• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 86
  • 21
  • 20
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 254
  • 254
  • 75
  • 49
  • 43
  • 42
  • 39
  • 32
  • 29
  • 29
  • 23
  • 23
  • 20
  • 18
  • 18
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
171

The Applications of Regression Analysis in Auditing and Computer Systems

Hubbard, Larry D. 05 1900 (has links)
This thesis describes regression analysis and shows how it can be used in account auditing and in computer system performance analysis. The study first introduces regression analysis techniques and statistics. Then, the use of regression analysis in auditing to detect "out of line" accounts and to determine audit sample size is discussed. These applications led to the concept of using regression analysis to predict job completion times in a computer system. The feasibility of this application of regression analysis was tested by constructing a predictive model to estimate job completion times using a computer system simulator. The predictive model's performance for the various job streams simulated shows that job completion time prediction is a feasible application for regression analysis.
172

Protótipo Facilita: a interface digital e a velhice

Viana, Eric Marcel 11 September 2017 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2017-09-21T12:29:51Z No. of bitstreams: 1 Inocente Coronel Muendo André.pdf: 1484660 bytes, checksum: b584598f40eaf71b70d103c0cd1f342e (MD5) / Made available in DSpace on 2017-09-21T12:29:51Z (GMT). No. of bitstreams: 1 Inocente Coronel Muendo André.pdf: 1484660 bytes, checksum: b584598f40eaf71b70d103c0cd1f342e (MD5) Previous issue date: 2017-09-11 / Fundação São Paulo - FUNDASP / The research in your hands traces the way through the definitions of digital native, digital immigrant and technological accent, draws parallels on how technological inequality and intergenerational lag have created groups of people who have different levels of interaction and understanding of contemporary technological instruments and how these levels affect the social interactions of the older people. It also deals with the process of aging and how physical limitations and social problems lead the elderly to distance themselves from digital devices that could bring greater social contact. The text approaches the following definitions of interface, usability, design, technologies and structures that enabled the creation / development of the final product, the digital prototype "Facilita" and closes with new technologies and future points of evolution of the work / A pesquisa em suas mãos percorre o caminho através das definições de nativo digital, imigrante digital e sotaque tecnológico, traça paralelos de como a desigualdade tecnológica e a defasagem intergeracional criaram grupos de pessoas que possuem diferentes níveis de interação e entendimentos dos instrumentais tecnológicos contemporâneos e de como esses níveis afetam o convívio das pessoas mais velhas. Trata, ainda, sobre o processo de envelhecimento e de como os limitantes físicos e problemas sociais levam o idoso a se distanciar dos aparelhos digitais que poderiam lhe trazer maior contato social. O texto aborda a seguir, definições sobre interface, usabilidade, design, tecnologias e estruturas que possibilitaram a criação/desenvolvimento do produto final, o protótipo digital “Facilita” e encerra com novas tecnologias e futuros pontos de evolução do trabalho
173

Symbolic dimensioning in computer-aided design

Light, Robert Allan January 1980 (has links)
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Mechanical Engineering, 1980. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING. / Bibliography: leaves 89-90. / by Robert Allan Light. / M.S.
174

FEASIBILITY STUDY USING BLOCKCHAIN TO IMPLEMENT PROOF OF LOCATION

Kristina D. Lister-Gruesbeck (5930723) 17 January 2019 (has links)
The purpose of this thesis is to determine the feasibility of using blockchain to implement proof of location. There has been an increasing demand for a way to create a validated proof of location that is economical, and easy to deploy as well as portable. There are several reasons for an increased demand in this technology including the ever-increasing number of mobile gamers that have been able to spoof their location successfully, the increasing number of on demand package shipments from companies such as Amazon, and the desire to reduce the occurrence of medical errors as well as holding hospitals accountable for their errors. Additional reasons that this technology is gaining popularity and increasing in demand is due the continually increasing number of lost baggage claims that airlines are receiving, as well as insurance companies desire to reduce the number of fraud cases that are related to high-value goods as well as increasing the probability of their recovery. Within the past year, there has been an extensive amount of research as well as work that has been completed to create an irrefutable method of location verification, which will permit a user to be able to create time-stamped documentation validating that they were at a particular location at a certain day and time. Additionally, the user is then permitted to release the information at a later date and time that is convenient for them. This research was completed using a Raspberry Pi 3B, a Raspberry Pi 3B+, two virtual Raspberry Pi’s as well as two virtual servers in which the goal was to download, and setup either Ethereum and/or Tendermint Blockchain on each piece of equipment. After completely synchronizing the blockchain it be used to store the verified location data that been time-stamped. There was a variety of issues that were encountered during the setup and installation of the blockchains on the equipment including overclocking processors, which negatively affected the computational abilities of the devices as well as causing overheating and surges in voltage as well as a variety of software and hardware incompatibilities. These issues when looked at individually appear to not have much of an impact on the results of this research but when combined together it is obvious that they reduced the results that could be obtained. In conclusion, the combination of hardware and software issues when combined with the temperature and voltage issues that were due to the overheating of the processor resulted in several insurmountable issues that could not be overcome. There are several recommendations for continuing this work including presyncing the blockchain using a computer, using a device that has more functionality and computational abilities, connecting a cooling device such as a fan or adding a heat sink, increasing the available power supply, utilizing an externally power hard drive for data storage, recreate this research with the goal in mind of determining what process or application was causing the high processor usage, or creating a distributed system that utilizes both physical and virtual equipment to reduce the amount of work on one type of device.
175

BUILDING FAST, SCALABLE, LOW-COST, AND SAFE RDMA SYSTEMS IN DATACENTERS

Shin-yeh Tsai (7027667) 16 October 2019 (has links)
<div>Remote Direct Memory Access, or RDMA, is a technology that allows one computer server to direct access the memory of another server without involving its CPU. Compared with traditional network technologies, RDMA offers several benefits including low latency, high throughput, and low CPU utilization. These features are especially attractive to datacenters, and because of this, datacenters have started to adopt RDMA in production scale in recent years.</div><div>However, RDMA was designed for confined, single-tenant, High-Performance-Computing (HPC) environments. Many of its design choices do not fit datacenters well, and it cannot be readily used by datacenter applications. To use RDMA, current datacenter applications have to build customized software stacks and fine-tune their performance. In addition, RDMA offers limited scalability and does not have good support for resource sharing or protection across different applications.</div><div>This dissertation sets out to seek solutions that can solve issues of RDMA in a systematic way and makes it more suitable for a wide range of datacenter applications.</div><div>Our first task is to make RDMA more scalable, easier to use, and have better support for safe resource sharing in datacenters. For this purpose, we propose to add an indirection layer on top of native RDMA to virtualize its low-level abstraction into a high-level one. This indirection layer safely manages RDMA resources for different datacenter applications and also provide a means for better scalability.</div><div>After making RDMA more suitable for datacenter environments, our next task is to build applications that can exploit all the benefits from (our improved) RDMA. We designed a set of systems that store data in remote persistent memory and let client machines access these data through pure one-sided RDMA communication. These systems lower monetary and energy cost compared to traditional datacenter data stores (because no processor is needed at remote persistent memory), while achieving good performance and reliability.</div><div>Our final task focuses on a completely different and so far largely overlooked one — security implications of RDMA. We discovered several key vulnerabilities in the one-sided communication pattern and in RDMA hardware. We exploited one of them to create a novel set of remote side-channel attacks, which we are able to launch on a widely used RDMA system with real RDMA hardware.</div><div>This dissertation is one of the initial efforts in making RDMA more suitable for datacenter environments from scalability, usability, cost, and security aspects. We hope that the systems we built as well as the lessons we learned can be helpful to future networking and systems researchers and practitioners.</div>
176

A HASP monitor for IBM systems under OS and HASP

Owens, Kathryn J. 03 June 2011 (has links)
This thesis describes the design, development, implementation, and output results of a software monitor program which measures job turnaround time on an IBM 360 system under OS/MFT and HASP. This program is designed to be used in conjunction with other monitors and accounting data to measure the performance of the System/360. In this thesis, relevant RASP logic is summarized, followed by design specifications of the monitor, solutions to design problems, and a full description of the monitor's program logic. Actual results obtained by the monitor are included.Ball State UniversityMuncie, IN 47306
177

Būsto kompiuterinės sistemos saugos sistemos sudarymas ir tyrimas / Creation and analysis of security system for house computer system

Žilinskas, Ignas 04 November 2013 (has links)
Šiame darbe apžvelgiamos būsto kompiuterinės sistemos saugumo problemos ir siūlomi būdai joms išspręsti. Išanalizavus egzistuojančias sistemas buvo pastebėta, kad tarp sistemos įtaisų siunčiami duomenys nėra šifruojami ar kitu būdu apsaugomi. Tai leidžia šiuos duomenis perimti ir suklastoti, taip paveikiant sistemos darbą. Kita problema – naudojamas belaidis ryšys. Jei sistema neatpažįsta belaidžio ryšio atakos, ji yra pažeidžiama. Šiame darbe duomenų apsaugai siūlomas KeeLoq šifravimas. Tyrimas rodo, kad šis šifravimo būdas yra efektyvus būsto kompiuterinėse sistemose. Taip pat šiame darbe sukurta belaidžio ryšio posistemė, kuri įgalina būsto kompiuterinę sistemą atpažinti belaidžio ryšio atakas ir į jas tinkamai reaguoti. Atliktas tyrimas rodo, kad būsto kompiuterinė sistema šios posistemės pagalba teisingai aptinka visas belaidžio ryšio atakas. / This paper presents gaps in the house computer systems security and suggests a way to solve it. It was noticed, that communication among house computer system’s devices isn’t encrypted or secured in any other way. This situation enable attacker to get data, sent among devices, and use it to affect the system. Another problem is attacks against wireless communication. If system’s devices can’t detect such attacks, it is vulnerable. This paper suggests using KeeLoq encryption to make communication safer. Research shows, that this type of encryption is effective in house computer system. There was created subsystem of wireless communication in this work. It enables house computer system to identify wireless attacks and respond to it properly. Research shows, that this subsystem correctly detects attacks and always help system to take right actions.
178

Accelerating Genomic Sequence Alignment using High Performance Reconfigurable Computers

McMahon, Peter 01 January 2008 (has links)
Recongurable computing technology has progressed to a stage where it is now possible to achieve orders of magnitude performance and power eciency gains over conventional computer architectures for a subset of high performance computing applications. In this thesis, we investigate the potential of recongurable computers to accelerate genomic sequence alignment specically for genome sequencing applications. We present a highly optimized implementation of a parallel sequence alignment algorithm for the Berkeley Emulation Engine (BEE2) recongurable computer, allowing a single BEE2 to align simultaneously hundreds of sequences. For each recongurable processor (FPGA), we demonstrate a 61X speedup versus a state-of-the-art implementation on a modern conventional CPU core, and a 56X improvement in performance-per-Watt. We also show that our implementation is highly scalable and we provide performance results from a cluster implementation using 32 FPGAs. We conclude that recongurable computers provide an excellent platform on which to run sequence alignment, and that clusters of recongurable computers will be able to cope far more easily with the vast quantities of data produced by new ultra-high-throughput sequencers.
179

WIMP and Beyond: The Origins, Evolution, and Awaited Future of User Interface Design

Yang, Grant 01 January 2015 (has links)
The field of computer user interface design is rapidly changing and diversifying as new devices are developed every day. Technology has risen to become an integral part of life for people of all ages around the world. Modern life as we know it depends on computers, and understanding the interfaces through which we communicate with them is critically important in an increasingly digital age. The first part of this paper examines the technological origins and historical background driving the development of graphical user interfaces from its earliest incarnations to today. Hardware advancements and key turning points are presented and discussed. In the second part of this paper, skeuomorphism and flat design, two of the most common design trends today, are analyzed and explained. Finally, the future course of user interface is predicted based off of emergent technologies such as the Apple Watch, Google Glass, Microsoft HoloLens, and Microsoft PixelSense. Through understanding the roots and current state of computer user interface design, engineers, designers, and scientists can help us get the most out of our ever-changing world of advanced technology as it becomes further intertwined with our existence.
180

Automatic Detection of Abnormal Behavior in Computing Systems

Roberts, James Frank 01 January 2013 (has links)
I present RAACD, a software suite that detects misbehaving computers in large computing systems and presents information about those machines to the system administrator. I build this system using preexisting anomaly detection techniques. I evaluate my methods using simple synthesized data, real data containing coerced abnormal behavior, and real data containing naturally occurring abnormal behavior. I find that the system adequately detects abnormal behavior and significantly reduces the amount of uninteresting computer health data presented to a system administrator.

Page generated in 0.3735 seconds