• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1609
  • 643
  • 580
  • 293
  • 278
  • 193
  • 151
  • 75
  • 52
  • 50
  • 42
  • 39
  • 38
  • 32
  • 23
  • Tagged with
  • 4652
  • 888
  • 723
  • 695
  • 575
  • 550
  • 486
  • 464
  • 419
  • 414
  • 405
  • 367
  • 357
  • 349
  • 334
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Research for presetting construction of EAI system in Telecommunication industry-A case study of A company

Tsai, Cheng-Pang 14 July 2007 (has links)
Because of the development of the information technology, the enterprises of telecommunication introduce many applications system which have different independent function or some software developed by enterprises itself. After enterprises introduce these systems, they find information systems ongoing to expand have influenced the performance of systems and the operation time of users. Even influence the customer service satisfaction. Thus the enterprise continually to integrate system functions. At the same time, they find these independent systems have many problems, such as valuable data have been input several times to different system, data and object standard different between different systems. The technology of enterprise application integration¡]EAI¡^ provides enterprise a better solution to solve these problems. The purpose of this study is to address the issue of telecommunication system integration and using the EAI¡¦s methodology to analysis system. The analytics contains 3 modules, i.e. ¡§data¡¨, ¡§activity¡¨ and ¡§process¡¨ that handle functions of data transforming, message dispatching and process modeling among the heterogeneous systems. This study will use three modules of EAI to analyze the operation information system and study the main evaluation factors of EAI. This study could be submitted to the telecommunication industry for presetting construction when they consider to implementing the ¡§Enterprise Application Integration¡¨ system.
152

Smart Card Information Sharing Platform towards Global Nomadic World

HATANAKA, Masayuki, YAMAMOTO, Shuichiro, SENDA, Shoichi, HASHIMOTO, Junko, NIWANO, Eikazu 01 April 2004 (has links)
No description available.
153

Design and Implement an Efficient Web Application Server

Wu, Jr-Houng 01 August 2000 (has links)
Web application servers are rapidly becoming the essential resources for competitive advantage, because e-businesses can gain amount of revenues. However, benefits are coming from consumers, more consumers cause more benefits. So web application server, which can provide more efficient services, will attract more people. To gain the biggest advantage, we research in Internet to find out a new method. A web application server means it will have frequent transactions. And it will access data in database and produce new web pages to respond consumers through the CGI (Common Gateway Interface) programs. In this paper, we present a new method that can improve performance of web application server through saving network¡¦s bandwidth, reducing web server loading and cutting wait-time of end user. The method primarily uses divided dedicated data and common information of the source web page. With saving the multiple download time of the common information, the efficiency of network¡¦s bandwidth and the user waiting time can be improved effectively. The method also can be easily combined with other existed technologies that can solve Internet efficiency problems. And we developed an approach to design and implement an efficient web application server. Finally, we measure the result of the traditional method and the new method to prove that our method really can save network¡¦s bandwidth, reduce web server loading and cut wait-time of end user. We hope the method can improve general existed problems in Internet.
154

Application Generator: A Framework and Methodology for IS Construction

Chang, I-chia 07 June 2002 (has links)
¡@¡@There is a general agreement that information system (IS) is one of the effective solutions to help enterprises dealing with the challenge in today¡¦s dynamic environment. In response to the changing business environment, the need for a system with flexibility, high quality, and low cost has increased dramatically. Besides, end users more and more rely on IT (information technologies) or IS for their daily life or work. Therefore, how to attain high software throughput would be highly sought constantly. An idea of reusing previously developed modules, packages, components, software development methodologies, analysis data and test information has been attracting as a keystone to improve software productivity. This approach was called component-based development (CBD) or component-based software engineering (CBSE) and is becoming the main stream of software development. ¡@¡@Various CBD approaches, tools, and techniques were proposed in the literature, however the research on the integration of the above into an environment to enhance the system development is virtually lacking. Therefore, we proposed a framework of application generator, which integrates above approaches and concepts into a collaborative mechanism. Otherwise, we proposed a methodology based on our generator for end users to translate the business models or user requirements into the specification and construct application more efficient. Finally, we apply this methodology to a real-world case and generate the application by the generator in order to verify the feasibility.
155

The Research Of Transparent HTML/WML Conversion

Cho, Roung-Rai 09 September 2002 (has links)
ABSTRACT Recently, wireless terminal users that want to a gain various information from www have been increased rapidly. Already-existing HTML applications can be converted into WML (Wireless Markup Language) applications for user on WAP (Wireless application Protocol) enabled devices[10], yet this process is not as simple as the alteration of the markup tags. This paper investigates the problems associated with the conversion process by examining the conversion of a functional information system that would be of benefit to its users when access from remote locations is required. This paper derails a number of problems discovered with the conversion of complex HTML[5] documents into simplified WML documents[4]. The major problems of displaying tabulated data, hyperlinks, navigational aids and user input are discussed, and described with possible solutions presented. The paper concludes by raising the issue of ¡¥intelligent¡¦ automated HTML-to-WML conversion, a topic for future research.
156

Improvements in distribution of meteorological data using application layer multicast

Shah, Saurin Bipin 25 April 2007 (has links)
The Unidata Program Center is an organization working with the University Center for Atmospheric Research (UCAR), in Colorado. It provides a broad variety of meteorological data, which is used by researchers in many real-world applications. This data is obtained from observation stations and distributed to various universities worldwide, using Unidata’s own Internet Data Distribution (IDD) system, and software called the Local Data Manager (LDM). The existing solution for data distribution has many limitations, like high end-toend latency of data delivery, increased bandwidth usage at some nodes, poor scalability for future needs and manual intervention for adjusting to changes or faults in the network topology. Since the data is used in so many applications, the impact of these limitations is often substantial. This thesis removes these limitations by suggesting improvements in the IDD system and the LDM. We present new algorithms for constructing an application-layer data distribution network. This distribution network will form the basis of the improved LDM and the IDD system, and will remove most of the limitations given above. Finally, we perform simulations and show that our algorithms achieve better average end-to-end latency as compared to that of the existing solution. We also compare the performance of our algorithms with a randomized solution. We find that for smaller topologies (where the number of nodes in the system are less than 38) the randomized solution constructs efficient distribution networks. However, if the number of nodes in the system increases (more than 38), our solution constructs efficient distribution networks than the randomized solution. We also evaluate the performance of our algorithms as the number of nodes in the system increases and as the number of faults in the system increases. We find that even if the number of faults in the system increases, the average end-to-end latency decreases, thus showing that the distribution topology does not become inefficient.
157

Malicious Web Page Detection Based on Anomaly Semantics

Luo, Jing-Siang 20 August 2009 (has links)
Web services are becoming the dominant way to provide access to on-line information. Web services have a lot of applications, like e-mail, web search engine, auction network and internet banking. On the web services, web application technology and dynamic webpage technology are very important, but hackers take advantage of web application vulnerabilities and dynamic webpage technology to inject malicious codes into webpages. However, a part of the web sites have neglected the issue of security. In this paper, we propose a novel approach for detecting malicious webpages by URL features, anomaly semantics, potential dangerous tags and tag attributes. This research proposed approach mainly consists of three parts: (1) scripting language and automatic link filter. (2) malicious feature. (3) scoring mechanism. By first part, this step can filter out normal webpages to increae detection speed. Second part can identify some known malicious attacks. Third part can search some unknown malicious webpages by scoring. Our experimental results show that the proposed approach achieves low false positive rate and low false negative rate.
158

Designing principles for mobile application data of body sensors on physical activities

Rafieian, Garsivaz, Amini Marvast, Amin January 2009 (has links)
<p>This thesis has been divided into two essential parts, the purpose of the first part is to investigate and explore a three-tier architecture for remote health monitoring system capable to collect, store and forward the physiological data, which has been collected by a mobile device via a bluetooth connection from body sensors, to an internet data base server.</p><p>During the second part, we have tried to take a deep look into a heart beat modeling method. We have studied and investigated on extended integral pulse frequency modulation model which is used for the presence of ectopic beats and heart rate turbulence.</p>
159

Analyzing the feasibility of using secure application integration methodology (SAIM) for integrating don enterprise resource planning (ERP) application /

Marin, Ramon O. January 2004 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2004. / Thesis advisor(s): Glenn R. Cook. Includes bibliographical references (p. 95-99). Also available online.
160

User-controlled kinetic network generation with INGen

Bennett, Craig Allen. January 2009 (has links)
Thesis (Ph. D.)--Rutgers University, 2009. / "Graduate Program in Chemical and Biochemical Engineering." Includes bibliographical references.

Page generated in 0.1045 seconds