• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 189
  • 32
  • 30
  • 22
  • 16
  • 10
  • 9
  • 6
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 387
  • 387
  • 97
  • 92
  • 59
  • 55
  • 50
  • 45
  • 36
  • 34
  • 33
  • 33
  • 31
  • 29
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
211

Využití reverzního inženýrství pro výpočty aerodynamiky automobilu / The utilization of reverse engineering in computation of vehicle aerodynamics

Rozsíval, Jan January 2008 (has links)
The vehicle body was measured by using ATOS 3D scanner. Measured data from the ATOS 3D scanner were applied to make a 3D model of vehicle body and to make a 3D model of whole vehicle by using computer program Pro/ENGINEER. The model of vehicle was made with a view for future use of CAD model. Surface of the vehicle model was used for computation of vehicle aerodynamics – aerodynamic static pressure distribution by using CFD software Star-CCM+.
212

Technologie výroby kopie osobního automobilu pomocí digitalizace / Manufacturing technology of a car copy by digitizing method

Eis, Jiří January 2010 (has links)
This thesis, maked as diploma project at VUT Brno, summarize in teoretical part most used methods, technology of reverse engineering and rapid prototyping, including their using in practice. Experimental part discussed about aplication of this technologies on practical example. Tendency of thesis was creation of digitized model of a car by optical scanner ATOS and photogrammetry system TRITOP, including modifications and processing of get data, which will use to verification of model by FDM technology.
213

Vytvoření technologie obrábění lopatkového kola / Creating of technology for turbine wheel machining

Urbánek, Aleš January 2010 (has links)
This diploma work deals with manufacturing technology of a turbine wheel. In first part is introduced description of equipment used for reverse engineering. In next part are clamping possibilities for cutting operations. The part of this diploma thesis is verification of a semi-product using ATOS system and proposal of establishment and clamping. Purpose of the work is technology preparation and production of clamping device for milling by the machining centre MCV 1210.
214

Konstrukční úprava těhlice osobního vozidla / Design modification of the vehicle upright

Coufal, Jiří January 2013 (has links)
This master´s thesis deals with design modification of specific upright in response to exchange the caliper for non-series one. It focuses on the creation and subsequent adjustment of the 3D model based on obtained size and shape of real upright by using 3D scan. For the editing part is conducted the strength test by using FEM and the results are compared with the values of the original upright.
215

Uplatnění technologie "reverse engineering" při zhotovení repliky Al odlitku metodou vytavitelného modelu / Using "reverse engineering" approach when making replica of Al casting by lost wax technology

Bezděk, Adam January 2016 (has links)
The aim of this thesis was to produce a prototype casting of aluminum alloy with usage of reverse engineering technology. In a production process surface quality and dimensional accuracy was optimized. 3D scanning, FDM technology, ABSplus surface finishing possibilities and investment casting technology is introduced in theoretical part of this thesis. Practical part of the thesis includes description of original parts, their 3D scanning, usage of RE and RP, production of new castings and evaluation of their dimensional accuracy and surface roughness.
216

Strukturování kódu v zadní části zpětného překladače / Code Structuring in Decompiler Back-End

Porwolik, Tomáš January 2016 (has links)
This thesis deals with a decompilation tool which converts low-level binary code to a high-level representation. This tool is being developed by AVG Technologies. The aim of this work is to design and implement a method for code structuring in the decompiler back-end. The designed method works by traversing the control-flow graph with matching of predefined patterns. It is not always possible to structure code using conditional statements and loops. Sometimes also goto statements must be used. The implemented solution is compared with the original solution in the decompiler. According to the results the new solution is faster, better tested, but in greater number of test cases generates invalid code. From the viewpoint of structuring the results are different and sometimes the code is structured better, but sometimes worse.
217

Generický zpětný překlad programů v bajtkódu do vyšší formy reprezentace / Generic Decompilation of Bytecode into High-Level Representation

Mrázek, Petr January 2013 (has links)
The work describes methods and principles of decompilation, basic information about reverse engineering and its use in both software engineering and engineering in general. Furthermore, it introduces the decompiler developed within the Lissom project at BUT FIT. The goal of the work is to design and implement a retargetable decompiler for bytecode, which extends the original decompiler.
218

Reverse Engineering of Passenger Jets - Classified Design Parameters

De Grave, Emiel January 2017 (has links) (PDF)
This thesis explains how the classified design parameters of existing passenger jets can be determined. The classified design parameters are; the maximum lift coefficient for landing and take-off, the maximum aerodynamic efficiency and the specific fuel consumption. The entire concept is based on the preliminary sizing of jet powered civil aeroplanes. This preliminary sizing is explained in detail because it is the foundation of the final result. The preliminary sizing is combined using reverse engineering which is not a strict method. Therefore, only the basics are explained. By applying reverse engineering on the preliminary sizing and aiming for the classified design parameters as output, formulas are derived to calculate the maximum lift coefficients, the maximum aerodynamic efficiency and the specific fuel consumption. The goal is to calculate these parameters, using only aircraft specifications that are made public by the manufacturer. The calculations are complex with mutual relations, iterative processes and optimizations. Therefore, it is interesting to integrate everything in a tool. The tool is built in Microsoft Excel and explained in detail adding operating instructions. The program is executed for miscellaneous aeroplanes, supported with the necessary comments. Investigated aeroplanes are: Caravelle 10B (Sud-Aviation), Boeing 707-320C, BAe 146-200 (British Aerospance), A320-200 (Airbus), "The Rebel" (based on A320), Boeing SUGAR High, Boeing 747-400, Blended Wing Body VELA 2 (VELA) and Dassault Falcon 8X.
219

Novel System Compartmentalization and Reverse Engineering Methods

Derrick P Mckee (12868367) 14 June 2022 (has links)
<p>The need to secure software systems is more important than ever. However, while a lot of work exists to design and implement secure systems, a fundamental weakness remains. Instead of implementing software with least privilege policies, developers create monolithic systems that allow any instruction near universal memory access. This dissertation attempts to rectify this fundamental weakness to software design through three different contributions.</p> <p>First, I address the monolithic software design problem by proposing and evaluating a novel compartmentalization enforcement mechanism called Hardware-Assisted Kernel Compartmentalization (HAKC). HAKC is capable of enforcing an arbitrary compartmentalization policy using features of the ARMv9 ISA, without the need of any extra virtualization or trusted software layer. I then introduce a method of determining an optimal compartmentalization policy based on user performance and security constraints called FlexC, which is tested using HAKC as the enforcement mechanism. The end result is a hardened, com-partmentalized kernel, customized to a user’s needs, which enforces a least privilege policy that minimizes overhead. Finally, as an avenue for further compartmentalization policy generation, I introduce a novel program analysis framework called IOVec Function Identifier (IOVFI), which foregoes the use of language processing and model learning, but instead uses program state changes as a unique function fingerprint. I show that IOVFI is a more stable and accurate function identifier than the state-of-the-art, even in the presence of differing compilation environments, purposeful obfuscations, and even architecture changes.</p>
220

Automated Culling of Data in a Relational Database for Archiving

Nilsson, Simon January 2019 (has links)
Background. Archiving of legacy information systems is challenging. When no options exist for extracting the information in a structured way, the last resort is to save the database. Optimally only the information that is relevant should be saved and the rest of the information could be removed. Objectives. The goal is to develop a method for assisting the archivist in the process of culling a database before archiving. The method should be described as rules defining how the tables can be identified.Methods. To get an overview of how the process works today and what archivists think can be improved, a number of interviews with experts in database archiving is done. The results from the interviews are then analysed, together with test databases to define rules that can be used in a general case. The rules are then implemented in a prototype that is tested and evaluated to verify if the method works. Results. The results point to the algorithm being both faster and able to exclude more irrelevant tables than a person could do with the manual method. An algorithm for finding candidate keys has also been improved to decrease the number of tests and execution time in the worst case. Conclusions. The evaluation shows results that point to the method working as intended while resulting in less work for the archivist. More work should be done on this method to improve it further.

Page generated in 0.1004 seconds