• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 203
  • 167
  • 106
  • 69
  • 55
  • 48
  • 28
  • 13
  • 8
  • 6
  • 5
  • 5
  • 5
  • 2
  • 2
  • Tagged with
  • 781
  • 141
  • 100
  • 93
  • 91
  • 79
  • 66
  • 64
  • 62
  • 55
  • 55
  • 55
  • 53
  • 53
  • 52
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
171

Analise de testes em ambiente Windows

Cisneiros, Fernando Antonio de Alemão 16 December 1992 (has links)
Orientador: Osvair Vidal Trevisan / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Mecanica / Made available in DSpace on 2018-07-18T05:20:46Z (GMT). No. of bitstreams: 1 Cisneiros_FernandoAntoniodeAlemao_M.pdf: 6160369 bytes, checksum: afff3e916746a12255188d442d3deefb (MD5) Previous issue date: 1992 / Resumo: Na última década ocorreram grandes avanços na técnica de interpretação de testes de pressão em poços e ao mesmo tempo uma expansão vertiginosa das facilidades de acesso a recursos computacionais através do advento dos microcomputadores. Nos últimos anos a popularização das interfaces gráficas para microcomputadores com o advento do Macintosh, do Windows e do OS/2, estão modificando fortemente a interação homem-máquina e abrindo novos horizontes para as tecnologias acentuadamente dependentes de recursos gráficos. A interpretação de testes de pressão em poços é sem dúvida uma tecnologia que se enquadra nesse perfil e a partir desta constatação, este trabalho propõe-se a definir e desenvolver um sistema profissional básico para análise de testes em ambiente gráfico. São definidos o modelo de dados e a especificação do sistema. As metodologias para análise em poços surgentes e não surgentes (DST) são implementadas incluindo métodos de análise especializada, análise por curva típica e análise automatizada. O desenvolvimento do sistema é feito utilizando um compilador C e o ambiente gráfico Windows / Abstract: A considerable progress has occurred in well test interpretations techniques in the last decade. At the same time, a large expansion in the access to computational resources has taken place through the advent of microcomputers. In the last years, the popularization of graphical interfaces for microcomputers introduced by Macintosh, Windows and OS/2, has modified the man-machine interaction and opened new ways to technologies which depend heavily on graphical resources. Well test interpretation is certainly a technology that carries the graphical dependence. The purpose of this work is to define and to develop a basic professional system applied to well test interpretation under a graphical environment. The data model and the system specification have been defined. Procedures for well test analysis of slug test data and tests for flowing wells have been implemented. The system includes type curves analysis, semilog analysis and automated type curve analysis. The system has been developed with a "C" compiler and under the Windows graphical environment / Mestrado / Mestre em Engenharia de Petróleo
172

Time Windows for Indexing Language Comprehension in Adults With and Without Aphasia

Hassan, Fatimah Hani B. January 2012 (has links)
No description available.
173

Fundamentals and Application of Large Area Dielectrowetting Optical Shutters

Russell, Ann C. January 2014 (has links)
No description available.
174

Development of a PC software package using windows 95 and visual C++ to evaluate traffic safety improvements based upon accidents per unit time

Yu, Kuan Tao January 1996 (has links)
No description available.
175

Windows and Mirrors: A Collection of Personal Essays

Baker, Holly T. 20 July 2010 (has links)
No description available.
176

Thermal energy conservation with draperies and a plastic window liner /

Sloan, Donna Lucille January 1984 (has links)
No description available.
177

An experimental investigation of glass breakage in compartment fires

Skelly, Michael J. 25 April 2009 (has links)
An experimental investigation has been completed which studied the breaking of window glass by fire. The experiments were carried out in a specially designed compartment to achieve two-layer flows characteristic of normal building fires. The experimental data was collected from two test groups: the first for windows with their edges insulated from the fire (edge-protected) and the second for windows uniformly heated by the fire (edge-unprotected). The results of the edge-protected window tests indicated that the glass breakage was caused by a critical temperature difference between the central heated portion of the pane and the glass edge. The experimental work showed the critical value to be approximately 90C. After the material properties of the glass were determined, the theoretical findings of Keski-Rahkonen were used to obtain a value of 70C; the difference attributed to radiative heating. The test results also demonstrated a distinctive loss of integrity by the windows. When breakage occurred, the cracks spread throughout the glass, joined together and caused at least partial collapse of the pane. The results from the edge-unprotected window tests were quite different. There were relatively few cracks developed and almost no propagation across the glass. Consequently, there was no window collapse in any of these cases. The breakage did initiate at a consistent glass temperature value, however, the mechanism for these tests is not known. / Master of Science
178

A Network Measurement Tool for Handheld Devices

Tan, SiewYeen Agnes 04 June 2003 (has links)
This thesis describes a performance measurement tool that allows a user to measure network performance using a handheld device. The measurement tool consists of a client program that runs on a Microsoft Pocket PC device and a server program that runs on a regular Microsoft Windows computer. Both programs are Windows applications implemented in C/C++ using the Microsoft Embedded Visual Tool and Microsoft Visual Studio. The use of a Pocket PC device provides mobility to users, which can save time and energy when performing experiments. The thesis describes the design of the performance measurement application, implementation issues, and tests conducted using the tool. / Master of Science
179

Uttryck och intryck : En studie om skillnaderna mellan avsikt och uppfattning på Windows Live Messenger / Expression and impression : A study of the differences between intention and conception on Windows Live Messenger

Ahlm, Caroline January 2010 (has links)
Face-to-face communication is always complemented with non-verbal signals that give us clues as to how a message shall be interpreted, but as communication is moved online the possibilities to express oneself becomes more limited. This paper focuses on the instant messaging client Windows Live Messenger and three of the non-verbal functions that it provides (nudges, winks and emotes). The purpose of the paper and its underlying study is to compare the senders' intentions with the receivers' conceptions when it comes to these functions. The study was done as a questionnaire with two different versions of the questions, one looking at the senders' intentions and the other at the receivers' conceptions. The results were then compared in order to look for tendencies. The results showed that the most common intention among the senders was also the most common conception among the receivers, but that the rest of the attitudes didn't match at all. The functions that are supposed to help the conversation flow often create ambiguity instead and lead to vagueness, misconceptions and annoyance. / Kommunikation som sker ansikte mot ansikte kompletteras alltid med icke-verbala signaler som ger ledtrådar till hur ett budskap ska tolkas, men i och med att kommunikationen flyttas online begränsas möjligheterna att uttrycka sig. Uppsatsen fokuserar på chatt-tjänsten Windows Live Messenger och tre av de icke-verbala funktioner som den tillhandahåller (vibbar, blinkningar och uttryckssymboler). Syftet med uppsatsen och dess bakomliggande studie är att jämföra avsändarnas avsikter med mottagarnas uppfattningar när det gäller dessa funktioner. Studien utfördes med kvantitativ metod i form av en enkätundersökning. Respondenterna fördelades jämnt mellan två olika enkäter vilka behandlade avsändarnas avsikter och mottagarnas uppfattningar var för sig. Resultaten av de två enkäterna jämfördes sedan med varandra i ett försök att avläsa vissa tendenser. Analysen visade att den vanligaste avsikten hos avsändarna också var den vanligaste uppfattningen hos mottagarna, men att resterande åsikter inte alls stämde överens. Funktionerna som ska hjälpa konversationen framåt visar sig istället vara mångtydiga och leda till så väl oklarheter som missförstånd och irritation.
180

Skadlig kod och sårbarheter i Windows : En studie i virusens historia och nutidens olika säkerhetsrisker

Lejdemalm, Roger, Andreasson, Daniel January 2008 (has links)
<p>I dag kan man oftast läsa om olika säkerhetshot och risker en datoranvändare måste tänka på för att inte ge någon utomstående möjlighet att komma åt känslig och/eller privat information. Här talas det om nya virus och nya typer av trojaner som sprids som epidemier över Internet, och i bland handlar det om ett spionprogram som följer med en nedladdad fil. Det är svårt att hålla reda på alla typer av skadlig kod som nämns fast med ökad förståelse ökar också chanserna för att klara sig från smitta. Det har visat sig att utvecklingen av skadlig kod är lika stark som den inom kommersiella mjukvaror. Från persondatorns uppkomst i början av 80-talet och fram till i dag, har utveckling skett i alla områden av den skadliga kod det handlar om strategi, syfte och framförallt ren kodkomplexitet.</p><p>Dagens ledande leverantör av operativsystem och webbläsare, Microsoft, lovar allt mer sofistikerade säkerhetslösningar varje gång en ny version av ett program släpps. Framförallt nämndes det i samband med lanseringen av Windows Vista att säkerheten var det som stod högst på listan.</p><p>Vi har tillsammans med WM-data i Stockholm tagit fram en programvara för fjärradministration av Windows. Huvudmålet var att med hjälp av våra baskunskaper i programmering skapa ett program för Windows XP och Windows Vista där en rad funktioner skulle kunna fjärrstyras utan att en användare vid den drabbade datorn upptäckte intrånget.</p><p>I denna rapport beskrivs utvecklingen av programvaran och de tester som gjorts på de båda operativsystemen. Vidare delas begreppet ”skadlig kod” upp i kategorierna virus, maskar, trojaner samt rootkits och förklaras mer ingående tillsammans med en historisk bild över hur utvecklingen av skadlig kod har sett ut.</p> / <p>In media today, you often read about different security threats and risks that one has to be aware of. Many things must be taken into consideration in order to maintain your integrity and information secrecy. It might be new virus outbreak, a new trojan or some kind of spy ware that undetected finds the way to your computer. It’s hard to keep track of all terms and types of malicious code, and with greater understanding, the risk of infection decreases. The development when it comes to malicious code is as strong as the one in commercial software development. From the 80’s until present day, every area in the development of malicious code has evolved, from strategy and purpose to the pure complexity of the code.</p><p>Microsoft, the worlds leading supplier of operating systems and web browsers, ensure us with every new release, that measures has been taken in order to enhance the security features. As the new operating system Windows Vista was released, spokesmen said that the security was now the highest priority.</p><p>We have, together with WM-data in Stockholm, developed software for remote administration of Windows. The objectives where by using our limited programming skills only, to come up with a program for Windows XP and Windows Vista, where a number of functions could be remotely executed without alerting a user at the infected computer.</p><p>This report describes the development of the software together with test results of execution on both operating systems. Further on, the report discusses different types of malicious code, such as viruses, worms, Trojans and root kits, together with a historical study of the development of malicious code.</p>

Page generated in 0.0587 seconds