Дисертації з теми "Configuration Analysis"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Configuration Analysis".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Avén, Joakim. "Analysis of the Z-wing configuration." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-12135.
Повний текст джерелаNelson, Tim. "First-Order Models for Configuration Analysis." Digital WPI, 2013. https://digitalcommons.wpi.edu/etd-dissertations/452.
Повний текст джерелаKuna, Tobias. "Studies in configuration space analysis and applications." Bonn [Germany] : Rheinischen Friedrich-Wilhelms-Universität, 1999. http://catalog.hathitrust.org/api/volumes/oclc/45762540.html.
Повний текст джерелаMarchesi, Chiara. "Conformational analysis and absolute configuration of Spiropyrazolones." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13968/.
Повний текст джерелаPerez, Caceres Leslie. "Automatic Algorithm Configuration: Analysis, Improvements and Applications." Doctoral thesis, Universite Libre de Bruxelles, 2017. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/262048.
Повний текст джерелаDoctorat en Sciences de l'ingénieur et technologie
info:eu-repo/semantics/nonPublished
Williams, Robert L. "Planar robotic mechanisms: analysis and configuration comparison." Diss., Virginia Polytechnic Institute and State University, 1988. http://hdl.handle.net/10919/54462.
Повний текст джерелаPh. D.
Ellingsæter, Jenny Marie, and Frode Sandholtbråten. "Algorithms and Approaches for Configuration-less Log Analysis." Thesis, Norwegian University of Science and Technology, Department of Computer and Information Science, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9095.
Повний текст джерелаSystem logs contain messages from a wide range of applications. They are the natural starting point when troubleshooting a system. The usual approach for analysing system logs is to write a number of regular expressionsto match specific keywords and events. When the number of expressions grows large, the analysis solution becomes unmaintainable. In addition, the use of regular expressions requires the system administrator to have extensive knowledge of the system at hand. This thesis presents methods for performing log analysis without regular expressions. This is an area of system administration that has attracted very few researchers. Therefore, little published research is available on the subject. Much effort has been put into the task of generating patterns from log file. These patterns are an important prerequisites for statistical analysis. Patterns could also be used to identify transactions for use in Markov models. None of the existing pattern mining algorithm for system logs produce satisfactory results. To solve the task at hand, a new method for mining patterns is developed. Several different approaches were tested. An approach based on inserting log lines into a tree structure turned out to be a very promising. It outputs good quality patterns and its resource use is moderate. Log analysis without prior knowledge of the system at hand have been proven difficult. This thesis shows that methods where some basic knowl- edge of systems in general is exploited, are the most promising ones. Other approaches based on Markov models and neural networks are suggested in this thesis, but they have not been tested to full extend and require some more work before being useful.
Bevan, Jennifer Louise. "Software instability analysis : co-change analysis across configuration-based dependence relationhips /." Diss., Digital Dissertations Database. Restricted to UC campuses, 2006. http://uclibs.org/PID/11984.
Повний текст джерелаIkeda, Toshihiro, and toshi ikeda@gmail com. "Aerodynamic Analysis of a Blended-Wing-Body Aircraft Configuration." RMIT University. Aerospace, Mechanical and Manufacturing Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20070122.163030.
Повний текст джерелаJansen, Marloes Eline. "Spatial configuration in rubberhand illusion research : A meta-analysis." Thesis, Högskolan i Skövde, Institutionen för biovetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-20621.
Повний текст джерелаAlinaghian, Leila Sadat. "Operationalising dynamic capabilities : a supply network configuration approach." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708789.
Повний текст джерелаNARAYANAN, VIJAY. "STRUCTURAL ANALYSIS OF REINFORCED SHELL WING MODEL FOR JOINED-WING CONFIGURATION." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1116214221.
Повний текст джерелаKnudson, Ole. "Transportability analysis of the M119 Howitzer in the firing configuration." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA277209.
Повний текст джерелаThesis advisor(s): Healey, Anthony J. "September 1993." Includes bibliographical references. Also available online.
Black, Bruce J. "Modeling organizational configuration and decision processes for information warfare analysis." Thesis, Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/8694.
Повний текст джерелаFor an organization to survive it must be able to adapt to its environment. A military organization operates in an environment that is constantly changing. The ability to model organizational configurations and organizational decision processes can assist the commander in adapting to the environment and understanding how a military organization is susceptible to Information Warfare (1W) attacks. First a commander must understand the concepts of Information Warfare, Command and Control and the concept of organizational decision processes and how these permit an organization to adapt to its environment. Then the commander must determine what level of detail is necessary to model the organizational decision processes for its environment. Next the commander must analyze his model for configuration and decision processes. Using such commercially available software as Organizational Consultant and vDT the commander can identify any organizational misfits to the environment and the 1W attack susceptibilities of the organizational decision processes. In the end, this approach demonstrates that it is feasible to model organizational configuration and organizational decision processes in an Information Warfare environment
Wee, Hong Chuan. "Aerodynamic analysis of a canard missile configuration using ANSYS-CFX." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10707.
Повний текст джерелаThis study used the Computational Fluid Dynamics code, ANSYS-CFX to predict the static aerodynamic characteristics of a canard-wing missile configuration with a hemispherical nose, triangular wedge canards and fixed trapezoidal wings. The study was conducted for Mach numbers of 0.2, 0.8 and 1.2. The results were compared against experimental data from actual wind tunnel tests and data from a semi-empirical method, AP09. The ANSYS-CFX results showed good agreement for CN, CM, and CL but less agreement for CA when compared to the experimental results. The AP09 results also showed good agreement for CN, CM, and CL but also showed less agreement for CA.
Allahverdiyev, Rovshan. "Effects of beam configuration on dynamic properties and seismic performances of multi-storey frame building models." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Знайти повний текст джерелаGuan, Junfei. "Simultaneous optimization of transit line configuration and passenger line assignment /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?CIVL%202004%20GUAN.
Повний текст джерелаSantos, Sara Cristina Pereira Guedes Ribeiro. "Separação preparativa e caracterização espectroscópica dos principais monómeros da suberina da cortiça." Doctoral thesis, ISA, 2013. http://hdl.handle.net/10400.5/6157.
Повний текст джерелаSuberin is a vital biomacromolecule responsible for the protection of plants, and yet its molecular structure remains mostly unknown. Cork is the ideal material for suberin extraction because of its suberin content (≥40%) and availability in industrial quantities. Suberin is a polyester made of glycerol and long-chain α,ω-bifunctional fatty acids, mainly C18 ω-hydroxyacids and α,ω-diacids with mid-chain substituents, either an unsaturation, an epoxide or a vic-diol group. The objective of this work was twofold: to develop techniques to isolate the main suberin acids from cork in preparative quantities and high purity (≥99.5%); and to develop spectroscopic techniques, namely NMR-based, to unambiguously assign the stereochemical configuration of the C18 suberin acids. The multi-step process developed comprised suberin depolymerization and suberin acids separation in solvents of contrasting polarities and tempera-tures, followed by successive purification by normal-phase LC and reversed-phase HPLC. The C18:1 suberin acids were proved to be cis, through the analysis of their olefinic and allylic proton and carbon chemical shifts, and coupling constants extracted by spectra simulation. A NMR technique was developed using the chemical shifts of the benzylidene acetal derivatives of vic-diols, proving that the suberin acids C18 9,10-epoxyacids were cis, and the C18 9,10-diol acids were threo, in both cases present as racemic mixtures. The stereochemistry of these acids will be determinant to understand the macromolecular structure of suberin, and the techniques developed for their preparative isolation can be the basis for their industrial commercialization.
Wong, Eric Gregory Wen Wie. "Validating network security policies via static analysis of router ACL configuration." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FWong.pdf.
Повний текст джерелаThesis Advisor(s) Geoffrey Xie. "December 2006." Includes bibliographical references (p. 149-150). Also available in print.
Garcia, Jose Mauro de Figueiredo. "A methodology for the comparative analysis of airport passenger terminal configuration." Thesis, Loughborough University, 1996. https://dspace.lboro.ac.uk/2134/31872.
Повний текст джерелаMcManus, Stephen C. "Predicting host level reachability via static analysis of routing protocol configuration." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FMcManus.pdf.
Повний текст джерелаThesis Advisor(s): Xie, Geoffrey. "September 2007." Description based on title screen as viewed on October 24, 2007. Includes bibliographical references (p. 149). Also available in print.
Sans, Aguilar Juan R. "Four dimensional analysis of free electron lasers in the amplifier configuration." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FSans%5FAguilar.pdf.
Повний текст джерелаThesis Advisor(s): Colson, William B. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 63). Also available in print.
Saur, Martin, and Lena Nikolaisen. "DESIGN AND IMPLEMENTATION OF ELECTRICAL LOAD ANALYSIS FOR CROSS FLEET CONFIGURATION." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-29814.
Повний текст джерелаArbia, Giuseppe. "Spatial data configuration in statistical analysis of regional economic and related problems." Thesis, University of Cambridge, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.330149.
Повний текст джерелаDong, Zhen [Verfasser], and Artur [Akademischer Betreuer] Andrzejak. "Diagnosing Software Configuration Errors via Static Analysis / Zhen Dong ; Betreuer: Artur Andrzejak." Heidelberg : Universitätsbibliothek Heidelberg, 2017. http://d-nb.info/1180739493/34.
Повний текст джерелаHuang, Haidong. "Optimal design of a flying-wing aircraft inner wing structure configuration." Thesis, Cranfield University, 2012. http://dspace.lib.cranfield.ac.uk/handle/1826/7439.
Повний текст джерелаMotta, Teixeira Leopoldo. "Verification and refactoring of configuration knowledge for software product lines." Universidade Federal de Pernambuco, 2010. https://repositorio.ufpe.br/handle/123456789/2323.
Повний текст джерелаConselho Nacional de Desenvolvimento Científico e Tecnológico
Uma linha de produtos de software (LPS) é definida como um conjunto de sistemas de software que compartilham características em comum, mas que são suficientemente distintos entre si, desenvolvidos a partir de um conjunto de artefatos reusáveis. Modelos de features e configuração são usados para possibilitar a geração automática de produtos a partir destes artefatos. Um modelo de features representa o conjunto de possíveis configurações de produto de uma LPS, enquanto o modelo de configuração estabelece o mapeamento entre features e implementação. Por exemplo, associando expressões de features, na forma de proposições lógicas, a artefatos. Os benefícios de produtividade que a abordagem de LPS fornece tornam possível que uma LPS seja capaz de gerar milhares de produtos. Neste contexto, erros cometidos ao especificar o modelo de configuração podem resultar em produtos inválidos - o problema da composição segura. Este problema pode ser difícil de ser detectado manualmente, já que os modelos de features e configuração podem tornar-se muito complexos. Gerar todos os produtos de uma LPS pode não ser prático, dado que existem LPS em que é possível gerar milhares de produtos. No entanto, mesmo modelos de configuração que não permitem a geração de produtos inválidos podem ter problemas na sua estrutura interna, como complexidade e duplicação, especialmente no contexto de LPS grandes, onde sua manutenção pode se tornar difícil. Precisamos nos certificar de que não introduzimos erros ao corrigir estes problemas. Neste trabalho, é proposta uma abordagem automática de verificação de composição segura para LPS baseadas em modelos de configuração. Esta abordagem é baseada na tradução de instâncias específicas de modelos de features e configuração em lógica proposicional, usando uma teoria codificada com Alloy. O suporte ferramental fornecido pelo Alloy Analyzer auxilia a verificação. Também é proposto um catálogo de refatoramentos simples para modelos de configuração, como uma maneira de evitar erros ao corrigir problemas na estrutura interna de tais modelos. Este catálogo é formalizado usando uma teoria geral para modelos de configuração especificada com o Prototype Verification System (PVS). Nós avaliamos a abordagem de verificação usando sete versões de uma LPS, com modelos de features que possibilitam a geração de até 272 produtos. Os resultados demonstram a vantagem de usar esta abordagem ao invés de gerar todos os produtos da LPS, já que o tempo médio para compilar um único produto da LPS é maior que o tempo para analisá-la na maior das versões analisadas. Também avaliamos o catálogo de refatoramento provando consistência (soundness) dos refatoramentos propostos no provador de teoremas de PVS
Austin, Robert. "The effect of the fastener of different configuration composite panels on failure analysis." DigitalCommons@CalPoly, 2009. https://digitalcommons.calpoly.edu/theses/63.
Повний текст джерелаDong, Ming. "Process Modeling, Performance Analysis and Configuration Simulation in Integrated Supply Chain Network Design." Diss., Virginia Tech, 2001. http://hdl.handle.net/10919/28779.
Повний текст джерелаPh. D.
Harris, Chester A. "Distributed computing configuration: A combined user, software, and hardware model and analysis methodology /." The Ohio State University, 1997. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487946103568637.
Повний текст джерелаLee, Jim Pak-Yee Carleton University Dissertation Engineering Electrical. "Acoustooptic fourier transforming configuration for spectrum analysis and determination of direction-of-arrival." Ottawa, 1986.
Знайти повний текст джерелаShim, Young Hak. "Design of a cluster analysis heuristic for the configuration and capacity management of manufacturing cells." Diss., Texas A&M University, 2003. http://hdl.handle.net/1969.1/5905.
Повний текст джерелаMüller, Michael. "Retrieval and Analysis of Software Systems from SCM Repositories." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1603.
Повний текст джерелаOne source of input data for software evolution research is data stored inside a software configuration management repository. The data includes different versions of a software system’s source code as well as version history metadata, such as check-in dates or log messages. Inherently, extracting this data manually is a time- and labor intensive task. The subsequent preprocessing step and the appropriate storage of the results, necessary to utilize the data for further analysis, is an additional effort for the researcher.
The goal of this thesis is to design and implement a front-end plug-in for an existing software comprehension tool, the VizzAnalyzer, providing the capability to extract and analyze multiple versions and evolutional information of software systems from SCM repositories and to store the results. Thereby, the implemented solution provides the infrastructure for software evolution research.
SIVAJI, RANGARAJAN. "AERODYNAMIC ANALYSIS OF THE JOINED-WING CONFIGURATION OF A HIGH-ALTITUDE, LONG ENDURANCE (HALE) AIRCRAFT." University of Cincinnati / OhioLINK, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1083849791.
Повний текст джерелаAndersson, Elin, and Johanna Linda Nugin. "Configuration of an electronic Kanban board for planning analysis activities at an industrial laboratory." Thesis, KTH, Industriell produktion, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-278077.
Повний текст джерелаFör att förbättra produktiviteten är det viktigt att rätt produkt produceras i rätt mängd när den behövs. Kanban är ett sätt att signalera behov av material och dess huvudaspekt är att material dras genom processen endast när det behövs. Kanban kan därför minska pågående arbete (WIP). Quality Control (QC) på AstraZeneca i Södertälje har som uppgift att kontrollera kvaliteten på batchprover från produktion. Flera olika analyser måste genomföras på en batch och alla analyser ska helst slutföras samtidigt för att reducera nivåerna av pågående arbete. Det nuvarande systemet och arbetsrutiner för att planera analysaktiviteter på QC laboratorierna resulterar i höga nivåer av WIP. Syftet med detta projekt var att undersöka möjligheten att ersätta det nuvarande planeringssystemet med en elektronisk Kanbantavla så att nivåerna av WIP kan begränsas och ett mer förutsägbart flöde uppnås. Observationer och diskussioner har genomförts för att få en förståelse för nuvarande arbetssätt i QC. En litteraturstudie har genomförts för att bilda ett teoretisk ramverk för koncept som Just-In-Time och Kanban. En Kanbantavla har konfigurerats för ett av lagen i en programvara som föreslagits av AstraZeneca. Tavlans funktionalitet presenteras och det diskuteras hur denna kan användas i deras verksamhet. Den har konfigurerats så att det är möjligt att prioritera att analyserna av pågående batcher slutförs innan nya batcher påbörjas, vilket möjliggör en reduktion av WIP och skapandet av ett mer förutsägbart flöde. Ett beslutsträd ska användas som hjälpmedel för att prioritera arbetsuppgifter rätt. Begränsningar i konstruktionen och utmaningar med en potentiell framtida implementation diskuteras. Tavlan har presenterats för team leaders och analytiker för att erhålla deras input. Baserat på denna har också några ändringar föreslagits. Ett förslag på upplägg för en pilottestning presenteras. Det är rekommenderat att tavlan testas parallellt med nuvarande planeringssystem för att utvärdera möjligheten att implementera den i större skala samt för att vidare undersöka utmaningar och möjligheter med programvaran.
MARISARLA, SOUJANYA. "STRUCTURAL ANALYSIS OF AN EQUIVALENT BOX-WING REPRESENTATION OF SENSORCRAFT JOINED-WING CONFIGURATION FOR HIGH-ALTITUDE, LONG-ENDURANCE (HALE) AIRCRAFT." University of Cincinnati / OhioLINK, 2005. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1116215297.
Повний текст джерелаWiscombe, Samantha Ann. "Family Ties: A Profile of Television Family Configurations, 2004–2013." BYU ScholarsArchive, 2014. https://scholarsarchive.byu.edu/etd/4348.
Повний текст джерелаSivaji, Rangarajan. "Aerodynamic analysis of the joiined-wing configuration of a high-altitude, long-endurance (hale) aircraft." Cincinnati, Ohio : University of Cincinnati, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1083849791.
Повний текст джерелаZarrouk, Pauline. "Clustering Analysis in Configuration Space and Cosmological Implications of the SDSS-IV eBOSS Quasar Sample." Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLS297/document.
Повний текст джерелаThe ΛCDM model of cosmology assumes the existence of an exotic component, called dark energy, to explain the late-time acceleration of the expansion of the universe at redshift z < 0.7. Alternative scenarios to this cosmological constant suggest to modify the theory of gravitation based on general relativity at cosmological scales. Since fall 2014, the SDSS-IV eBOSS multi-object spectrograph has undertaken a survey of quasars in the almost unexplored redshift range 0.8 ≤ z ≤ 2.2 with the key science goal to complement the constraints on dark energy and extend the test of general relativity at higher redshifts by using quasars as direct tracers of the matter field.In this thesis work, we measure and analyse the two-point correlation function of the two-year data taking of eBOSS quasar sample to constrain the cosmic distances, i.e. the angular diameter distance DA and the expansion rate H, and the growth rate of structure fσ8 at an effective redshift Zeff = 1.52. First, we build large-scale structure catalogues that account for the angular and radial incompleteness of the survey. Then to obtain robust results, we investigate several potential systematics, in particular modeling and observational systematics are studied using dedicated mock catalogs which are fictional realizations of the data sample. These mocks are created with known cosmological parameters such that they are used as a benchmark to test the analysis pipeline. The results on the evolution of distances are consistent with the predictions for ΛCDM with Planck parameters assuming a cosmological constant. The measurement of the growth of structure is consistent with general relativity and hence extends its validity to higher redshift. We also provide updated constraints on extensions of ΛCDM and models of modified gravity. This study is a first use of eBOSS quasars as tracers of the matter field and will be included in the analysis of the final eBOSS sample at the end of 2019 with an expected improvement on the statistical precision of a factor 2. Together with BOSS, eBOSS will pave the way for future programs such as the ground-based Dark Energy Spectroscopic Instrument (DESI) and the space-based mission Euclid. Both programs will extensively probe the intermediate redshift range 1 < z < 2 with millions of spectra, improving the cosmological constraints by an order of magnitude with respect to current measurements
Wennbom, Marika. "Impact of error : Implementation and evaluation of a spatial model for analysing landscape configuration." Thesis, Stockholms universitet, Institutionen för naturgeografi och kvartärgeologi (INK), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-79214.
Повний текст джерелаVan, Mierlo Koen. "Computational analysis of the flow field and noise radiation of a generic main landing gear configuration." Thesis, University of Southampton, 2014. https://eprints.soton.ac.uk/388076/.
Повний текст джерелаSmith, Paige Elizabeth. "Tools to Improve the Process of Engineering Design: An Analysis of Team Configuration and Project Support." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/26677.
Повний текст джерелаPh. D.
Yang, Yi-Chen, and 楊義成. "Mechanism Configuration Synthesis and Machining Analysis." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/99089271632265774362.
Повний текст джерела國立成功大學
機械工程學系
88
The purpose of this paper is to investigate the characteristics of wire-cut electric discharge machines in all respects, including: mechanism configuration synthesis, machining error analysis and algorithm for CAD/CAM system. Firstly, the mechanism configuration synthesis for wire-cut EDM machine is proposed. The mechanism tree-graph representations are introduced to conclude the topology and motion characteristics of wire-cut EDM. The design requirements are studied and the structure configurations are synthesized. The design process starts by investigating existing mechanisms and concludes their topology and motion characteristics. The second step is to describe the topology structures of existing mechanisms. The third step is to transform these mechanisms into their corresponding generalized tree graphs. The fourth step is to obtain all possible tree graph. The fifth step is to assign certain type of links and joints. Finally, the atlas mechanisms are obtained. As the result, for the wire-cut EDM machine, the number of possible configurations is 248. Secondly, using the Denavit-Hartenburg matrix to describe the motion of the wire and to generate the function of the ruled surface. Then, applied the error of each link and joint to analysis the error matrix of each link. Finally, using the differential method to calculate the machining error. Two examples are shown to compare the current mechanism and new mechanism synthesized from chapter 3. Finally, this paper proposes a CAD/CAM mathematical foundation to design ruled surfaces for wire-cut EDM. This method combines the boundary plane concept, the Plucker coordinate representation of lines, control lines and design function to generate free form ruled surfaces. The tool motion and offset surface can also be generated simply by the same approach for computer numerical control (CNC) wire-cut EDM. The algorithm, being different from conventional methods, can present a surface or tool path concisely and uniquely.
Wu, Tzu-wei, and 吳子偉. "The Configuration Analysis of Interferometric Hydrophones." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/04954299911558010991.
Повний текст джерела國立中山大學
通訊工程研究所
92
The interferometeric optical fiber sensor has high sensitivity for sound signal. This characteristic is used to design hydrophones. The sound pressure causes the optical fiber to change its shape. So as to induce phase difference between sensing and reference arms. Using the demodulation system, we can get the signal we want. In this thesis, we plan to analyze three different kinds of optic configurations, such as Michelson, compensating Mach-Zehnder, hybrid configuration of Mach-Zehnder and Sagnac interferometers. The mathematical methods are used to compare their characters. We also use software to simulate the relation among sensitivity, delay fiber and frequency character of the Sagnac interferometer. In our experiment, we use PGC modulation technology and compare the results with a standard hydrophone B&K 8103 for calibration. We also measure the dynamic range of proposed three interferometers. The measurement result of this paper is as following: Michelson and compensating type Mach-Zehnder interferometer dynamic range were about 24.90 dB and 13.98 dB, the acoustic signal sensitivity was -201.67 dB re V/1uPa and -205.97 dB re V/Pa, respectively. The dynamic range of the hybrid of Mach-Zehnder and Sagnac type interferometer was 33.67 dB and acoustic signal sensitivity was -212.47 dB re V/1uPa.
Te, Chen Tzung, and 陳宗德. "Analysis of Assembly through Product Configuration." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/82267171012512992928.
Повний текст джерела國立中山大學
機械工程研究所
86
Product configuration is the standard information of the product thatdescribes its composition, structure, and their relationships. These datashows what the product is and how it is built including its structure,components, geometric information, and assembly relationships, etc. Configuration management is a product data management facility in a productdatabase management system that manages product data and related components''data to build up its configuraton. It allows designer to develop a productmore easy and effective. During the product design and development stages,designer can acquire complete related product and components data with CMsupport. Product configuration process is one of the applying processes in CMthat helps designer establish his/her design with combining differentcomponents'' data. The selected components will be connected and furtherchecking the feasibility of their assembability before they are assembled inreal world. The assembly verification provides such function in CM. However,for doing this task, the assembly rules and constraints should be establishedat first in order to verify the assembly relations between related parts.Assembly model is a common approach to represent the assembly relations in aproduct that can be analyzed to generated assembly rules and constraints. Forusing it to analyze assembly relations, it should be able to represent thegeneric design of aproduct. In this thesis, we suggest a modeling procedurefor building such an assembly model and we also make discussion how to makeanalysis of the assembly relations in it. At last, the configuration of thepersonal computer will be taken as an example to show how this procedure worksand how the assembly rules and constraints for computer assembly are derived.
Singh, Nieraj. "Integrated tooling framework for software configuration analysis." Thesis, 2011. http://hdl.handle.net/1828/3281.
Повний текст джерелаGraduate
Shih, Ying, and 石穎. "Improving System Security through System Configuration Analysis." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/58247755030704128690.
Повний текст джерела國立交通大學
資訊科學與工程研究所
101
Configuration is an essential part of any software system and plays a key role in the security of a system. On Windows, the registry stores a large amount of configuration information. There is research about registry which applied it on many applications. Some applied on intrusion detection. Some applied on configuration error detection. We propose a system for examining problems of a Windows system’s configuration, which covers not only the Windows registry but also the file system. The system checks for three kinds of problem: 1) missing updates for Microsoft software, 2) corruption in file system that causes abnormal application behavior, 3) corruption in Windows registry that causes abnormal application behavior. The system consists of three main components. The first is configuration extractor running on the client-side to extract a user system’s configuration. The second is configuration statistics builder which produces a statistics of healthy samples collected. The other is the configuration examiner which examines the target configuration. Statistics builder produces configuration statistics from healthy samples, and examiner examines target configuration with the statistics. The system is evaluated against all three types of problems. On the checking for missing updates for Microsoft software, the system achieves 90% accuracy, and on the checking for corruption in the file system, the system achieves higher than 70% accuracy. For the checking for corruption in Windows registry that causes abnormal application behavior, although the system cannot fix the abnormal behavior of application, the system points out the registry difference between sick machine and the statistics from healthy machines.
CHANG, CHEN-FENG, and 張振豐. "SCANNING OPTICAL MICROSCOPE CONFIGURATION AND FAILURE ANALYSIS." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/cn8qc3.
Повний текст джерела中華大學
機械工程學系
106
Failure Analysis (FA) is one of the most important steps in design, manufacture process and packaging for ICs or panels. During the whole fabrication process, lots of failures will have occurred. As a result, failure localization is one of the key points to increase the reliability, product’s yield and product’s quality. Moreover, problem-solving skills and information categorize are also critical techniques for engineers. When a problem or issue occurred, it is important for engineers to quickly analyze it and applied the best solution to solve it. In this thesis, it will include relevant technical information and current popular techniques for Failure analysis. It will also contain three case studies for real on field experience and how to put it into a particle experience and to help others to solve similar problems faster in the future. All these experiences are very important assets for the company and the engineer as this would be able to decrease the system downtime by solving the issue quickly and be able to provide the production and R&D department to improve the system reliability. These knowledge and experience are extremely important assets to the company as it would be able to save a lot of time and effort for repeatable failure on different systems. In conclusion, all these issues can be solved or prevented after the investigation of the failure.
Kanso, Ali. "Automated Configuration Design and Analysis for Service High-Availability." Thesis, 2012. http://spectrum.library.concordia.ca/974790/9/Kanso_PhD_F2012.pdf.
Повний текст джерела"Analysis of configuration singularities of platform-type robotic manipulators." Chinese University of Hong Kong, 1995. http://library.cuhk.edu.hk/record=b5888477.
Повний текст джерелаThesis (M.Phil.)--Chinese University of Hong Kong, 1995.
Includes bibliographical references (leaves 76-81 (2nd gp.)).
Acknowledgments --- p.i
Abstract --- p.ii
Notations --- p.iii
List of Figures --- p.v
List of Tables --- p.vii
Chapter 1. --- Introduction
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Literature Review --- p.4
Chapter 1.3 --- Objective --- p.10
Chapter 2. --- Comparison of Different Approaches
Chapter 2.1 --- Sample Manipulator --- p.11
Chapter 2.1.1 --- Force Decomposition Method --- p.12
Chapter 2.1.2 --- Forward Rate Kinematics Base Method --- p.15
Chapter 2.1.3 --- Grassmann Geometry Method --- p.18
Chapter 2.2 --- Comparison Criteria --- p.20
Chapter 2.2.1 --- Computational Complexity --- p.20
Chapter 2.2.2 --- Scope of Application --- p.22
Chapter 2.3 --- Summary --- p.23
Chapter 3. --- Enumeration of Configuration Singularity
Chapter 3.1 --- Novel 6 DOF --- p.25
Chapter 3.1.1 --- Result Analysis --- p.31
Chapter 3.2 --- A 3 DOF with Symmetric Base --- p.33
Chapter 3.2.1 --- Result Analysis --- p.35
Chapter 3.3 --- A 3 DOF with Non-Symmetric Base --- p.36
Chapter 3.3.1 --- Result Analysis --- p.37
Chapter 3.4 --- A New Model of 6-SPS Defined by Kong et al --- p.40
Chapter 3.5 --- A New Class of 6-SPS Platform-Type Parallel Manipulator --- p.45
Chapter 3.5.1 --- The Hexagonal Base --- p.46
Chapter 3.5.2 --- The Pentagonal Base --- p.50
Chapter 3.5.3 --- The Tetragonal Base --- p.52
Chapter 3.5.4 --- The Triangular Base --- p.55
Chapter 3.6 --- Summary --- p.59
Chapter 4. --- Numerical Analysis
Chapter 4.1 --- Parameter Analysis --- p.60
Chapter 4.1.1 --- One Unknown Variable --- p.61
Chapter 4.1.2 --- Two Unknown Variables --- p.63
Chapter 4.2 --- Critical Value of Ratio R/q --- p.69
Chapter 4.3 --- Summary --- p.72
Chapter 5. --- Conclusions and Future Work
Chapter 5.1 --- Conclusions --- p.73
Chapter 5.2 --- Future Work --- p.75
References --- p.76
Appendix --- p.82