Thèses sur le sujet « Information storage and retrieval systems - security »

Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Information storage and retrieval systems - security.

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Information storage and retrieval systems - security ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Cheung, Yee-him, et 張貽謙. « Secure object spaces for global information retrieval (SOSGIR) ». Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B29869596.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Labert, Matthew J. « Implementation of information assurance risk management training into existing Department of the Navy training pipelines / ». Thesis, Monterey, California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/5991.

Texte intégral
Résumé :
Approved for public release, distribution is unlimited
With the implementation and continuing research on information systems, such as Information Technology for the 21st Century (IT-21), Navy-Marine Corps Intranet (NMCI), and "Network-Centric warfare," there is little doubt that the Navy is becoming heavily dependent on information and information systems. Though much has been accomplished technically to protect and defend these systems, an important security issue has thus far been overlooked-the human factor. Information Assurance Risk Management (IARM) was a proposal to standardize the way DON personnel discuss, treat, and implement information assurance. IARM addresses the human security aspect of information and information systems in a regimented way to be understandable through all levels of the DON. To standardize the way DON personnel perceive information assurance, they must be taught what IARM is and how to use it. Can an IARM course be implemented in the DON, and if so at what level and to whom should it be taught?
Styles APA, Harvard, Vancouver, ISO, etc.
3

Stieger, Ewald Andreas. « A framework for the development of a personal information security agent ». Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/d1012326.

Texte intégral
Résumé :
Nowadays information is everywhere. Organisations process, store and create information in unprecedented quantities to support their business processes. Similarly, people use, share and synthesise information to accomplish their daily tasks. Indeed, information and information technology are the core of business activities, and a part of daily life. Information has become a crucial resource in today‘s information age and any corruption, destruction or leakage of information can have a serious negative impact on an organisation. Thus, information should be kept safe. This requires the successful implementation of information security, which ensures that information assets are only used, modified and accessed by authorised people. Information security faces many challenges; and organisations still have not successfully addressed them. One of the main challenges is the human element. Information security depends to a large extent on people and their ability to follow and apply sound security practices. Unfortunately, people are often not very security-conscious in their behaviour; and this is the cause of many security breaches. There are a variety of reasons for this such as a lack of knowledge and a negative attitude to security. Many organisations are aware of this; and they attempt to remedy the situation by means of information security awareness programs. These programs aim to educate, train and increase the security awareness of individuals. However, information security awareness programs are not always successful. They are not a once-off remedy that can quickly cure information security. The programs need to be implemented effectively, and they require an ongoing effort. Unfortunately, this is where many organisations fail. Furthermore, changing individuals‘ security behaviour is difficult due to the complexity of factors that influence everyday behaviour. In view of the above, this research project proposes an alternative approach in the form of a personal information security agent. The goal of this agent is to influence individuals to adopt more secure behaviour. There are a variety of factors that need to be considered, in order to achieve this goal, and to positively influence security behaviour. Consequently, this research establishes criteria and principles for such an agent, based on the theory and practice. From a theoretical point of view, a variety of factors that influence human behaviour such as self-efficacy and normative beliefs were investigated. Furthermore, the field of persuasive technology has provided for strategies that can be used by technology to influence individuals. On the practical side, a prototype of a personal information security agent was created and evaluated through a technical software review process. The evaluation of the prototype showed that the theoretical criteria have merit but their effectiveness is largely dependent on how they are implemented. The criteria were thus revised, based on the practical findings. The findings also suggest that a personal information security agent, based on the criteria, may be able to positively influence individuals to be more secure in their behaviour. The insights gained by the research are presented in the form of a framework that makes both theoretical and practical recommendations for developing a personal information security agent. One may, consequently, conclude that the purpose of this research is to provide a foundation for the development of a personal information security agent to positively influence computer users to be more security-conscious in their behavior.
Styles APA, Harvard, Vancouver, ISO, etc.
4

Subbiah, Arun. « Efficient Proactive Security for Sensitive Data Storage ». Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.

Texte intégral
Résumé :
Fault tolerant and secure distributed data storage systems typically require that only up to a threshold of storage nodes can ever be compromised or fail. In proactively-secure systems, this requirement is modified to hold only in a time interval (also called epoch), resulting in increased security. An attacker or adversary could compromise distinct sets of nodes in any two time intervals. This attack model is also called the mobile adversary model. Proactively-secure systems require all nodes to "refresh" themselves periodically to a clean state to maintain the availability, integrity, and confidentiality properties of the data storage service. This dissertation investigates the design of a proactively-secure distributed data storage system. Data can be stored at storage servers using encoding schemes called secret sharing, or encryption-with-replication. The primary challenge is that the protocols that the servers run periodically to maintain integrity and confidentiality must scale with large amounts of stored data. Determining how much data can be proactively-secured in practical settings is an important objective of this dissertation. The protocol for maintain the confidentiality of stored data is developed in the context of data storage using secret sharing. We propose a new technique called the GridSharing framework that uses a combination of XOR secret sharing and replication for storing data efficiently. We experimentally show that the algorithm can secure several hundred GBs of data. We give distributed protocols run periodically by the servers for maintaining the integrity of replicated data under the mobile adversary model. This protocol is integrated into a document repository to make it proactively-secure. The proactively-secure document repository is implemented and evaluated on the Emulab cluster (http://www.emulab.net). The experimental evaluation shows that several 100 GBs of data can be proactively-secured. This dissertation also includes work on fault and intrusion detection - a necessary component in any secure system. We give a novel Byzantine-fault detection algorithm for quorum systems, and experimentally evaluate its performance using simulations and by deploying it in the AgileFS distributed file system.
Styles APA, Harvard, Vancouver, ISO, etc.
5

Horn, John F. « IPSec-based dynamic security services for the MYSEA environment ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHorn.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2005.
Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. Includes bibliographical references (p. 107-109). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Radley, Johannes Jurgens. « Pseudo-random access compressed archive for security log data ». Thesis, Rhodes University, 2015. http://hdl.handle.net/10962/d1020019.

Texte intégral
Résumé :
We are surrounded by an increasing number of devices and applications that produce a huge quantity of machine generated data. Almost all the machine data contains some element of security information that can be used to discover, monitor and investigate security events.The work proposes a pseudo-random access compressed storage method for log data to be used with an information retrieval system that in turn provides the ability to search and correlate log data and the corresponding events. We explain the method for converting log files into distinct events and storing the events in a compressed file. This yields an entry identifier for each log entry that provides a pointer that can be used by indexing methods. The research also evaluates the compression performance penalties encountered by using this storage system, including decreased compression ratio, as well as increased compression and decompression times.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Parameswaran, Rupa. « A Robust Data Obfuscation Technique for Privacy Preserving Collaborative Filtering ». Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11459.

Texte intégral
Résumé :
Privacy is defined as the freedom from unauthorized intrusion. The availability of personal information through online databases, such as government records, medical records, and voters and #146; lists, pose a threat to personal privacy. The concern over individual privacy has led to the development of legal codes for safeguarding privacy in several countries. However, the ignorance of individuals as well as loopholes in the systems, have led to information breaches even in the presence of such rules and regulations. Protection against data privacy requires modification of the data itself. The term {em data obfuscation} is used to refer to the class of algorithms that modify the values of the data items without distorting the usefulness of the data. The main goal of this thesis is the development of a data obfuscation technique that provides robust privacy protection with minimal loss in usability of the data. Although medical and financial services are two of the major areas where information privacy is a concern, privacy breaches are not restricted to these domains. One of the areas where the concern over data privacy is of growing interest is collaborative filtering. Collaborative filtering systems are being widely used in E-commerce applications to provide recommendations to users regarding products that might be of interest to them. The prediction accuracy of these systems is dependent on the size and accuracy of the data provided by users. However, the lack of sufficient guidelines governing the use and distribution of user data raises concerns over individual privacy. Users often provide the minimal information that is required for accessing these E-commerce services. The lack of rules governing the use and distribution of data disallows sharing of data among different communities for collaborative filtering. The goals of this thesis are (a) the definition of a standard for classifying DO techniques, (b) the development of a robust cluster preserving data obfuscation algorithm, and (c) the design and implementation of a privacy-preserving shared collaborative filtering framework using the data obfuscation algorithm.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Ntsham, Xolile. « Information flows in the social development grant process : a user experience perspective ». Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1390.

Texte intégral
Résumé :
Thesis submitted in fulfilment of the requirements for the degree Master of Technology: Information Technology in the Faculty of Informatics and design at the Cape Peninsula University of Technology 2014
This study focuses on information flows in the social grant process from a user experience perspective. The study was conducted with the South African Social Security Agency (SASSA), which is responsible for the administration and distribution of social grants to underprivileged citizens. Social grants help poor citizens to attain equitable income on a monthly basis. Grants play an increasingly important role in reducing poverty and inequality in South Africa, but are also subject to challenges like dependency, mismanagement and corruption. Information flow within SASSA is essential for the coordination of the grant process. The success of administering any social grant process depends largely on efficient communication practices and stable information technology. Communication among grant users requires the transfer of relevant information from its point of inception to the next point(s) of use. Government departments are transposing their paper-based systems into digital systems, which pose new implications for grant administration, however. Accordingly, the use of electronic services in government should mean faster information flow and, thus, more effective service delivery. The literature reveals, however, that non-technical aspects like user experience (UX) are essential in designing meaningful e-government systems. With a focus on user experience, this study uncovers the problems that SASSA and grant users face in the grant process and works toward possible solutions to resolve these problems. This research lays an important foundation in terms of gaining a better understanding of information flows, e-government, and user experiences in the grant process. This research is exploratory in nature and adopts a qualitative interpretivist approach. To gain a deeper understanding of the perspectives and experiences of grant users, the researcher employed the „Institutionalise User Experience in Government‟ (IUXG) methodology. The study targeted individuals that had knowledge of the social grants. A purposive sampling technique was used to select the research participants. Furthermore, the researcher adopted a thematic analysis method to code and analyse data. The findings of this study revealed the centrality of user experience in the grant process, notably in terms of the many challenges associated with information flow. The findings also revealed that factors such as social grant awareness, availability and use of information technology, digital divide, and grant accessibility bring enormous impact on grant processes and service delivery. The study contributes a landscape model for depicting the information flows in processing grants, and develops a broader understanding of how technology can help users to better disburse, access, and utilise grants. The study also informs e- government practitioners about the design and implementation of user-centred design with emphasis on information flows. Key Words: Information flows, social grants, e-government, and user experience.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Mashima, Daisuke. « Safeguarding health data with enhanced accountability and patient awareness ». Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/45775.

Texte intégral
Résumé :
Several factors are driving the transition from paper-based health records to electronic health record systems. In the United States, the adoption rate of electronic health record systems significantly increased after "Meaningful Use" incentive program was started in 2009. While increased use of electronic health record systems could improve the efficiency and quality of healthcare services, it can also lead to a number of security and privacy issues, such as identity theft and healthcare fraud. Such incidents could have negative impact on trustworthiness of electronic health record technology itself and thereby could limit its benefits. In this dissertation, we tackle three challenges that we believe are important to improve the security and privacy in electronic health record systems. Our approach is based on an analysis of real-world incidents, namely theft and misuse of patient identity, unauthorized usage and update of electronic health records, and threats from insiders in healthcare organizations. Our contributions include design and development of a user-centric monitoring agent system that works on behalf of a patient (i.e., an end user) and securely monitors usage of the patient's identity credentials as well as access to her electronic health records. Such a monitoring agent can enhance patient's awareness and control and improve accountability for health records even in a distributed, multi-domain environment, which is typical in an e-healthcare setting. This will reduce the risk and loss caused by misuse of stolen data. In addition to the solution from a patient's perspective, we also propose a secure system architecture that can be used in healthcare organizations to enable robust auditing and management over client devices. This helps us further enhance patients' confidence in secure use of their health data.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Watkins, Alfred R. « Continuous media object modeling, storage, and retrieval ». Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/9184.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

SENIGAGLIESI, LINDA. « Information-theoretic security techniques for data communications and storage ». Doctoral thesis, Università Politecnica delle Marche, 2019. http://hdl.handle.net/11566/263165.

Texte intégral
Résumé :
Negli ultimi anni il bisogno di sicurezza e privacy è cresciuto in maniera esponenziale in molti aspetti delle comunicazioni, parallelamente allo sviluppo tecnologico. La maggior parte dei sistemi di sicurezza attualmente implementati sono basati sulla nozione di sicurezza computazionale, e devono essere continuamente tenuti aggiornati per affrontare il miglioramento degli attacchi e l’avanzamento tecnologico. Allo scopo di soddisfare requisiti sempre più stringenti e rigorosi, di recente è cresciuto l’interesse verso soluzioni appartenenti al paradigma della teoria dell’informazione a supporto di schemi di segretezza prettamente crittografici, in particolare grazie alla capacità di queste soluzioni di garantire sicurezza indipendentemente dalla capacità dell’attaccante, altrimenti nota come sicurezza incondizionata. In questo lavoro di tesi il nostro scopo è quello di analizzare come metriche di segretezza relative alla teoria dell’informazione possono essere applicate in sistemi pratici con lo scopo di garantire la sicurezza e la privacy dei dati. Per iniziare, vengono definite delle metriche di tipo information-teoretiche per valutare le prestazioni di segretezza di sistemi realistici di comunicazione wireless sotto vincoli pratici, e con esse un protocollo che combina tecniche di codifica per sicurezza a livello fisico con soluzioni crittografiche. Questo schema è in grado di raggiungere un dato livello di sicurezza semantica in presenza di un attaccante passivo. Allo stesso tempo vengono presi in considerazione molteplici scenari: viene fornita un’analisi di sicurezza per canali paralleli con nodi relay, trovando l’allocazione ottima di risorse che massimizza il secrecy rate. Successivamente, sfruttando un model checker probabilistico, vengono definiti i parametri per sistemi di storage distribuiti ed eterogenei che permettono di raggiungere la segretezza perfetta in condizioni pratiche. Per garantire la privacy, proponiamo inoltre uno schema che garantisce il recupero privato delle informazioni in uno scenario di caching wireless in presenza di nodi malevoli. Definiamo infine il piazzamento ottimale dei contenuti tale minimizzare l’uso del canale di backhaul, riducendo così il costo delle comunicazioni del sistema.
The last years have seen a growing need of security and privacy in many aspects of communications, together with the technological progress. Most of the implemented security solutions are based on the notion of computational security, and must be kept continuously updated to face new attacks and technology advancements. To meet the more and more strict requirements, solutions based on the information-theoretic paradigm are gaining interest to support pure cryptographic techniques, thanks to their capacity to achieve security independently on the attacker’s computing resources, also known as unconditional security. In this work we investigate how information-theoretic security can be applied to practical systems in order to ensure data security and privacy. We first start defining information-theoretic metrics to assess the secrecy performance of realistic wireless communication settings under practical conditions, together with a protocol that mixes coding techniques for physical layer security and cryptographic solutions. This scheme is able to achieve some level of semantic security at the presence of a passive attacker. At the same time, multiple scenarios are considered. We provide a security analysis for parallel relay channels, thus finding an optimal resource allocation that maximizes the secrecy rate. Successively, by exploiting a probabilistic model checker, we define the parameters for heterogeneous distributed storage systems that permit us to achieve perfect secrecy in practical conditions. For privacy purposes, we propose a scheme which guarantees private information retrieval of files for caching at the wireless edge against multiple spy nodes. We find the optimal content placement that minimizes the backhaul usage, thus reducing the communication cost of the system.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Xie, Jinsheng. « On the analysis of selected automated storage and retrieval systems ». Diss., Georgia Institute of Technology, 1985. http://hdl.handle.net/1853/25020.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
13

Chen, QiFan. « An object-oriented database system for efficient information retrieval applications ». Diss., This resource online, 1992. http://scholar.lib.vt.edu/theses/available/etd-06062008-170433/.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
14

Ho, Lai-ming. « Evaluation of the development and impact of clinical information systems / ». Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B19657857.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
15

Fraser, Mark E. « Architecture and methodology for storage, retrieval and presentation of geo-spatial information ». [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000316.

Texte intégral
Résumé :
Thesis (M.S.)--University of Florida, 2001.
Title from title page of source document. Document formatted into pages; contains xi, 77 p.; also contains graphics. Includes vita. Includes bibliographical references.
Styles APA, Harvard, Vancouver, ISO, etc.
16

Fei, Qi. « Operation models for information systems / ». View abstract or full-text, 2009. http://library.ust.hk/cgi/db/thesis.pl?IELM%202009%20FEI.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Coles, Susan. « Personal information systems : the implications of job and individual differences for design ». Thesis, Loughborough University, 1990. https://dspace.lboro.ac.uk/2134/33024.

Texte intégral
Résumé :
In an age where information has become a crucial commodity, accessing appropriate information quickly is essential to economic success. Developing ways of improving information retrieval is therefore of central concern to human factors and technologists alike. One aspect of information access relates to the ability of individual office workers to manage and retrieve their own information effectively, and this is what the present research addresses. Previous work in the area has been dominated by designing computer interfaces for the average user. This research investigates how people's needs might differ according to circumstance and examines a wider range of design possibilities. Specifically it sets out to relate retrieval problems (specific information retrieval rather than e.g. browsing or reminding) to job and individual (personality) differences within the general context of personal information management in offices using traditional technologies of paper, filing cabinets and desks. This is achieved by both extensive fieldwork and the use of simulated filing-retrieval systems in a controlled context.
Styles APA, Harvard, Vancouver, ISO, etc.
18

ATCHESON, PAUL DONALD. « AN INVESTIGATION OF ANALOG OPTICAL STORAGE THROUGH PHOTOCHEMICAL HOLE-BURNING ». Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/188022.

Texte intégral
Résumé :
We have examined the technique of persistent spectral holeburning as a method for analog optical data storage. Two types of materials were examined from a theoretical standpoint, ones which exhibit photochemical holeburning (PHB) and ones which exhibit nonphotochemical holeburning (NPHB). We have presented the conditions under which a PHB material shows a linear relation between hole depth and exposure intensity or exposure time. Also we show that a NPHB material has no such condition. We conclude that a PHB material may be useful for analog optical data storage, while a NPHB material would not. Experiments were conducted with a NPHB material, R' color centers in LiF, to support the NPHB analysis.
Styles APA, Harvard, Vancouver, ISO, etc.
19

Paiva, Joao Argemiro de Carvalho. « Topological Equivalence and Similarity in Multi-Representation Geographic Databases ». Fogler Library, University of Maine, 1998. http://www.library.umaine.edu/theses/pdf/PaivaJA1998.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
20

Wurm, Kurt B. « The Integration of Cadastral Base Mapping with Cadastral Parcel Attribution ». Fogler Library, University of Maine, 2003. http://www.library.umaine.edu/theses/pdf/WurmKB2003.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
21

Angkasith, Vorapoch. « An intelligent design retrieval system for module-based products ». Diss., Columbia, Mo. : University of Missouri-Columbia, 2004. http://hdl.handle.net/10355/4085.

Texte intégral
Résumé :
Thesis (Ph. D.)--University of Missouri-Columbia, 2004.
The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (June 30, 2006) Vita. Includes bibliographical references.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Gregory, Michael W. (Michael Walter). « Interrelational Laboratory Information System for Data Storage and Retrieval ». Thesis, University of North Texas, 1989. https://digital.library.unt.edu/ark:/67531/metadc935708/.

Texte intégral
Résumé :
The necessity for a functional user friendly laboratory data management program has become evident as the quantity of information required for modern scientific research has increased to to titanic proportions. The required union of strong computer power, ease of operation, and adaptability have until recently been outside the realm of most research laboratories. Previous systems, in addition to their high cost, are necessarily complex and require software experts in order to effect any changes that the end user might deem necessary. This study examines the Apple Macintosh computer program Hypercard as an interactive laboratory information system that is user-friendly, cost effective, and adaptable to the changing demands within a modern molecular or microbiology.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Grabs, Torsten. « Storage and retrieval of XML documents with a cluster of database systems / ». Berlin : Aka, 2003. http://www.loc.gov/catdir/toc/fy0713/2007435297.html.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
24

Mukherjea, Sougata. « Visualizing the information space of hypermedia systems ». Diss., Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/8223.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
25

Yeung, Chung Kei. « Ontological model for information systems development methodology ». HKBU Institutional Repository, 2006. http://repository.hkbu.edu.hk/etd_ra/702.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
26

Daoud, Amjad M. « Efficient data structures for information retrieval ». Diss., Virginia Tech, 1993. http://hdl.handle.net/10919/40031.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
27

Sahle, Eskinder. « Development of a user interface for MARIAN and CODER systems ». Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-04272010-020142/.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
28

Veerasamy, Aravindan. « Visualization and user interface techniques for interactive information retrieval systems ». Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/9244.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
29

Bae, Sanghoon. « Development of a real-time and geographical information system-based transit management information system ». Thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-11242009-020226/.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
30

Lee, Jaejin. « Robust multitrack modulation codes for the storage channel ». Diss., Georgia Institute of Technology, 1994. http://hdl.handle.net/1853/15034.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
31

Cheung, Yee-him. « Secure object spaces for global information retrieval (SOSGIR) / ». Hong Kong : University of Hong Kong, 2000. http://sunzi.lib.hku.hk:8888/cgi-bin/hkuto%5Ftoc%5Fpdf?B23295284.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
32

Pridaphattharakun, Wilasini. « Information retrieval and answer extraction for an XML knowledge base in WebNL ». [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000344.

Texte intégral
Résumé :
Thesis (M.S.)--University of Florida, 2001.
Title from title page of source document. Document formatted into pages; contains xiii, 71 p.; also contains graphics. Includes vita. Includes bibliographical references.
Styles APA, Harvard, Vancouver, ISO, etc.
33

France, Robert Karl. « An artificial intelligence environment for information retrieval research ». Thesis, Virginia Polytechnic Institute and State University, 1986. http://hdl.handle.net/10919/91091.

Texte intégral
Résumé :
The CODER (COmposite Document Expert/Extended/Effective Retrieval) project is a multi-year effort to investigate how best to apply artificial intelligence methods to increase the effectiveness of information retrieval systems. Particular attention is being given to analysis and representation of heterogeneous documents, such as electronic mail digests or messages, which vary widely in style, length, topic, and structure. In order to ensure system adaptability and to allow reconfiguration for controlled experimentation, the project has been designed as a moderated expert system. This thesis covers the design problems involved in providing a unified architecture and knowledge representation scheme for such a system, and the solutions chosen for CODER. An overall object-oriented environment is constructed using a set of message-passing primitives based on a modified Prolog call paradigm. Within this environment is embedded the skeleton of a flexible expert system, where task decomposition is performed in a knowledge-oriented fashion and where subtask managers are implemented as members of a community of experts. A three-level knowledge representation formalism of elementary data types, frames, and relations is provided, and can be used to construct knowledge structures such as terms, meaning structures, and document interpretations. The use of individually tailored specialist experts coupled with standardized blackboard modules for communication and control and external knowledge bases for maintenance of factual world knowledge allows for quick prototyping, incremental development, and flexibility under change. The system as a whole is structured as a set of communicating modules, defined functionally and implemented under UNIX™ using sockets and the TCP/IP protocol for communication. Inferential modules are being coded in MU-Prolog; non-inferential modules are being prototyped in MU-Prolog and will be re-implemented as needed in C++.
M.S.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Fulmer, Charles A. « Developing information storage and retrieval systems on the internet a knowledge management approach ». Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5596.

Texte intégral
Résumé :
Approved for public release; distribution is unlimited
Search is becoming the primary way in which people get information. In 2010, global Internet usage was over two billion people, with 92% of online adults using search engines to find information. Most commercial search engines (Google, Yahoo, Bing, etc.) provide their indexing and search services at no cost. The DoD can achieve large gains at a small cost by making public documents available to search engines. This can be achieved through the utilization of important design components and effective knowledge management. This thesis examines methods for making information available to search engines at the Naval Postgraduate School (NPS) and the Defense Technical Information Center (DTIC). In a large-scale project, over 200,000 documents were organized on the website dodreports.com. The results of this research revealed improvement gains of 8-20% for finding reports through commercial search engines during the first six months of implementation.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Bae, Soo Hyun. « Information retrieval via universal source coding ». Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26573.

Texte intégral
Résumé :
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.
Committee Chair: Juang, Biing-Hwang; Committee Member: Al-Regib, Ghassan; Committee Member: Linda Wiils; Committee Member: Mersereau, Russell; Committee Member: Pappas, Thrasyvoulos. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Styles APA, Harvard, Vancouver, ISO, etc.
36

Tedori, Veronica. « Design of a safety management information and tracking system ». Master's thesis, This resource online, 1993. http://scholar.lib.vt.edu/theses/available/etd-03302010-020341/.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
37

Janicki, James H. « Retrieval from an image knowledge base / ». Online version of thesis, 1993. http://hdl.handle.net/1850/12196.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
38

Mohageg, Michael F. « The influence of hypertext linking structures and task-related variables on information retrieval tasks ». Diss., This resource online, 1990. http://scholar.lib.vt.edu/theses/available/etd-08082007-114303/.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
39

Vijayan, Balaji. « Accurate and efficient detection, prediction and exploitation of program phases ». Diss., Online access via UMI:, 2005.

Trouver le texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
40

Hjalmarsson, Anders. « Behovet av struktur och frihet : en avhandling om situationsanpassad facilitering vid samarbetsinriktad modellering ». Doctoral thesis, Högskolan i Borås, Institutionen Handels- och IT-högskolan, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-3524.

Texte intégral
Résumé :
Informationssystem är resultatet av samarbete människor emellan. System designas, realiseras, testas och implementeras i de verksamheter som de ska stödja. Samarbetekrävs under alla dessa steg. I utvecklingsarbetets inledning är det inte ovanligt att kraven på systemen formuleras genom projekt som organiseras genom olika typer avsamarbetsformer. I föreliggande avhandling lyfter vi pä locket på samarbetsinriktad modellering och studerar i detalj vad som sker när krav på system formuleras. Genom en gedigen forskningsdesign och ett rikt datamaterial följer vi två modelleringsteam när de facililerar verksamhetsrepresentanter i olika situationer under tre modelleringsprojekt. Avsikten är att utveckla kunskap om vad som utmärker facililering i dessa situationersamt studera vad som utmärker situationsanpassning när modellerarna underlättar och möjliggör arbetet. Genom videobaserad forskning har modelleringsarbetet dokumenterats och med hjälp av olika analysmetoder, såsom konversationsinriktad handlingsanalys och multigrundad teoriutveckling, tolkas episoder i materialet och en plattform för en praktisk teori om facililering utvecklas. Resultatet utgörs av en typologi över samarbetsinriktad modellering, åtgärder för att utföra facililering av arbetet, samt insikter om vad som utmärker situationsanpassning när facilitering utförs och olika omständigheter måste mötas. Synsättet som förespråkas är att tillämpande av struktur och utnyttjandet av frihet är förutsättningar då goda krav på informationssystem ska formuleras genom samarbete.
Styles APA, Harvard, Vancouver, ISO, etc.
41

Jennings, Daniel Blair. « Welding information system : design, operations, methods ». Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/29988.

Texte intégral
Résumé :
This thesis encompasses a Welding Information System for Design, Operations, and Methods (WISDOM). In essence, the WISDOM project aimed at research and development of an innovative and comprehensive information collection on welding in close cooperation with industry utilizing modern micro-computer techniques of information review, retrieval, storage, updating, and transfer. Emphasis is placed on new and more efficient methods of knowledge communication, pursuing the idea of exploring knowledge (in contrast to rehearsing recipes). The development of this project concentrated on the following three main topics: 1. Background information on steel metallurgy and welding 2. Analysis and Design Methods for Welded Connections 3. Code Requirements of Welds Preliminary research on the WISDOM project involved communications with industry to determine primary objectives. The need for an information system on welding was unquestionably apparent. The knowledge base is supplemented with graphic images and analysis and design programs. It is hoped that the information in this system will be delivered to the engineer in an efficient and useful manner. The priority here is to raise welding awareness while promoting efficient welded design. In addition, we hope that the WISDOM system will close the ever widening gap between the design engineer and the fabricator. In the most general sense, the primary objective of the WISDOM project was to produce an integrated self-paced teaching tool for both engineering professional and student alike. The versatility of the system is maintained by presenting the information in modular form. Screen graphics oriented learning modules encourage the user to become more involved in the learning process than more conventional teaching methods allow. Analysis and design modules promote rapid and efficient connection design in a more consistent and professional manner. A smooth transition from the learning environment to engineering practice is envisioned by providing realistic design tools with a transparent background.
Applied Science, Faculty of
Civil Engineering, Department of
Graduate
Styles APA, Harvard, Vancouver, ISO, etc.
42

On, Sai Tung. « Efficient transaction recovery on flash disks ». HKBU Institutional Repository, 2010. http://repository.hkbu.edu.hk/etd_ra/1170.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
43

Yildiz, Meliha Yetisgen. « Using statistical and knowledge-based approaches for literature-based discovery / ». Thesis, Connect to this title online ; UW restricted, 2007. http://hdl.handle.net/1773/7178.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
44

Lamb, Robert Ray. « An information retrieval system for images from the trace satellite ». Thesis, Montana State University, 2008. http://etd.lib.montana.edu/etd/2008/lamb/LambR0508.pdf.

Texte intégral
Résumé :
The ability to identify particular features and structures, such as faces or types of scenery in images, is a topic with many available applications and potential solutions. In this paper we discuss solar images and the results of our preliminary investigation of techniques that can be used to identify solar phenomena in images from the TRACE satellite. Being able to automatically identify various phenomena in solar images is of great interest for scientists studying phenomena on the sun. A set of characteristics that can be quickly extracted from solar images needs to be acquired. These characteristics are used to create classifiers for various phenomena contained in solar images. There are many obstacles that need to be overcome when extracting features and creating these classifiers. These include the inherent unbalanced data sets due to varying rates at which different phenomena appear and multiple phenomenon that could appear in each image. The classifiers that have been generated were used in the creation of an information retrieval system to make finding phenomenon solar images quick and easy.
Styles APA, Harvard, Vancouver, ISO, etc.
45

Iancu, Ovidiu Dan. « The role of timing in shaping information processing in neural systems / ». Full text open access at:, 2008. http://content.ohsu.edu/u?/etd,659.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
46

Wang, Jiying. « Information extraction and integration for Web databases / ». View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20WANGJ.

Texte intégral
Résumé :
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2004.
Includes bibliographical references (leaves 112-118). Also available in electronic version. Access restricted to campus users.
Styles APA, Harvard, Vancouver, ISO, etc.
47

Mo, Yiu Wing. « Comparative study on routing strategies for integrated automated storage and retrieval system / ». View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?IEEM%202005%20MO.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
48

Yoon, Changwoo. « Domain-specific knowledge-based informational retrieval model using knowledge reduction ». [Gainesville, Fla.] : University of Florida, 2005. http://purl.fcla.edu/fcla/etd/UFE0011560.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
49

McFarland, Sean Alan. « Decision making theory with geographic information systems support ». CSUSB ScholarWorks, 2008. https://scholarworks.lib.csusb.edu/etd-project/3393.

Texte intégral
Résumé :
Decisions are made with varying degrees of effectiveness and efficiency and are influenced by a myriad of internal and external forces. Decision Support Systems (DSS) software can effectively aid decision making through processing the facts and producing meaningful outputs for use by the person or team in making the final choice. Geographic Information Systems (GIS), a form of DSS, are very effective when locational data are present. This thesis talks about using GIS software in decision making procedures.
Styles APA, Harvard, Vancouver, ISO, etc.
50

Takagaki, Ken. « A formalism for object-based information systems development ». Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/31016.

Texte intégral
Résumé :
Most current approaches to Information Systems Development (ISD) tend to derive from past experience and practice, rules of thumb and technology trends. The lack of theoretical foundations hinders the systematic development and evaluation of new ISD methodologies. The research undertaken in this thesis addresses this issue by proposing a formal, theory-based model, Ontology/Object-Based Conceptual Modelling (OBCM), for conceptually representing IS applications. The formalism is novel in that it is grounded in first principles derived from metaphysics, in particular the system of Ontology developed by Mario Bunge. Underlying this approach is the premise that an Information System is a model of reality and that model should be therefore rooted in a theory of reality, ie. a metaphysics. As a result, basic assumptions in reality such as thing, substance, property, attribute, time, state and change are explicitly and rigorously addressed. OBCM features an ontologically well-defined construct, "object", which is used to directly represent entities in reality, thus lending theoretical credence to the so-called object-oriented paradigm found in recent programming languages and databases. In addition, the thesis presents a framework, Ontology/Object-Based Information System (OBIS), for systems implementation based on this model. This framework directly implements the object construct so that it can be immediately utilized by the information systems user in a "direct manipulation" style of end-user interaction. Further, OBIS strives for a single, homogeneous concept of system operation drawn from ontology rather than in terms of IS or computing technology. In principle, this one concept can be applied to any object in the IS, this simplifying the understanding and use of the Information System. In this way, the model attempts to unify the analysis, implementation and user-interface aspects of Information Systems Development, thereby reducing the so-called "semantic gap" which has often been observed between the reality of the application and its final implementation in an IS. A "proof of concept" prototype is described which illustrates the main principles and explores practical applications of the proposed model. This prototype is implemented as a single, stand-alone "shell" which can be used to support a wide variety of applications as well as providing the basis of a rapid prototyping or CASE tool. The prototype is used to implement sample problems including the well-known IFIP Working Conference problem, thus demonstrating the feasibility of the overall approach.
Business, Sauder School of
Graduate
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie