• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 22
  • 5
  • 5
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 49
  • 8
  • 8
  • 7
  • 7
  • 6
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Predicting Endpoint of Goal-Directed Motion in Modern Desktop Interfaces using Motion Kinematics

Ruiz, Jaime January 2012 (has links)
Researchers who study pointing facilitation have identified the ability to identify--during motion--the likely target of a user's pointing gesture, as a necessary precursor to pointing facilitation in modern computer interfaces. To address this need, we develop and analyze how an understanding of the underlying characteristics of motion can enhance our ability to predict the target or endpoint of a goal-directed movement in graphical user interfaces. Using established laws of motion and an analysis of users' kinematic profiles, we demonstrate that the initial 90% of motion is primarly balistic and submovements are limited to the last 10% of gesture movement. Through experimentation, we demonstrate that target constraint and the intended use of a target has either a minimal effect on the motion profile or affects the last 10% of motion. Therefore, we demonstrate that any technique that models the intial 90% of gesture motion will not be affected by target constraint or intended use. Given, these results, we develop a technique to model the initial ballistic motion to predict user endpoint by adopting principles from the minimum jerk principle. Based on this principle, we derive an equation to model the initial ballistic phase of movement in order to predict movement distance and direction. We demonstrate through experimentation that we can successfully model pointing motion to identify a region of likely targets on the computer display. Next, we characterize the effects of target size and target distance on prediction accuracy. We demonstrate that there exists a linear relationship between prediction accuracy and target distance and that this relationship can be leveraged to create a probabilistic model for each target on the computer display. We then demonstrate how these probabilities could be used to enable pointing facilitation in modern computer interfaces. Finally, we demonstrate that the results from our evaluation of our technique are supported by the current motor control literature. In addition, we show that our technique provides optimal accuracy for any optimal accuracy when prediction of motion endpoint is performed using only the ballistic components of motion and before 90% of motion distance.
22

A Hybrid Design of Speech Recognition System for Chinese Names

Hsu, Po-Min 06 September 2004 (has links)
A speech recognition system for Chinese names based on Karhunen Loeve transform (KLT), MFCC, hidden Markov model (HMM) and Viterbi algorithm is proposed in this thesis. KLT is the optimal transform in minimum mean square error and maximal energy packing sense to reduce data. HMM is a stochastic approach which characterizes many of the variability in speech signal by recording the state transitions. For the speaker-dependent case, the correct identification rate can be achieved 93.97% within 3 seconds in the laboratory environment.
23

A Design of Speech Recognition System for Chinese Names of Historical Figures Around the World

Lin, Wei-Ci 07 September 2006 (has links)
A design of speech recognition system for Chinese names of historical figures around the world is proposed in this thesis. A speech database of approximately forty-six thousand Chinese names is collected and recorded twice for system evaluation. This system applies Mel-frequency cepstrum coefficients, monosyllable HMM¡¦s and speech-text alignment scheme to accomplish initial candidate selection. A Mandarin pitch identification mechanism is then followed to increase the correct rate and obtain the final answer. The experimental results indicate that a 90% correct identification rate can be achieved, under the condition that the first session recording material is used for training and the second one for testing. For the speaker dependent case, the correct name can be recognized within 1.5 seconds, using a PC with an Intel Celeron 2.4 GHz CPU and RedHat Linux 9.0 Operation System.
24

Visualizing Endpoint Security Technologies using Attack Trees

Pettersson, Stefan January 2008 (has links)
<p>Software vulnerabilities in programs and malware deployments have been increasing almost every year since we started measuring them. Information about how to program securely, how malware shall be avoided and technological countermeasures for this are more available than ever. Still, the trend seems to favor the attacker. This thesis tries to visualize the effects of a selection of technological countermeasures that have been proposed by researchers. These countermeasures: non-executable memory, address randomization, system call interception and file integrity monitoring are described along with the attacks they are designed to defend against. The coverage of each countermeasure is then visualized with the help of attack trees. Attack trees are normally used for describing how systems can be attacked but here they instead serve the purpose of showing where in an attack a countermeasure takes effect. Using attack trees for this highlights a couple of important aspects of a security mechanism, such as how early in an attack it is effective and which variants of an attack it potentially defends against. This is done by the use of what we call defensive codes that describe how a defense mechanism counters a sub-goal in an attack. Unfortunately the whole process is not well formalized and depends on many uncertain factors.</p>
25

LCA : Hur påverkas resultatet av livscykelanalysen av vilken metod för viktning som används?

Thernström, Jessica January 2015 (has links)
Syftet med arbetet är att beskriva ett antal olika metoder som används vid viktning i samband med livscykelanalyser, samt diskutera hur valet av metod kan påverka resultatet av analysen. Metoderna som beskrivs är EPS2000, Ecoindicator99, ReCiPe, Stepwise2006 och LIME. Varje metod beskrivs kort med påverkanskategorier, skyddsobjekt och indikatorer. Metoderna grundas på beräkningar av utsläpp och resursanvändning, men för att få fram viktningstalen så använder man sig av olika teorier, paneldiskussioner, frågeformulär och subjektiva antagande. Min slutsats är att det är svårt att få viktningsmetodiken mindre subjektiv, och att mycket vid viktningen bygger på antagande. Varje metod bygger på olika antaganden och det är därför viktigt att man är tydlig med vilka omständigheter som gäller vid beräkningarna samt att man inte jämför resultat från olika metoder. Däremot så går det utmärkt att jämföra olika produkter med hjälp av samma viktningsmetod, och att hitta i vilket skede i livscykeln som man får störst miljöpåverkan. Jag tror att det egentligen är diskussionen kring produktens miljöpåverkan som är det väsentliga, inte värdena som man får från viktningen, då dessa till så stor del baseras på antagande och gissningar. / The purpose of the study is to describe some methods used for weighting when conducting a life cycle analysis, and discuss how the choice of method may effect the result of the analysis. The methods described are EPS2000, Ecoindicator99, ReCiPe, Stepwise2006 and LIME. Each method is shortly described with impact categories, safety objects and indicators. The methods are based upon calculations of pollutions and use of resources, but to get the weightingfactors, one will have to rely on different theories, panel discussions, questionnaries and subjective assumptions. The conclusion of the study will be that it is difficult to get the methods for weighting less subjective, and that much of the weighting will be based upon assumptions. Every method is built on different assumptions, and therefor is it important that each are clear with the circumstances for the calculations, and you can not compare results from the different methods. On the contrary you may compare products if you use the same one for both, and you may also find in which phase of the lifecycle when you will get the most impact of the environment. I think that the discussion about the environmental impact of the product is most important, not the figures you will get from the procedure of weighting, which is based upon assumptions and guesses.
26

Predicting Endpoint of Goal-Directed Motion in Modern Desktop Interfaces using Motion Kinematics

Ruiz, Jaime January 2012 (has links)
Researchers who study pointing facilitation have identified the ability to identify--during motion--the likely target of a user's pointing gesture, as a necessary precursor to pointing facilitation in modern computer interfaces. To address this need, we develop and analyze how an understanding of the underlying characteristics of motion can enhance our ability to predict the target or endpoint of a goal-directed movement in graphical user interfaces. Using established laws of motion and an analysis of users' kinematic profiles, we demonstrate that the initial 90% of motion is primarly balistic and submovements are limited to the last 10% of gesture movement. Through experimentation, we demonstrate that target constraint and the intended use of a target has either a minimal effect on the motion profile or affects the last 10% of motion. Therefore, we demonstrate that any technique that models the intial 90% of gesture motion will not be affected by target constraint or intended use. Given, these results, we develop a technique to model the initial ballistic motion to predict user endpoint by adopting principles from the minimum jerk principle. Based on this principle, we derive an equation to model the initial ballistic phase of movement in order to predict movement distance and direction. We demonstrate through experimentation that we can successfully model pointing motion to identify a region of likely targets on the computer display. Next, we characterize the effects of target size and target distance on prediction accuracy. We demonstrate that there exists a linear relationship between prediction accuracy and target distance and that this relationship can be leveraged to create a probabilistic model for each target on the computer display. We then demonstrate how these probabilities could be used to enable pointing facilitation in modern computer interfaces. Finally, we demonstrate that the results from our evaluation of our technique are supported by the current motor control literature. In addition, we show that our technique provides optimal accuracy for any optimal accuracy when prediction of motion endpoint is performed using only the ballistic components of motion and before 90% of motion distance.
27

Speech Endpoint Detection: An Image Segmentation Approach

Faris, Nesma January 2013 (has links)
Speech Endpoint Detection, also known as Speech Segmentation, is an unsolved problem in speech processing that affects numerous applications including robust speech recognition. This task is not as trivial as it appears, and most of the existing algorithms degrade at low signal-to-noise ratios (SNRs). Most of the previous research approaches have focused on the development of robust algorithms with special attention being paid to the derivation and study of noise robust features and decision rules. This research tackles the endpoint detection problem in a different way, and proposes a novel speech endpoint detection algorithm which has been derived from Chan-Vese algorithm for image segmentation. The proposed algorithm has the ability to fuse multi features extracted from the speech signal to enhance the detection accuracy. The algorithm performance has been evaluated and compared to two widely used speech detection algorithms under various noise environments with SNR levels ranging from 0 dB to 30 dB. Furthermore, the proposed algorithm has also been applied to different types of American English phonemes. The experiments show that, even under conditions of severe noise contamination, the proposed algorithm is more efficient as compared to the reference algorithms.
28

Firewall Dinâmico: uma implementação cliente/servidor

Gonsales Panes, Guilherme [UNESP] 29 July 2011 (has links) (PDF)
Made available in DSpace on 2014-06-11T19:24:01Z (GMT). No. of bitstreams: 0 Previous issue date: 2011-07-29Bitstream added on 2014-06-13T20:11:43Z : No. of bitstreams: 1 gonsalespanes_g_me_sjrp.pdf: 460030 bytes, checksum: 52240d29e75235682133dfc019184aff (MD5) / A proteção dos perímetros de segurança realizada através de firewalls somente é eficiente quando o cliente se encontra dentro do perímetro protegido por este firewall. Como mobilidade é um item essencial para as empresas, há um grande desafio na proteção destes clientes computacionais (Laptops e PDAs), pois é necessário aplicar a Política de Segurança da empresa independentemente de onde estes equipamentos estejam se conectando já que a segurança dos dados é fator essencial para garantia e continuidade dos negócios. Este trabalho tem como objetivo apresentar uma solução para este problema, de forma a utilizar ferramentas de firewall existentes, independente da plataforma e do software utilizado. Para tanto, desenvolveu-se um software baseado na arquitetura cliente/servidor, que analisa o ambiente em que o equipamento está conectado, através de um Intrusion Detection System (IDS), e baseado nestas informações recebe do Servidor Firewall um conjunto de regras para ser aplicado no firewall nativo do equipamento independentemente do sistema operacional utilizado. Desta forma é possível garantir que, independentemente do ambiente em que o equipamento esteja conectado, não se deixe de aplicar as regras contidas na Política de Segurança da corporação. O software foi desenvolvido em Java utilizando contents web visando portabilidade de plataforma e usabilidade para os administradores. Os testes desenvolvidos demonstram que o software cumpre o papel proposto de gerenciar as regras de firewall de forma coerente com o ambiente de rede conectada à máquina cliente / The protection of the secure areas performed through firewalls is only effective when the client machine is inside the perimeter protected by the firewall. As mobility is an essential item for companies, there is a big challenge in protecting these mobile devices (Laptops and PDAs). It is necessary to apply the Security Policy company regardless of where these devices are to connecting as data security is an essential factor for securing and business continuity. This paper aims to propose a solution to this problem in order to use firewall tools existing, regardless of platform and application software. We have developed a software architecture based on a client / server approach, which analyzes the environment in which the equipment is connected using an Intrusion Detection System (IDS), and based Server receives this information a set of firewall rules for be applied on the native firewall system independent of the equipment operational use. This way it is possible to ensure that, regardless of the environment in which the equipment is connected, not be sure to apply the rules contained in the Security Policy corporation are always in effect. The software was developed in Java using web contents aiming platform portability, and usability for administrators. The performed tests show that the developed software meets the proposed role of managing the firewall rules consistent with the network environment connected to the client machine
29

Firewall Dinâmico : uma implementação cliente/servidor /

Gonsales Panes, Guilherme. January 2011 (has links)
Orientador: Marcos Cavenaghi / Coorientador: Roberta Spolon / Banca: Aparecido Nilceu Marana / Banca: Hélio Crestana Guardia / Resumo: A proteção dos perímetros de segurança realizada através de firewalls somente é eficiente quando o cliente se encontra dentro do perímetro protegido por este firewall. Como mobilidade é um item essencial para as empresas, há um grande desafio na proteção destes clientes computacionais (Laptops e PDAs), pois é necessário aplicar a Política de Segurança da empresa independentemente de onde estes equipamentos estejam se conectando já que a segurança dos dados é fator essencial para garantia e continuidade dos negócios. Este trabalho tem como objetivo apresentar uma solução para este problema, de forma a utilizar ferramentas de firewall existentes, independente da plataforma e do software utilizado. Para tanto, desenvolveu-se um software baseado na arquitetura cliente/servidor, que analisa o ambiente em que o equipamento está conectado, através de um Intrusion Detection System (IDS), e baseado nestas informações recebe do Servidor Firewall um conjunto de regras para ser aplicado no firewall nativo do equipamento independentemente do sistema operacional utilizado. Desta forma é possível garantir que, independentemente do ambiente em que o equipamento esteja conectado, não se deixe de aplicar as regras contidas na Política de Segurança da corporação. O software foi desenvolvido em Java utilizando contents web visando portabilidade de plataforma e usabilidade para os administradores. Os testes desenvolvidos demonstram que o software cumpre o papel proposto de gerenciar as regras de firewall de forma coerente com o ambiente de rede conectada à máquina cliente / Abstract: The protection of the secure areas performed through firewalls is only effective when the client machine is inside the perimeter protected by the firewall. As mobility is an essential item for companies, there is a big challenge in protecting these mobile devices (Laptops and PDAs). It is necessary to apply the Security Policy company regardless of where these devices are to connecting as data security is an essential factor for securing and business continuity. This paper aims to propose a solution to this problem in order to use firewall tools existing, regardless of platform and application software. We have developed a software architecture based on a client / server approach, which analyzes the environment in which the equipment is connected using an Intrusion Detection System (IDS), and based Server receives this information a set of firewall rules for be applied on the native firewall system independent of the equipment operational use. This way it is possible to ensure that, regardless of the environment in which the equipment is connected, not be sure to apply the rules contained in the Security Policy corporation are always in effect. The software was developed in Java using web contents aiming platform portability, and usability for administrators. The performed tests show that the developed software meets the proposed role of managing the firewall rules consistent with the network environment connected to the client machine / Mestre
30

Effects of Methanol, Atrazine, and Copper on the Ultrastructure of Pseudokirchneriella Subcapitata (Selenastrum Capricornutum).

Garrett, David C. 05 1900 (has links)
The toxicity of methanol, atrazine, and copper to Pseudokirchneriella subcapitata (Korshikov) Hindák historically referred to as Selenastrum capricornutum Printz were determined following 96 hrs growth in a modified Goram's growth media. Methanol and atrazine inhibited fluorescence readings in the cultures by 50% (IC50) at concentrations of 2% and 82 µg/l respectively. These toxicity values compared favorably to other published reports. The IC50 for copper was 160 µg/l which is substantially higher than reported values. This is understandable because of the high chelating capacity of Goram's media. The use of stereologically derived relative volume in the chloroplasts, mitochondria, lipid bodies, phosphate bodies, and nucleus was investigated to determine if it could be used as a sensitive endpoint in toxicity tests. The volume fractions for the chloroplasts and mitochondria were normally distributed in control cells while the nuclei, phosphate bodies, and lipid bodies were not. The chloroplasts were the most dominate organelle occupying a mean relative volume of 46% and mitochondria occupied a mean relative volume of 3%. The nucleus and phosphate bodies occupied a median relative volume of 7% and 2% respectively. The lipid bodies were rare in section profile and no meaningful median relative volume could be calculated. Up to the 82nd percentile of sectioned profiles contained no recognizable lipid bodies. The use of relative volume was not a sensitive endpoint for use in toxicity tests. No significant differences in relative volume could be detected in the nucleus or phosphate bodies following any treatment. Limited differences were detected in the mitochondria, chloroplasts, and lipid bodies. The only significant differences that appear to be biologically significant occurred in methanol treated cells where an increase in the lipid bodies' relative volume was apparently concentration dependent. Significant differences in the relative volume of mitochondria and chloroplasts do not appear to be biologically significant.

Page generated in 0.034 seconds