Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: E CONFIGURATION.

Rozprawy doktorskie na temat „E CONFIGURATION”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „E CONFIGURATION”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Chandmare, Kunal. "Automated Configuration of Time-Critical Multi-Configuration AUTOSAR Systems". Master's thesis, Universitätsbibliothek Chemnitz, 2017. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-229308.

Pełny tekst źródła
Streszczenie:
The vision of automated driving demands a highly available system, especially in safety-critical functionalities. In automated driving when a driver is not binding to be a part of the control loop, the system needs to be operational even after failure of a critical component until driver regain the control of vehicle. In pursuit of such a fail-operational behavior, the developed design process with software redundancy in contrast to conventional dedicated backup requires the support of automatic configurator for scheduling relevant parameters to ensure real-time behavior of the system. Multiple implementation methods are introduced to provide an automatic service which also considers task criticality before assigning task to the processor. Also, a generic method is developed to generate adaptation plans automatically for an already monitoring and reconfiguration service to handle fault occurring environment.
Style APA, Harvard, Vancouver, ISO itp.
2

Axelsson, Jonas, i Ahmed Ghassabei. "Supply Chain Configuration : Ens studie av förbättringsarbetet "Supply Chain Configuration". Thesis, KTH, Tillämpad maskinteknik (KTH Södertälje), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93955.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Zabriskie, Peter William. "High Throughput FPGA Configuration Using a Custom DMA Configuration Controller". BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6886.

Pełny tekst źródła
Streszczenie:
SRAM-based Field Programmable Gate Arrays (FPGAs) must be programmed with configuration data every time they are powered on. In addition to initially programming an FPGA, there are many other applications that require access to FPGA configuration memory such as partial reconfiguration, fault injection, and memory scrubbing. This thesis describes a system that provides high-speed, programmable configuration management for Xilinx FPGAs through external interfaces. This system is an improvement upon the JTAG Configuration Manager (JCM) previously created at BYU. The JCM consists of a custom I/O board paired with a MicroZed development board which includes a Xilinx ZYNQ SoC. This platform is used to implement a flexible configuration management system that can communicate with Xilinx FPGAs at high speeds using the JTAG and SelectMAP interfaces.The improved system described in this thesis increases the maximum data transfer rate of the JCM's JTAG and SelectMAP interfaces and dramatically decreases the processor utilization of user programs running on the JCM. This is accomplished by incorporating a Direct Memory Access (DMA) engine and interrupts into the system. In addition to faster data rates, these changes and the decrease in processor utilization also allow the JCM to manage up to eight JTAG chains simultaneously with the use of a special I/O card.
Style APA, Harvard, Vancouver, ISO itp.
4

Sadownick, Ronald 1960. "Helicopter configuration optimization". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/82683.

Pełny tekst źródła
Streszczenie:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design & Management Program, February 2001.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (leaf 102).
by Ronald Sadownick.
S.M.
Style APA, Harvard, Vancouver, ISO itp.
5

Atoui, Wassim Sellil. "Toward auto-configuration in software networks". Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS015.

Pełny tekst źródła
Streszczenie:
Les réseaux logiciels ont le potentiel de porter l'infrastructure réseau à un niveau plus avancé, un niveau qui peut rendre la configuration autonome. Cette capacité peut surmonter la complexité croissante des réseaux actuels et permettre aux entités de gestion d'activer un comportement efficace dans le réseau pour une amélioration globale des performances sans aucune intervention humaine. Les paramètres de configuration peuvent être sélectionnés automatiquement pour les ressources réseau afin de faire face à diverses situations que les réseaux rencontrent, comme les erreurs et la dégradation des performances. Malheureusement, certains défis doivent être relevés pour atteindre ce niveau avancé de réseaux. Actuellement, la configuration est encore souvent générée manuellement par des experts du domaine dans d'énormes fichiers semi-structurés écrits en XML, JSON et YAML. C'est une tâche complexe, sujette aux erreurs et fastidieuse à accomplir par les humains. De plus, il n'y a pas de stratégie formelle, à part l'expérience et les meilleures pratiques des experts du domaine pour concevoir les fichiers de configuration. Différents experts peuvent choisir une configuration différente pour le même objectif de performances. Cette situation rend plus difficile l'extraction des fonctionnalités des fichiers de configuration et l'apprentissage des modèles susceptibles de générer ou de recommander automatiquement la configuration. De plus, il n'y a toujours pas de consensus sur un modèle de données de configuration commun dans les réseaux logiciels, qui a abouti à des solutions hétérogènes, telles que: TOSCA, YANG, Hot, etc. qui rendent la gestion de réseau de bout en bout difficile. Dans cette thèse, nous présentons nos contributions qui abordent les défis susmentionnés liés à l'automatisation de la configuration dans les réseaux logiciels. Pour aborder le problème de l'hétérogénéité entre les fichiers de configuration, nous proposons un cadre sémantique basé sur des ontologies qui peuvent fédérer des éléments communs à partir de différents fichiers de configuration
Software networks have the potential to take the network infrastructure to a more advanced level, a level that can make the configuration autonomic. This ability can overcome the rapidly growing complexity of current networks, and allow management entities to enable an effective behavior in the network for overall performance improvement without any human intervention. Configuration parameters can be automatically selected for network resources to cope with various situations that networks encounter like errors and performance degradation. Unfortunately, some challenges need to be tackled to reach that advanced level of networks. Currently, the configuration is still often generated manually by domain experts in huge semi-structured files written in XML, JSON, and YAML. This is a complex, error-prone, and tedious task to do by humans. Also, there is no formal strategy except experience and best practices of domain experts to design the configuration files. Different experts may choose different configurations for the same performance goal. This situation makes it harder to extract features from the configuration files and learn models that could generate or recommend automatic configuration. Moreover, there is still no consensus on a common configuration data model in software networks, which resulted in heterogeneous solutions, such as TOSCA, YANG, Hot, etc. that make the end-to-end network management difficult. In this thesis, we present our contributions that tackle the aforementioned challenges related to automating the configuration in software networks. To tack the problem of heterogeneity between the configuration files we propose a semantic framework based ontologies that can federate common elements from different configuration files. And, to tackle the problem of generating automatically the configuration, we propose two contributions, one contribution that considers deep neural networks to learn from configuration files models for recommending the configuration and another contribution based on a model-driven approach to assist automatically the design of the configuration files
Style APA, Harvard, Vancouver, ISO itp.
6

Ababneh, Mohammad. "Network configuration using XML". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA384258.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management and M.S. in Computer Science) Naval Postgraduate School, September 2000.
Thesis advisor(s): Xie, Geoffrey ; Dolk, Daniel. "September 2000." Includes bibliographical references (p. 115). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
7

Siu, Joao Baptista. "Network configuration management systems". Thesis, University of Macau, 2001. http://umaclib3.umac.mo/record=b1447841.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
8

McCrindle, Rachel Jane. "Inverse software configuration management". Thesis, Durham University, 1998. http://etheses.dur.ac.uk/5013/.

Pełny tekst źródła
Streszczenie:
Software systems are playing an increasingly important role in almost every aspect of today’s society such that they impact on our businesses, industry, leisure, health and safety. Many of these systems are extremely large and complex and depend upon the correct interaction of many hundreds or even thousands of heterogeneous components. Commensurate with this increased reliance on software is the need for high quality products that meet customer expectations, perform reliably and which can be cost-effectively and safely maintained. Techniques such as software configuration management have proved to be invaluable during the development process to ensure that this is the case. However, there are a very large number of legacy systems which were not developed under controlled conditions, but which still, need to be maintained due to the heavy investment incorporated within them. Such systems are characterised by extremely high program comprehension overheads and the probability that new errors will be introduced during the maintenance process often with serious consequences. To address the issues concerning maintenance of legacy systems this thesis has defined and developed a new process and associated maintenance model, Inverse Software Configuration Management (ISCM). This model centres on a layered approach to the program comprehension process through the definition of a number of software configuration abstractions. This information together with the set of rules for reclaiming the information is stored within an Extensible System Information Base (ESIB) via, die definition of a Programming-in-the- Environment (PITE) language, the Inverse Configuration Description Language (ICDL). In order to assist the application of the ISCM process across a wide range of software applications and system architectures, die PISCES (Proforma Identification Scheme for Configurations of Existing Systems) method has been developed as a series of defined procedures and guidelines. To underpin the method and to offer a user-friendly interface to the process a series of templates, the Proforma Increasing Complexity Series (PICS) has been developed. To enable the useful employment of these techniques on large-scale systems, the subject of automation has been addressed through the development of a flexible meta-CASE environment, the PISCES M4 (MultiMedia Maintenance Manager) system. Of particular interest within this environment is the provision of a multimedia user interface (MUI) to die maintenance process. As a means of evaluating the PISCES method and to provide feedback into die ISCM process a number of practical applications have been modelled. In summary, this research has considered a number of concepts some of which are innovative in themselves, others of which are used in an innovative manner. In combination these concepts may be considered to considerably advance the knowledge and understanding of die comprehension process during the maintenance of legacy software systems. A number of publications have already resulted from the research and several more are in preparation. Additionally a number of areas for further study have been identified some of which are already underway as funded research and development projects.
Style APA, Harvard, Vancouver, ISO itp.
9

Selby, A. P. "Homology of configuration spaces". Thesis, University of Cambridge, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.308142.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
10

ZARRAS, APOSTOLOS. "Configuration systematique de middleware". Rennes 1, 2000. http://www.theses.fr/2000REN10010.

Pełny tekst źródła
Streszczenie:
Le traitement de problemes rencontres dans la construction de differentes familles d'applications a donne lieu a la definition et a la standardisation d'une couche logicielle qui se situe entre l'application et le systeme d'exploitation sous-jacent. Cette couche est connue sous le nom de middleware, et fournit des solutions reutilisables aux problemes recurrents dans la construction de logiciels complexes, comme l'heterogeneite, l'interoperabilite, la securite, la tolerance aux fautes ou encore l'execution de transactions. Un middleware est typiquement construit a partir de services fournis par une infrastructure. Des exemples connus de telles infrastructures sont celles conformes au standard corba, dcom ou encore ejb. L'implementation d'un logiciel s'appuyant sur des solutions reutilisables, fournies par les infrastructures middleware, simplifie de maniere evidente le processus de developpement du logiciel. Les developpeurs de logiciels se trouvent affranchis de l'implementation de protocoles de gestion des communications, de la securite ou encore de modeles transactionnels. Etant donnee une infrastructure middleware, le travail du developpeur quant a la mise en uvre d'un systeme d'execution (ou middleware) pour une application donnee est la combinaison de services middleware disponibles de telle sorte que le systeme resultant satisfasse les exigences de l'application. L'effort a fournir porte donc sur la conception d'architectures middleware qui satisfont les exigences particulieres des applications. Notre travail de these a porte sur l'exploitation de la notion d'architecture logicielle pour la construction systematique de middleware, adaptes aux applications. Plus precisement, nous proposons l'utilisation d'un langage de description d'architectures et d'un ensemble d'outils associes pour systematiser : la conception d'une architecture middleware qui reponde aux besoins d'une application donnee, l'integration de cette architecture au sein de l'application, et la maintenance de cette architecture au regard des evolutions relatives aux exigences de l'application ou a la disponibilite des services middleware. La solution proposee a la construction systematique de middleware adaptes aux besoins des applications comprend un systeme de stockage qui garde trace de l'historique des conceptions d'architectures middleware. Ce systeme de stockage contient en outre les implementations d'architectures concretes qui resultent des etapes de conceptions memorisees. Nous introduisons par ailleurs une methode pour la localisation systematique de chemins de conceptions, i. E. Sequences d'etapes de conceptions, qui conduisent eventuellement a des architectures concretes de middleware, satisfaisant les exigences d'une application donnee. Cette facilite est completee par une methode de developpement d'implementations d'architectures concretes de middleware, qui peuvent etre aisement integrees au sein d'une application. Enfin, nous donnons une solution a l'adaptation dynamique d'un middleware construit suivant notre methode, qui preserve l'execution coherente de l'application s'appuyant sur celui-ci. Une telle fonctionnalite est essentielle pour la maintenance d'une architecture middleware au regard de l'evolution des exigences de l'application et de l'infrastructure middleware.
Style APA, Harvard, Vancouver, ISO itp.
11

Lichtner, Ondrej. "Networking Subsystem Configuration Interface". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-235421.

Pełny tekst źródła
Streszczenie:
Cílem diplomové práce je návrh síťové konfigurační knihovny s důrazem kladeným na přenositelnost mezi operačními systémy na bázi Linuxu a BSD a rozšiřitelnosti podpory knihovny. V druhé kapitole práce zkoumá dostupné konfigurační rozhraní obou operačních systémů. Detailně pak rozebírá vlastnosti rozhraní Netlink socketů, které je primárním konfiguračním rozhraním pro síťové prvky na Linuxu, a systémové volání ioctl, které má na Linuxu menší schopnosti, ale zato je primárně používané na BSD a jiných UNIX systémech. Jsou též zkoumané rozhraní pro konfiguraci rozdílných firewallů. V třetí kapitole je práce zameřená na konkrétní typy síťových zařízení, specifika jejich konfigurace a jejich návaznost na rozhraní jádra popsané v druhé kapitole. V čtvrté kapitole jsou formulovány požadavky na konfigurační knihovnu: jednoduchá rozšiřitelnost, přenositelnost na různé operační systémy, podpora sledování změn a událostí a rozšiřitelnost o různé typy uživatelských rozhraní. Na základě výzkumu z předcházejících dvou kapitol je přednesen návrh knihovny. Návrh definuje konfigurační rozhraní jako hierarchii abstraktních tříd, oddělených od implementace. To umožnuje mít současně několik implementací stejného konfiguračního rozhraní i v rámci jednoho operačního systému. Jako vstupní rozhraní knihovny je definovaná třída LibNCFG, která má na starosti tyto konfigurační objekty vytvořit namísto uživatele. Tímto je dosažená jednoduchá rozšiřitelnost knihovny o nové rozhraní operačních systémů i o podporu konfigurace nových síťových prvků. Podpora pro nové uživatelské rozhraní se dá implementovat jako nová služba, která zabaluje rozhraní knihovny a poskytuje jiná rozhraní. Pro podporu sledování změn poskytuje třída LibNCFG metody pro registraci zpětných volání pro definované události. Ve čtvrté kapitole práce detailně popisuje rozhraní třídy LibNCFG, modulu Common a tříd NetDevice, EthDevice a BondDevice, které definují konfigurační rozhraní příslušných typů síťových zařízení. Pro tyto třídy jsou implementované konkrétní třídy NetlinkNetDevice, NetlinkEthDevice a sysfsBondDevice a popsané jejich implementační detaily. V páté kapitole je popsaná ukázková aplikace, která byla implementovaná pro účely předvedení jednoduchosti použití konfigurační knihovny. Nakonec jsou v závěru shrnuté výsledky práce a je vedena diskuze o možných vylepšeních a o pokračování projektu.
Style APA, Harvard, Vancouver, ISO itp.
12

Sagrén, Richard, i Alexander Yun. "Quadrotor in Y4 Configuration". Thesis, KTH, Maskinkonstruktion (Inst.), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-226658.

Pełny tekst źródła
Streszczenie:
Small aerial vehicles are increasing in popularity and the market is rapidlygrowing, especially for the ones called quadrotors or quadcopters due to theirsimplicity. Our project for this bachelor thesis was to build, investigate andfly a quadcopter in Y4 configuration. In this case the aircraft comprises onecentered main rotor for lift and three boom rotors facing upwards for stabilityand control. Light and rigid material were chosen for the construction, anArduino Uno R3 board as flight controller and an open source software tocontrol it. It can be concluded that a similar construction is feasible, and isable to fly. In this specific project stability is the main issue.
Små flygande farkoster blir allt vanligare och det är en snabbt växande marknad,speciellt för quadcoptrar eller quadrotors som de även kallas, då dessahar en simpel mekanisk konstruktion och är relativt billiga att tillverka. Dettakandidatexamensprojekt går ut på att konstruera, bygga, undersöka och flygaen quandrotor i Y4-format. I detta fall består denna av en huvudrotor för attgenerera lyftkraft samt tre armar, var och en med en mindre rotor riktad uppåt,för att ge stabilitet och styrförmåga. Lätta och styva material har använts förkonstutionen, en Arduino Uno R3 mikrokontroller till flygdator och en mjukvaramed öppen källkod för att kontrollera denna. Den slutsats som dras är att en sådan konstruktion är rimlig, och kan flyga. I detta specifika projekt ärstabilitet det största problemet.
Style APA, Harvard, Vancouver, ISO itp.
13

Šipka, Ladislav. "Implementace procesu Configuration management". Master's thesis, Vysoká škola ekonomická v Praze, 2010. http://www.nusl.cz/ntk/nusl-75832.

Pełny tekst źródła
Streszczenie:
The aim of this Thesis is to describe the practical implementation of process management in terms of Configuration Management process and subsequent implementation support tool, configuration and management database, focusing on describing and identifying particular steps needed for the definition and implementation process and the subsequent selection and implementation support tools. As an initial base of this Thesis I have used the practical experience of projects focusing on the definition and implementation of process management and subsequent implementation support tools, in which I acted in the role of the Configuration Manager. It means I assisted at course of entire projects. The Thesis focuses mainly on my run and defined Configuration Management process and describes the process and importance of various activities leading to the successful establishment of a process into practice, including identified problems and some of their solutions. The result of this Thesis should approach introducing one of the process of family ITIL v. 2 to practice and subsequent leading to the selection and implementation of the configuration and management database, as a major output of this process.
Style APA, Harvard, Vancouver, ISO itp.
14

Pfitzner, Kerstin. "Choreography configuration for BPMN". [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-33758.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
15

Trivic, Göran, i Mohammed Azan. "Cloudify our product configuration". Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40804.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

El-Habrouk, Mohamed. "A new configuration for shunt active power filters". Thesis, Brunel University, 1998. http://bura.brunel.ac.uk/handle/2438/5241.

Pełny tekst źródła
Streszczenie:
This thesis presents a new power circuit configuration to be used in shunt active power filters. A new control algorithm based on the linear voltage control suitable for the proposed circuit is introduced. The system is analysed both in time and frequency domains. The practical implementation of the system proves its suitability for the proposed task. The switching frequency of the proposed circuit is much lower than that in other active filters. The switching losses are then considerably reduced, in addition to the fact that the switching devices can withstand larger values of currents being switched on and off at lower frequencies which is an advantage to this circuit. The component sizes (capacitors and inductors) in the proposed circuit are also much smaller than those in other filter configurations. In addition, the thesis presents a new method for categorising the active filter systems proposed in the surveyed literature. The survey includes a comparison of these techniques showing their respective merits and drawbacks. The thesis also includes an implementation of a reference current generator that is suitable for single-phase applications without the need for excessive computations. The technique involves a modified Fourier analysis, which is suitable for active filtering applications.
Style APA, Harvard, Vancouver, ISO itp.
17

Stein, Benno. "Functional models in configuration systems". [S.l. : s.n.], 1995. http://deposit.ddb.de/cgi-bin/dokserv?idn=975239856.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
18

Jensen, Per. "Software Configuration Management i labbmiljö". Thesis, University of Skövde, School of Humanities and Informatics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-930.

Pełny tekst źródła
Streszczenie:

I nästan varje större organisation som arbetar med mjukvaruutveckling är ett "Software Configuration Management" (SCM) system ett måste. Anledningen till detta är att under utvecklingsfasen förändras mjukvarukoden ofta. Detta leder till att det är svårt att exempelvis spåra ändringar som gjorts tidigare i koden. Om organisationen inte har ett SCM-system blir situationen lätt kaotisk.

Att välja ett SCM-verktyg är inte enkelt. Det finns en uppsjö av verktyg på marknaden och varje leverantör erbjuder sina lösningar på problemen. Orsaken till detta är att det inte finns en standard som ett SCM-system måste följa. Det är helt och hållet upp till leverantören vad som ska ingå i systemet och hur det ska fungera. Detta gör det svårt för de organisationer som planerar att köpa in eller har köpt in ett SCM-system för att få den önskade funktionaliteten. Organisationen får helt enkelt anpassa sig efter verktyget.

Denna rapport kommer att fokusera på hur det är möjligt att få önskad funktionalitet eller kunna göra förbättringar mot ett befintligt SCM-system genom design av ett fristående verktyg som arbetar mot det i organisationen befintliga SCM-systemet.

Style APA, Harvard, Vancouver, ISO itp.
19

Bellissard, Luc. "Construction et configuration d'applications réparties". Phd thesis, Grenoble INPG, 1997. http://tel.archives-ouvertes.fr/tel-00004918.

Pełny tekst źródła
Streszczenie:
L'objectif de cette thèse est d'étudier les modèles de construction et de configuration d'applications réparties. La configuration d'une application correspond à la fois à l'identification de l'architecture logicielle et à son adaptation aux ressources disponibles dans un environnement réparti pour produire une image exécutable de l'application. Le résultat de ce travail est en premier lieu le langage de configuration Olan (OCL) qui apporte des solutions aux problèmes de définition de l'architecture d'une application, d'intégration de logiciels existants hétérogènes, d'adaptation aux facteurs de répartition, notamment aux ressources et mécanismes répartis disponibles, et enfin à la génération de l'image exécutable. En second lieu, ce travail propose un support système permettant d'installer et de déployer l'applications selon les directives et contraintes spécifiées au travers de l'architecture.
Style APA, Harvard, Vancouver, ISO itp.
20

Warin, Patrick. "Magnétorésistance et configuration de domaines". Phd thesis, Université Pierre et Marie Curie - Paris VI, 1999. http://tel.archives-ouvertes.fr/tel-00000860.

Pełny tekst źródła
Streszczenie:
Dans cette thèse, nous nous sommes attachés à mesurer la résistance induite par les parois magnétiques dans différents métaux ferromagnétiques (fer, cobalt, oxydes de manganèse, alliage de Fe0.5Pa0.5). Le premier circuit étudié consistait en un fil de 200 nanomètres de large et 50 nanomètres d'épaisseur, fabriqué par lithographie électronique. Par microscopie à force magnétique et microscopie de Lorentz nous avons observé que les domaines sont en position tête-bêche dans l'état vierge dans des fils de cobalt. La configuration magnétique a été suivie en fonction du champ appliqué. Par lithographie électronique, nous avons pu disposer sur le fil des contacts en or. Dans le cobalt, la résistance d'une paroi magnétique unique a été mesurée et sa valeur est supérieure aux prédictions théoriques. Dans le manganite, sur un circuit équivalent, nous avons pu mesurer la magnétorésistance de joints de grain. Nous avons aussi effectué la mesure de la résistance d'une paroi sur une couche à aimantation perpendiculaire (alliage de fer-palladium), dont les domaines étaient alignés. Nous avons mesuré la résistance perpendiculairement (MR=9%) et parallèlement (MR=2.8%) aux parois, et ainsi corroboré certains modèles. Nous avons, par ailleurs, étudié (expérimentalement et numériquement) des systèmes magnétiques dans lesquels l'anisotropie de forme joue un rôle prépondérant. Dans des plots triangulaires de taille variant entre 0.1 et 2 microns, la frustration géométrique stabilise des états de vortex. Dans des lignes de fer-palladium, nous avons montré que les dimensions des domaines étaient conservées lorsque la taille latérale du système était réduite jusqu'à 300 nanomètres En revanche, l'orientation des domaines devient anisotrope et les parois magnétiques s'orientent perpendiculairement à l'axe de la ligne. Ces études permettent de mieux comprendre les effets de l'anisotropie de forme.
Style APA, Harvard, Vancouver, ISO itp.
21

Ku, Fei Yen. "Towards Automatic Initial Buffer Configuration". Thesis, University of Waterloo, 2003. http://hdl.handle.net/10012/1078.

Pełny tekst źródła
Streszczenie:
Buffer pools are blocks of memory used in database systems to retain frequently referenced pages. Configuring the buffer pools is a difficult and manual task that involves determining the amount of memory to devote to the buffer pools, the number of buffer pools to use, their sizes, and the database objects assigned to each buffer pool. A good buffer configuration improves query response times and system throughput by reducing the number of disk accesses. Determining a good buffer configuration requires knowledge of the database workload. Empirical studies have shown that optimizing the initial buffer configuration (determined at database design time) can improve system throughput. A good initial configuration can also provide a faster convergence towards a favorable dynamic buffer allocation. Previous studies have not considered automating the buffer pool configuration process. This thesis presents two techniques that facilitate the initial buffer configuration task. First, we develop an analytic model of the GCLOCK buffer replacement policy that can be used to evaluate the effectiveness of a particular buffer configuration for a given workload. Second, to obtain the necessary model parameters, we propose a workload characterization scheme that extracts workload parameters, describing the query reference patterns, from the query access plans. In addition, we extend an existing multifractal model and present a multifractal skew model to represent query access skew. Our buffer model has been validated against measurements of the buffer manager of a commercial database system. The model has also been compared to an alternative GCLOCK buffer model. Our results show that our proposed model closely predicts the actual physical read rates and recognizes favourable buffer configurations. This work provides a foundation for the development of an automated buffer configuration tool.
Style APA, Harvard, Vancouver, ISO itp.
22

Kristensson, Johan. "Optimization of Configuration Management Processes". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188784.

Pełny tekst źródła
Streszczenie:
Configuration management is a process for establishing and maintaining consistency of a product's performance, as well as functional and physical attributes with regards to requirements, design and operational information throughout its lifecycle. The way configuration management is implemented in a project has a huge impact on the project’s chance of success. Configuration management is, however, notoriously difficult to implement in a good way, i.e. in such a way that it increases performance and decrease the risk of projects. What works well in one field may be difficult to implement or will not work in another. The aim of this thesis is to present a process for optimizing configuration management processes, using a telecom company as a case study. The telecom company is undergoing a major overhaul of their customer relationship management system, and they have serious issues with quality of the software that is produced and meeting deadlines, and therefore wants to optimize its existing CM processes in order to help with these problems. Data collected in preparation for the optimization revealed that configuration management tools were not used properly, tasks that could be automated were done manually, and existing processes were not built on sound configuration management principles. The recommended optimization strategy would have been to fully implement a version handling tool, and change the processes to take better advantage of a properly implemented version handling tool. This was deemed too big a change though, so instead a series of smaller changes with less impact were implemented, with the aim of improving quality control to minimize the number of bugs that reached production. The majority of the changes had the purpose of replicating the most basic functions of a version handling tool, as well as automating manual tasks that were error prone.
Configuration management är en process för att etablera och bevara konsistensen hos en produkts prestanda, så väl som funktionella och fysiska attribut med avseende på krav, design och driftinformation genom dess livscykel. Hur konfigurationshantering implementeras i ett projekt har en avsevärd betydelse för huruvida projektet kommer att lyckas eller ej. Configuration management är dock ökänt för att vara svårt att implementera på ett bra sätt, d.v.s. så att det ökar prestandan och minskar risken i projekt. Det som fungerar bra inom en bransch kan vara svårt att implementera eller fungerar inte i en annan. Målet med denna studie är presentera en process for optimering av konfigurationshanteringsprocesser där ett telekomföretag använts som en fallstudie. Telekomföretaget genomgår en stor upprusting av sitt kund-system. Företaget har stora problem med kvalitén på den mjukvara de tar fram och att möta levaranstidpunkter, och vill därför förbättra sina processer för att komma till rätta med dessa problem. Data som samlades in inför optimeringen visar att CM-verktyg ej användes på korrekt vis, arbetsuppgifter som kunde automatiserats gjordes manuellt, och existerande processer byggde ej på best practices inom CM. De rekommenderade optimeringsstrategin var att implementera och använda ett versionhanteringssystem, och ändra processerna för att dra nytta av fördelarna med ett korrekt implementerat versionshanteringssystem. Detta ansågs dock vara en allt för stor förändring, så istället genomfördes ett antal mindre ändringar med mindre påverkan, med målet att förbättra kvalitetskontrollerna och minimera antalet fel som nådde produktion. Majoriteten av ändringarna hade syftet att replikera de mest grundläggande funktionaliteten hos ett versionhanteringsverktyg, så väl som att automatisera felbenägna manuella rutiner.
Style APA, Harvard, Vancouver, ISO itp.
23

Ollesson, Niklas. "Automatic Configuration of Vision Sensor". Thesis, Linköpings universitet, Datorseende, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-93415.

Pełny tekst źródła
Streszczenie:
In factory automation cameras and image processing algorithms can be used to inspect objects. This can decrease the faulty objects that leave the factory and reduce manual labour needed. A vision sensor is a system where camera and image processing is delivered together, and that only needs to be configured for the application that it is to be used for. Thus no programming knowledge is needed for the customer. In this Master’s thesis a way to make the configuration of a vision sensor even easier is developed and evaluated. The idea is that the customer knows his or her product much better than he or she knows image processing. The customer could take images of positive and negative samples of the object that is to be inspected. The algorithm should then, given these images, configure the vision sensor automatically. The algorithm that is developed to solve this problem is described step by step with examples to illustrate the problems that needed to be solved. Much of the focus is on how to compare two configurations to each other, in order to find the best one. The resulting configuration from the algorithm is then evaluated with respect to types of applications, computation time and representativeness of the input images.
Style APA, Harvard, Vancouver, ISO itp.
24

Qiu, Jin 1962. "Production control and capacity configuration". Thesis, McGill University, 1994. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=28646.

Pełny tekst źródła
Streszczenie:
Production control and capacity configuration policies are critical to a manufacturing firm for effective inventory control. In the first part of this dissertation, a Dynamic Programming model and a solution algorithm are developed to obtain an optimal (near-optimal) production control policy. The solution algorithm is able to produce an extremely good policy under mild conditions, but is applicable only to problems with a limited number of products. For problems involving a large number of products, a heuristic algorithm based on a decomposition/aggregation scheme is then proposed. This algorithm overcomes the computational difficulty typically associated with Dynamic Programming problems with a large number of state dimensions. Computational test results are reported to show the performance of the policy generated by the heuristic algorithm. In the second part of the dissertation, the production lead time and operational cost performance of two capacity configurations are analyzed. Models are developed for each configuration to determine the amount of capacity which minimizes the total capacity acquisition and operational costs, including the inventory cost. Computational test results are presented to study the impact of problem characteristics on the superiority of each configuration.
Style APA, Harvard, Vancouver, ISO itp.
25

Costa, Armindo Emanuel. "Topological complexity of configuration spaces". Thesis, Durham University, 2010. http://etheses.dur.ac.uk/736/.

Pełny tekst źródła
Streszczenie:
In this thesis we study the homotopy invariant TC(X); the topological complexity of a space X. This invariant, introduced by Farber in [15], was originally motivated by a problem in Robotics; the motion planning problem. We study relations between the topological complexity of a space and its fundamental group, namely when the fundamental group is ”small”, i.e. either has small order or small cohomological dimension. We also apply the navigation functions technique introduced in [20] to the study of the topological complexity of projective and lens spaces. In particular, we introduce a class of navigation functions on projective and lens spaces. It is known ([25]) that the topological complexity of a real projective space equals one plus its immersion dimension. A similar approach to the immersion dimension of some lens spaces has been suggested in [31]. Finally, we study the topological complexity (and other invariants) of random right-angled Artin groups, i.e. the stochastic behaviour of the topological complexity of Eilenberg-MacLane spaces of type K(G, 1), where G is a right-angled Artin group associated to a random graph.
Style APA, Harvard, Vancouver, ISO itp.
26

Afriat, Alexander. "Quantum waves in configuration space". Thesis, London School of Economics and Political Science (University of London), 1999. http://etheses.lse.ac.uk/2085/.

Pełny tekst źródła
Streszczenie:
The thesis deals with issues in the foundations of quantum mechanics, having to do with configuration space, the physical reality of quantum waves, additive conservation and EPR experiments. After a historical sketch of optical theories, concentrating on the dual nature of light, the passage from Hamilton's optico-mechanical analogy to wave mechanics is looked at. The wave-particle duality of de Broglie's theorie de la double solution is favoured after comparison with some of Schrodinger's views. Three experiments are considered which support that realist duality by indicating corpuscular and undulatory properties. If wave and particle coexist and the wave guides the particle along its trajectory, the wave must have a physical reality. The issue is whether such a wave can propagate in a fictitious configuration space. Features of quantum-mechanical interference are represented on the Riemann sphere. The treatment is generalized to infinite dimensions and then to tensor product spaces. 'Entanglement' is defined; certain states of composite systems cannot be broken up in such a way that every subsystem has a (pure) state. Entanglement is shown to be always empirically visible in principle; for every entangled state there exists a 'sensitive' observable which can tell apart from any mixture of factorizable states. Observables represented by functions of tensor products of operators cannot, however, tell the difference. Additive conservation is considered separately from interference, and is related to Schmidt's theorem and Bertlmann's socks in cases involving two subsystems. The treatment is then generalized to N subsystems. Interference and additive conservation are combined in two examples; the violation of Bell's inequality, and the theorem of Wigner, Araki and Yanase. Schrodinger's cat is made to 'oscillate.' Interpretations of quantum waves in configuration space are assessed and Furry's hypothesis discarded. The distinction is drawn between weak Bell inequalities deduced from local realism alone, and strong inequalities which involve physically unreasonable additional assumptions. It is shown that, as long as inefficient detectors are employed, photons can only be used to violate strong inequalities. Kaons are almost always detected and can be used to discriminate between quantum mechanics and local realism, and determine whether quantum waves really propagate in configuration space.
Style APA, Harvard, Vancouver, ISO itp.
27

Jiang, Sheng. "All-GaN integrated cascode configuration". Thesis, University of Sheffield, 2018. http://etheses.whiterose.ac.uk/20183/.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
28

Douglas, Steven R. "Network Configuration for Range Interconnectivity". International Foundation for Telemetering, 1994. http://hdl.handle.net/10150/611745.

Pełny tekst źródła
Streszczenie:
International Telemetering Conference Proceedings / October 17-20, 1994 / Town & Country Hotel and Conference Center, San Diego, California
A demonstration of near real-time performance assessment for the Program Executive Officer for Cruise Missiles Project and Unmanned Aerial Vehicles, Cruise Test Directorate, PEO(CU)-CT, was conducted between 22 March 1994 through 4 May 1994. The demonstration involved the temporary installation of a portable TOMAHAWK telemetry recording and telecommunications capability at the Air Force Development Test Center range at Eglin Air Force Base, Florida and a receiving telecommunications capability at the Naval Warfare Assessment Division (NWAD), Corona, California. The system was successfully used on 4 May 1994 to record TOMAHAWK missile telemetry data in real-time in support of Operational Test Launch (OTL)-163 and to transfer that data to the weapons system performance analysts at NWAD in near real-time. The one hour and three minutes of flight data was compressed in real-time as it was recorded, then, after completion of the flight, the data was transferred to NWAD in about 12 minutes using the switched 56 kbps network. Additional transfers using the Defense Commercial Telecommunications Network (DCTN) were also conducted. All transfers were secured using ethernet encryptors. The data was processed by both the NWAD telemetry ground station and the TOMAHAWK workstation complex. This paper quantifies the results and documents the lessons learned from this demonstration and proposes a standardized system design for possible implementation at TOMAHAWK test range sites in the future. A position is taken that for situations where the remote site (e.g. other range or data analysis site) does not exercise direct operational control over the test/host range, near real-time data relay solutions are not only as adequate, but in many cases are preferable to real-time solutions.
Style APA, Harvard, Vancouver, ISO itp.
29

Palmer, Martin. "Configuration spaces and homological stability". Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:7e056dbd-2cdd-4eac-9473-53f750371f9a.

Pełny tekst źródła
Streszczenie:
In this thesis we study the homological behaviour of configuration spaces as the number of objects in the configuration goes to infinity. For unordered configurations of distinct points (possibly equipped with some internal parameters) in a connected, open manifold it is a well-known result, going back to G. Segal and D. McDuff in the 1970s, that these spaces enjoy the property of homological stability. In Chapter 2 we prove that this property also holds for so-called oriented configuration spaces, in which the points of a configuration are equipped with an ordering up to even permutations. There are two important differences from the unordered setting: the rate (or slope) of stabilisation is strictly slower, and the stabilisation maps are not in general split-injective on homology. This can be seen by some explicit calculations of Guest-Kozlowski-Yamaguchi in the case of surfaces. In Chapter 3 we refine their calculations to show that, for an odd prime p, the difference between the mod-p homology of the oriented and the unordered configuration spaces on a surface is zero in a stable range whose slope converges to 1 as p goes to infinity. In Chapter 4 we prove that unordered configuration spaces satisfy homological stability with respect to finite-degree twisted coefficient systems, generalising the corresponding result of S. Betley for the symmetric groups. We deduce this from a general “twisted stability from untwisted stability” principle, which also applies to the configuration spaces studied in the next chapter. In Chapter 5 we study configuration spaces of submanifolds of a background manifold M. Roughly, these are spaces of pairwise unlinked, mutually isotopic copies of a fixed closed, connected manifold P in M. We prove that if the dimension of P is at most (dim(M)−3)/2 then these configuration spaces satisfy homological stability w.r.t. the number of copies of P in the configuration. If P is a sphere this upper bound on its dimension can be increased to dim(M)−3.
Style APA, Harvard, Vancouver, ISO itp.
30

Cardenas, Alex Sierra. "Center of Brauer configuration algebras". Universidade de São Paulo, 2017. http://www.teses.usp.br/teses/disponiveis/45/45131/tde-05122017-151146/.

Pełny tekst źródła
Streszczenie:
In the present thesis we introduce a new class of finite dimensional algebras that we call Brauer configuration algebras. Besides studying some of the basic properties of a Brauer configuration algebra, we focus our work on developing the necessary tools to calculate an explicit basis of its center. We also obtain an interesting expression for the value of the dimension of the center that shows that it can be directly read off from the combinatorial data of the Brauer configuration.
Na presente tese apresentamos uma nova classe the álgebras de dimensão finita que vamos chamar de álgebras de configuração de Brauer. Além de estudar algumas das propriedades básicas de uma algebra de configuração de Brauer, vamos concentrar nosso trabalho em de- senvolver as ferramentas necessárias para o cálculo de uma base explícita do centro. Também obtemos uma expressão interessante do valor da dimensão do centro que mostra que esse valor pode-se cacular diretamente dos dados combinatórios da configuração de Brauer.
Style APA, Harvard, Vancouver, ISO itp.
31

Estratat, Mathieu. "Vers les grammaires de configuration". Aix-Marseille 3, 2006. http://www.theses.fr/2006AIX30056.

Pełny tekst źródła
Streszczenie:
Cette thèse a pour objet d’utiliser la recherche de modèles finis comme un cadre unique pour l’analyse de langages naturels du double point de vue syntaxique et sémantique. Pour la syntaxe, les grammaires de configuration que nous proposons offrent un cadre formel de représentation et d’étude de grammaires. Elles autorisent notamment la réalisation d’un analyseur syntaxique par simple définition de la grammaire. Le traitement de la sémantique est envisagé, quant à lui, sur des textes descriptifs (décrivant des objets). Ces traitements syntaxico-sémantiques sont décrits par des modèles objets contraints, formalisés grâce au langage Z. Cette méthode, nouvelle à notre connaissance dans le domaine de l’analyse du langage naturel, présente l’avantage d’être indépendante des techniques de résolution. Nous avons choisi une méthode de recherche de modèles finis, la configuration, pour la recherche de solutions à partir d’une interprétation du modèle objet contraint
The goal of this thesis is to use finite models search as a single natural language parsing framework at both syntactical and semantical points of view. For the syntax, the configuration grammars we propose offer a formal framework for the representation and studying of grammars. They allow the implementation of a syntactical parser, just by defining the grammar. The semantics treatment is based on descriptive texts (which describe objects). These syntactico-semantic treatments are described by constrained object models, formalized with the Z language. This method, new to the best of our knowledge in natural language analysis, presents the advantage of being independant from resolution technics. We are using a finite model search method, called configuration, for searching a solution out of an interpretation of the constrained object model
Style APA, Harvard, Vancouver, ISO itp.
32

Warin, Patrick. "Magnetoesistance et configuration de domaines". Paris 6, 1999. https://tel.archives-ouvertes.fr/tel-00000860.

Pełny tekst źródła
Streszczenie:
Dans cette these, nous nous sommes attaches a mesurer la resistance induite par les parois magnetiques dans differents metaux ferromagnetiques (fer, cobalt, oxydes de manganese, alliage de fe 0. 5pa 0. 5). Le premier circuit etudie consistait en un fil de 200 nanometres de large et 50 nanometres d'epaisseur, fabrique par lithographie electronique. Par microscopie a force magnetique et microscopie de lorentz nous avons observe que les domaines sont en position tete-beche dans l'etat vierge dans des fils de cobalt. La configuration magnetique a ete suivie en fonction du champ applique. Par lithographie electronique, nous avons pu disposer sur le fil des contacts en or. Dans le cobalt, la resistance d'une paroi magnetique unique a ete mesuree et sa valeur est superieure aux predictions theoriques. Dans le manganite, sur un circuit equivalent, nous avons pu mesurer la magnetoresistance d'un seul joint de grain. Nous avons aussi effectue la mesure de la resistance d'une paroi sur une couche a aimantation perpendiculaire (alliage de fer-palladium), dont les domaines etaient alignes. Nous avons mesure la resistance perpendiculairement (mr = 9%) et parallelement (mr = 2. 8%) aux parois, et ainsi corrobore certains modeles. Nous avons, par ailleurs, etudie (experimentalement et numeriquement) des systemes magnetiques dans lesquels l'anisotropie de forme joue un role preponderant. Dans des plots triangulaires de taille variant entre 0. 1 et 2 microns, la frustration geometrique stabilise des etats de vortex. Dans des lignes de fer-palladium, nous avons montre que les dimensions des domaines etaient conservees lorsque la taille laterale du systeme etait reduite jusque 300 nanometres. En revanche, l'orientation des domaines devient anisotrope et les parois magnetiques s'orientent perpendiculairement a l'axe de la ligne. Ces etudes permettent de mieux comprendre les effets de l'anisotropie de forme.
Style APA, Harvard, Vancouver, ISO itp.
33

ASCHOFF, Rafael Roque. "DNCP: dynamic node configuration protocol". Universidade Federal de Pernambuco, 2010. https://repositorio.ufpe.br/handle/123456789/2381.

Pełny tekst źródła
Streszczenie:
Made available in DSpace on 2014-06-12T15:57:34Z (GMT). No. of bitstreams: 2 arquivo3208_1.pdf: 2070521 bytes, checksum: e116b054c78a9f150df6289d879355a2 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2010
Conselho Nacional de Desenvolvimento Científico e Tecnológico
Rede Móvel Ad Hoc (MANET) é uma rede sem fio onde os nós podem se mover livremente e formar, dinamicamente, topologias de rede temporárias e arbitrárias sem qualquer controle centralizado ou infra-estrutura de comunicação estabelecida previamente. Nestas redes, os nós agem de maneira cooperativa, encaminhando pacotes uns aos outros, de forma a possibilitar a comunicação entre pares de nós que se encontram fora do alcance direto de transmissão sem fio. Nos últimos anos, as pesquisas direcionadas à MANETs têm recebido grande atenção do governo, academia e indústria. Contudo, ainda existem algumas questões em aberto relativas à implantação de MANETs que impedem o desenvolvimento de aplicações reais e difusão das mesmas. O avanço das pesquisas nesta área poderia melhorar o desempenho atual no uso destas redes, bem como propiciar o surgimento de novos campos de aplicação. Além disso, ainda existe um grande potencial econômico a ser explorado no que se refere ao uso de redes móveis ad hoc. Um dos principais desafios relativos à implantação de MANETs é a configuração adequada dos endereços de rede. Tais endereços precisam ser únicos dentro do mesmo domínio de roteamento, ou em outras palavras, um MANET não deve conter dois dispositivos configurados com o mesmo endereço de rede. A configuração estática dos nós ad hoc não é viável devido à natureza dinâmica destas redes, e esquemas tradicionais desenvolvidos para as redes infraestruturadas não são adequados. Estas questões motivaram algumas pesquisas destinadas à permitir que os nós se configurarem sem intervenção humana, resultando em uma série de métodos para configuração automática de endereços. Estas soluções, no entanto, apresentam uma série de limitações, relacionadas principalmente à aplicabilidade em cenários restritos ou introdução elevada de sobrecarga na rede. Este trabalho apresenta um método escalável e eficiente para alocação e organização do espaço de endereçamento em redes móveis ad hoc. Uma revisão bibliográfica dos trabalhos existentes é apresentada, considerando as vantagens e limitações de cada um. Por fim, o trabalho apresenta uma avaliação preliminar do método proposto, considerando diferentes cenários e métricas
Style APA, Harvard, Vancouver, ISO itp.
34

Traustadóttir, Sólrún. "System Configuration in Design Automation". Thesis, KTH, Industriell produktion, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254442.

Pełny tekst źródła
Streszczenie:
Some companies have managed to gain an advantage in today’s increasingly competitive market by utilizing product configuration software. However, many companies in the industrial manufacturing industry offer systems of configurable products and wish to be able to configure the products both individually and together as a system. The project described in this thesis was carried out at Tacton Systems, a provider of sales and product configuration software. This project aims to contribute to the literature knowledge on system configuration by researching, through literature study and interviews, what types of systems companies want to be able to configure, and what relationships or interfaces are needed between the configurable modules forming the system. The result was that it is possible to look at each system in levels of abstraction. When looking at whole systems, the system structures can be split into two types, i.e., linear systems and central systems. Parameters need to be communicated between the modules in the system. The module interfaces defined in the Tactonmodel could carry enough information to establish the necessary relationships between the modules and thus make different parameter types irrelevant. Furthermore, this project investigates different aspects of how Computer AidedDesign (CAD) models for system configuration in Solid Works need to be structured to work in a robust way for design automation. Different functions were tried on a relatively simple model as a proof of concept. The main result is that the most robust way to do the mates between the configurable components is to assign them to reference geometry that is built into templates. This project focused on investigating the possibility for system configuration in the design automation environment, but it is necessary for Tacton to look at the future development in a holistic view.
Vissa företag har lyckats skapa en fördel i dagens alltmer konkurrensutsatta marknad genom att använda produktkonfigurationsprogram. Många företag inom industrin tillverkar dock hela system med konfigurbara produkter och vill därför kunna konfigurera produkterna både individuellt och tillsammans som ett system. Projektet som beskrivs i denna avhandling utfördes hos Tacton Systems, en leverantör av försäljnings- och produktkonfigurationsprogram. Avhandlingen syftar till att bidra till litteraturkunskapen om systemkonfiguration genom att undersöka vilka typer av system företag vill kunna konfigurera, och vilka relationer eller gränssnitt som behövs mellan de konfigurbara modulerna som bildar systemet. För att åstadkomma detta genomfördes en studie av litteratur och intervjuer. Resultatet var att det är möjligt att titta på varje system i abstraktionsnivåer. När man tittar på hela system kan systemstrukturerna delas upp i två typer; linjära system och centrala system. Parametrar måste kommuniceras mellan modulerna i systemet. Modulgränssnittet som definieras i Tacton-modellenkan bära tillräckligt information för att upprätta nödvändiga relationer mellan modulerna och därigenom göra olika parametertyper irrelevanta. Dessutom undersökte jag i denna avhandling olika aspekter på hur CAD-modeller för systemkonfiguration i SolidWorks behöver struktureras för att fungera på ett robust sätt för designautomatisering. Olika metoder prövades på en relativt enkel modell som ett bevis på konceptet. Huvudresultatet är att det mest robusta sättet att göra relationer mellan de konfigurbara komponenterna är använda referensgeometri som är inbyggd i mallar. Projektet fokuserade på att undersöka möjligheten för systemkonfiguration iDesign Automation-miljön, men det är nödvändigt för Tacton att se på framtidautveckling i en helhetssyn.
Style APA, Harvard, Vancouver, ISO itp.
35

Ali, Usman. "Configuration management process maturity : definition and maturation of configuration management for aerospace and defence industries". Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/configuration-management-process-maturity-definition-and-maturation-of-configuration-management-for-aerospace-and-defence-industries(63343e6b-9f51-4492-b934-00394ef2720c).html.

Pełny tekst źródła
Streszczenie:
This research focuses on the effective implementation and continuous improvement methodologies for Configuration Management practices within aerospace and defence industries. The research is conducted mainly to develop a Configuration Management Maturity Model which is based on Critical Success Factors and Barriers to Configuration Management implementation. The motives behind this research were the lack of understanding and problems in the implementation of high-grade Configuration Management systems as highlighted by other researchers. The research is conducted in three phases through interviews and questionnaire surveys with experienced Configuration Management professionals working in aerospace and defence industries. The first part of this research identifies, prioritizes, and categorizes the Critical Success Factors for Configuration Management and devises a Configuration Management Activity Model to help practationers in the effective implementation and continuous improvement of the process. The second part of the research sets out to identify and prioritize the obstacles to effective implementation of Configuration Management practices, categorized these obstacles into more manageable groups of factors, and analysed the effects of multiple factors on identification and rating of these barriers. Both studies were conducted through mixed method research with in-depth interviews followed by questionnaire surveys. The governance aspect of the process is also investigated to a great deal in the second part through interviews to conclude on process governance in various setups. The third part of this research is related to the development of a Configuration Management Maturity Model. It is important to note that other maturity models on the topic are generic in nature and emphasis on ‘what’ to implement instead of ‘how’ to implement which has left a gap of uncertainty that forced us to devise a suitable framework. The Configuration Management Maturity Model is an assessment tool which not only provides benchmark information but also helps to identify the strengths and weaknesses of the process. This maturity framework is unique in its presentation and unlike previous maturity models, is based on current Configuration Management practices, Critical Success Factors, and Barriers to Configuration Management implementation. This maturity model will help organizations to assess their current level of maturity, identify rational targets for improvements, and will help in providing action plans for enhancing their configuration management process capability. Like the previous two studies, this part of the research is conducted through semi-structured interviews followed by questionniare surveys.
Style APA, Harvard, Vancouver, ISO itp.
36

Fialho, de Queiroz Leonardo. "Fault Tolerance Configuration for Uncoordinated Checkpoints". Doctoral thesis, Universitat Autònoma de Barcelona, 2011. http://hdl.handle.net/10803/79095.

Pełny tekst źródła
Streszczenie:
La tendencia general de los computadores paralelos es crecer en complejidad y en número de componentes. La miniaturización y la concentración de dichos elementos es la principal causa de la aparición y aumento de los fallos en estos computadores. Asimismo, para permitir la ejecución correcta de las aplicaciones paralelas, existe la necesidad de proveer soporte y de tolerar fallos en estos entornos. Una estrategia amplamente utilizada es el rollback-recovery, que consiste en guardar periódicamente el estado de la aplicación y, en caso de fallos, reanudar la aplicación desde el último estado guardado. El uso de estos protocolos añade una sobrecarga al tiempo de ejecución de la aplicación. Con el uso de protocolos de checkpoints no coordinados, es fácil estimar el tiempo total de ejecución de una aplicación, así como también la frecuencia en la cual estos checkpoints deben ser guardados. Actualmente, existen modelos precisos para estimar estos tiempos. Sin embargo, el uso de protocolos de checkpoints coordinados, puede no ser la mejor solución para proveer tolerancia a fallos en los computadores paralelos de próxima generación. En otras palabras, el actual paradigma de tolerancia a fallos para computadores paralelos, no es adecuado para los futuros sistemas. Los protocolos de tolerancia a fallos no coordinados permiten que, cada proceso de la aplicación paralela guarde su estado independientemente de los demás procesos; la combinación de estos protocolos con técnicas de log de eventos eliminan los inconvenientes de los protocolos no coordinados, como el efecto domino y la aparición de mensajes huérfanos. Esta combinación representa el paradigma emergente de tolerancia a fallos para aplicaciones paralelas escalables. Actualmente, no hay modelos adecuados para estimar el tiempo de ejecución de aplicaciones paralelas que están siendo protegidas por checkpoints no coordinados. Así como tampoco existen modelos para calcular la frecuencia en que dichos checkpoints deben ser creados. El objetivo de esta tesis es, definir los modelos específicos para cada uno de los paradigmas: el coordinado y el no coordinado. Los modelos proveen una estimación del tiempo total de ejecución de las aplicaciones cuando están protegidas por cualquiera de los dos paradigmas. Además, se propone una metodología para definir el valor de las variables necesarias para calcular el intervalo de checkpoints. La principal motivación de este trabajo es proveer el conocimiento necesario para enfrentar el paradigma emergente de tolerancia a fallos y hacerlo asequible para los usuarios de las aplicaciones paralelas.
Parallel computers are growing in complexity and in number of components. The components miniaturisation and concentration are the major root causes of the failures increasingly seen on these computers. Thus, in order to achieve the execution end, parallel application should use a fault tolerance strategy. A widely used strategy is the rollback-recovery, which consists of saving the application state periodically. In the event of a fault occurring, the application resumes it execution from the most recent saved state. These fault tolerance protocols include an overhead on the parallel application execution. Using a coordinated checkpointing protocol it becomes easy to estimate the application execution time, as well as to calculate the frequency in which checkpoints should be taken. In fact, there are very precise models to estimate the application execution time and the checkpoint interval nowadays. However, the use of the coordinated checkpointing may not be the best solution to provide fault tolerance on the next-generation parallel computers. In other words, the current paradigm of fault tolerance for parallel applications is not suitable for the future parallel computer. Fault tolerance protocols such as uncoordinated checkpointing permits that each process of the parallel application saves its state independently of other processes. The combination of uncoordinated checkpointing with logging of message-passing events avoids the inconvenience of this sort of protocol, such as the domino effect and orphan messages. This is the emergent paradigm of fault tolerance for scalable parallel applications. For instance, there is no model suitable to estimate the execution time of a parallel application protected by uncoordinated checkpointing. As well as there is no convenient model to calculate the frequency in which those checkpoints should be taken. The objective of this thesis is to define suitable models that can be used with each paradigm: the coordinated and the uncoordinated. These models should provide an estimation of the application wall time clock running under each fault tolerance paradigm, as well a methodology to define the value of the variables used to calculate the checkpointing interval. The main motivation of this work is to provide at the same time the knowledge necessary to face the emergent fault tolerance paradigm and make it suitable to be used by parallel applications users.
Style APA, Harvard, Vancouver, ISO itp.
37

Brugaletta, Luca. "Randomized configuration for Algorithm Selector SUNNY". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/17573/.

Pełny tekst źródła
Streszczenie:
In questa tesi abbiamo analizzato i comportamenti dell'algoritmo Sunny andando a modificare il metodo di scelta delle feature, principalmente passando da un approccio sequenziale ad uno casuale. Abbiamo implementato e confrontato 3 tecniche oltre a quella di partenza: -randk: sfrutta un approccio puramente casuale per il calcolo delle n feature e della k. -simann: sfrutta la tecnica di ottimizzazione di simulated annealing per calcolare le n feature e il valore di k. -simann-mod: come simann, ma utilizza parametri diversi per il calcolo. All'interno di questa tesi troviamo i risultati dell'esperimento e i vantaggi che si possono avere nell'utilizzo di una tecnica che non visita tutte le possibili soluzioni, ma solamente un numero ridotto di esse.
Style APA, Harvard, Vancouver, ISO itp.
38

Plagemann, Thomas Peter Plagemann Thomas Peter Plagemann Thomas Peter Plagemann Thomas Peter. "A framework for dynamic protocol configuration /". [S.l.] : [s.n.], 1994. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=10830.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
39

Liu, Sha. "Software Configuration Management and Change Management". Thesis, Mälardalen University, Mälardalen University, Department of Computer Science and Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-5726.

Pełny tekst źródła
Streszczenie:

 

Nowadays, as the use of computers is rapidly spreading to our life, software is getting more and more complex and large in computer systems. Therefore, the software configuration management (SCM) is playing an increasingly important role in the software development process. One of its significant activities is change management, which has an outstanding role in dealing with the continued and concurrent change requirements during the system development and use.

In this report, we describe some basic activities of SCM, overview some representative SCM CASE tools with emphasizing on change management and analyze a possibility of integration of SCM version management tool (e.g., Subversion) and error management tool (e.g., Bugzialla) in order to provide an integrated software configuration management and change management. Moreover, a set of exercises based on RCS are developed, which illustrate some SCM simple activities and their modification to facilitate version management and change management.

 

Style APA, Harvard, Vancouver, ISO itp.
40

Flo, Randi Aardal. "Configuration of large offshore wind farms". Thesis, Norwegian University of Science and Technology, Department of Electrical Power Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9957.

Pełny tekst źródła
Streszczenie:

This master thesis is written at the Department of Electric Power Engineering at the Norwegian University of Science and Technology. The work has been carried out at NTNU in Trondheim. The thesis deals with configuration of large offshore wind farms and transmission systems, and is a continuation of the project written during the autumn 2008. Today several plans on 1000 MW offshore wind farms exists. The size of the wind farms has led to a challenge of how to find an efficient and secure design of the overall system. The system has to be cost-effective in order to compete with other forms of power generation. In this study, costs is not considered. The purpose of this thesis was to study different transmission systems and configuration of an 1000 MW wind farm located 75 km from shore. The optimal distance between the turbines is a compromise between wake effect, wind farm are and cable lengths. To perform a detailed study of wake effects and optimal spacing, computer programs like WindSim would be necessary. Three common wind farm configurations is radial, star and ring layout. The selection of layout depends on costs, wind data and the wind farm area. Various wind turbine systems have been developed and different wind generators have been built. According to the survey of different wind generator system and considering the grid connection requirements on wind turbines, the developing trends of wind turbine generator systems shows that variable speed is very attractive and concepts with full-scale power converters will become more attractive. In this thesis two wind farm configurations with different transmission system were further studied. AC/AC, AC/DC and DC/DC are possible transmission systems. In this thesis AC/AC and AC/DC were compared. The selected layout of the wind farm was the radial layout. Number of strings was 35, with eight turbines in each string. Each wind turbine could produce 3.6 MW, which gives a total generation of 1008 MW. The two configurations were modeled in PSS/E. Siemens has made a model called WT3 that was developed to simulate performance of a wind turbine employing a doubly fed induction generator (DFIG). The model was developed in close cooperation with the GE Energy modeling team. This model was used in this thesis. For the dc transmission the HVDC Light from ABB was used. Two different disturbances were applied. One at the connection point at shore, and one at the connection point for all the radials. The load flow results shows that the losses are 5.8$%$ higher in the AC/DC system. The dynamical result shows that both of the systems were stable, and fulfill the grid code requirements. The results indicates that the short-circuit MVA is higher in the ac system than in the dc system. After a fault the voltage recovery was more smoother in the dc system, and the voltage recovery time were shorter.

Style APA, Harvard, Vancouver, ISO itp.
41

Tanil, Cagatay. "Optimal External Configuration Design Of Missiles". Master's thesis, METU, 2009. http://etd.lib.metu.edu.tr/upload/12610873/index.pdf.

Pełny tekst źródła
Streszczenie:
The main area of emphasis in this study is to investigate the methods and technology for aerodynamic configuration sizing of missiles and to develop a software platform in MATLAB®
environment as a design tool which has an ability of optimizing the external configuration of missiles for a set of flight requirements specified by the user through a graphical user interface. A genetic algorithm based optimization tool is prepared by MATLAB is expected to help the designer to find out the best external geometry candidates in the conceptual design stage. Missile DATCOM software package is employed to predict the aerodynamic coefficients needed in finding the performance merits of a missile for each external geometry candidate by integrating its dynamic equations of motion. Numerous external geometry candidates are rapidly eliminated according to objectives and constraints specified by designers, which provide necessary information in preliminary design. In this elimination, the external geometry candidates are graded according to their flight performances in order to discover an optimum solution. In the conceptual design, the most important performance objectives related to the external geometry of a missile are range, speed, maneuverability, and control effectiveness. These objectives are directly related to the equations of motion of the missile, concluding that the speed and flight range are related to the total mass and the drag-to-lift ratio acting on missile. Also, maneuverability depends on the normal force acting on missile body and mass whereas the control effectiveness is affected by pitching moment and mass moment of inertia of missile. All of the flight performance data are obtained by running a two degree-of-freedom simulation. In order to solve the resulting multi-objective optimization problem with a set of constraint of linear and nonlinear nature and in equality and inequality forms, genetic-algorithm-based methods are applied. Hybrid encoding methods in which the integer configuration variables (i.e., nose shape and control type) and real-valued geometrical dimension (i.e., diameter, length) parameters are encoded in the same individual chromosome. An external configuration design tool (EXCON) is developed as a synthesis and external sizing tool for the subsonic cruise missiles. A graphical user interface (GUI), a flight simulator and optimization modules are embedded into the tool. A numerical example, the re-configuration problem of an anti-ship cruise missile Harpoon, is presented to demonstrate the accuracy and feasibility of the conceptual design tool. The optimum external geometries found for different penalty weights of penalty terms in the cost function are compared according to their constraint violations and launch mass values. By means of using EXCON, the launch mass original baseline Harpoon is reduced by approximately 30% without deteriorating the other flight performance characteristics of the original Harpoon.
Style APA, Harvard, Vancouver, ISO itp.
42

Bayraktar, Gamze. "Representing Component Variability In Configuration Management". Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12614670/index.pdf.

Pełny tekst źródła
Streszczenie:
Reusability of assets within a family of products is the major goal of Software Product Line Engineering (SPLE), therefore managing variability is an important task in SPLs. Configuration management in the context of software product line engineering is more complicated than that in single systems engineering due to &rdquo
variability in space&rdquo
in addition to &rdquo
variability in time&rdquo
of core assets. In this study, a method for documenting variability in executable configuration items, namely components, is proposed by associating them with the Orthogonal Variability Model (OVM) which introduces variability as a separate model. The main aim is to trace variability in dierent configurations by explicitly documenting variability information for components. The links between OVM elements and components facilitate tool support for product derivation as the components matching the selected variations can be gathered by following the links. The proposed scheme is demonstrated on a case study about a radar GUI variability model.
Style APA, Harvard, Vancouver, ISO itp.
43

Kandemir, Fatma Gulsah. "A Dynamic Software Configuration Management System". Master's thesis, METU, 2012. http://etd.lib.metu.edu.tr/upload/12614725/index.pdf.

Pełny tekst źródła
Streszczenie:
Each software project requires a specialized management to handle software development activities throughout the project life cycle successfully and efficiently. Software governance structures provide easy and efficient ways to handle software development activities. Software configuration management is an important software development activity, and while selecting the right strategy in configuration management, its conformity to the software governance should be considered as well. Software configuration management patterns are aligned with the software governance structures to increase the success in development and management of the projects. Companies running large and inter-dependent projects, should adapt their governance structures to the changing characteristics and dependencies of projects. In this thesis, we propose a method to dynamically manage software configuration management, as a result of the changing specifications in the software governance representation.
Style APA, Harvard, Vancouver, ISO itp.
44

Avén, Joakim. "Analysis of the Z-wing configuration". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-12135.

Pełny tekst źródła
Streszczenie:
This thesis will analyze the Z-wing configuration. The Z-wing configuration is basically an airplane that has one of the wings placed at the forward section of the fuselage and the other wing placed on the other side far aft at the fuselage. This configuration creates a lot of different and unwanted forces and moments due to a differential in lift and drag between both the wings and the main objective with this thesis is to get a Z-wing to fly straight and level flight without these strange and unwanted forces and moments over it. Therefore the contribution of the wings different parameters to different moments and forces have been mapped out. Parameters such as the angle of incidence, wing span, dihedral, placement of wings etc. All the calculations done regarding the aerodynamic forces on the Z-wing have been performed in the Tornado, which is a program that runs in MATLAB and uses Vortex Lattice Method for its calculations. The outcome was that a steady level flight was possible. The configuration does have a lot of disadvantages. It will be very difficult to control in pitch, yaw and roll, although a backwards sweep of the front wing and a backwards sweep of the aft wing made roll control much better.
Style APA, Harvard, Vancouver, ISO itp.
45

Jensen, Patrik. "Configuration of Platform Architectures in Construction". Doctoral thesis, Luleå tekniska universitet, Byggkonstruktion och -produktion, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-26587.

Pełny tekst źródła
Streszczenie:
Construction is often defined as a project-oriented industry that develops complex one-of-a-kind products using an engineer-to-order (ETO) design process. The technical solutions that are developed in specific projects often have integral product architectures that are difficult to re-use in continuous improvement processes. The ETO process also means that very few components can be produced before being ordered, which is necessary for creating economies of scale in production. In contrast, Modify-To-Order (MTO) Configure-To-Order (CTO) or Select variant-To-Order (STO) design processes based on theories of mass customization reuse technical solutions from earlier projects to varying degrees. However, many researchers argue that results and theories from the manufacturing industry cannot be used in the contexts of construction because each construction project has different functional requirements and local site conditions whose interaction mandates the creation of unique end products that cannot be modularized as is done in manufacturing industries. The purpose of this thesis was to investigate how mass customization principles could be utilized in the design of construction products, especially how the adoption of platform architectures and configurators could support the reuse of technical solutions between projects. Several case studies of projects using different specification levels (MTO, CTO and STO) were conducted to test theories of mass customization in the context of construction. The results obtained show that when working at the MTO and CTO specification levels, platform architectures should be based on modules that can be developed incrementally. STO products can be developed with integral product architectures, but if the needs of customers in the target market segment change this presents a risk of ad-hoc end product customization that will adversely affect the production system downstream in the value chain. For all studied specification levels, it is important to determine whether the target market volume is sufficient to justify the cost of developing a product platform. The introduction of design modules in modular platform architectures enables the development and use of configurators in ETO construction design processes. Such tools allow MTO platforms to be customized using a mixture of traditional ETO design and the configuration of predefined modules. Configuration tools for module customization at the MTO and CTO levels must therefore be integrated with the traditional design tools used in construction. The configuration of modular platform architectures also facilitates the effective use of information and its transfer between domains. As the use of pre-defined modules in the product specification process increases, the need to involve multiple design disciplines decreases. At the STO level, the design work can be reduced to such an extent that customization can be achieved using web-based configurators.Overall, the results presented in this thesis indicate that the Products in Product mass customization concept introduced by Erixon (1998) can be implemented at multiple specification levels in the traditional design of construction products. By introducing the new design module category into the platform architecture, predefined construction product platforms can be integrated with the traditional ETO design process and developed incrementally.
Construction is often defined as a project oriented industry developing complex one-of-a-kind products in an engineer-to-order (ETO) driven process by temporary organizations. That is resulting in a fragmented design process with loose connection between different disciplines. Many studies indicate that the early stages of product development is critical for product constructability, but technical solutions that are developed in specific projects lead to integral product architectures that are difficult to re-use in a continuous improvement process. The ETO process also means that very few components can be produced before ordering, a prerequisite for creating economies of scale in production. By changing the product realization process to "modify- to-Order" (MTO), "configure- to-order" (CTO) or "select variant" (STP), which is based on the theories of mass customization, technical solutions can be reused between the specific projects. However, several researchers in the construction industry proclaim that the contexts of construction industry cannot be compared with other industries and products. The variation of interacting functional requirements creates unique end products that cannot be separated in similar way as in the manufacturing industry. Arguments are based on the uniqueness of the end products that is analysed with regards to the highest level in the product architecture, which is why a more nuanced view is required.Mass Customisation can be described as an approach to combine economies of scale from mass production with increased customization for the end customer. To successfully achieve this, the generic product architecture need to be based on a modular architecture with clear separation between functional requirements (FR) and design parameters ( DP) and well-specified interfaces between the modules. Selected market segment affects the demand for product customization relatively the order point and thus affects its product realization process; MTO, CTO and STP, whereupon the selected specification level also affects the generic product architecture with its product platform and how the customization can be done. The purpose of this thesis is to describe whether and how mass customization can be used in the construction industry by describing the relationships between product architectures and the specification levels.Several case studies in the specification levels MTO, CTO and STP have been made based on theory of mass customization. The case studies have been performed in a deductive approach where theories have been tested in real cases and validated through experiments. Results from the cases have improved the understanding in this area and been used in following case studies, why the thesis as a whole can be described as abduction.Research results shows that in the MTO and CTO specification level, product platforms should be based on modules that can be developed incrementally. STP products can be developed with integral product architecture, but if changes in the customer segment occur there is great risk that production will be affected negatively. In all studied specification levels, it is important to understand the market segment volumes to justify the development costs. Introduction of "Design variant module" for modular systems means that configurators for subsystems can be developed. Customization of MTO platforms then consists of a mixture of traditional design and configuration of modules. But to accomplish this, the link between ICT tools in the MTO and CTO process needs to be connected with traditional ICT tools in the construction industry. However, using modular product architectures in the design greatly reduce the information exchange between disciplines. If STP products are developed customization can be done using a web interface.In conclusion, if using the "Products in Product" concept (Erixon, 1998) it is possible to implement theories from mass customization in construction. It is also seen that modular product architecture creates opportunities to repair information chains and minimizes the exchange of information between different disciplines, enabling the use of ICT tools developed in other industries. By introducing a new module category to the existing theory, namely "Design variant module", the traditional design process (ETO) can be coupled with predefined product platforms and develop incrementally.
Godkänd; 2014; 20140416 (patjen); Nedanstående person kommer att disputera för avläggande av teknologie doktorsexamen. Namn: Patrik Jensen Ämne: Byggproduktion/Construction Engineering Avhandling: Configuration of Platform Architectures in Construction Opponent: Professor Lars Hvam, Department of Management Engineering, Technical University of Denmark, Lyngby, Denmark Ordförande: Professor Thomas Olofsson, Avd för byggkonstruktion- och produktion, Institutionen för samhällsbyggnad och naturresurser, Luleå tekniska universitet Tid: Tisdag den 17 juni 2014, kl 13.00 Plats: F1031, Luleå tekniska universitet
Style APA, Harvard, Vancouver, ISO itp.
46

Godfrey, Michael Wallace. "A framework for visual system configuration". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape16/PQDD_0017/NQ27654.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
47

Gruber, Elliott Ross. "Optimal configuration of adjustable noise suppressors". Thesis, Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/47616.

Pełny tekst źródła
Streszczenie:
Noise generated by fluid power applications can be treated using bladder-style suppressors, and an optimal operating condition for these devices is sought in this thesis. Bladder-style suppressors employ a compliant nitrogen-charged bladder to create an impedance change within the system, reflecting the noise back to the source and preventing it from propagating downstream. The noise in a hydraulic system is created by a pump, the flow source in a hydraulic system, and can be separated into three categories: fluid-borne noise, structure-borne noise and airborne noise. Fluid-borne noise places addition stress on sealing surfaces, potentially causing leaks. Airborne noise can be uncomfortable, even hazardous depending on the level. Bladder-style suppressors primarily treat fluid-borne noise; however, it is seen in the literature that fluid-borne noise is the cause of structure-borne and airborne noise. This thesis presents an optimization method for finding the optimal charge pressure for implementation with a given system operating over a broad range of system pressures. The optimization weights suppressor performance by the spectral content of the fluid-borne noise as well as the duty cycle of the system. A single charge pressure works well over a small range of system pressures, though many fluid power applications operate over a larger range of system pressure than the usable range of a suppressor. For systems operating over an extremely broad pressure range, two suppressors charged to different pressures are used to treat the noise in the entire system pressure range. To determine suppressor performance experimental measurements were performed, and models developed, of the transmission loss of this type of device. A multi-microphone method using transfer function relationships between six sensors determines the transmission loss of the suppressor under test. An equivalent fluid model modeling the wave behavior both upstream and downstream, as well as within the suppressor, was created to predict suppressor transmission loss. Optimal configurations are found for a set of system pressures, charge pressures and duty cycles. Analysis of the results shows the time weighting has a more significant impact on the optimum charge pressure than the frequency weighting, as shown by duty cycles considered in this thesis. In addition, all charge pressures selected as optimal for either single suppressor optimizations or double suppressor optimizations, exhibit the highest transmission loss for a single system pressure in the pressure duty cycle for a simulated machine.
Style APA, Harvard, Vancouver, ISO itp.
48

Kers, Simon. "Configuration and device identification on networkgateways". Thesis, KTH, Data- och elektroteknik (Stängd 20130701), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-133442.

Pełny tekst źródła
Streszczenie:
To set up port forwarding rules on network gateways, certain technical skills are requiredfrom end-users. These assumptions in the gateway software stack, can lead to an increasein support calls to network operators and resellers of customer premises equipment. Theuser interface itself is also an important part of the product and a complicated interfacewill contribute to a lessened user experience. Other issues with an overwhelming userinterface include the risk of faulty configuration by the user, potentially leaving the networkvulnerable to attacks.We present an enhancement of the current port forwarding configuration in the gatewaysoftware, with an extensible library of presets along with usability improvements. To helpusers with detecting available services, a wrapper for a network scanner is implemented, fordetecting devices and services on the local network. These parts combined relieves end-usersof looking up forwarding rules for ports and protocols to configure their gateway, basingtheir decisions on data collected by the network scanner or by using an applications nameinstead of looking up its ports. Another usability improvement is an internal DNS service,which enables access to the gateway interface through a human-memorable domain name,instead of using the LAN IP address.Using the Nmap utility for identifying services on the network, could be consideredharmful activity by network admins and intrusion detection systems. The preset libraryis extensible and generic enough to be included in the default software suite shipping withthe network equipment. Working within the unified configuration system of OpenWrt, thepreset design will add value and allow resellers to easily customize it to their services. Thisproposal could reduce support costs for the service operators and improve user experiencein configuring network gateways.
Vid portmappning i nätverksgateways krävs det vissa tekniska förkunskaper av användaren.Höga krav på kunskapsnivå kan leda till ett ökat antal supportsamtal för återförsäljareoch nätverksoperatörer. Användargränssnittet i sig är också en viktig del i produkten ochett komplicerat gränssnitt bidrar till försämrad användarupplevelse. Övriga problem medkomplicerade användargränssnitt är risken för felaktig konfiguration, vilket kan försämraIT-säkerheten på nätverket.En förändring av nuvarande inställningar för portmappning presenteras, tillsammansmed ett utbyggbart bibliotek med förinställda regler, samt generella förbättringar av an-vändargränssnittet. Ytterligare förbättringar av användarvänligheten sker i form av nä-tadressöversättning, som möjliggör åtkomst till nätverksgateway via domännamn som ärenklare att minnas än IP adressens siffror. För att hjälpa användare med identifikationav enheter och att göra rätt inställningar, utvecklas en wrapper för en portskanner, somautomatiskt kan identifiera enheter och nättjänster på det lokala nätverket. Tillsammansunderlättar dessa delar för slutanvändaren, befriar den från att referera till regler för portaroch protokoll och möjliggör inställningar enbart genom att använda portskanning eller väljanamnet på önskad tjänst från en lista.Användandet av verktyget Nmap för att identifiera nättjänster på nätverket kan kommaatt betraktas som dataintrång av nätverksadministratörer och intrångdetekteringssystem.Konfigurationsfilerna med förinställningar är utbyggbar, fungerar och passar in tillräck-ligt bra för att levereras med standardmjukvaran. Via det centraliserade konfigurationssys-temet i OpenWrt, kommer utformningen av systemet med förinställningar för portmappningmöjliggöra för komplementering av återförsäljare, för att innefatta deras respektive nät-tjänster och enheter som kräver vidarebefodring av särskilda portar. Systemet kan minskasupportkostnader för bredbandsleverantörer och bidra till en förbättrad användarupplevelsevid konfiguration av nätverksgateways.
Style APA, Harvard, Vancouver, ISO itp.
49

Xiao, Zhifeng 1966. "A policy based network configuration framework /". Thesis, McGill University, 2002. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=29487.

Pełny tekst źródła
Streszczenie:
Networks and their services have been growing rapidly in recent years, so has the complexity of configuring the network operations. In order to manage the rapidly expanding networks, new management protocols are thus needed to change the network management from configuration of individual devices to automation of the whole network. SNMPCONF, a policy-based configuration with SNMP protocol, is proposed by IETF to meet this requirement.
SNMPCONF is suggested to configure networks with a policy MIB (Management Information Base). However, deploying this protocol in existing network devices needs more work, because the policy MIB defined by SNMPCONF is not implemented now in the present network and no configuration MIB defined. Even if the configuration MIB and policy MIB implemented by vendors in future, some existing devices may not be upgraded to support these MIB for their hardware limitation (e.g., memory limit). Another problem is found in the communication between a SNMP supported network and the SNMP unsupported networks (e.g. telecommunication network where TL1 is used in North America). In this study, CLI and TL1 are used to help solving these problems. Based on Modular SNMP from University of Quebec at Montreal, a JAVA framework to deploy SNMPCONF with this approach is implemented and tested on a network built with Cisco routers (Cisco IOS 12.0, routers ranged from Catalyst 2600 to 2900). The preliminary work shows the SNMPCONF can be implemented by wrapping CLI commands as accessory functions in policy language without configuration MIB. As shown in this work, another advantage of this approach is that policy execution is atomic and persistent.
Style APA, Harvard, Vancouver, ISO itp.
50

Fossa, Halldor. "Interactive configuration management for distributed systems". Thesis, Imperial College London, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.265615.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii