• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 4
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 15
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Srovnání komerčních BI nástrojů s nástroji OpenSource

Okleštěk, Petr January 2006 (has links)
Cílem této diplomové práce je porovnat komerční a OpenSource Business Intelligence řešení pro střední podnik. Za účelem srovnání byl vybrán databázový server MS SQL Server s Analysis Services a dva možné způsoby nasazení OpenSource technologií. Prvním z nich je komplexní BI řešení od společnosti Insight Strategy a.s. ?The Bee?. Druhým způsobem je řešení pomocí dílčích aplikací nalezených na Internetu a to pomocí aplikací Keetle, Firebird, Mondrian a Openi. Jednotlivá řešení jsou porovnána na základě předem stanovených a popsaných metrik. Hlavním cílem je ověření na fiktivní firmě zda OpenSource BI řešení fungují a mohou nahradit komerční řešení a zda je to z finanční stránky výhodné.
2

Design and Implementation of a User Friendly OpenModelica - Python interface

Ganeson, Anand January 2012 (has links)
How can Python users be empowered with the robust simulation, compilation and scripting abilities of a non-proprietary object-oriented, equation based modeling language such as Modelica? The immediate objective of this thesis work is to develop an application programming interface for the OpenModelica modeling and simulation environment that would bridge the gap between the two agile programming languages Python and Modelica. The Python interface to OpenModelica OMPython, is both a tool and a functional library that allows Python users to realize the full capabilities of Open- Modelica’s scripting and simulation environment requiring minimal setup actions. OMPython is designed to combine both simulation and model building. Thus domain experts (people writing the models) and computational engineers (people writing the solver code) can work on one unified tool that is industrially viable for optimization of Modelica models, while offering a flexible platform for algorithm development and research.
3

Investigating student experiences with GitHub and Stack Overflow: an exploratory study

Bhasin, Trishala 29 July 2021 (has links)
Programmers who want to improve their skills and background in software development rely heavily on developer social platforms such as GitHub and Stack Overflow to enhance their learning. Stack Overflow provides answers to questions they have about languages or library skills they wish to acquire, while contributing to open-source projects hosted on sites like GitHub gives them valuable experience. Students also use these platforms during their education: most will rely heavily on Stack Overflow at some point in their schooling, while many can benefit from contributing to GitHub projects to build their expertise and professional portfolios. We already know from previous research that developers face barriers participating on these platforms, and therefore we may expect that at least some students will experience similar or possibly even bigger barriers. This research describes a semi-structured interview study followed by a survey with university students to explore how they use the GitHub and Stack Overflow platforms. I identified the benefits the students report from using these tools and the barriers they face. I have concluded with some preliminary recommendations on how to reduce the hurdles students may face with these and other developer social platforms, and I have also suggested future work to mitigate these roadblocks. / Graduate
4

Packetfence och Cisco ISE : En jämförelse av NAC

Engfors, Emil, Markstedt, Jens January 2017 (has links)
Syftet med detta arbete var att jämföra de två mjukvarorna Packetfence och Cisco Identity Services Engine. Målet är att bilda en förståelse kring hur den här typen av mjukvaror kan implementeras i ett nätverk av olika storlekar och även en insikt över hur detta kan minska den administrativa belastningen. Den här typen av system kan även användas för att centralt styra åtkomst till ett företags resurser och kan säkra upp olika typ av enheter och program. Det genomfördes en installation för att upptäcka skillnader mellan systemen, därefter konfigurerades de så likt varandra som möjligt för att upptäcka om det finns några olikheter i den här delen av mjukvaran. Rapporten tar upp grundläggande information kring de tjänster som systemen innehåller och beskriver även de steg som krävs för att utföra konfiguration. Rapporten redovisar den metod gruppen arbetat efter under dessa veckor för att uppnå ett tillfredsställande resultat för uppdragsgivaren. Resultatet presenterar arbetet gruppen utfört under arbetet och visar hur de olika systemen kan konfigureras för att uppnå ett säkert nätverk hos ett företag. Diskussionen tar upp att det är viktigt att vara flexibel i sin planering för att arbeta runt uppkomna problem. / The purpose of this study was to compare two security softwares, Packetfence and Cisco Identity Services Engin. The goal was to provide an understanding of how this kind of software can be implemented in a network of different sizes and also an insight into how this can reduce the administrative burden. This type of system can also be used to centrally control access to a company's resources and can secure different types of devices and applications. An installation was completed to detect differences between the systems, then they were configured as similarly as possible to detect if there were any differences in this part of the software. The report summarizes basic information about the services that the systems contain and also describes the steps required to perform configuration. The report presents the methodology the group worked for these weeks to achieve a satisfactory result for the client. The result presents the work the group completed during the study and shows how the various systems can be configured to achieve a secure network for a company. The discussion states that it is important to be flexible in its planning to work around problems that arise.
5

Řešení e-learningových aplikací v prostředí MOODLE / E-learning solutions in MOODLE

Zakál, Tomáš January 2007 (has links)
Práce pojednává o e-learningovém řešení postaveném na klíč se zaměřením na výuku cizích jazyků. V úvodních pasážích je ve stručnosti probrána problematika e-learningu se zaměřením na popis klíčových standardů (SCORM) a používaných nástrojů (LMS). Dále je do detailů rozebrán opensourcový LMS MOODLE. Následující kapitoly se zabývají tvorbou výukového obsahu. Tato část práce je postavena na popisu systému, který se využívá v praxi ve společnosti LANGMaster. Závěrečné kapitoly pak na případové studii demonstrují, jak lze celé řešení na klíč postavit. Vše je předvedeno na hypotetické poptávce podniku po řešení na klíč.
6

Atviro kodo CRM tyrimas / Open Source CRM Research

Bukelis, Donatas 09 June 2006 (has links)
The study deals with the features open source CRMs have, the ways we can change the code and make our own open source CRM system. The research is oriented to Web based CRMs. One open source CRM system is modyfied and translated into the Lithuanian language. Installation files were created for people who do not know databases and Web services software in order to help them install this CRM system and configure database as well as other system requirements. The final result of our work is open source CRM system called „OfisasTinkle2006“. This product is used by a couple of firms in their business sphere.
7

Company interactions with open platforms: case of Carrier Grade Linux /

Yuan, Jiang, January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 61-66). Also available in electronic format on the Internet.
8

Howthe difficulty of obtaining intrusion artifacts can influence threat modeling : An experiment that shows how IT forensics can be used preventingly / Hur svårigheten att erhålla intrångs artefakter påverkar risken i hot modellering : Ett expriment där IT forensik och hot modellering möts

Meyer, Oscar January 2022 (has links)
IT system intrusions are a problem today and the belief that all you need is a strong outer defense has faded. Today continuous monitoring of the IT infrastructure is widespread and alerts are continuously investigated. The clarity of what caused the alert will vary from a clear brute-force attempt to something more sophisticated that could be perceived as normal activity. The investigation of these alerts can bring clarity or in the worst case dismiss a legit intrusion as some system event or user action. The risk should vary depending on how easy or hard an intrusion is to detect, investigate, and for how long the artifacts will remain on a system. By investigating if different attacks carry different risks it should be possible to use this in a tool like threat modeling. The detection risk that different attacks carry can affect where a defender should spend their resources and provides awareness of the types of attack that they are especially vulnerable to. An environment is set up where an attacker targets a victim with chosen attacks and each attack step is forensically investigation with open-source tools. In this forensic investigation logs, files, active tasks, and network connections are investigated. In the end, the results indicate that it is possible to conclude that different attacks carry different risks. Three grading parameters are suggested based on this work, and these parameters could be used in a threat modeling implementation. / Idag är intrång in i IT system ett problem och idén om att det räcker med ett stark yttre försvars är passé. Kontinuerlig övervakning av IT system är nu vanligt och varningar som uppstår är undersökta. Vad som orsakade varningen kan varierar från rätt uppenbara saker så som brute force attacker till mer sofistikerade attacker som kan antas vara normal aktivitet. Att undersöka varningarna kan ge klarhet i vad som hänt eller i värsta fall avvisa ett intrång som någon systemhändelse eller användarhandling. Risken borde variera beroende på hur enkelt det är att upptäcka, undersöka och hur länge som artefakterna finns kvar på systemet. Genom att undersöka om olika attacker kommer med olika risker så borde det vara möjligt att använda denna kunskap inom ett verktyg så som hot modellering. Med denna kunskapen kan försvarare lättare spendera sina resurser där de behövs mest och vara medvetna om vilka attacker de är extra sårbara för. Genom att sätta upp en miljö där en anfallare attackerar ett offer med förbestämda attacker och efter varje attacksteg genomföra en forensisk undersökning med open-source verktyg. Där loggar, filer, aktiva processer och nätverks uppkopplingar undersöks. Resultaten pekar efter detta på att det är går att anta att olika attacker kommer med olika risknivåer. Baserat på detta arbetet så föreslås tre stycken klassificeringspunkter som kan användas inom till exempel hotmodellering.
9

Desenvolvimento de uma Plataforma de Software para a Modelagem Digital de Terrenos baseada em TIN

Oliveira, Fábio Feliciano [UNESP] 27 September 2010 (has links) (PDF)
Made available in DSpace on 2014-06-11T19:23:09Z (GMT). No. of bitstreams: 0 Previous issue date: 2010-09-27Bitstream added on 2014-06-13T20:29:50Z : No. of bitstreams: 1 oliveira_ff_me_prud.pdf: 3029284 bytes, checksum: 34c640f397adad0d6d6a082789722407 (MD5) / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES) / O reconhecimento de padrões de alvos específicos presentes na paisagem urbana como telhados de edificações as quais não são padronizados, ou seja, possuem variadas formas geométricas, dimensões, cores e texturas não é uma tarefa simples devido à alta complexidade desses alvos. Detectar e discriminar esses alvos constitui tarefa fundamental nos processos de mapeamento baseados em análise de imagem. Entretanto, graças aos avanços tecnológicos incorporados às câmaras fotogramétricas digitais, tem-se percebido um aumento contínuo da resolução espectral. Isso torna possível adquirir imagens com maior potencial para a discriminação devido aos atributos espectrais. Como alternativa de sistema de aerolevantamento, foi desenvolvido o Sistema Aerotransportado de Aquisição e Pós- Processamento de Imagens Digitais (SAAPI) o qual é capaz de adquirir imagens aéreas multiespectrais com alta resolução espacial. O SAAPI é composto por sensores de quadro capazes de produzir imagens multiespectrais com características de flexibilidade, confiabilidade e baixo custo. Mas, esses dados espectrais devem ser avaliados em aplicações de reconhecimento de padrões para aprimorar sua utilização. Nesse contexto, este trabalho busca ajustar índices de realce para serem capazes de destacar alvos específicos como corpo d’água, sombra, via pavimentada e vegetação presentes na paisagem urbana registrados em imagens adquiridas pelo SAAPI. Também, foi desenvolvida uma abordagem para correção do efeito vinhete baseada na análise de superfície de tendência da resposta radiométrica de sombras. Os resultados obtidos foram satisfatórios e confirmaram que as abordagens desenvolvidas podem ser aplicadas em mapeamento de áreas urbanas para reconhecer e identificar alvos específicos nas imagens adquiridas pelo SAAPI. A análise de superfície de... / Pattern recognition of specific targets in the urban scenery is not a simple task due to its high complexity. Recognizing building roofs, per example, has very variable features like geometrical form, dimension, color and texture. Detection and discrimination of these targets are basic tasks in mapping processes which are based on image analysis. Technological advancements of digital cameras have helped to improve the continuous increase of spectral resolution. Consequently, it allows the acquisition of aerial image data with higher potential for target discrimination based on spectral response. As an alternative to areal surveying system, it was developed the Lightweight Airborne Image Acquisition System (SAAPI) in order to survey high resolution areal-based multispectral images. The SAAPI is made-up of sensors to produce multispectral images with characteristics of flexibility, reliability and low cost. However, these spectral data must be evaluated for pattern recognition applications. Thus, this research intends to adjust enhancement indexes to detection of specific targets in the urban scenery, like water, shadow, paved roads and vegetation in images taken through the SAAPI. It was also developed an approach for correcting the vignetting effect based on the trend surface analysis of shadow radiometric response. The findings are satisfactory and validate the use of the developed approach in urban areas mapping to recognize and identify specific targets, based on SAAPI images.... (Complete abstract click electronic access below)
10

StackAct: avaliação de desempenho em uma nuvem IaaS multicamadas / StackAct: performance evaluation in an IaaS cloud multilayer

Bruschi, Gustavo Cesar [UNESP] 01 June 2016 (has links)
Submitted by GUSTAVO CESAR BRUSCHI null (gustavo@bruschi.net) on 2016-06-30T22:02:25Z No. of bitstreams: 1 Dissertacao_GustavoBruschi_FINAL(CORRIGIDO)_v2.pdf: 2377456 bytes, checksum: 41a5c87825aeb7131a629aee63fc450d (MD5) / Rejected by Ana Paula Grisoto (grisotoana@reitoria.unesp.br), reason: Solicitamos que realize uma nova submissão seguindo a orientação abaixo: O arquivo submetido está sem a ficha catalográfica. A versão submetida por você é considerada a versão final da dissertação/tese, portanto não poderá ocorrer qualquer alteração em seu conteúdo após a aprovação. Corrija esta informação e realize uma nova submissão contendo o arquivo correto. Agradecemos a compreensão. on 2016-07-04T18:38:19Z (GMT) / Submitted by GUSTAVO CESAR BRUSCHI null (gustavo@bruschi.net) on 2016-07-05T13:38:34Z No. of bitstreams: 2 Dissertacao_GustavoBruschi_FINAL(CORRIGIDO)_v2.pdf: 2377456 bytes, checksum: 41a5c87825aeb7131a629aee63fc450d (MD5) Dissertacao_GustavoBruschi_FINAL(CORRIGIDO)_v2.pdf: 2402200 bytes, checksum: 7d077bcd92c83a83ef1a9502d794312d (MD5) / Approved for entry into archive by Ana Paula Grisoto (grisotoana@reitoria.unesp.br) on 2016-07-07T16:26:49Z (GMT) No. of bitstreams: 1 bruschi_gc_me_sjrp.pdf: 2402200 bytes, checksum: 7d077bcd92c83a83ef1a9502d794312d (MD5) / Made available in DSpace on 2016-07-07T16:26:49Z (GMT). No. of bitstreams: 1 bruschi_gc_me_sjrp.pdf: 2402200 bytes, checksum: 7d077bcd92c83a83ef1a9502d794312d (MD5) Previous issue date: 2016-06-01 / A Computação em Nuvem tornou-se sinônimo de qualidade e eficiência em investimento na área de Tecnologia de Informação, criando novos desafios para o processamento e integração de dados. O desempenho da solução adotada é um ponto chave para o sucesso de uma solução em Nuvem, assim como a maneira como as máquinas virtuais realizam a leitura e gravação no armazenamento, podem ser determinantes para uma melhor utilização desta solução. Este trabalho apresenta o StackAct, um mecanismo que permite realizar o monitoramento e obter dados, em uma Nuvem IaaS, relativos ao consumo de recursos computacionais de uma solução em três camadas utilizando orquestrador Apache CloudStack com hypervisor XenServer e armazenamento dos dados no sistema Openfiler. Foram realizados testes de desempenho utilizando três diferentes tipos de perfil de instâncias em uma nuvem computacional privada, possibilitando mensurar os consumos de CPU, E/S e Memória nas três camadas envolvidas, com diferentes tipos de ofertas de serviços. Os testes resultaram em um comparativo entre cada item analisado para cada camada individual, onde foi possível detectar uma pequena variação entre as diferentes configurações de testes devido a forma como a camada do hypervisor enfileira as requisições realizadas pela camada do orquestrador. Já no comparativo realizado entre as camadas, foi possível constatar o alto consumo de disco na camada de armazenamento de dados, em especial E/S de gravação de dados, que levaram a realização de outros testes utilizando disco de estado sólido na camada de armazenamento, tendo um grande impacto no desempenho da solução como um todo. Foi detectado também um alto consumo de memória na camada hypervisor, que é justificada pela alocação do próprio hypervisor além das VMs que estão sendo criadas e utilizadas no processo. / Cloud Computing has become synonymous of quality, efficiency, and return of investment in Information Technology, creating new challenges for processing and data integrations. The performance of the adopted solution is a key to the success of a solution on Cloud, as well as the way that virtual machines use reading and writing to storage, which can be decisive for a better use of this solution. This work presents the StackAct, a mechanism that allows for monitoring and obtaining data on the consumption of computing resources of a solution in three layers using orchestrator IaaS Apache CloudStack with XenServer hypervisor and storage of data on the NAS OpenFiler system. Based on this mechanism, performance tests were conducted using three different instances of a private cloud. CPU, I/O, and memory usages in the three layers involved were measured with different types of loads. The tests resulted in a comparison between each item analyzed for each individual layer, and it was possible to detect a slight variation between the different configurations of tests because of the way that the hypervisor layer queues the requests made by the orchestrator layer. In the comparison made between the layers, it was possible to high consumption of disk in the data storage layer, in particular I/O data recording, which led to other tests using solid state disk in the storage layer, having an high impact on the performance of the solution as a whole. It was also detected high memory in the hypervisor layer, which is justified by the allocation of the hypervisor itself beyond the VMs being created and used in the process.

Page generated in 0.0632 seconds