Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Engineering

Is Vehicle Characterization In Accordance With Standard Test Procedures A Necessary Prerequisite For Validating Computer Models Of A Test Vehicle?, Michael Hall Feb 2014

Is Vehicle Characterization In Accordance With Standard Test Procedures A Necessary Prerequisite For Validating Computer Models Of A Test Vehicle?, Michael Hall

Masters

Vehicle characterization is the process by which a particular vehicle’s inherent dynamic behavior is classified by measuring its response to certain command inputs under standard test conditions. Such information is required when comparing its performance to that of other vehicles in response to the same test event and it is also used to authenticate computer models of the test vehicle. The aim of this research was to determine whether vehicle characterization is possible using data from non- standard tests and to judge whether such data can also be used for the purpose of validating a computer model of the test …


A New Simplified Federated Single Sign-On System, Chen Liang Jan 2013

A New Simplified Federated Single Sign-On System, Chen Liang

Masters

The work presented in this MPhil thesis addresses this challenge by developing a new simplified FSSO system that allows end-users to access desktop systems, web-based services/applications and non-web based services/applications using one authentication process. This new system achieves this using two major components: an “Authentication Infrastructure Integration Program (AIIP)" and an “Integration of Desktop Authentication and Web-based Authentication (IDAWA)." The AIIP acquires Kerberos tickets (for end-users who have been authenticated by a Kerberos single sign-on system in one net- work domain) from Kerberos single sign-on systems in different network domains without establishing trust between these Kerberos single sign-on systems. The …


Investigating Text Message Classification Using Case-Based Reasoning, Matt Healy Jan 2007

Investigating Text Message Classification Using Case-Based Reasoning, Matt Healy

Masters

Text classification is the categorization of text into a predefined set of categories. Text classification is becoming increasingly important given the large volume of text stored electronically e.g. email, digital libraries and the World Wide Web (WWW). These documents represent a massive amount of information that can be accessed easily. To gain benefit from using this information requires organisation. One way of organising it automatically is to use text classification. A number of well known machine learning techniques have been used in text classification including Naïve Bayes, Support Vector Machines and Decision Trees, and the less commonly used are k-Nearest …


Peer-To-Peer Searching And Sharing Of Electronic Documents, Paul Stacey Oct 2004

Peer-To-Peer Searching And Sharing Of Electronic Documents, Paul Stacey

Masters

Peer-to-peer systems have existed since the first incarnation of the Internet. In recent times the Internet has taken on a more hierarchical form, power has been taken away from the individual and placed in the hands of operators of large servers. However, with the re-emergence of p2p the individual is gaining more freedom. End users attached to the Internet now have the power to host and publish content through the user of p2p technologies. Peer-to-peer systems present significant design challenges and have opened up a floodgate of research in an effort to overcome some of the fundamental problems. This thesis …


An Atm System Model And Wireless Channel Simulation, Karen Dunne Dec 2000

An Atm System Model And Wireless Channel Simulation, Karen Dunne

Masters

Congestion in the low frequency regions of the electromagnetic spectrum and demand for support of high bandwidth applications has prompted widespread investigations into networking technologies and communications media. Traditional networking technologies such as Ethernet that are not capable of adequately supporting high bandwidth applications (e.g. videoconferencing) are being replaced by high speed, high bandwidth technologies such as Asynchronous Transfer Mode (ATM). In the communications media market, wireless systems are becoming ubiquitous due to their ease of installation and maintenance costs. In this research, the networking technology of interest is ATM. ATM used a cell switching architecture that allows seamless support …