational Psychology))--University of Stellenbosch, 2005. / As a research-therapist-in-training I sought to document a young boys story of his struggle with enuresis. The purpose of the study was to explore the use of the narrative metaphor with this young boy who took a stand against enuresis after numerous attempts to resolve it. Enuresis is a medical diagnostic term and I attempted to seek alternatives to the diagnosis and treatment of what is sometimes viewed as pathology. I undertook to find an answer to the research curiosity: How could the narrative metaphor be used in working against the bedwetting? The narrative approach was utilized to guide the research journey in order to facilitate the client's preferred, alternative story of his life. I was interested in highlighting an alternative story to the diagnosis and treatment of enuresis as pathology. Looking at the positivist views on enuresis I became particularly interested how the narrative metaphor could be used against enuresis. I used the guidelines and questions suggested by Michael White's work (1995:201) on narrative therapy and bedwetting to strengthen Michael's voice. White described ways of externalising the problem and mapping the influence of the problem. Key concepts used during the research journey were: terms adopted from narrative therapy, enuresis and postmodernism.
79

Transformação de um modelo de empresa em um modelo de casos de uso seguindo os conceitos de engenharia dirigida por modelos. / Transforming an enterprise model into a use case model using model-driven engineering concepts.

Siqueira, Fábio Levy 08 December 2011 (has links)
Uma das principais responsabilidades da área de Engenharia de Requisitos é refinar requisitos em especificações. Em sistemas empresariais esse refinamento deve considerar o contexto empresarial no qual o sistema fará parte. Apesar de existirem algumas abordagens para refinar requisitos algumas delas até mesmo considerando o contexto empresarial essa tarefa é realizada manualmente. Baseado em conceitos de Engenharia Dirigida por Modelos, este trabalho propõe uma transformação semiautomática usando um modelo da empresa como modelo dos requisitos e um modelo de casos de uso como modelo das especificações. Para isso, considera-se que ao usar um modelo de empresa como origem dessa transformação é possível representar tanto os requisitos quanto os conhecimentos de domínio necessários para obter especificações através de uma transformação. Com isso, este trabalho apresenta os metamodelos de origem e de destino, um conjunto de regras de transformação e uma ferramenta que permite executar a transformação. Por fim, este trabalho também discute um experimento que foi executado para analisar alguns aspectos desta proposta. / One of the key responsibilities of Requirements Engineering is to refine requirements into specifications. For enterprise systems, this refinement must consider the enterprise context where the system will be deployed. Although there are some approaches for requirements refinement, some of them even considering the enterprise context, this task is executed manually. Based on Model-Driven Engineering concepts, this study proposes a semi-automatic transformation using an enterprise model as a requirements model and a use case model as a specifications model. For that, this work considers that using an enterprise model as a source it is possible to represent both the requirements and the domain knowledge that are necessary to obtain specifications through a transformation. Therefore, this study presents the source and target meta-models, a set of transformation rules, and a tool to support the transformation. Finally, this study also discusses an experiment executed to analyze some aspects of this proposal.
80

Transformação de um modelo de empresa em um modelo de casos de uso seguindo os conceitos de engenharia dirigida por modelos. / Transforming an enterprise model into a use case model using model-driven engineering concepts.

Fábio Levy Siqueira 08 December 2011 (has links)
Uma das principais responsabilidades da área de Engenharia de Requisitos é refinar requisitos em especificações. Em sistemas empresariais esse refinamento deve considerar o contexto empresarial no qual o sistema fará parte. Apesar de existirem algumas abordagens para refinar requisitos algumas delas até mesmo considerando o contexto empresarial essa tarefa é realizada manualmente. Baseado em conceitos de Engenharia Dirigida por Modelos, este trabalho propõe uma transformação semiautomática usando um modelo da empresa como modelo dos requisitos e um modelo de casos de uso como modelo das especificações. Para isso, considera-se que ao usar um modelo de empresa como origem dessa transformação é possível representar tanto os requisitos quanto os conhecimentos de domínio necessários para obter especificações através de uma transformação. Com isso, este trabalho apresenta os metamodelos de origem e de destino, um conjunto de regras de transformação e uma ferramenta que permite executar a transformação. Por fim, este trabalho também discute um experimento que foi executado para analisar alguns aspectos desta proposta. / One of the key responsibilities of Requirements Engineering is to refine requirements into specifications. For enterprise systems, this refinement must consider the enterprise context where the system will be deployed. Although there are some approaches for requirements refinement, some of them even considering the enterprise context, this task is executed manually. Based on Model-Driven Engineering concepts, this study proposes a semi-automatic transformation using an enterprise model as a requirements model and a use case model as a specifications model. For that, this work considers that using an enterprise model as a source it is possible to represent both the requirements and the domain knowledge that are necessary to obtain specifications through a transformation. Therefore, this study presents the source and target meta-models, a set of transformation rules, and a tool to support the transformation. Finally, this study also discusses an experiment executed to analyze some aspects of this proposal.

Page generated in 0.0208 seconds