• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 647
  • 91
  • 44
  • 38
  • 15
  • 11
  • 11
  • 11
  • 11
  • 11
  • 11
  • 7
  • 3
  • 3
  • 2
  • Tagged with
  • 934
  • 934
  • 934
  • 894
  • 248
  • 237
  • 223
  • 167
  • 139
  • 83
  • 83
  • 69
  • 60
  • 60
  • 53
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
381

Pseudo-random access compressed archive for security log data

Radley, Johannes Jurgens January 2015 (has links)
We are surrounded by an increasing number of devices and applications that produce a huge quantity of machine generated data. Almost all the machine data contains some element of security information that can be used to discover, monitor and investigate security events.The work proposes a pseudo-random access compressed storage method for log data to be used with an information retrieval system that in turn provides the ability to search and correlate log data and the corresponding events. We explain the method for converting log files into distinct events and storing the events in a compressed file. This yields an entry identifier for each log entry that provides a pointer that can be used by indexing methods. The research also evaluates the compression performance penalties encountered by using this storage system, including decreased compression ratio, as well as increased compression and decompression times.
382

The design of an integration and quantization unit for a radar processor

Foncannon, Robert G January 1977 (has links)
Typescript, etc.
383

An e-learning environment for enterprise resource planning systems

Whale, Alyssa Morgan January 2016 (has links)
Enterprise Resource Planning (ERP) education can positively impact the success of an ERP implementation. Incorporating new tools and technologies into the learning process can potentially alleviate the evident problems with ERP education. Blended learning and e-learning environments both offer opportunities for improvement in education. However, there are various factors and components that need to be in place for such an environment to be successful. The aim of this research is to provide an ERP e-Learning Environment (ERPeL) that can assist with ERP education in terms of creating an integrated and comprehensive learning environment for novice ERP users. In order to achieve this aim, this study followed the Design-Based Research (DBR) methodology which is specific to educational technology research and was applied in iterative cycles where various components of the environment were evaluated by different participants. Quantitative and qualitative data was collected by means of field studies (interviews, focus groups and questionnaires). The proposed ERPeL underwent several iterations of feedback and improvement. In order to determine the success of e-learning, various critical success factors and evaluation criteria were investigated. Field studies were conducted in order to validate the theory in a real-world context. An initial field study was conducted with third year Nelson Mandela Metropolitan University (NMMU) students who were enrolled in the 2014 ERP systems’ module in the Department of Computing Sciences. Many of the problems identified in theory were found to be prevalent in the real-world context. One of the DBR process cycles involved the implementation of specific components of the ERPeL at the Developing and Strengthening Industry-driven Knowledge-transfer between developing Countries (DASIK) introduction to ERP systems course. Participants were either NMMU students, academic staff or industry delegates. The components evaluated included videos, learning content, badges, assessment and the SYSPRO Latte m-learning application. Additional components of a leader board, live chats, peer reviewing, expert reviews, user generated content, consultancy with experts and SYSPRO ERP certification were implemented in the subsequent cycle where participants were 2015 third year NMMU ERP systems students. The criteria used to evaluate the success of the ERPeL and its e-learning components were adapted from literature and a new set of evaluation criteria for e-learning was proposed. The ERPeL is made up of Moodle, the SYSPRO ERP System, the SYSPRO e-Learning System, the SYSPRO Latte m-learning application, learning content and components. Overall the ERPeL was positively received by the various sample groups. The research results indicate that the use of an e-learning environment for ERP systems was positively received. The most positive aspects reported were the implementation of e-learning components such as the interactive videos, simulations and m-learning. In support of this Masters dissertation, the following three papers have been published and presented at two local conferences and one international conference: 1. SACLA 2014, Port Elizabeth (South Africa); 2. SAICSIT 2015, Stellenbosch (South Africa); and 3. IDIA 2015, Zanzibar (Tanzania).
384

A framework for the development of a personal information security agent

Stieger, Ewald Andreas January 2011 (has links)
Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
385

Welding information system : design, operations, methods

Jennings, Daniel Blair January 1991 (has links)
This thesis encompasses a Welding Information System for Design, Operations, and Methods (WISDOM). In essence, the WISDOM project aimed at research and development of an innovative and comprehensive information collection on welding in close cooperation with industry utilizing modern micro-computer techniques of information review, retrieval, storage, updating, and transfer. Emphasis is placed on new and more efficient methods of knowledge communication, pursuing the idea of exploring knowledge (in contrast to rehearsing recipes). The development of this project concentrated on the following three main topics: 1. Background information on steel metallurgy and welding 2. Analysis and Design Methods for Welded Connections 3. Code Requirements of Welds Preliminary research on the WISDOM project involved communications with industry to determine primary objectives. The need for an information system on welding was unquestionably apparent. The knowledge base is supplemented with graphic images and analysis and design programs. It is hoped that the information in this system will be delivered to the engineer in an efficient and useful manner. The priority here is to raise welding awareness while promoting efficient welded design. In addition, we hope that the WISDOM system will close the ever widening gap between the design engineer and the fabricator. In the most general sense, the primary objective of the WISDOM project was to produce an integrated self-paced teaching tool for both engineering professional and student alike. The versatility of the system is maintained by presenting the information in modular form. Screen graphics oriented learning modules encourage the user to become more involved in the learning process than more conventional teaching methods allow. Analysis and design modules promote rapid and efficient connection design in a more consistent and professional manner. A smooth transition from the learning environment to engineering practice is envisioned by providing realistic design tools with a transparent background. / Applied Science, Faculty of / Civil Engineering, Department of / Graduate
386

A formalism for object-based information systems development

Takagaki, Ken January 1990 (has links)
Most current approaches to Information Systems Development (ISD) tend to derive from past experience and practice, rules of thumb and technology trends. The lack of theoretical foundations hinders the systematic development and evaluation of new ISD methodologies. The research undertaken in this thesis addresses this issue by proposing a formal, theory-based model, Ontology/Object-Based Conceptual Modelling (OBCM), for conceptually representing IS applications. The formalism is novel in that it is grounded in first principles derived from metaphysics, in particular the system of Ontology developed by Mario Bunge. Underlying this approach is the premise that an Information System is a model of reality and that model should be therefore rooted in a theory of reality, ie. a metaphysics. As a result, basic assumptions in reality such as thing, substance, property, attribute, time, state and change are explicitly and rigorously addressed. OBCM features an ontologically well-defined construct, "object", which is used to directly represent entities in reality, thus lending theoretical credence to the so-called object-oriented paradigm found in recent programming languages and databases. In addition, the thesis presents a framework, Ontology/Object-Based Information System (OBIS), for systems implementation based on this model. This framework directly implements the object construct so that it can be immediately utilized by the information systems user in a "direct manipulation" style of end-user interaction. Further, OBIS strives for a single, homogeneous concept of system operation drawn from ontology rather than in terms of IS or computing technology. In principle, this one concept can be applied to any object in the IS, this simplifying the understanding and use of the Information System. In this way, the model attempts to unify the analysis, implementation and user-interface aspects of Information Systems Development, thereby reducing the so-called "semantic gap" which has often been observed between the reality of the application and its final implementation in an IS. A "proof of concept" prototype is described which illustrates the main principles and explores practical applications of the proposed model. This prototype is implemented as a single, stand-alone "shell" which can be used to support a wide variety of applications as well as providing the basis of a rapid prototyping or CASE tool. The prototype is used to implement sample problems including the well-known IFIP Working Conference problem, thus demonstrating the feasibility of the overall approach. / Business, Sauder School of / Graduate
387

Inligtingsekerheid, met spesifieke verwysing na risiko-ontleding in mediese-inligtingstelsels

Halgreen, Lize-Mari 11 September 2012 (has links)
M.Comm. / The present study was undertaken in a bid to meet an urgent need uncovered in medical-information systems (MIS) for a formal process whereby risks posing a threat to patients in medical institutions could be identified and controlled by means of the appropriate security measures. At the time of the study, however, no such formal risk-analysis model had yet been developed specifically for application in MIS. This gave rise to the development of RAMMO, a riskanalysis model specifically aimed at the identification of risks threatening the patient in his or her capacity as an asset in a medical institution. The author, therefore, managed to achieve her object with the study, namely to initiate a riskanalysis model that could be applied to medical environments. Following, an overview of the research method used in order to achieve the objectives of the study: Firstly, background information regarding the issues and problems to be addressed was obtained, and they provided the well-founded motivation for the study. Secondly, the development and importance of MIS in medical environments came under consideration, as well as the applicability of information security in an MIS. In the third instance, general terms and concepts used in the risk-management process were defined, by means of which definitions existing risk-analysis models were investigated and critically evaluated in a bid to identify a model that could be applied to a medical environment. Fourthly, a conceptual or draft design was suggested for a risk-analysis model developed specifically for medical environments. In doing so, the first two stages of the model, namely risk identification and risk assessment, were given special emphasis. The said model was then illustrated by means of a practical application in a general hospital in South Africa. The study culminated in a summation of the results of and the conclusions reached on the strength of the research. Further problem areas were also touched upon, which could become the focus of future research projects.
388

Information Storage and Retrieval Systems

Creech, Teresa Adams 05 1900 (has links)
This thesis describes the implementation of a general purpose personal information storage and retrieval system. Chapter one contains an introduction to information storage and retrieval. Chapter two contains a description of the features a useful personal information retrieval system should contain. This description forms the basis for the implementation of the personal information storage and retrieval system described in chapter three. The system is implemented in UCSD Pascal on an Apple II microcomputer.
389

Development of a user interface for MARIAN and CODER systems

Sahle, Eskinder 27 April 2010 (has links)
Master of Science
390

Design of a safety management information and tracking system

Tedori, Veronica 30 March 2010 (has links)
Master of Science

Page generated in 0.2524 seconds