Dissertations / Theses on the topic 'Static tool'

To see the other types of publications on this topic, follow the link: Static tool.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Static tool.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Tao, Hongjing. "Static analyzer, a design tool for TROM." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape11/PQDD_0002/MQ44886.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Morgenthaler, John David. "Static analysis for a software transformation tool /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 1997. http://wwwlib.umi.com/cr/ucsd/fullcit?p9804509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Dutko, Adam M. "THE RELATIONAL DATABASE: A NEW STATIC ANALYSIS TOOL?" Cleveland State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=csu1313678735.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Baca, Dejan. "Automated static code analysis : A tool for early vulnerability detection." Licentiate thesis, Karlskrona : Department of Systems and Software Engineering, School of Engineering, Blekinge Institute of Technology, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-00429.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Eads, Joshua Michael. "EtherAnnotate: a transparent malware analysis tool for integrating dynamic and static examination." Diss., Rolla, Mo. : Missouri University of Science and Technology, 2010. http://scholarsmine.mst.edu/thesis/pdf/Eads_09007dcc807a2d75.pdf.

Full text
Abstract:
Thesis (M.S.)--Missouri University of Science and Technology, 2010.
Vita. The entire thesis text is included in file. Title from title screen of thesis/dissertation PDF file (viewed May 4, 2010) Includes bibliographical references (p. 65-68).
APA, Harvard, Vancouver, ISO, and other styles
6

Gustafson, Christopher, and Sam Florin. "Qualification of Tool for Static Code Analysis : Processes and Requirements for Approval of Static Code Analysis in the Aviation Industry." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277941.

Full text
Abstract:
In the aviation industry, the use of software development tools is not as easily adopted as in other industries. Due to the catastrophic consequences of software errors in airborne systems, software development processes has rigorous requirements. One of these requirements is that a code standard must be followed. Code standards are used to exclude code constructions which could result in unwanted behaviours. The process of manually ensuring a specific code standard can be costly. This process could be automated by a tool for static code analysis, however, this requires a formal qualification. This thesis evaluates the process of qualifying a tool for static code analysis in accordance with the requirements of the major aviation authorities EASA and FAA. To describe the qualification process, a literature study was conducted. To further explain how an existing tool could be put through the qualification process, a case study of the existing tool Parasoft C/C++ test was conducted. The results of the literature study show what processes must be completed in order to qualify a static code analysis tool. Importantly, the study shows that no requirements are put on the development process of the tool. This was an important takeaway as it meant that an existing tool could be qualified without any additional data from the developer of the tool. The case study of Parasoft C/C++ test showed how the tool could be configured and verified to analyze code in accordance with a small set of code rules. Furthermore, three documents including qualification data were produced showing how the qualification process should be documented in order to communicate the process to an authority. The results of the thesis do not provide the full picture of how a tool could be qualified as the software, in which the tool is used, is considerations the are specific to the software the tool is used to develop still need to be taken into consideration. The thesis does, however, provide guidance on the majority of the applicable requirements. Future research could be done to provide the complete picture of the qualification process, as well as how the process would look like for other types of tools.
Inom flygindustrin är användandet av olika programmeringsverktyg inte lika självklart som inom andra industrier. På grund av de katastrofala konsekvenser som fel i mjukvaran i ett flygplan kan resultera i finns det rigorösa krav på mjukvaruutvecklingsprocessen. Ett av dessa krav är att en viss kodstandard måste upprätthållas. Kodstandarder används för att exkludera vissa strukturer i kod som kan leda till oönskat beteende. Upprätthållandet av en viss kodstandard är en långdragen process att genomföra manuellt, och kan därför automatiseras med hjälp av ett statiskt kodanalysverktyg. För att kunna använda ett sådant verktyg behövs däremot en formell verktygskvalificering. I denna uppsats kommer kvalificeringsprocessen av ett verktyg för statisk kodanalys att evalueras enligt de krav som de två stora flygmyndigheterna EASA och FAA ställer. För att förklara processen av att kvalificera ett sådant verktyg gjordes en litteraturstudie följt av en fallstudie av det existerande verktyget Parasoft C/C++ test. Resultaten av litteraturstudien beskriver de olika processerna som måste genomföras för att kvalificera ett statiskt kodanalysverktyg. Noterbart är att resultaten visar att inga krav ställs på utvecklingsprocessen av verktyget själv. Detta betyder att ett existerande kommersiellt verktyg kan kvalificeras utan att verktygsutvecklarna själva behöver bidra med extra information. Fallstudien visade hur verktyget Parasoft C/C++ test kan konfigureras och verifieras att följa en viss kodstandard. Vidare resulterade fallstudien i utkast av de nödvändiga dokumenten som behöver produceras för att kommunicera kvalificeringsprocessen till en myndighet. De resultat som presenteras i denna uppsats är i sig inte tillräckliga för beskriva hela kvalificeringsprocessen. Ytterligare överväganden som är specifika till den mjukvaran som verktyget ska användas till att utveckla måste göras för att en komplett kvalificering ska kunna genomföras. Uppsatsen bidrar däremot med riktlinjer och vägledning av majoriteten av de processerna som behöver genomföras. Ytterligare forskning kan göras för att bidra med den kompletta bilden av verktygskvalificering av ett statiskt kodanalysverktyg, samt hur kvalificering kan göras av andra typer av verktyg.
APA, Harvard, Vancouver, ISO, and other styles
7

Al, Awadi Wali. "An Assessment of Static and Dynamic malware analysis techniques for the android platform." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2015. https://ro.ecu.edu.au/theses/1635.

Full text
Abstract:
With Smartphones becoming an increasingly important part of human life, the security of these devices is very much at stake. The versatility of these phones and their associated applications has fostered an increasing number of mobile malware attacks. The purpose of the research was to answer the following research questions: 1. What are the existing methods for analysing mobile malware? 2. How can methods for analysing mobile malware be evaluated? 3. What would comprise a suitable test bed(s) for analysing mobile malware? The research analyses and compares the various tools and methods available for compromising the Android OS and observing the malware activity before and after its installation onto an Android emulator. Among several available tools and methods, the approach made use of online scanning engines to perform pre installation of mobile malware analysis and the AppUse (Android Pentest Platform Unified Standalone Environment) tool to perform post installation. Both the above approaches facilitate better analysis of mobile malware before and after being installed onto the mobile device. This is because, with malware being the root cause of many security breaches, the developed mobile malware analysis allows future security practitioners in this field to determine if newly developed applications are malicious and, if so, what would their effect be on the target. In addition, the AppUse tool can allow security practitioners to first establish the behaviour of post installed malware infections onto the Android emulator then be able to effectively eliminate malware from individual systems as well as the Google Play Store. Moreover, mobile malware analysis can help with a successful incident response, assisting with mitigating the loss of intellectual property, personal information as well as other critical private data. It can strive to limit the damage of a security breach or to reduce the scope of damage of an attack. The basic structure of the research work began with a dynamic analysis, followed by a static analysis: a) Mobile malware were collected and downloaded from the Contagio website to compromise an Android emulator, b) Mobile malware were uploaded onto five online scanning engines for dynamic analysis to perform pre installation analysis, and c) AppUse tool was implemented and used for static analysis to perform post installation analysis by making use of its: a. Android emulator and, b. JD-GUI and Dex2Jar tools. The findings were that the AppUse methodology used in the research was successful but the outcome was not as anticipated. This was because the installed malicious applications on the Android emulator did not generate the derived behavioural reports; instead, only manifest files in xml format. To overcome this issue, JD-GUI and Dex2Jar tools were used to manually generate the analysis results from the Android emulator to analyse malware behaviour. The key contribution of this research work is the proposal of a dynamic pre-installation and a static post-installation analysis of ten distinct Android malware samples. To our knowledge, no research has been conducted on post installation of mobile malware analysis and this is the first research that uses the AppUse tool for mobile malware analysis.
APA, Harvard, Vancouver, ISO, and other styles
8

Woods, Brian Keith. "Development of an active pulsed radar receiver for a mono-static borehole-radar tool." Thesis, Stellenbosch : University of Stellenbosch, 2003. http://hdl.handle.net/10019.1/2512.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Silva, Antonio Carlos Fernandes da. "ChipCflow: tool for convert C code in a static dataflow architecture in reconfigurable hardware." Universidade de São Paulo, 2015. http://www.teses.usp.br/teses/disponiveis/55/55134/tde-30062015-141638/.

Full text
Abstract:
A growing search for alternative architectures and softwares have been noted in the last years. This search happens due to the advance of hardware technology and such advances must be complemented by innovations on design methodologies, test and verification techniques in order to use technology effectively. Alternative architectures and softwares, in general, explores the parallelism of applications, differently to Von Neumann model. Among high performance alternative architectures, there is the Dataflow Architecture. In this kind of architecture, the process of program execution is determined by data availability, thus the parallelism is intrinsic in these systems. The dataflow architectures become again a highlighted search area due to hardware advances, in particular, the advances of Reconfigurable Computing and Field Programmable Gate Arrays (FPGAs). ChipCflow projet is a tool for execution of algorithms using dynamic dataflow graph in FPGA. In this thesis, the development of a code conversion tool to generate aplications in a static dataflow architecture, is described. Also the ChipCflow project where the code conversion tool is part, is presented. The specification of algorithm to be converted is made in C language and converted to a hadware description language, respecting the proposed by ChipCflow project. The results are the proof of concept of converting a high-level language code for dataflow architecture to be used into a FPGA.
Existe uma crescente busca por softwares e arquiteturas alternativas. Essa busca acontece pois houveram avanços na tecnologia do hardware, e estes avanços devem ser complementados por inovações nas metodologias de projetos, testes e verificação para que haja um uso eficaz da tecnologia. Os software e arquiteturas alternativas, geralmente são modelos que exploram o paralelismo das aplicações, ao contrário do modelo de Von Neumann. Dentre as arquiteturas alternativas de alto desempenho, tem-se a arquitetura a fluxo de dados. Nesse tipo de arquitetura, o processo de execução de programas é determinado pela disponibilidade dos dados, logo o paralelismo está embutido na própria natureza do sistema. O modelo a fluxo de dados possui a vantagem de expressar o paralelismo de maneira intrínseca, eliminando a necessidade do programador explicitar em seu código os trechos onde deve haver paralelismo. As arquiteturas a fluxo de dados voltaram a ser uma área de pesquisa devido aos avanços do hardware, em particular, os avanços da Computação Reconfigurável e dos Field Programmable Gate Arrays (FPGAs).Nesta tese é descrita uma ferramenta de conversão de código que visa a geração de aplicações utilizando uma arquitetura a fluxo de dados estática. Também é descrito o projeto ChipCflow, cuja ferramenta de conversão de código, descrita nesta tese, é parte integrante. A especificação do algoritmo a ser convertido é feita em linguagem C e convertida para uma linguagem de descrição de hardware, respeitando o modelo proposto pelo ChipCflow. Os resultados alcançados visam a prova de conceito da conversão de código de uma linguagem de alto nível para uma arquitetura a fluxo de dados a ser configurada em FPGA.
APA, Harvard, Vancouver, ISO, and other styles
10

Hubert, Laurent. "Foundations and implementation of a tool bench for static analysis of Java bytecode programs." Rennes 1, 2010. http://www.theses.fr/2010REN1S122.

Full text
Abstract:
In this thesis we study the static analysis of Java bytecode and its semantics foundations. The initialization of an information system is a delicate operation where security properties are enforced and invariants installed. Initialization of fields, objects and classes in Java are difficult operations. These difficulties may lead to security breaches and to bugs, and make the static verification of software more difficult. This thesis proposes static analyses to better master initialization in Java. Hence, we propose a null pointer analysis that finely tracks initialization of fields. It allows proving the absence of dereferencing of null pointers (NullPointerException) and refining the intra-procedural control flow graph. We present another analysis to refine the inter-procedural control flow due to class initialization. This analysis directly allows inferring more precise information about static fields. Finally, we propose a type system that allows enforcer secure object initialization, hence offering a sound and automatic solution to a known security issue. We formalize these analyses, their semantic foundations, and prove their soundness. Furthermore, we also provide implementations. We developed several tools from our analyses, with a strong focus at having sound but also efficient tools. To ease the adaptation of such analyses, which have been formalized on idealized languages, to the full-featured Java bytecode, we have developed a library that have been made available to the community and is now used in other research labs across Europe
Dans cette thèse, nous nous intéressons à l’analyse statique du bytecode Java. L’initialisation d’un système d’information est une phase délicate où des propriétés de sécurité sont vérifiées et des invariants installés. L’initialisation en Java pose des difficultés, que ce soit pour les champs, les objets ou les classes. De ces difficultés peuvent résulter des failles de sécurité, des erreurs d’exécution (bugs), ou une plus grande difficulté à valider statiquement ces logiciels. Cette thèse propose des analyses statiques répondant aux problèmes d’initialisation de champs, d’objets et de classes. Ainsi, nous décrivons une analyse de pointeurs nuls qui suit finement l’initialisation des champs et permet de prouver l’absence d’exception de pointeur nuls (NullPointerException) et de raffiner le graphe de flot de contrôle intra-procédural. Nous proposons aussi une analyse pour raffiner le graphe de flot de contrôle inter-procédural liée à l’initialisation de classe et permettant de modéliser plus finement le contenu des champs statiques. Enfin, nous proposons un système de type permettant de garantir que les objets manipulés sont complètement initialisés, et offrant ainsi une solution formelle et automatique à un problème de sécurité connu. Les fondations sémantiques de ces analyses sont données. Les analyses sont décrites formellement et prouvées correctes. Pour pouvoir adapter ces analyses, formalisées sur de petits langages, au bytecode, nous avons développé une bibliothèque logicielle. Elle nous a permis de produire des prototypes efficaces gérant l’intégralité du bytecode Java
APA, Harvard, Vancouver, ISO, and other styles
11

Gebhard, Gernot [Verfasser], and Reinhard [Akademischer Betreuer] Wilhelm. "Static timing analysis tool validation in the presence of timing anomalies / Gernot Gebhard. Betreuer: Reinhard Wilhelm." Saarbrücken : Saarländische Universitäts- und Landesbibliothek, 2013. http://d-nb.info/1053679947/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Skoglund, Björn. "Code profiling as a design tool for application specific instruction sets." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-8585.

Full text
Abstract:

As the embedded devices has become more and more generalized and as their product cycles keeps shrinking the field has opened up for the Application Specific Instruction set Processor. A mix between the classic generalized microcontroller and the specialized ASIC the ASIP keeps a set of general processing instructions for executing embedded software but combines that with a set of heavily specialized instructions for speeding up the data intense application core algorithms. One important aspect of the ASIP design flow

research is cutting design time and cost. One way of that is automation of the instruction set design. In order to do so a process is needed where the algorithm to be ASIPed is analyzed and critical operations are found and exposed so that they can be implemented in special hardware. This process is called profiling. This thesis describes an implementation of a fine grained source code profiler for use in an ASIP design flow. The profiler software is based on a static-dynamic workflow where data is assembled from both static

analysis and dynamic execution of the program and then analyzed together in an specially made analysis software.

APA, Harvard, Vancouver, ISO, and other styles
13

Hameed, Muhammad Muzaffar, and Muhammad Zeeshan ul Haq. "DefectoFix : An interactive defect fix logging tool." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5268.

Full text
Abstract:
Despite the large efforts made during the development phase to produce fault free system, most of the software implementations still require the testing of entire system. The main problem in the software testing is the automation that could verify the system without manual intervention. Recent work in software testing is related to the automated fault injection by using fault models from repository. This requires a lot of efforts, which adds to the complexity of the system. To solve this issue, this thesis suggests DefectoFix framework. DefectoFix is an interactive defect fix logging tools that contains five components namely Version Control Sysem (VCS), source code files, differencing algorithm, Defect Fix Model (DFM) creation and additional information (project name, class name, file name, revision number, diff model). The proposed differencing algorithm extracts detailed information by detecting differences in source code files. This algorithm performs comparison at sub-tree levels of source code files. The extracted differences with additional information are stored as DFM in repository. DFM(s) can later be used for the automated fault injection process. The validation of DefectoFix framework is performed by a tool developed using Ruby programming language. Our case study confirms that the proposed framework generates a correct DFM and is useful in automated fault injection and software validation activities.
APA, Harvard, Vancouver, ISO, and other styles
14

Al-Kassar, Feras. "Testability Tarpits - Navigating the Challenges of Static Tools in Web Applications." Electronic Thesis or Diss., Sorbonne université, 2023. http://www.theses.fr/2023SORUS675.

Full text
Abstract:
L'objectif de cette thèse était d'évaluer l'efficacité d'une combinaison de scanners de sécurité commerciaux et open source. Grâce à l'expérimentation, nous avons identifié divers modèles de code qui entravent la capacité des outils de pointe à analyser les projets. En détectant ces modèles au cours du cycle de développement des logiciels, notre approche peut offrir aux développeurs un retour d'information précieux sur la testabilité de leur code. En outre, elle leur permet d'évaluer plus précisément le risque résiduel que leur code puisse encore contenir des vulnérabilités, même si les analyseurs statiques ne font état d'aucune découverte. Notre approche suggère également des méthodes alternatives pour transformer le code et améliorer sa testabilité pour SAST
The goal of this thesis was to evaluate the effectiveness of a combination of commercial and open source security scanners. Through experimentation, we identified various code patterns that hinder the ability of state-of-the-art tools to analyze projects. By detecting these patterns during the software development lifecycle, our approach can offer valuable feedback to developers regarding the testability of their code. Additionally, it enables them to more accurately evaluate the residual risk that their code might still contain vulnerabilities, even if static analyzers report no findings. Our approach also suggests alternative methods to transform the code and enhance its testability for SAST
APA, Harvard, Vancouver, ISO, and other styles
15

Wicks, John A. "An efficiency rating tool for process-level VHDL behavioral models." Diss., This resource online, 1996. http://scholar.lib.vt.edu/theses/available/etd-06062008-151205/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Lerner, Harry 1969. "Static types to dynamic variables : re-assessing the methods of prehistoric Huron chipped stone tool documentation and analysis in Ontario." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33298.

Full text
Abstract:
An assemblage of prehistoric Huron chipped stone tools has been analyzed in terms of its inherently dynamic properties. It is hypothesized that the series of measurements and ratios that has been developed is more efficient than existing systems for gauging the changing nature of these implements over time. The statistical evaluation of the data revealed strong linear relationships between various pairs of variables, such as projectile point length and tip angle and end scraper bit edge angles and bit height. It was found that comparing these data to other attributes of these tools, such as use-wear traces and reduction techniques, can be very informative about how each category of tools changed through manufacture, use, and maintenance. The results of this analysis were then compared to those of a more traditional study of a contemporaneous collection of Huron stone tools (Poulton, 1985), demonstrating the utility of the techniques developed.
APA, Harvard, Vancouver, ISO, and other styles
17

Szipka, Károly. "Prediction of the machine tool errors under quasi-static load : Developing methodology through the synthesis of bottom-up and top-down modeling approach." Thesis, KTH, Industriell produktion, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186143.

Full text
Abstract:
One of the biggest challenges in the manufacturing industry is to increase the understanding of the sources of the errors and their effects on machining systems accuracy. In this thesis a new robust empirical evaluation method is developed to predict the machine tool errors under quasi-static load including the effect of the variation of stiffness in the workspace, the geometric and the kinematic errors. These errors are described through combined computational models for a more accurate assessment of the machine tool’s capability. The purpose of this thesis is to establish such methodology through the synthesis of the bottom-up and the top-down modeling approach, which consists the combination of the direct (single axis measurements by laser interferometer) and indirect (multi-axis measurements by loaded double ball-bar) measurement technics. The bottom-up modeling method with the direct measurement was applied to predict the effects of the geometric and kinematic errors in the workspace of a machine tool. The top-down modeling method with the indirect measurement was employed to evaluate the variation of the static stiffness in the workspace of a machine tool. The thesis presents a case study demonstrating the applicability of the proposed approach. The evaluation technic extended for machine tools with various kinematic structures. The methodology was implemented on a three and a five axis machine tool and the results expose the potential of the approach.
APA, Harvard, Vancouver, ISO, and other styles
18

Laspas, Theodoros. "Closed Force Loop Evaluation of Machining Systems." Licentiate thesis, KTH, Maskin- och processteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-227664.

Full text
Abstract:
Machine tools accuracy has been a cornerstone in defining machining system capability and directly affecting dimensional and geometrical tolerance of machined parts. The effort for achieving higher precision and accuracy can be distinguished in two general ideas. One is to improve performance of machine tools by designing better, stiffer and more accurate machine tools. The other is to develop tools and methods for evaluating and measuring their behaviour and gain knowledge of their performance. In order to properly control the machine tool characteristics that can affect and improve their accuracy such as static stiffness and static accuracy.This thesis is aiming at establishing and further advancing the idea of loaded testing of machining systems and the concept of Elastically Linked Systems as a framework for measuring, identifying and characterising quasi-static stiffness of machine tools under loaded conditions. This will allow the creation of an improved capability profile of machining system accuracy. The focus is on the implementation of Elastically Linked Systems concept (ELS) through the Loaded Double Bar system, a measurement method that can partly simulate the process-machine interaction by reproducing forces exerted on the machine tool structure for the evaluation of system characteristics under loaded condition. This allows the qualitative and quantitative evaluation and comparison of machine tools for the purpose of accuracy enhancement, identification of weak directions with potential utilization in process planning, machine procurement and maintenance.Through two case studies, the capability to identify the effect of machine components and structure behaviour is shown.

QC 20180514

APA, Harvard, Vancouver, ISO, and other styles
19

Zarinkhail, Mohammad Shuaib. "Static MySQL Error Checking." University of the Western Cape, 2010. http://hdl.handle.net/11394/8492.

Full text
Abstract:
Masters of Science
Coders of databases repeatedly face the problem of checking their Structured Query Language (SQL) code. Instructors face the difficulty of checking student projects and lab assignments in database courses. We collect and categorize common MySQL programming errors into three groups: data definition errors, data manipulation errors, and transaction control errors. We build these into a comprehensive list of MySQL errors, which novices are inclined make during database programming. We collected our list of common MySQL errors both from the technical literature and directly by noting errors made in assignments handed in by students. In the results section of this research, we check and summarize occurrences of these errors based on three characteristics as semantics, syntax, and logic. These data form the basis of a future static MySQL checker that will eventually assist database coders to correct their code automatically. These errors also form a useful checklist to guide students away from the mistakes that they are prone to make.
APA, Harvard, Vancouver, ISO, and other styles
20

Král, Benjamin. "Forenzní analýza malware." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385910.

Full text
Abstract:
This master's thesis describes methodologies used in malware forensic analysis including methods used in static and dynamic analysis. Based on those methods a tool intended to be used by Computer Security Incident Response Teams (CSIRT) is designed to allow fast analysis and decisions regarding malware samples in security incident investigations. The design of this tool is thorougly described in the work along with the tool's requirements on which the tool design is based on. Based on the design a ForensIRT tool is implemented and then used to analyze a malware sample Cridex to demonstrate its capabilities. Finally the analysis results are compared to those of other comparable available malware forensics tools.
APA, Harvard, Vancouver, ISO, and other styles
21

Hellström, Patrik. "Tools for static code analysis: A survey." Thesis, Linköping University, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-16658.

Full text
Abstract:

This thesis has investigated what different tools for static code analysis, with anemphasis on security, there exist and which of these that possibly could be used in a project at Ericsson AB in Linköping in which a HIGA (Home IMS Gateway) is constructed. The HIGA is a residential gateway that opens up for the possibility to extend an operator’s Internet Multimedia Subsystem (IMS) all the way to the user’s home and thereby let the end user connect his/her non compliant IMS devices, such as a media server, to an IMS network.

Static analysis is the process of examining the source code of a program and in that way test a program for various weaknesses without having to actually execute it (compared to dynamic analysis such as testing).

As a complement to the regular testing, that today is being performed in the HIGA project, four different static analysis tools were evaluated to find out which one was best suited for use in the HIGA project. Two of them were open source tools and two were commercial.

All of the tools were evaluated in five different areas: documentation, installation & integration procedure, usability, performance and types of bugs found. Furthermore all of the tools were later on used to perform testing of two modules of the HIGA.

The evaluation showed many differences between the tools in all areas and not surprisingly the two open source tools turned out to be far less mature than the commercial ones. The tools that were best suited for use in the HIGA project were Fortify SCA and Flawfinder.

As far as the evaluation of the HIGA code is concerned some different bugs which could have jeopardized security and availability of the services provided by it were found.

APA, Harvard, Vancouver, ISO, and other styles
22

Lekeš, Petr. "Návrh a optimalizace tělesa vřeteníku pro obráběcí stroj." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2021. http://www.nusl.cz/ntk/nusl-444267.

Full text
Abstract:
This diploma thesis deals with the design and optimization of a headstock for machine tool. Thesis was focused to comparison of several types of slide-ways and linear guides of headstock, considering their static and dynamic rigidity. An overview in the field of machine tools, their static and dynamic properties, use materials and design of headstocks, considering types of guideways, types of guideways drives and types of drives of spindle was made. Among the other main goals is included design of several types of guideway of headstock for horizontal machine tool, elaboration of computational models and evaluation of results.
APA, Harvard, Vancouver, ISO, and other styles
23

Königsson, Niklas. "Limitations of static analysis tools : An evaluation of open source tools for C." Thesis, Umeå universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-155299.

Full text
Abstract:
This paper contains an evaluation of common open source static analysistools available for C. The tools algorithms are examined and measured in a test environment designed for such benchmarks to present their strengths and weaknesses. The examined tools represent different approaches to static analysis to get a good coverage of the algorithms that are commonly used. The test environment shows how many bugs that are correctly reportedby the tools, and also how many falsely reported bug they produce. The revealed strengths and weaknesses are discussed in relation to the tools algorithms to gain a deeper understanding of their limitations.
APA, Harvard, Vancouver, ISO, and other styles
24

Homdim, Tchuenteu Joel Landry. "Analysis and dynamic modeling of intermediate distributors for balancing of production lines." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/18626/.

Full text
Abstract:
The work carried out at the company Pulsar Engineering s.r.l, and discussed in this thesis, focuses on the construction of a model for the dynamic simulation of the operations of a machine that allows feeding and sorting/merging in the tissue sector called REDS INTERMEDIATE. The goal is to derive a powerful dynamic model that can simulate a large range of REDS intermediate that could work in different existing operating modes (DIVERTER, COMBINER and By-pass modes) and containing all existing operating strategies (REVOLVER and TETRIS strategies). This was possible with the aid of a powerful simulation tool called PLS DYNAMIC/ TISSUEPLS DYNAMIC. It is important to emphasize that we will deal with a simplified production line since we are interested in just getting the REDS INTERMEDIATE model. This model can be used to: - Obtain a real estimate of the parameters necessary for the design of a production line. - See the behaviour of the PULSAR line in a 2D and 3D interface proposed by the software. The following discussion reports the study in question presenting some result, starting from a general description of the production lines, and a static analysis of the REDS INTERMEDIATE.
APA, Harvard, Vancouver, ISO, and other styles
25

Ecorchard, Gaël. "Static accuracy enhancement of redundantly actuated parallel kinematic machine tools." [Auerbach/Vogtl.] Verl. Wiss. Scripten, 2010. http://d-nb.info/1000285359/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Ecorchard, Gaël. "Static Accuracy Enhancement of Redundantly Actuated Parallel Kinematic Machine Tools." Doctoral thesis, Universitätsbibliothek Chemnitz, 2010. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200902064.

Full text
Abstract:
Redundant parallel kinematic machines are parallel mechanisms to which one or more kinematic branch is added in order to improve their mechanical properties, in particular, their stiffness. Redundant parallel kinematic machines have then more actuators than their degree of freedom. New calibration methods are developed in this thesis in order to deal with the particularities related to the actuation redundancy. First, calibration methods using geometrical models are tested. Several measurement systems and control models are compared. A self-calibration is also carried out, where the redundant branches are switched to a passive mode. Thus, they play the role of the measurement system and the mechanism can be calibrated without the help of extra sensors. Geometrical calibration methods, however, do not take into account the internal constraints due to the redundancy. Elastic deformations are neglected although they are shown to have an influence on the positioning accuracy after the calibration. Modeling methods are then developed that take into account the geometry of the mechanism as well as the stiffness of its elements to improve the accuracy of the calibration. With such modeling methods, it is possible to determine the tool-center-point position for redundantly actuated parallel mechanisms from geometrical and stiffness parameters and given positions for all actuators. The modeling methods are first demonstrated on a simple mechanism. They are then tested on a real machine and used in calibration processes
Mechanismen mit redundanter Parallelkinematik sind Parallelmechanismen, denen eine oder mehrere kinematische Ketten zugefügt werden, um die mechanischen Eigenschaften, insbesondere die Steifigkeit, zu verbessern. Maschinen mit redundanter Parallelkinematik besitzen dann mehr Antriebe als ihr Freiheitsgrad erfordern würde. In dieser Dissertation werden neue Kalibrierungsmethoden entwickelt, um die mit der Antriebsredundanz gebundenen Besonderheiten zu betrachten. Zuerst werden Kalibrierungsmethoden basierend auf geometrischen Modellen getestet. Verschiedene Messmethoden und Messsysteme werden verglichen. Eine Selbstkalibrierung wird durchgeführt. Bei dieser Kalibrierungsmethode werden die redundanten Antriebe freigeschaltet und als Messsystem genutzt. Die Maschine kann dadurch ohne externes Messsystem kalibriert werden. Dennoch betrachten geometrische Kalibrierungsmethode keine internen Verspannungen, die mit der Redundanz verbunden sind. Die elastischen Verformungen werden vernachlässigt, obwohl gezeigt wird, dass sie einen Einfluss auf die Positioniergenauigkeit nach der Kalibrierung haben. Es werden deshalb Modellierungsmethoden entwickelt, die sowohl die Geometrie des Mechanismus als auch die Elementsteifigkeit betrachten, um die Genauigkeit der Kalibrierung zu verbessern. Mit solchen Methoden ist es möglich, die Werkzeugposition redundanter Parallelkinematiken aus den Geometrie- und Steifigkeitsparametern und allen Antriebspositionen zu bestimmen. Die Modellierungsmethoden werden zuerst an einem einfachen Mechanismus angewandt. Sie werden danach an einer realen Maschine getestet und in einem Kalibrierungsprozess genutzt
Les mécanismes à cinématique parallèle redondante sont des mécanismes parallèles auxquels a été ajoutée une branche cinématique, ou plus, dans le but d'améliorer leurs propriétés mécaniques, en particulier, leur rigidité. Les mécanismes à cinématique parallèle redondante possèdent donc plus d'actionneurs que leur degré de liberté. De nouvelles méthodes d'étalonnage sont développées dans cette thèse afin de prendre en compte les spécificités liées à la redondance d'actionnement. Les méthodes d'étalonnage utilisant des modèles géométriques sont d'abord testées. Plusieurs systèmes de mesure et plusieurs modèles de contrôle sont comparés. Un auto-étalonnage est aussi réalisé. Pour cette méthode d'étalonnage, les actionneurs redondants sont mis en mode passif et jouent le rôle de système de mesure. Le mécanisme peut être étalonné sans ajout de codeurs. Cependant, les méthodes d'étalonnage géométriques ne prennent pas en compte les contraintes internes liées à la redondance. Les déformations élastiques sont négligées bien qu'il soit montré qu'elles ont une influence sur la précision de positionnement après étalonnage. Des méthodes de modélisation qui prennent en compte la géométrie du mécanisme ainsi que la rigidité des éléments sont donc développées pour améliorer la précision de l'étalonnage. Avec de telles méthodes, il est possible de déterminer la position de l'outil des mécanismes à redondance d'actionnement à partir de paramètres géométriques et élastiques et de la position de tous les actionneurs. Les méthodes de modélisation sont d'abord appliquées sur un mécanisme simple. Elles sont ensuite testées sur une machine réelle et utilisées dans des processus d'étalonnage
APA, Harvard, Vancouver, ISO, and other styles
27

Ecorchard, Gaël. "Static Accuracy Enhancement of Redundantly Actuated Parallel Kinematic Machine Tools." Doctoral thesis, Verlag Wissenschaftliche Scripten, Zwickau, 2008. https://monarch.qucosa.de/id/qucosa%3A19252.

Full text
Abstract:
Redundant parallel kinematic machines are parallel mechanisms to which one or more kinematic branch is added in order to improve their mechanical properties, in particular, their stiffness. Redundant parallel kinematic machines have then more actuators than their degree of freedom. New calibration methods are developed in this thesis in order to deal with the particularities related to the actuation redundancy. First, calibration methods using geometrical models are tested. Several measurement systems and control models are compared. A self-calibration is also carried out, where the redundant branches are switched to a passive mode. Thus, they play the role of the measurement system and the mechanism can be calibrated without the help of extra sensors. Geometrical calibration methods, however, do not take into account the internal constraints due to the redundancy. Elastic deformations are neglected although they are shown to have an influence on the positioning accuracy after the calibration. Modeling methods are then developed that take into account the geometry of the mechanism as well as the stiffness of its elements to improve the accuracy of the calibration. With such modeling methods, it is possible to determine the tool-center-point position for redundantly actuated parallel mechanisms from geometrical and stiffness parameters and given positions for all actuators. The modeling methods are first demonstrated on a simple mechanism. They are then tested on a real machine and used in calibration processes.
Mechanismen mit redundanter Parallelkinematik sind Parallelmechanismen, denen eine oder mehrere kinematische Ketten zugefügt werden, um die mechanischen Eigenschaften, insbesondere die Steifigkeit, zu verbessern. Maschinen mit redundanter Parallelkinematik besitzen dann mehr Antriebe als ihr Freiheitsgrad erfordern würde. In dieser Dissertation werden neue Kalibrierungsmethoden entwickelt, um die mit der Antriebsredundanz gebundenen Besonderheiten zu betrachten. Zuerst werden Kalibrierungsmethoden basierend auf geometrischen Modellen getestet. Verschiedene Messmethoden und Messsysteme werden verglichen. Eine Selbstkalibrierung wird durchgeführt. Bei dieser Kalibrierungsmethode werden die redundanten Antriebe freigeschaltet und als Messsystem genutzt. Die Maschine kann dadurch ohne externes Messsystem kalibriert werden. Dennoch betrachten geometrische Kalibrierungsmethode keine internen Verspannungen, die mit der Redundanz verbunden sind. Die elastischen Verformungen werden vernachlässigt, obwohl gezeigt wird, dass sie einen Einfluss auf die Positioniergenauigkeit nach der Kalibrierung haben. Es werden deshalb Modellierungsmethoden entwickelt, die sowohl die Geometrie des Mechanismus als auch die Elementsteifigkeit betrachten, um die Genauigkeit der Kalibrierung zu verbessern. Mit solchen Methoden ist es möglich, die Werkzeugposition redundanter Parallelkinematiken aus den Geometrie- und Steifigkeitsparametern und allen Antriebspositionen zu bestimmen. Die Modellierungsmethoden werden zuerst an einem einfachen Mechanismus angewandt. Sie werden danach an einer realen Maschine getestet und in einem Kalibrierungsprozess genutzt
Les mécanismes à cinématique parallèle redondante sont des mécanismes parallèles auxquels a été ajoutée une branche cinématique, ou plus, dans le but d'améliorer leurs propriétés mécaniques, en particulier, leur rigidité. Les mécanismes à cinématique parallèle redondante possèdent donc plus d'actionneurs que leur degré de liberté. De nouvelles méthodes d'étalonnage sont développées dans cette thèse afin de prendre en compte les spécificités liées à la redondance d'actionnement. Les méthodes d'étalonnage utilisant des modèles géométriques sont d'abord testées. Plusieurs systèmes de mesure et plusieurs modèles de contrôle sont comparés. Un auto-étalonnage est aussi réalisé. Pour cette méthode d'étalonnage, les actionneurs redondants sont mis en mode passif et jouent le rôle de système de mesure. Le mécanisme peut être étalonné sans ajout de codeurs. Cependant, les méthodes d'étalonnage géométriques ne prennent pas en compte les contraintes internes liées à la redondance. Les déformations élastiques sont négligées bien qu'il soit montré qu'elles ont une influence sur la précision de positionnement après étalonnage. Des méthodes de modélisation qui prennent en compte la géométrie du mécanisme ainsi que la rigidité des éléments sont donc développées pour améliorer la précision de l'étalonnage. Avec de telles méthodes, il est possible de déterminer la position de l'outil des mécanismes à redondance d'actionnement à partir de paramètres géométriques et élastiques et de la position de tous les actionneurs. Les méthodes de modélisation sont d'abord appliquées sur un mécanisme simple. Elles sont ensuite testées sur une machine réelle et utilisées dans des processus d'étalonnage.
APA, Harvard, Vancouver, ISO, and other styles
28

Ramos, Alexander. "Evaluating the ability of static code analysis tools to detect injection vulnerabilities." Thesis, Umeå universitet, Institutionen för datavetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-128302.

Full text
Abstract:
Identifying and eliminating security vulnerabilities in programs can be very time consuming. A way to automate and speed up the process is to integrate static code analysis tools in the development process. Choosing a static code analysis tool for a project is not an easy task since different tools have their own strengths and performance characteristics. One way of testing the qualifications of a tool for finding flaws is to test them against a test suite, constructed for the specific purpose of static code analysis tool testing. In this paper the tools Visual Code Grepper, FindBugs and SonarQube are tested for their ability to detect SQL, OS command and LDAP injection vulnerabilities against the Juliet test suite v1.2 for Java and the performance of the tools are evaluated. Since the tools have their own techniques for finding errors and vulnerabilities, diverse results are obtained where the tools show their strengths and weaknesses which are presented in tables and graphs. In general, the FindBugs tool seems to be the most suitable tool for detecting potential injections, however further studies including more test cases should be conducted to cover more of what the tools are capable of detecting. To cover most of the vulnerabilities in a program, it would be ideal to use as many tools as possible to locate the maximum amount of flaws
APA, Harvard, Vancouver, ISO, and other styles
29

Tichý, Antonín. "Porovnání nosných struktur obráběcích strojů z tradičního a netradičního materiálu." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2019. http://www.nusl.cz/ntk/nusl-400934.

Full text
Abstract:
The topic of this diploma thesis is compare materials in machine tool structures. The introduction part is about literature retrieval in field of constructional components in machine frames. There are discribe the indiviual parts of machine structures their properties and influence, witch affect their static toughness, stabilty and accuracy of the whole milling machine. The most important part is focused to the materials witch constructions of machine are made from. The main of this thesis is a practical part, where is designed the own model of milling machine solved on the basis of experiences gain. The important choose was appropriate topology and materials witch the machine frame was made.
APA, Harvard, Vancouver, ISO, and other styles
30

Mamun, Md Abdullah Al, and Aklima Khanam. "Concurrent Software Testing : A Systematic Review and an Evaluation of Static Analysis Tools." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4310.

Full text
Abstract:
Verification and validation is one of the most important concerns in the area of software engineering towards more reliable software development. Hence it is important to overcome the challenges of testing concurrent programs. The extensive use of concurrent systems warrants more attention to the concurrent software testing. For testing concurrent software, automatic tools development is getting increased focus. The first part of this study presents a systematic review that aims to explore the state-of-the-art of concurrent software testing. The systematic review reports several issues like concurrent software characteristics, bugs, testing techniques and tools, test case generation techniques and tools, and benchmarks developed for the tools. The second part presents the evaluation of four commercial and open source static analysis tools detecting Java multithreaded bugs. An empirical evaluation of the tools would help the industry as well as the academia to learn more about the effectiveness of the static analysis tools for concurrency bugs.
APA, Harvard, Vancouver, ISO, and other styles
31

RIZZO, ROBERTO GIORGIO. "Energy-Accuracy Scaling in Digital ICs: Static and Adaptive Design Methods and Tools." Doctoral thesis, Politecnico di Torino, 2019. http://hdl.handle.net/11583/2743228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Sickorez, Robert D. "Allocating Air Force career field accession targets : an optimization-based tool." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FSickorez.pdf.

Full text
Abstract:
Thesis (M.S. in Applied Science (Operations Research))--Naval Postgraduate School, September 2003.
Thesis advisor(s): David H. Olwell, W. Matthew Carlyle. Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
33

Jones, Julia W. "Study of Navy recruiting simulation tool." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FJones%5FJulia.pdf.

Full text
Abstract:
Thesis (M.S. in Management)--Naval Postgraduate School, March 2010.
Thesis Advisor(s): Eitelberg, Mark J. ; Roberts, Benjamin J. "March 2010." Description based on title screen as viewed on April 28, 2010. Author(s) subject terms: Manpower/Supply, Recruiting, Utilization, Training, Simulation. Includes bibliographical references (p. 105-108). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
34

Janeba, Jan. "Marketingová komunikace v prostorách železničních stanic." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-114170.

Full text
Abstract:
Definition of marketing specifics in public transportation service utilities. Analysis of marketing communication instruments of the České dráhy, a.s. company, in the railways stations rooms. Proposal of possible improvements for effective communication.
APA, Harvard, Vancouver, ISO, and other styles
35

Rozehnalová, Magda. "Design totální stanice." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2010. http://www.nusl.cz/ntk/nusl-229357.

Full text
Abstract:
This diploma thesis presents a design solution of a total station. The proposal is processed especially with regard to technical, ergonomic and aesthetic requirements. The main inovation of the proposal lies in a complex ergonomic and aesthetic solution that better reflects modern trends in the field of surveying technology. In comparison to current designs of the device, new proposal of the total station perfectly integrates certain parts of the device, such as a control panel. Since it is a relatively small device, it is important to design all details properly, especially the form and arrangement of controls. The thesis also suggests a number of alternative solutions to particular problems. The proposal of a total station is suitable for various types of work and methods of surveying.
APA, Harvard, Vancouver, ISO, and other styles
36

Busch, Benjamin C. "Cognitive bargaining model an analysis tool for third party incentives?" Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FBusch.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Defense Decision-Making))--Naval Postgraduate School, December 2009.
Thesis Advisor(s): Looney, Robert. Second Reader: Tsypkin, Mikhail. "December 2009." Description based on title screen as viewed on January 29, 2010. Author(s) subject terms: Inducements, bargaining, war, Ukraine, Russia, denuclearization, Prospect Theory, rational choice, cognitive, model, bargaining and war. Includes bibliographical references (p. 75-80). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
37

Pekari, Gregory Chivers Kurt Miles Erickson Brian G. Belcher Robert C. Kartashov Vitalii. "An analysis comparing Commander Submarine Force U.S. Pacific Fleet (CSP) current inventory management tool versus PACFLT Regional Inventory Stocking Model (PRISM) : a proposed demand-based management tool /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FPekari.pdf.

Full text
Abstract:
Thesis (M.B.A.)--Naval Postgraduate School, June 2003.
"MBA professional report"--Cover. Joint authors: Kurt Miles Chivers, Brian G. Erickson, Robert C. Belcher, Vitalii Kartashov. Thesis advisor(s): Raymond Franck, Keebom Kang, Dan Dolk. Includes bibliographical references (p. 119-120). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
38

Fúsek, Jakub. "Měřicí stanice v automatické obráběcí lince." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2018. http://www.nusl.cz/ntk/nusl-378870.

Full text
Abstract:
This master thesis deals with the use of measuring stations in an automatic machining lines. An overview of the methods of measuring engineering products in engineering practice with a focus on automation of measurement is described. The basic principles of function of these machines, their construction and materials are described. The largest part describes coordinate measuring machines, which continue to evolve and offer more and more possibilities for automatic measurement. The practical part is aimed at documenting the sample situation of measurements on this type of equipment and evaluating the possibility of its integration into the automatic machining line.
APA, Harvard, Vancouver, ISO, and other styles
39

Steinert, Bastian. "Built-in recovery support for explorative programming : preserving immediate access to static and dynamic information of intermediate development states." Phd thesis, Universität Potsdam, 2014. http://opus.kobv.de/ubp/volltexte/2014/7130/.

Full text
Abstract:
This work introduces concepts and corresponding tool support to enable a complementary approach in dealing with recovery. Programmers need to recover a development state, or a part thereof, when previously made changes reveal undesired implications. However, when the need arises suddenly and unexpectedly, recovery often involves expensive and tedious work. To avoid tedious work, literature recommends keeping away from unexpected recovery demands by following a structured and disciplined approach, which consists of the application of various best practices including working only on one thing at a time, performing small steps, as well as making proper use of versioning and testing tools. However, the attempt to avoid unexpected recovery is both time-consuming and error-prone. On the one hand, it requires disproportionate effort to minimize the risk of unexpected situations. On the other hand, applying recommended practices selectively, which saves time, can hardly avoid recovery. In addition, the constant need for foresight and self-control has unfavorable implications. It is exhaustive and impedes creative problem solving. This work proposes to make recovery fast and easy and introduces corresponding support called CoExist. Such dedicated support turns situations of unanticipated recovery from tedious experiences into pleasant ones. It makes recovery fast and easy to accomplish, even if explicit commits are unavailable or tests have been ignored for some time. When mistakes and unexpected insights are no longer associated with tedious corrective actions, programmers are encouraged to change source code as a means to reason about it, as opposed to making changes only after structuring and evaluating them mentally. This work further reports on an implementation of the proposed tool support in the Squeak/Smalltalk development environment. The development of the tools has been accompanied by regular performance and usability tests. In addition, this work investigates whether the proposed tools affect programmers’ performance. In a controlled lab study, 22 participants improved the design of two different applications. Using a repeated measurement setup, the study examined the effect of providing CoExist on programming performance. The result of analyzing 88 hours of programming suggests that built-in recovery support as provided with CoExist positively has a positive effect on programming performance in explorative programming tasks.
Diese Arbeit präsentiert Konzepte und die zugehörige Werkzeugunterstützung um einen komplementären Umgang mit Wiederherstellungsbedürfnissen zu ermöglichen. Programmierer haben Bedarf zur Wiederherstellung eines früheren Entwicklungszustandes oder Teils davon, wenn ihre Änderungen ungewünschte Implikationen aufzeigen. Wenn dieser Bedarf plötzlich und unerwartet auftritt, dann ist die notwendige Wiederherstellungsarbeit häufig mühsam und aufwendig. Zur Vermeidung mühsamer Arbeit empfiehlt die Literatur die Vermeidung von unerwarteten Wiederherstellungsbedürfnissen durch einen strukturierten und disziplinierten Programmieransatz, welcher die Verwendung verschiedener bewährter Praktiken vorsieht. Diese Praktiken sind zum Beispiel: nur an einer Sache gleichzeitig zu arbeiten, immer nur kleine Schritte auszuführen, aber auch der sachgemäße Einsatz von Versionskontroll- und Testwerkzeugen. Jedoch ist der Versuch des Abwendens unerwarteter Wiederherstellungsbedürfnisse sowohl zeitintensiv als auch fehleranfällig. Einerseits erfordert es unverhältnismäßig hohen Aufwand, das Risiko des Eintretens unerwarteter Situationen auf ein Minimum zu reduzieren. Andererseits ist eine zeitsparende selektive Ausführung der empfohlenen Praktiken kaum hinreichend, um Wiederherstellungssituationen zu vermeiden. Zudem bringt die ständige Notwendigkeit an Voraussicht und Selbstkontrolle Nachteile mit sich. Dies ist ermüdend und erschwert das kreative Problemlösen. Diese Arbeit schlägt vor, Wiederherstellungsaufgaben zu vereinfachen und beschleunigen, und stellt entsprechende Werkzeugunterstützung namens CoExist vor. Solche zielgerichtete Werkzeugunterstützung macht aus unvorhergesehenen mühsamen Wiederherstellungssituationen eine konstruktive Erfahrung. Damit ist Wiederherstellung auch dann leicht und schnell durchzuführen, wenn explizit gespeicherte Zwischenstände fehlen oder die Tests für einige Zeit ignoriert wurden. Wenn Fehler und unerwartete Ein- sichten nicht länger mit mühsamen Schadensersatz verbunden sind, fühlen sich Programmierer eher dazu ermutig, Quelltext zu ändern, um dabei darüber zu reflektieren, und nehmen nicht erst dann Änderungen vor, wenn sie diese gedanklich strukturiert und evaluiert haben. Diese Arbeit berichtet weiterhin von einer Implementierung der vorgeschlagenen Werkzeugunterstützung in der Squeak/Smalltalk Entwicklungsumgebung. Regelmäßige Tests von Laufzeitverhalten und Benutzbarkeit begleiteten die Entwicklung. Zudem prüft die Arbeit, ob sich die Verwendung der vorgeschlagenen Werkzeuge auf die Leistung der Programmierer auswirkt. In einem kontrollierten Experiment, verbesserten 22 Teilnehmer den Aufbau von zwei verschiedenen Anwendungen. Unter der Verwendung einer Versuchsanordnung mit wiederholter Messung, ermittelte die Studie die Auswirkung von CoExist auf die Programmierleistung. Das Ergebnis der Analyse von 88 Programmierstunden deutet darauf hin, dass sich eingebaute Werkzeugunterstützung für Wiederherstellung, wie sie mit CoExist bereitgestellt wird, positiv bei der Bearbeitung von unstrukturierten ergebnisoffenen Programmieraufgaben auswirkt.
APA, Harvard, Vancouver, ISO, and other styles
40

Clarke, William M. "Rethinking the REAL ID Act and national identification cards as a counterterrorism tool." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FClarke.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2009.
Thesis Advisor(s): Dahl, Erik J. ; Denning, Dorothy E. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: REAL ID, PASS ID, biometrics, driver's license, enhanced driver's license, national identification card, biometric technologies, fingerprints, iris scan, facial recognition, hand geometry, Department of Homeland Security. Includes bibliographical references (p. 85-96). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
41

Shaw, Shirley A. "Hypercard: A promising tool for constructivist methodolody." CSUSB ScholarWorks, 1992. https://scholarworks.lib.csusb.edu/etd-project/1121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Chapin, Timothy Stewart. "Urban revitalization tools : assessing the impacts of sports stadia at the microarea level /." Thesis, Connect to this title online; UW restricted, 1999. http://hdl.handle.net/1773/10831.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Wainer, Gwen. "Economic sanctions : an effective tool of foreign policy." Honors in the Major Thesis, University of Central Florida, 2000. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/210.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Arts and Sciences
Political Science
APA, Harvard, Vancouver, ISO, and other styles
44

Margolis, Michael C. "Upgradeable operational availability forecasting tool for the U.S. Navy P-3 replacement aircraft /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FMargolis.pdf.

Full text
Abstract:
Thesis (M.S. in Operations Research)--Naval Postgraduate School, September 2003.
Thesis advisor(s): Arnold H. Buss, David A. Schrady. Includes bibliographical references (p. 107-108). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
45

Nshimiyimana, Jean Marie Mr, Oluwafeyisayo Oyeniyi, Mathew Mr Seiler, Kimberly Ms Hawkins, and Temitope Mr Adeyanju. "Development of Public Health Indicator Visualization Tool." Digital Commons @ East Tennessee State University, 2019. https://dc.etsu.edu/asrf/2019/schedule/32.

Full text
Abstract:
As the public and government officials become aware of the impact of public health on communities, it is important that relevant public health statistics be available for decision making. Existing web resources have limited visualization options, cannot visually compare a county to all others in the US, and cannot compare the counties in an arbitrary region to all others in the US. The College of Public Health Indicator Visualization Tool (CPHIVT) is a web application providing visualization and ranking for a county in the US in comparison to all counties for a specific health indicator. An iterative development methodology was used to complete major features and refine the features over time. Features divided into small tasks that could be completed within two-week cycles. After the first version of the web application was completed and presented to the client, client feedback on the application was used to refine specifications and was incorporated into planning for future iterations. Iterative development was adopted with a focus on improving and expanding existing features and making the application publicly available online. A suite of automated user interface tests is being developed to verify the application’s functions. Making a complete version of the application publicly available involves significant research and software configuration to deploy the web application in a secure and performant manner. The web application has two major components corresponding to its two major user groups. The first component allows authenticated users from the Department of Public Health to upload and manage sets of data for various health indicators. Tools are included to automatically process uploaded data points. This allows the information presented on the web site to be expanded and kept up to date over time with minimal effort. The second component is accessible to anyone and allows a user to choose to a state or county with text search or hierarchical navigation. The application then provides graphical charts showing that location’s standing for various health indicators compared to all other counties nationally. This is accomplished by applying percentile rankings to the counties and plotting the percentiles against the values for a selected indicator. A user can save a generated chart to a variety of export formats including PNG image or PDF document. The application is expected to serve as a tool for many community members. Staff and students at the College of Public Health will use this tool for presentations and research. County health departments will be able to use the tool when planning community programs. County government leaders can use this tool to determine areas of need in the community. Decision makers will have the ability to visualize their county or region as compared to the nation, not just to neighboring counties or within a state.
APA, Harvard, Vancouver, ISO, and other styles
46

Freeman, Wilma M. Milton Pamela. "Electronic Commerce : case analyses and tools utilized in the accomplishment of buying Defense /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FFreeman.pdf.

Full text
Abstract:
Thesis (M.S. in Contract Management)--Naval Postgraduate School, Sept. 2004.
Thesis advisor(s): Marshall Engelbeck, E. Cory Yoder. Includes bibliographical references (p. 57-61). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
47

Kinstler, Daniel Paul Johnson Raymond W. "Developing a Markov Model to be used as a force shaping tool for the Navy Nurse Corps /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FKinstler.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Hunt, Andrew W. "Basic Expeditionary Airfield Resource (BEAR) Requirements Analysis Tool (BRAT)." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Gilman, Scott D., and Russell A. Rhoads. "Wargaming and simulation as tools for CONOPS development." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1423.

Full text
Abstract:
Approved for public release; distribution is unlimited
The purpose of this thesis is to use wargaming and simulation to gain insight into the effective employment of a new Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) system, the Adaptive Joint C4ISR Node (AJCN). The AJCN provides the supported commander with several capabilities, to include: range extension, waveform bridging, signal intelligence, electronic warfare, and information operations. Two methods are used to gain insight to the support generation of the concept of operations for the AJCN's employment. The first method is wargaming. The wargaming method utilized a class of NPS students and the JCATS combat simulation model. The wargaming generated insights concerning the AJCN's employment. The second method is the use of a constructive simulation model, POA 2. Insights gained from the two methods include: the need for commanders to differentiate the AJCN and its supporting platform; the need for effective information processing techniques; the importance of maintaining at least two-tiers of AJCN coverage to enhance situational awareness of the supported units.
Major, United States Army
Captain, United States Army
APA, Harvard, Vancouver, ISO, and other styles
50

Freeman, Jonathan. "Military assistance as a tool of 20th Century American grand strategy : the American experience in Korea and Vietnam after World War II." Thesis, London School of Economics and Political Science (University of London), 2018. http://etheses.lse.ac.uk/3816/.

Full text
Abstract:
Military Assistance, the development and training of capacity and capability of foreign security forces, has largely been ignored by the research community, including the security studies research community. Military Assistance, as a tool, creates the possibility of both positive and negative outcomes for both recipient and providing nations, and as such it should be examined within the broader framework of international relations, with regards to the projection and perception of power. This research is timely and important, since Military Assistance is an actively pursued security solution within the international system. With the growth of Military Assistance missions around the world, from Iraq and Afghanistan to the Central African Republic, understanding the dynamics that can create or facilitate successful Military Assistance and its broader implications has become more critical. As a tool of United States foreign policy, Military Assistance missions extend United States power, while at the same time minimizing the risk of protracted United States military involvement. Consequently, reliance on Military Assistance has become the preferred method for pursuing strategic military direction and the development of strategic alliances. This will be explored in two case studies: South Korea and Vietnam. This research study seeks to recognize and define the dynamics of successful Military Assistance missions: more specifically, by defining its role in possibly linking the development of an army and a broader strategic alliance between states. I trace how the creation of capacities and capabilities establishes a more integrated relationship between two states, and acts as a prime process to extrapolate and test an applicable theory that can be used in multiple contexts. The goal of this research is a better understanding of Military Assistance as an international relations tool which can further strategic alliances and American Grand Strategy.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography