Dissertations / Theses on the topic 'Architecture IdO'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Architecture IdO.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Amaro, da Cruz Mauro. "An enhanced multi-protocol middleware solution for Internet of things." Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.
Full textIn Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
Gunji, Akira. "Inferring Design Environment (IDE) : "(re) shaping a design pattern as a learning process"." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/33035.
Full textIncludes bibliographical references (leaves 14-16).
This proposal examines the Design process through developing a dialog or game-like graphic software environment. Inferring Design Environment (IDE) is a concept sketch that assimilates a dialog or turn-taking game onto a two dimensional digital canvas, which in turn helps designers learn about their learning processes. This turn-taking process eventually gives rise to meaningful expression through the use of a rule the Designer has made previously. Henceforth, learning is not something that has a goal and purpose such as teaching does, but is rather the emergence and discovery of an interaction of finite elements and the "self"' in an Environment.
by Akira Gunji.
S.M.
Kim, Taekyu. "Ontology/Data Engineering Based Distributed Simulation Over Service Oriented Architecture For Network Behavior Analysis." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/193678.
Full textKourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.
Full textPollet, Damien. "Une architecture pour les transformations de modèles et la restructuration de modèles uml." Phd thesis, Université Rennes 1, 2005. http://tel.archives-ouvertes.fr/tel-00538536.
Full textAkhlaq, Monis. "Improved performance high speed network intrusion detection systems (NIDS) : a high speed NIDS architectures to address limitations of packet loss and low detection rate by adoption of dynamic cluster architecture and traffic anomaly filtration (IADF)." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5377.
Full textMartin, Kyle A. "Harmony oriented architecture." Master's thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4795.
Full textID: 031001554; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Title from PDF title page (viewed August 26, 2013).; Thesis (M.S.)--University of Central Florida, 2011.; Includes bibliographical references (p. 79-84).
M.S.
Masters
Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science
Stead, Sarah. "PLACE, SPACE, AND FORM CAPTURED THROUGH PHOTOGRAPHIC MEDITATION." Master's thesis, University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4193.
Full textM.F.A.
Department of Art
Arts and Humanities
Studio Art and the Computer MFA
Joanne, Pascal. "L'espace sensible du monastère cistercien aux origines : essai de caractérisation des ambiances architecturales." Nantes, 2003. http://portaildocumentaire.citechaillot.fr/search.aspx?SC=theses&QUERY=cour+ouverte#/Detail/%28query:%28Id:%270_OFFSET_0%27,Index:1,NBResults:1,PageRange:3,SearchQuery:%28CloudTerms:!%28%29,ForceSearch:!t,Page:0,PageRange:3,QueryString:Joanne,ResultSize:10,ScenarioCode:theses,ScenarioDisplayMode:display-standard,SearchLabel:%27%27,SearchTerms:Joanne,SortField:!n,SortOrder:0,TemplateParams:%28Scenario:%27%27,Scope:%27%27,Size:!n,Source:%27%27,Support:%27%27%29%29%29%29.
Full textPALCZYNSKI, MATTHEW JOSEPH. "ROTHKO AND ARCHITECTURE." Diss., Temple University Libraries, 2011. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/213124.
Full textPh.D.
The overall goal of this dissertation is to identify and examine the neglected aspects of the literature on Mark Rothko's 1958-1959 project to make murals for the Four Seasons restaurant (see Figs. 1-12) in the then-newly opened Seagram Building in Manhattan. These include Rothko's attempts to merge the mediums of painting and architecture in order to create an antagonistic environment in the restaurant; how his visits to Italy before and during the project reinforced this goal; how a good deal of the figurative paintings from Rothko's earliest career anticipated his blend of aggression and architecturally-related themes; the connection between Rothko and Mies van der Rohe, the architect of the building, in regard to the theme of transcendence; and how his experiments with architectural subjects and motifs aligned Rothko with some of the most influential vanguard artists in New York in the late 1950s and early 1960s. Discussions of these topics will suggest that his career-long references to architecture functioned, for him, as something intended to produce discomfort in the viewer. I will show that his acceptance of a lucrative commission to make paintings for a lavish restaurant that might seem at first to suggest pandering to an élite audience had the paradoxical effect of condemning that audience. I intend also to demonstrate that Rothko understood that the project was not merely about making paintings. Instead, for him, it dealt more with the challenge of uniting architecture and painting.
Temple University--Theses
Pagna, Disso Jules Ferdinand. "A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.
Full textPagna, Disso Jules F. "A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.
Full textAl-Azzani, Sarah. "Architecture-centric testing for security." Thesis, University of Birmingham, 2014. http://etheses.bham.ac.uk//id/eprint/5206/.
Full textBobusky, Sergej. "BlueJ interactive mode enhancement." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193923.
Full textFeske, Norman, and Christian Helmuth. "Design of the Bastei OS Architecture." Technische Universität Dresden, 2006. https://tud.qucosa.de/id/qucosa%3A26246.
Full textDing, Ke. "Architectures of DNA block copolymers." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=98214217X.
Full textMotii, Anas. "Engineering secure software architectures : patterns, models and analysis." Thesis, Toulouse 3, 2017. http://www.theses.fr/2017TOU30274/document.
Full textNowadays most organizations depend on Information and Communication Technologies (ICT) to perform their daily tasks (sometimes highly critical). However, in most cases, organizations and particularly small ones place limited value on information and its security. In the same time, achieving security in such systems is a difficult task because of the increasing complexity and connectivity in ICT development. In addition, security has impacts on many attributes such as openness, safety and usability. Thus, security becomes a very important aspect that should be considered in early phases of development. In this work, we propose an approach in order to secure ICT software architectures during their development by considering the aforementioned issues. The contributions of this work are threefold: (1) an integrated design framework for the specification and analysis of secure software architectures, (2) a novel model- and pattern-based methodology and (3) a set of supporting tools. The approach associates a modeling environment based on a set of modeling languages for specifying and analyzing architecture models and a reuse model repository of modeling artifacts (security pattern, threat and security property models) which allows reuse of capitalized security related know-how. The approach consists of the following steps: (a) model-based risk assessment performed on the architecture to identify threats, (b) selection and instantiation of security pattern models towards the modeling environment for stopping or mitigating the identified threats, (c) integration of security pattern models into the architecture model, (d) analysis of the produced architecture model with regards to other non-functional requirements and residual threats. In this context, we focus on real-time constraints satisfaction preservation after application of security patterns. Enumerating the residual threats is done by checking techniques over the architecture against formalized threat scenarios from the STRIDE model and based on existing threat references (e.g., CAPEC). As part of the assistance for the development of secure architectures, we have implemented a tool chain based on SEMCO and Eclipse Papyrus to support the different activities based on a set of modeling languages compliant with OMG standards (UML and its profiles). The assessment of our work is presented via a SCADA system (Supervisory Control And Data Acquisition) case study
Tejeira-Davis, Eduardo. "Roots of modern Latin American architecture the Hispano-Caribbean region from the late 19th century to the recent past /." Heidelberg : Deutscher Akademischer Austauschdienst, 1987. http://books.google.com/books?id=LNBPAAAAMAAJ.
Full textFloc'h, Antoine. "Compilation optimisante pour processeurs extensibles." Phd thesis, Université Rennes 1, 2012. http://tel.archives-ouvertes.fr/tel-00726420.
Full textBista, Sulabh. "Assessing the Physical Security of IDFs with PSATool: a Case Study." Digital Commons @ East Tennessee State University, 2015. https://dc.etsu.edu/etd/2605.
Full textHu, Ji. "A virtual machine architecture for IT-security laboratories." Phd thesis, [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=980935652.
Full textBeckenkamp, Fábio Ghignatti. "A component architecture for artificial neural network systems." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=964923580.
Full textEricson, Fabian, and Sara Knutas. "Energieffektiva klimatskal i flerbostadshus: Tillämpning av nära-nollenergikrav." Thesis, Linnéuniversitetet, Institutionen för byggteknik (BY), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-66092.
Full textBarnes, Andrew James. "A modular architecture for systematic text categorisation." Thesis, University of Huddersfield, 2013. http://eprints.hud.ac.uk/id/eprint/23292/.
Full textBall-Jones, Matthew Phillip. "Cascading cycloadditions for polycyclic sp³-rich architecture." Thesis, University of Birmingham, 2017. http://etheses.bham.ac.uk//id/eprint/7986/.
Full textGötz, Sebastian, Claas Wilke, Sebastian Cech, and Uwe Aßmann. "Architecture and Mechanisms of Energy Auto-Tuning." Technische Universität Dresden, 2012. https://tud.qucosa.de/id/qucosa%3A26969.
Full textLievens, Halewijn, Freek Dendooven, and Marie Bemelmans. "A house, architecture for residents with dementia." TUDpress, 2019. https://tud.qucosa.de/id/qucosa%3A36605.
Full textDedenroth, Høj Louise. "Exploring the potentials of dementia village architecture." TUDpress, 2019. https://tud.qucosa.de/id/qucosa%3A36682.
Full textFatima, Arooj. "An integrated architecture for semantic search." Thesis, Anglia Ruskin University, 2016. https://arro.anglia.ac.uk/id/eprint/701475/1/Fatima_2016.pdf.
Full textKhecharem, Amani. "MuVArch : une approche de méta-modélisation pour la représentation multi-vues des architectures hétérogènes embarqués." Thesis, Nice, 2016. http://www.theses.fr/2016NICE4019/document.
Full textWe introduced and realized with our MuVarch approach an heterogeneous (meta)modeling environment for multi-view representation of heterogeneous embedded architectures (of "smartphone" type for instance). In addition to the backbone architectural view supporting others, we considered performance, power, and thermal view. We introduced also the functional applicative view, to provide typical use cases for the architecture. It was important to describe in MuVarch our various views would connect to the basic one, and how they would mutually relate together as well (how temperature depends on power consumption for instance). The global objective was to let the framework consider alternative mapping/allocation strategies for applicative tasks on architectural resources (although the definition of such strategies themselves was out of the scope). The appropriate form of such an allocation relation, which may be quite involved, was thus an important aspect of this thesis
Hao, Shilun. "IDS---Intelligent Dougong System: A Knowledge-based and Graphical Simulation of Construction Processes of China’s Song-style Dougong System." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1417702752.
Full textSells, Chris. "Bridging object models : the faux-object idiom /." Full text open access at:, 1997. http://content.ohsu.edu/u?/etd,281.
Full textStaite, Christopher. "Identity management architecture and implementation : evaluation and improvement." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3388/.
Full textGöbel, Steffen, Christoph Pohl, Ronald Aigner, Martin Pohlack, Simone Röttger, and Steffen Zschaler. "The COMQUAD Component Container Architecture and Contract Negotiation." Technische Universität Dresden, 2004. https://tud.qucosa.de/id/qucosa%3A26291.
Full textKrstić, Miloš. "Request-driven GALS technique for datapath architectures." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=978773063.
Full textSchäfer, Olga [Verfasser]. "Poly(S-Alkylsulfonyl-L-Cysteine) in Modular Nanoparticle Synthesis : exploring key factors from disulfide stabilization, polypept(o)ide architectures to secondary structures / Olga Schäfer." Mainz : Universitätsbibliothek Mainz, 2019. http://d-nb.info/1194435742/34.
Full textWilliams, Denver Robert Edward. "An adaptive integration architecture for software reuse." Doctoral diss., University of Central Florida, 2001. http://digital.library.ucf.edu/cdm/ref/collection/RTD/id/4167.
Full textThe problem of building large, reliable software systems in a controlled, cost effective way, the so-called software crisis problem, is one of computer science's great challenges. From the very outset of computing as science, software reuse has been touted as a means to overcome the software crisis issue
Ph.D.
Doctorate;
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Electrical Engineering and Computer Science
221 p.
xix, 221 leaves, bound : ill. ; 28 cm.
Fernández-Busnadiego, Rubén. "Structural analysis of presynaptic architecture by cryoelectron tomography." kostenfrei, 2010. https://mediatum2.ub.tum.de/node?id=976427.
Full textBenamira, Messaoud. "Conducteurs mixtes nanostructurés pour les piles à combustible à oxyde solide (SOFC) : élaboration et performances de nouvelles architectures." Phd thesis, Paris 6, 2008. http://pastel.archives-ouvertes.fr/pastel-00004896.
Full textSchultz, Jörg. "SMART, a simple modular architecture research tool development and applications /." [S.l.] : [s.n.], 2001. http://deposit.ddb.de/cgi-bin/dokserv?idn=961722851.
Full textBuchty, Rainer. "Cryptonite a programmable crypto processor architecture for high bandwidth applications /." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=966328108.
Full textKolaric, Branko. "Foam films containig polyelectrolytes of different molecular architectures." [S.l.] : [s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=96798131X.
Full textZheng, Huanyang. "SOCIAL NETWORK ARCHITECTURES AND APPLICATIONS." Diss., Temple University Libraries, 2017. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/470889.
Full textPh.D.
Rather than being randomly wired together, the components of complex network systems are recently reported to represent a scale-free architecture, in which the node degree distribution follows power-law. While social networks are scale-free, it is natural to utilize their structural properties in some social network applications. As a result, this dissertation explores social network architectures, and in turn, leverages these architectures to facilitate some influence and information propagation applications. Social network architectures are analyzed in two different aspects. The first aspect focuses on the node degree snowballing effects (i.e., degree growth effects) in social networks, which is based on an age-sensitive preferential attachment model. The impact of the initial links is explored, in terms of accelerating the node degree snowballing effects. The second aspect focuses on Nested Scale-Free Architectures (NSFAs) for social networks. The scale-free architecture is a classic concept, which means that the node degree distribution follows the power-law distribution. `Nested' indicates that the scale-free architecture is preserved when low-degree nodes and their associated connections are iteratively removed. NSFA has a bounded hierarchy. Based on the social network structure, this dissertation explores two influence propagation applications for the Social Influence Maximization Problem (SIMP). The first application is a friend recommendation strategy with the perspective of social influence maximization. For the system provider, the objective is to recommend a fixed number of new friends to a given user, such that the given user can maximize his/her social influence through making new friends. This problem is proved to be NP-hard by reduction from the SIMP. A greedy friend recommendation algorithm with an approximation ratio of $1-e^{-1}$ is proposed. The second application studies the SIMP with the crowd influence, which is NP-hard, monotone, non-submodular, and inapproximable in general graphs. However, since user connections in Online Social Networks (OSNs) are not random, approximations can be obtained by leveraging the structural properties of OSNs. The modularity, denoted by $\Delta$, is proposed to measure to what degree this problem violates the submodularity. Two approximation algorithms are proposed with ratios of $\frac{1}{\Delta+2}$ and $1-e^{-1/(\Delta+1)}$, respectively. Beside the influence propagation applications, this dissertation further explores three different information propagation applications. The first application is a social network quarantine strategy, which can eliminate epidemic outbreaks with minimal isolation costs. This problem is NP-hard. An approximation algorithm with a ratio of 2 is proposed through utilizing the problem properties of feasibility and minimality. The second application is a rating prediction scheme, called DynFluid, based on the fluid dynamics. DynFluid analogizes the rating reference among the users in OSNs to the fluid flow among containers. The third application is an information cascade prediction framework: given the social current cascade and social topology, the number of propagated users at a future time slot is predicted. To reduce prediction time complexities, the spatiotemporal cascade information (a larger size of data) is decomposed to user characteristics (a smaller size of data) for subsequent predictions. All these three applications are based on the social network structure.
Temple University--Theses
Kayikci, Duygu y. "The Behavior of Moment Resisting Steel Frames Under Seismic Excitation with Variation of Geometric Dimensions of Architectural Setbacks." Scholarly Repository, 2011. http://scholarlyrepository.miami.edu/oa_dissertations/583.
Full textFröning, Holger. "Architectural improvements of interconnection network interfaces." [S.l.] : [s.n.], 2007. http://deposit.ddb.de/cgi-bin/dokserv?idn=985127449.
Full textShaer, May. "The decorative architectural surfaces of Petra." [S.l. : s.n.], 2005. http://deposit.ddb.de/cgi-bin/dokserv?idn=974415952.
Full textZheng, Zhaoshi. "A FPGA-based architecture for LED backlight driving." Master's thesis, University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4514.
Full textID: 029094272; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (M.S.)--University of Central Florida, 2010.; Includes bibliographical references (p. 60-61).
M.S.
Masters
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science
Hung, Victor C. "Robust dialog management through a context-centric architecture." Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/4639.
Full textID: 029094516; System requirements: World Wide Web browser and PDF reader.; Mode of access: World Wide Web.; Thesis (Ph.D.)--University of Central Florida, 2010.; Includes bibliographical references (p. 280-301).
Ph.D.
Doctorate
Department of Electrical Engineering and Computer Science
Engineering and Computer Science
Rabadi, Yousef. "Building a secured XML real-time interactive data exchange architecture." Thesis, University of Huddersfield, 2011. http://eprints.hud.ac.uk/id/eprint/17824/.
Full textEssien, Joe. "Model driven validation approach for enterprise architecture and motivation extensions." Thesis, University of West London, 2015. https://repository.uwl.ac.uk/id/eprint/1269/.
Full text