Dissertations / Theses on the topic 'Critical applications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Critical applications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Wu, Weihang. "Architectural Reasoning for Safety Critical Software Applications." Thesis, University of York, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.485150.
Full textHaylock, James Alexander. "Fault tolerant drives for safety critical applications." Thesis, University of Newcastle Upon Tyne, 1998. http://hdl.handle.net/10443/352.
Full textKurd, Zeshan. "Artificial neural networks in safety-critical applications." Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.428472.
Full textVenugopalan, Vigneshwaran. "Supervisory wireless control for critical industrial applications." Thesis, University of Sheffield, 2014. http://etheses.whiterose.ac.uk/8501/.
Full textRohrmair, Gordon Thomas. "Use of CSP to verify security-critical applications." Thesis, University of Oxford, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433325.
Full textSchwager, Mac. "Towards verifiable adaptive control for safety critical applications." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/32344.
Full textIncludes bibliographical references (p. 97-101).
To be implementable in safety critical applications, adaptive controllers must be shown to behave strictly according to predetermined specifications. This thesis presents two tools for verifying specifications relevant to practical direct-adaptive control systems. The first tool is derived from an asymptotic analysis of the error dynamics of a direct adaptive controller and uncertain linear plant. The analysis yields a so called Reduced Linear Asymptotic System, which can be used for designing adaptive systems to meet transient specifications. The tool is demonstrated in two design examples from flight mechanics, and verified in numerical simulation. The second tool developed is an algorithm for direct-adaptive control of plants with magnitude saturation constraints on multiple inputs. The algorithm is a non-trivial extension of an existing technique for single input systems with saturation. Boundeness of all signals is proved for initial conditions in a compact region. In addition, the notion of a class of multi-dimensional saturation functions is introduced. The saturation compensation technique is demonstrated in numerical simulation. Finally, these tools are applied to design a direct-adaptive controller for a realistic multi-input aircraft model to accomplish control reconfiguration in the case of unforeseen failure, damage, or disturbances. A novel control design for incorporating control allocation and reconfiguration is introduced. The adaptive system is shown in numerical simulation to have favorable transient qualities and to give a stable response with input saturation constraints.
by Mac Schwager.
S.M.
Furht, Borko, David Joseph, David Gluch, and John Parker. "OPEN SYSTEMS FOR TIME-CRITICAL APPLICATIONS IN TELEMETRY." International Foundation for Telemetering, 1990. http://hdl.handle.net/10150/613465.
Full textIn this paper we discuss the next generation of open real-time systems for time critical applications in telemetry. Traditionally, real-time computing has been a realm of proprietary systems, with real-time applications written in assembly language. With the escalating cost of software development and the need for porting real-time applications to state-of-the-art hardware without massive conversion efforts, there is a need for real-time applications to be portable so that they can be moved to newer hardware platforms easily. Therefore, the next generation of real-time systems will be based on open systems incorporating industry standards, which will reduce system cost and time to market, increase availability of software packages, increase ease-of-use, and facilitate system integration. The open real-time system strategy, presented in this paper, is based on hardware architectures using off-the-shelf microprocessors, Motorola 680X0 and 88X00 families, and the REAL/IX operating system, a fully preemptive real-time UNIX operating system, developed by MODCOMP.
Bion, Julian Fleetwoo. "Severity scoring and its applications in critical illness." Thesis, Imperial College London, 1990. http://hdl.handle.net/10044/1/47775.
Full textJiang, Xiaolin. "Wireless Communication Networks for Time-critical Industrial Applications." Licentiate thesis, KTH, Nätverk och systemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-239019.
Full textQC 20181116
Lu, Yu. "Probabilistic verification of satellite systems for mission critical applications." Thesis, University of Glasgow, 2016. http://theses.gla.ac.uk/7586/.
Full textNicholson, Richard. "Radiation sensor interface ASSP designed for safety critical applications." Thesis, Lancaster University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.497766.
Full textBen, Tahayekt Ben Tahaikt Chaimaa. "A secure user authentication scheme for critical mobile applications." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-34845.
Full textLuckcuck, Matthew. "Safety-Critical Java Level 2 : applications, modelling, and verification." Thesis, University of York, 2016. http://etheses.whiterose.ac.uk/17743/.
Full textMaad, Sara. "Critical point theory with applications to semilinear problems without compactness." Doctoral thesis, Uppsala : Matematiska institutionen, Univ. [distributör], 2002. http://publications.uu.se/theses/91-506-1557-2/.
Full textBauer, Thomas. "Thermophotovoltaic applications in the UK : critical aspects of system design." Thesis, Northumbria University, 2006. http://nrl.northumbria.ac.uk/82/.
Full textYe, Fan. "Justifying the use of COTS components within safety critical applications." Thesis, University of York, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.424582.
Full textMartin, Paul J. (Paul Jonathan). "The industrial-pollution-projection system : critical analysis and potential applications." Thesis, Massachusetts Institute of Technology, 1993. http://hdl.handle.net/1721.1/68993.
Full textTavakoli, Dehkordi Anousheh. "Optimisation and algorithms in wireless networks for mission critical applications." Thesis, University of Greenwich, 2015. http://gala.gre.ac.uk/13827/.
Full textNuthakki, Chandu. "Modeling and analysis of IP storage protocols for time critical applications." Thesis, Wichita State University, 2007. http://hdl.handle.net/10057/1527.
Full textThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering
"July 2007."
Phillips, Shannon L. "Fundamental studies and applications of liquid chromatography at the critical condition /." The Ohio State University, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=osu148640254458979.
Full textStapleton, Jacob D. "SYNTHESIS OF UPPER CRITICAL SOLUTION TEMPERATURE POLYMER FOR APPLICATIONS IN BIOTECHNOLOGY." Miami University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=miami1501260269518501.
Full textNuthakki, Chandu Pendse Ravindra. "Modeling and analysis of IP storage protocols for time critical applications /." Thesis, A link to full text of this thesis in SOAR, 2007. http://hdl.handle.net/10057/1527.
Full textFarag, Hossam. "Enabling Time- and Mission-Critical Applications in Industrial Wireless Sensor Networks." Licentiate thesis, Mittuniversitetet, Institutionen för informationssystem och –teknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-35572.
Full textSMART (Smarta system och tjänster för ett effektivt och innovativt samhälle)
Evers, Barbara. "The contribution of gender analysis to economic theory and its policy applications." Thesis, University of Manchester, 2010. http://www.manchester.ac.uk/escholar/uk-ac-man-scw:110580.
Full textAo, Gang. "Software hot-swapping techniques for upgrading mission-critical applications on the fly." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0023/MQ52384.pdf.
Full textZhong, Le. "A critical literature review of case-based reasoning and its educational applications." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ64004.pdf.
Full textStewart, David G. "Thermophysical properties of gases and gas mixtures for critical flow nozzle applications." Thesis, University of Strathclyde, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.248763.
Full textWoźniak, Mariusz. "High engineering critical current density MgB2 wires and joints for MRI applications." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610780.
Full textEleye-Datubo, Adokiye Godwill. "Integrative risk-based assessment modelling of safety-critical marine and offshore applications." Thesis, Liverpool John Moores University, 2005. http://researchonline.ljmu.ac.uk/5806/.
Full textReedman, Adam Victor Creyke. "The design and control of a manipulator for safety-critical deployment applications." Thesis, Loughborough University, 2002. https://dspace.lboro.ac.uk/2134/33736.
Full textSchmitt, Felix, Robert Dietrich, and Guido Juckeland. "Scalable critical-path analysis and optimization guidance for hybrid MPI-CUDA applications." Sage, 2017. https://tud.qucosa.de/id/qucosa%3A35554.
Full textGanesh, Sai Vinayak. "Critical analysis of aging models for lithium-ion second-life battery applications." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587643968721108.
Full textAbed, Wathiq. "Robust fault analysis for permanent magnet DC motor in safety critical applications." Thesis, University of Plymouth, 2015. http://hdl.handle.net/10026.1/3550.
Full textAo, Gang Carleton University Dissertation Engineering Systems and Computer. "Software hot-swapping techniques for upgrading mission critical applications on the fly." Ottawa, 2000.
Find full textLyamin, Nikita. "Performance evaluation of safety critical ITS-G5 V2V communications for cooperative driving Applications." Doctoral thesis, Universitat Pompeu Fabra, 2019. http://hdl.handle.net/10803/665484.
Full textEls Sistemes de Transport Intel·ligents (ITS) tenen com a objectiu proporcionar serveis innovadors relacionats amb diferents modes de transport i gestió del trànsit, i permetre que els usuaris en facin un ús més segur, més coordinat i més intel·ligent. Cooperative-ITS (C-ITS) fa possible la connectivitat entre vehicles, entre vehicles i la infraestructura de la carretera, entre senyals de trànsit, i amb altres usuaris de la carretera. Per tal de permetre la comunicació entre vehicles, l'Institut Europeu de les Telecomunicacions (ETSI) va crear el ITS-G5 - un conjunt de normes C-ITS. Tenint en compte els objectius de C-ITS, les comunicacions entre vehicles han de ser fiables i eficients.Lobjectiu d'aquesta tesi és l'avaluació del rendiment i l'eficiència de les comunicacions ITS-G5 per donar suport a les aplicacions de conducció cooperativa. La tesi inclou vuit articles científics al voltant de tres àrees de recerca: avaluació del rendiment dels protocols de baliseig ITS-G5; estudi del rendiment dels mecanismes de control de la congestió ITS-G5; i estudi de d’atacs de tipus Denial-of-Service (DoS) i els seus mètodes de detecció. En primer lloc, s’inclou una descripció general dels objectius d'estandardització actuals i futurs respecte a la conducció cooperativa C-ACC / platooning. Després, com a part de la primera àrea de recerca, es demostra a través de diversos estudis, que l'enfocament de balisa adaptativa on la generació de missatges està acoblada a la variació de velocitat dels ITS-s originadors, pot portar a un efecte de sincronització de missatges similar en el domini del temps quan els vehicles adapten de manera cooperativa la seva velocitat. Així, s’explica detalladament la causa d'aquest fenomen i s’estudia per a una àmplia gamma de paràmetres. En relació amb el segon problema, primer s’estudia la influència de diferents configuracions base del ITS-G5 en el consum de combustible, demostrant que amb una configuració adequada es pot millorar l'estalvi de combustible. Després, s’estudia el mecanisme de control de congestió definit per ITS-G5, que afectarà el funcionament de totes les aplicacions de C-ITS de conducció cooperativa ja que es un component obligatori, avaluant la seva influència en el rendiment de les aplicacions, i donant recomanacions de millora. Finalment, en l’àrea de l'última direcció d'investigació, es proposen dos mètodes de detecció de DoS en temps real. El principal avantatge de les tècniques de detecció presentades és la seva curta fase d'aprenentatge, que no excedeix d’uns pocs segons, i el seu baix retard de detecció d'uns pocs centenars de milisegons. Sota alguns supòsits, els algoritmes proposats demostren la capacitat de detectar certs tipus d'atacs amb alta probabilitat de detecció.
Los Sistemas de Transporte Inteligentes (ITS) tienen como objetivo proporcionar servicios innovadores relacionados con diferentes modos de transporte y gestión del tráfico, y permitir que los usuarios hagan un uso más seguro, más coordinado y más inteligente. Cooperative-ITS (C-ITS) hace posible la conectividad entre vehículos, entre vehículos y la infraestructura de la carretera, entre señales de tráfico, y con otros usuarios de la carretera. Para permitir la comunicación entre vehículos, el Instituto Europeo de las Telecomunicaciones (ETSI) creó el ITS-G5 - un conjunto de normas C-ITS. Teniendo en cuenta los objetivos de C-ITS, las comunicaciones entre vehículos deben ser fiables y eficientes. El objetivo de esta tesis es la evaluación del rendimiento y la eficiencia de las comunicaciones ITS-G5 para dar soporte a las aplicaciones de conducción cooperativa. La tesis incluye ocho artículos científicos en torno a tres áreas de investigación: evaluación del rendimiento de los protocolos de baliza ITS-G5; estudio del rendimiento de los mecanismos de control de la congestión ITS-G5; y estudio de de ataques de tipo Denial-of-Service (DoS) y sus métodos de detección. En primer lugar, se incluye una descripción general de los objetivos de estandarización actuales y futuros respecto a la conducción cooperativa C-ACC / platooning. Luego, como parte de la primera área de investigación, se demuestra a través de varios estudios, que el enfoque de baliza adaptativa donde la generación de mensajes está acoplada a la variación de velocidad de los ITS-s originadores, puede llevar a un efecto de sincronización de mensajes similar en el dominio del tiempo cuando los vehículos adaptan de manera cooperativa su velocidad. Así, se explica detalladamente la causa de este fenómeno y se estudia para una amplia gama de parámetros. En relación con el segundo problema, primero se estudia la influencia de diferentes configuraciones base del ITS-G5 en el consumo de combustible, demostrando que con una configuración adecuada se puede mejorar el ahorro de combustible. Después, se estudia el mecanismo de control de congestión definido por ITS-G5, que afectará el funcionamiento de todas las aplicaciones de C-ITS de conducción cooperativa ya que es un componente obligatorio, evaluando su influencia en el rendimiento de las aplicaciones, y dando recomendaciones de mejora. Finalmente, en el área de la última dirección de investigación, se proponen dos métodos de detección de DoS en tiempo real. La principal ventaja de las técnicas de detección presentadas es su corta fase de aprendizaje, que no excede de unos pocos segundos, y su bajo retraso de detección de unos pocos cientos de milisegundos. Bajo algunos supuestos, los algoritmos propuestos demuestran la capacidad de detectar ciertos tipos de ataques con alta probabilidad de detección.
Heursch, Arnd Christian. "Using standard operating systems for time critical applications with special emphasis on LINUX /." kostenfrei, 2006. http://nbn-resolving.de/urn:nbn:de:bvb:706-1856.
Full textRossi, Giorgia. "Optimised protocols for time-critical applications and internetworking in vehicular ad-hoc networks." Thesis, Imperial College London, 2017. http://hdl.handle.net/10044/1/56212.
Full textPease, Sarogini G. "A cross-layer middleware architecture for time and safety critical applications in MANETs." Thesis, Loughborough University, 2013. https://dspace.lboro.ac.uk/2134/13606.
Full textNEFFELLI, MARCO. "COVARIANCE MATRIX CONSTRUCTION AND ESTIMATION: CRITICAL ANALYSES AND EMPIRICAL CASES FOR PORTFOLIO APPLICATIONS." Doctoral thesis, Università degli studi di Genova, 2019. http://hdl.handle.net/11567/945803.
Full textHubbard, Jerry. "Postsecondary Instructor Attitudes Toward Tablet Use for Collaboration and Critical Thinking Development." ScholarWorks, 2017. https://scholarworks.waldenu.edu/dissertations/4143.
Full textBrown, Mark Anthony. "An investigation of three-dimensional displays for real-time, safety-critical command/control applications : with application to air traffic control." Thesis, Queen Mary, University of London, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.336445.
Full textCardany, John Paul. "Node to processor allocation for large grain data flow graphs in throughput-critical applications." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA283607.
Full textYao, Xudong. "Minimax methods for finding multiple saddle critical points in Banach spaces and their applications." Diss., Texas A&M University, 2004. http://hdl.handle.net/1969.1/2732.
Full textPowell, Thomas. "Understanding sub-critical water hydrolysis of proteins by mass : applications in proteomics and biorefining." Thesis, University of Birmingham, 2018. http://etheses.bham.ac.uk//id/eprint/8697/.
Full textChirindo, Tasimba Denford David. "An open vendor agnostic fog computing framework for mission critical and data dense applications." Master's thesis, Faculty of Engineering and the Built Environment, 2018. http://hdl.handle.net/11427/29984.
Full textOjdanic, Milos. "SYSTEMATIC LITERATURE REVIEW OF SAFETY-RELATED CHALLENGES FOR AUTONOMOUS SYSTEMS IN SAFETY-CRITICAL APPLICATIONS." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-43980.
Full textSanyal, Sourav. "Predicting Critical Warps in Near-Threshold GPGPU Applications Using a Dynamic Choke Point Analysis." DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7545.
Full textEnniss, Harris. "A Refined Saddle Point Theorem and Applications." Scholarship @ Claremont, 2012. https://scholarship.claremont.edu/hmc_theses/33.
Full textHahn, Klaus. "Critical investigation of the mobile information technology expert's perspective on the impact of the mobile application development within the German financial market and service industry." Thesis, Edinburgh Napier University, 2017. http://researchrepository.napier.ac.uk/Output/979068.
Full textCross, David M. "Usefulness of compile-time restructuring of large grain data flow programs in throughput-critical applications." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA274915.
Full textThesis advisor(s): Shridhar B. Shukla ; Amr Zaky. "September 1993." Cover title: Usefulness of ... of LGDF programs ... Includes bibliographical references. Also available online.