• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 349
  • 134
  • 38
  • 33
  • 32
  • 31
  • 16
  • 12
  • 11
  • 10
  • 8
  • 6
  • 6
  • 5
  • 4
  • Tagged with
  • 779
  • 122
  • 88
  • 86
  • 84
  • 73
  • 65
  • 58
  • 52
  • 51
  • 51
  • 50
  • 44
  • 41
  • 40
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Optimizing and scheduling of a pooled log transport system

Haridass, Karunakaran, Valenzuela, Jorge F., January 2009 (has links)
Thesis--Auburn University, 2009. / Abstract. Vita. Includes bibliographical references (p. 87-88).
2

A Study of Log Patternization for Linux-based Systems

Hung, Jui-lin 30 June 2010 (has links)
With the rapid development of Internet technology, as well as extensive use of broadband networks, the issues of network security are increasing. In order to deal with these complex issues, network adminstrators adopt firewalls, intrusion detection systems, intrusion prevention systems to prevent them, in addition, the collection and analysis of log are also very important. By the log analysis, administrators can understand the error messages generated by system and the abnormal behavior of external connections, and develop the corresponding security policy on the use of the security tools. The current log analyzer, besides default rules, administrators have to spend much time reviewing the syslog of their system in detail to set the corresponding rules for their system, and each analyzer has its own unique rules of definitions. The purpose of this study is to transform tens of thounds of logs into a small number of valuable patterns, classify these patterns into abnormal ones and normal ones, and sum up the logs corresponding with listed patterns to assist administrator to review. In this study, we adopt the concept of string similarity comparison, and do similarity comparison for each log to find out all patterns which presented by regular expression. After experimental evaluation, this study can indeed analyze and generate all patterns of logs automatically, and these patterns can be applies to a practical tool of network security.
3

Analysis of Red Oak Timber Defects and Associated Internal Defect Area for the Generation of Simulated Logs

Winn, Matthew F. 30 December 2002 (has links)
Log sawing simulation computer programs can be a valuable tool for training sawyers as well as for testing different sawing patterns. Most available simulation programs rely on databases from which to draw logs and can be very costly and time-consuming to develop. In this study, a computer program was developed that can accurately generate random, artificial logs and serve as an alternative to using a log database. One major advantage of using such a program is that every log generated is unique, whereas a database is finite. Real log and external defect data was obtained from the Forest Service Northeastern Research Station in Princeton, West Virginia for red oak (Quercus rubra, L.) logs. These data were analyzed to determine distributions for log and external defect attributes, and the information was used in the program to assure realistic log generation. An attempt was made to relate the external defect attributes to internal defect characteristics such as volume, depth, and angle. CT scanning was used to obtain internal information for the five most common defect types according to the Princeton log data. Results indicate that external indicators have the potential to be good predictors for internal defect volume. Tests performed to determine whether a significant amount of variation in volume was explained by the predictor variables proved significant for all defect types. Corresponding R2 values ranged from 0.39 to 0.93. External indicators contributed little to the explanation of variation in the other dependent variables. Additional predictor variables should be tested to determine if further variation could be explained. / Master of Science
4

Secure logging mechanisms for smart cards

Markantonakis, Constantinos January 2000 (has links)
No description available.
5

Cost minimization in the primary transport of forest products

Suddarth, Stanley K. January 1952 (has links)
Thesis (Ph. D.)--Purdue University. / Vita. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaf 66).
6

A critical review of currently available pore pressure methods and their input parameters : glaciations and compaction of north sea sediments

Gyllenhammar, Carl Fredrik January 2003 (has links)
Historically pore pressure evaluation in exploration areas was based on empirical relationships between drilling parameters, wireline logs and the mud weight. Examples include Eaton's Ratio and the Hottman & Johnson Methods, which were based on data from the Gulf of Mexico. These methods are not readily transported to other areas, such as the North Sea Basin, where the sediments are different in character and where burial and temperature histories are distinctly different. Data from several offshore North Sea wells, with high quality wireline and associated data have been analysed to determine the most appropriate method to estimate pore pressure in mudrocks. The data have led to an understanding of the key parameters for successful pore pressure estimation. The most effective method is shown to be the Equivalent Depth Method, but only where disequilibrium compaction is the source of the overpressure in the mudrocks. Core samples from 576 British Geological Survey sites in the offshore area of the British Islands were compared with > 10,000 porosities collected from the deep oceans (DSDP/ODP sites), which show that the porosities in the shallow section in the North Sea are anomalously low. The shallow section of the North Sea includes large volumes of Pleistocene-Recent sediments deposited as glacial and inter-glacial deposits. Frequency analysis (Cyclolog) of the wireline data covering this interval in several North Sea wells revealed a pattern in the relative featureless original data. Comparison with the global signature for oxygen isotopes for the same time period suggests that there have been ten cycles of ice sheet build up (Glacial period) followed by melting (Interglacial period) during the last one million years. Glacial deposits from 10 individual glacial cycles have therefore been identified in several exploration wells in the North Sea. Implications of loading/unloading of ice for the migration and trapping of hydrocarbons in the North Sea Basin are assessed.
7

William Tennent and the Log College a common man and an uncommon legacy /

Schnittjer, Gary Edward. January 1992 (has links)
Thesis (Th. M.)--Dallas Theological Seminary, 1992. / Includes bibliographical references (leaves 245-267).
8

Extra-light log trailer design /

Wylezinski, Andrzej T., January 1993 (has links)
Thesis (Ph. D.)--Virginia Polytechnic Institute and State University, 1993. / Vita. Abstract. Includes bibliographical references (leaves 288-291). Also available via the Internet.
9

Watchblogs: Medienkritik 2.0? eine inhaltsanalytische Untersuchung journalistischer Qualität in medienkritischen Weblogs

Hutter, Andres January 2008 (has links)
Zugl.: Zürich, Univ., Lizentiatsarbeit, 2008
10

William Tennent and the Log College a common man and an uncommon legacy /

Schnittjer, Gary Edward. January 1992 (has links)
Thesis (Th. M.)--Dallas Theological Seminary, 1992. / Includes bibliographical references (leaves 245-267).

Page generated in 0.0258 seconds