Dissertations / Theses on the topic 'Design pattern detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 31 dissertations / theses for your research on the topic 'Design pattern detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
SAEKI, Motoshi, Takashi KOBAYASHI, Ryota SAKAMOTO, Junya KATADA, and Shinpei HAYASHI. "Design Pattern Detection by Using Meta Patterns." Institute of Electronics, Information and Communication Engineers, 2008. http://hdl.handle.net/2237/14977.
Full textBinun, Alexander [Verfasser]. "High Accuracy Design Pattern Detection / Alexander Binun." Bonn : Universitäts- und Landesbibliothek Bonn, 2012. http://d-nb.info/1043911294/34.
Full textAlshira'H, Mohammad H. "Integrating user knowledge into design pattern detection." Thesis, University of Leicester, 2015. http://hdl.handle.net/2381/36232.
Full textZANONI, MARCO. "Data mining techniques for design pattern detection." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2012. http://hdl.handle.net/10281/31515.
Full textHatzipantelis, Eleftherios. "The design and implementation of a statistical pattern recognition system for induction machine condition monitoring." Thesis, University of Aberdeen, 1995. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU086061.
Full textMAGGIONI, STEFANO. "Design pattern detection and software architecture reconstruction: an integrated approach based on software micro-structures." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2010. http://hdl.handle.net/10281/7817.
Full textNikitina, Asya F. "Design and implementation of pattern recognition algorithms for the detection of chemicals with a microcantilever sensor array." abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1447605.
Full textManhaeve, Hans A. R. "Single pattern detection and identification of of CMOS transistor faults, requirements and methods : design and realisation of the OCIMU Iâ†Dâ†Dâ†Q monitor; single pattern CMOS transistor fault testing." Thesis, University of Hull, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.361497.
Full textKarvir, Hrishikesh. "Design and Validation of a Sensor Integration and Feature Fusion Test-Bed for Image-Based Pattern Recognition Applications." Wright State University / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=wright1291753291.
Full textAtojoko, Achimugu A. "Design and Modelling of Passive UHF RFID Tags for Energy Efficient Liquid Level Detection Applications. A study of various techniques in the design, modelling, optimisation and deployment of RFID reader and passive UHF RFID tags to achieve effective performance for liquid sensing applications." Thesis, University of Bradford, 2016. http://hdl.handle.net/10454/15906.
Full textMansutti, Giulia. "Analysis and design of innovative antenna systems for telecommunications and health applications." Doctoral thesis, Università degli studi di Padova, 2018. http://hdl.handle.net/11577/3421863.
Full textFadel, Mai. "Detecting opportunities for applying design patterns." Thesis, University of Exeter, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.441773.
Full textDESTEFANIS, GIUSEPPE. "Assessing sofware quality by micro patterns detection." Doctoral thesis, Università degli Studi di Cagliari, 2013. http://hdl.handle.net/11584/266243.
Full textClark, Christopher R. "Design of Efficient FPGA Circuits For Matching Complex Patterns in Network Intrusion Detection Systems." Thesis, Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5137.
Full textAl-Obeidallah, Mohammad. "A Multiple Level Detection Approach for design patterns recovery from object-oriented programs." Thesis, University of Brighton, 2018. https://research.brighton.ac.uk/en/studentTheses/1a15ad3e-fb7a-414d-b963-5e812dc3817a.
Full textLarsson, Edvin, and Jesper Hägglund. "Studying the Relation between Linguistic and Design Quality in RESTful APIs." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97696.
Full textSadia, Ahmad, and Osama Zarraa. "Are APIs with Poor Design Subject to Poor Lexicon? : A Google Perspective." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96846.
Full textMohamed, Mohamed Hassan Wahba Ayman. "Diagnostic des erreurs de conception dans les circuits digitaux : le cas des erreurs simples." Grenoble 1, 1997. http://www.theses.fr/1997GRE10086.
Full textur-Rehman, Fazal. "Design and development of detector modules for a highly compact and portable preclinical PET system." Elsevier, 2011. http://hdl.handle.net/1993/9592.
Full textSundblad, Graziella. "Building a low-cost IoT sensor system that recognizes behavioral patterns for collaborative learning - A Proof of Concept." Thesis, Malmö universitet, Institutionen för datavetenskap och medieteknik (DVMT), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-44351.
Full textBodnarova, Adriana. "Texture analysis for automatic visual inspection and flaw detection in textiles." Thesis, Queensland University of Technology, 2000.
Find full textJimenez, Willy. "Two complementary approaches to detecting vulnerabilities in C programs." Phd thesis, Institut National des Télécommunications, 2013. http://tel.archives-ouvertes.fr/tel-00939088.
Full textWang, Wei. "Design pattern detection in eiffel systems /." 2004.
Find full textTypescript. Includes bibliographical references (leaves 163-167). Also available on the Internet. MODE OF ACCESS via web browser by entering the following URL: http://gateway.proquest.com/openurl?url%5Fver=Z39.88-2004&res%5Fdat=xri:pqdiss &rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:MR11919
Chu, Hung-Yu, and 朱泓瑜. "Design of High-speed Parallel Matching System for Pattern Detection." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/04939866475514818573.
Full text國立中正大學
電機工程研究所
89
In this thesis, we put forward three different kinds of parallel processing architectures. As to the high-speed image detection, generally, there are either symmetric figures or those without complicated designs; e.g., designs whose figures comprise shapes such as circles, diamonds, triangles, etc. In the first design, we detect the number of the edge points at the round locus by adopting the method of pre-storing the image templates and working with the multi-processor architecture. In the second design, we demonstrate our ability to quickly spread the information at the edge points by employing a new detection method from the mesh-connected processor, and by working in broadcasting. Simplifying the processor element of the former design, we can enjoy wider aspect of application in the final design. In our designs, each processor element has been simplified so that only one adder or one comparator is required, consequently, easing modification it would be considerably easy. Time efficiency is considerably improved.
Su, Yanlin, and 蘇延麟. "Pipelined Pattern Matching Chip Design for Network Intrusion Detection and Prevention System." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/75270057616839466661.
Full text國立中正大學
電機工程研究所
99
The development of network is growing up quickly that accompanied by the many applications and many attacks. For the reason, it is necessary to establish the intrusion detection and prevention systems on the router or switch that can detect and prevent the network intrusions in the large scale institutions. If the speed of intrusion detection and prevention system is not faster than or equal to line rate, it is become to the bottleneck of network bandwidth. In this thesis, we proposed an intrusion detection and prevention system. It is a hardware software co-design implementation with NetFPGA and Snort. With this feature, it is high flexibility and high detection efficiency. The core of hardware architecture is the pipelined Bloom Filters with separation of rule sets, so it can be avoid the high density of rule spaces that reduce the accuracy of matching. In the practical design, we also implement the chip with ASIC flow. In the APR stage, it can run up to 495 MHz. Our proposed design can deal with the needs of high speed without the bottleneck of network bandwidth.
Peng, Szu-Yuan, and 彭思淵. "Design and Implementation of a Multi-Pattern Matching Circuit for Intrusion Detection Systems." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/85349675616572811987.
Full text國立海洋大學
電機工程學系
91
The main purpose of an intrusion detection system (IDS) is to monitor the traffics on the network, sniff out malicious activities, block attacks on the computers, and alert the system administrators when necessary. A well-known example of the IDS is Snort, a freeware which uses misuse detection to sense network intrusions. The detection is primarily based on pattern matching for the contents of the incoming packets. A match with any of the predetermined string patterns signifies a potential intrusion attempt. Pattern matching operations are highly CPU-bound and require a large amount of memory accesses. When the network traffic is heavy, a certain amount of packets are likely to elude the screening of Snort. To facilitate the pattern matching operations of an IDS, we propose in this thesis a multi-pattern matching hardware architecture. For performance considerations, we adopt the Aho-Corasick algorithm for pattern matching and use binary search to reduce memory references. The hardware is implemented with a VHDL-based FPGA design flow emphasizing design scalability and reusability. On our current FPGA platform, the circuit operates at a baud rate of 500 kByte/s, which is suitable for most ADSL applications. For high-speed network environments, our design allows easy multiplication into a parallel pattern-matching engine and will be able to provide performance enhancements required for a variety of applications.
Sanyal, Alodeep. "On detection, analysis and characterization of transient and parametric failures in nano-scale CMOS VLSI." 2010. https://scholarworks.umass.edu/dissertations/AAI3409842.
Full textChiou, Wei Han, and 邱暐瀚. "A Randomized Curve Detection Platform Based on Design Patterns." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/90915729065523999769.
Full text國立臺北科技大學
電腦通訊與控制研究所
88
Curve detection is an important research area in computer vision. In developing efficient and effective curve detection methods, it is necessary to conduct large numbers of experiments on randomly generated images. Such a process can be very tedious and time consuming. In this thesis, a platform for developing curve detection methods based on randomized Hough transform (RHT) is designed and implemented. The objective is to expedite the process of developing RHT-based curve detection methods. In so doing, we have made use of design patterns to create a framework that provides support for random image generation and result visualization. With this platform, developers can easily plug in new RHT-based methods and conduct experiments. To demonstrate this, two examples using RHT and coaxal transform are given.
Guo, JIN. "BUSINESS PROCESS RECOVERY USING UI DESIGN PATTERNS AND CLONE DETECTION IN BUSINESS PROCESSES." Thesis, 2008. http://hdl.handle.net/1974/1564.
Full textThesis (Master, Computing) -- Queen's University, 2008-10-28 11:06:31.41
Wu, Min-Nan, and 吳閔楠. "Design of a Parallel Processor System for High-speed Detection of Symmetric Patterns." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/34019074914080061026.
Full text國立中正大學
電機工程研究所
93
In this thesis, we propose three kinds of array processors that detect the vertical symmetry axis for patterns in the image. Based on the detected symmetry axis, the symmetric pattern can be further extracted. In the first design, we use two n-bit shift-registers to process n bits of input image data in one row, and connect the image data in the near-coincident positions of the two shift-registers to the two-input AND gates. By shifting the data of two shifter registers in two opposite directions, all the midpoints of edge-point pairs in the same row can be generated. To have a faster processor response, the second design links all the possible pairings of the row image data by the 2-input AND gates. It makes use of the hardwired-OR circuits to combine the AND-gate outputs for the same midpoint position through the ingenious IC layout placement. Thus, without costing too much chip area, we can acquire all the midpoints of the given row generated within one clock period. In the third design, we input the edge-point image data column by column (that is, pixel by pixel sequentially with respect to each row). By connecting the input shift-register of each row to another shift-register that shifts in the reverse direction, the encountering of all the edge-point pairs in the same row can be achieved. Though the hardwired-OR circuit combining the pairing AND gates, the alternating shifts of the two shift-registers sequentially generate the midpoints of all edge-pairs in each row. With the collection of midpoint information, our parallel circuits accumulate the midpoint count at each column position of the image. If the count value of a column position is greater than the given threshold, then this coordinate is taken as where the pattern’s vertical symmetry axis locates. Based on the location of detected symmetry axis, our system retrieves the image data of each corresponding two columns on two sides of the axis. And by taking some logical operations, the symmetric patterns can be extracted. In order to correctly evaluate the ease of layout placement, chip area, and the actual performance for the above array processors, we realize the major parts of our designs as IC chips. We adopt the TSMC 0.35μ Mixed Signal (2P4M) CMOS technology and the full custom design to implement the second and third array processor design. The IC layout and Hspice simulation of the second design have been complete and successful, while the fabricated chip of the third array processor design has been physically tested and verified to be successful. Keywords: Array Processor, Symmetry Axis, Symmetric Patterns , Parallel Processing
Lin, Chih-chuan, and 林之泉. "The Design of an Array Type Nasal Block Detector Based on The Pattern of Obstruction." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/81266372423614105671.
Full text國立成功大學
電機工程學系碩博士班
95
The aim of this thesis is to design a measurement system that can be used to quantify and store the situation of nasal obstruction. The condition of the nasal obstruction usually do not fit in with patients’ feelings, so there is a need to find an objective measurement method to inspect the condition of nasal obstruction quantitatively. It also helps doctors to understand patients’ nasal obstruction condition. There are many kinds of apparatuses to measure the condition of nasal obstruction, and most of the apparatuses measure the pressure or the flow rate of air in nasal cavity. In this study, we adopt the condenser microphone as the detecting component. The expiratory air will flow through the condenser microphones array. The data are processed and stored in the registers of 8051 single-chip, and then delivered to computer via the RS-232 interface. We can compare the previous saved data and the current measured data. Then we can assess whether the nasal obstruction has improved or not.