• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 22
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Email: From “To” to “Send"

Cameron, Nancy G. 01 August 2010 (has links)
No description available.
2

Email: From “To” to “Send"

Cameron, Nancy G. 01 March 2007 (has links)
Occupational health nurses' ability to use email efficiently and effectively enhances their professionalism, responsiveness, and overall communications. Poorly written emails can damage the reputations of nurses and their organizations. Knowing when not to communicate by email is as important as being able to write effective emails. Many safeguards can be employed to prevent or minimize confusion and strengthen email communications. Names and addresses must be checked, appropriate subject lines used, and humor applied conscientiously. All emails should be proofread prior to sending, and replies must be carefully considered. Simple, colorless email backgrounds make downloading quicker. Sharp, clear fonts are easier on the eyes. Direct and defined requests and confirmations augment communication. Once "Send" is pressed, the email is out of the sender's control. Lack of network security, forwarding by others, and potential confidentiality breaches can lead to legal or public relations controversies. Email is an important business tool. Occupational health nurses must be competent in the skills of effective email communication, as it is an integral part of business and health care.
3

Where do I fit it? : exploring how dyslexic young people experience social interactions in a mainstream secondary school

Ross, Helen January 2017 (has links)
Since the Children and Families Act 2014, young people and parents appear (on paper) to have a bigger role than ever in negotiating Special Educational Needs provision for themselves/their children. However, recent studies have suggested this is not necessarily the case (Craston et al, 2013a; 2013b; 2013c), particularly for young people with a hidden impairment, such as dyslexia (Ross, 2013b; 2013c). This current study explored the experiences of dyslexic young people, their parents/carers and their teachers in relation to dyslexia-related support interventions. Over 5 months in 2015, fieldwork was undertaken at Hilltop View School (pseudonym), in a ‘Pathfinder’ Local Authority (The Stationary Office, 2011) in the South-West of England. Young people, parents and carers, and teachers participated in focus group sessions and one-to-one interviews. Lessons were also observed. Participants’ understandings of dyslexia, it’s effect on young people’s self-concept and subsequent ability to negotiate social spaces to secure provision of resources were explored within a framework based on Jenkins’ (2008) ‘levels of interaction’, grounded in a Bourdieusien model of the social world. Through the use of this unique theoretical framework, participants were found to have differing capacities to negotiate their own social space at different ‘levels of interaction’ (Jenkins, 2008). Young people and teachers were found to have the best capacity to navigate their social setting at an ‘interactional level’ (person to person interactions), while parents appeared to have more opportunity to engage at the ‘institutional level’ (person/institution to institution interactions). This study provides an understanding of the experiences of stakeholders within a changing policy framework and provides a new theoretical framework within which to undertake investigations into the experiences of stakeholders in SEND provision.
4

Konstrukční návrh průběžného mísiče o výkonu 5-12 tun/hod / The design of sand mixer with output range 5-12 TPH

Bobkovič, Štefan January 2012 (has links)
The aim of this diploma thesis is the structural design of continous mixer with output range 5-12 tons per hour. The work contains a brief description of mixing technology and basic parameters of similar machines. The work is devoted to the design of double-arm sand mixer with a belt conveyor. An important part of this diploma thesis is a 3D model of fundamental parts of sand mixer, as well as its composition. Based on the 3D model is elaborated strenght analysis of selected parts with finite element method. The work is accompanied by manufacturing drawings of selected components and assembly drawing of deposit of mixing blades to the shaft.
5

Flow Control of Real Time Multimedia Applications Using Model Predictive Control with a Feed Forward Term

Duong, Thien Chi 2010 December 1900 (has links)
Multimedia applications over the Internet are getting more and more popular. While non-real-time streaming services, such as YouTube and Megavideo, are attracting millions of visiting per day, real-time conferencing applications, of which some instances are Skype and Yahoo Voice Chat, provide an interesting experience of communication. Together, they make the fancy Internet world become more and more amusing. Undoubtedly, multimedia flows will eventually dominate the computer network in the future. As the population of multimedia flows increases gradually on the Internet, quality of their service (QoS) is more of a concern. At the moment, the Internet does not have any guarantee on the quality of multimedia services. To completely surpass this limitation, modifications to the network structure is a must. However, it will take years and billions of dollars in investment to achieve this goal. Meanwhile, it is essential to find alternative ways to improve the quality of multimedia services over the Internet. In the past few years, many endeavors have been carried on to solve the problem. One interesting approach focuses on the development of end-to-end congestion control strategies for UDP multimedia flows. Traditionally, packet losses and delays have been commonly used to develop many known control schemes. Each of them only characterizes some different aspects of network congestion; hence, they are not ideal as feedback signals alone. In this research, the flow accumulation is the signal used in feedback for flow control. It has the advantage of reflecting both packet losses and delays; therefore, it is a better choice. Using network simulations, the accumulations of real-time audio applications are collected to construct adaptive flow controllers. The reason for choosing these applications is that they introduce more control challenges than non-real-time services. One promising flow control strategy was proposed by Bhattacharya and it was based on Model Predictive Control (MPC). The controller was constructed from an ARX predictor. It was demonstrated that this control scheme delivers a good QoS while reducing bandwidth use in the controlled flows by 31 percent to 44 percent. However, the controller sometime shows erratic response and bandwidth usage jumps frequently between lowest and highest values. This is not desirable. For an ideal controller, the controlled bandwidth should vary near its mean. To eliminate the deficiency in the strategy proposed by Bhattacharya, it is proposed to introduce a feed forward term into the MPC formulation, in addition to the feedback terms. Simulations show that the modified MPC strategy maintains the benefits of the Bhattacharya strategy. Furthermore, it increases the probability of bandwidth savings from 58 percent for the case of Bhattacharya model to about 99 percent for this work.
6

Zabezpečení počítačových sítí s protokolem IPv6 / Securing computer networks with IPv6 protocol

Geyer, Lukáš January 2012 (has links)
The objective of the diploma thesis is the analysis of network attacks on local area networks with IPv6 protocol and defenses against these attacks along with methodology of the security process.
7

Bezpečné objevování sousedů / Secure Neighbor Discovery Protocol

Bezdíček, Lukáš January 2014 (has links)
This report deals with designing and implementing of a complete SEND protocol for operating systems GNU/Linux. The first part of the document contains a description of ND and SEND protocols. The second part of the document defines security threats connected with unsecured ND. The third part of the report describes a design and implementation of SEND protocol named sendd . Conclusion of the document is dedicated to a summary of accomplished results and information about future development of this project.
8

Einstellung von PI-Reglern bei Send-on-Delta-Abtastung

Hensel, Burkhard 08 December 2017 (has links) (PDF)
Energieeffizienz hat in Forschung und Alltag eine zentrale Bedeutung. Arbeiten verschiedene elektronische Geräte zusammen, um gemeinsam eine Regelungsaufgabe zu lösen, müssen sie miteinander kommunizieren. Ein Beispiel aus dem Alltag sind Funk-Raumtemperaturregler, bei denen ein batteriebetriebener Temperatursensor und ein Heizungsaktor (Stellantrieb am Heizungsventil) über drahtlose Kommunikation zusammenarbeiten. Diese Kommunikation benötigt oft mehr Energie als der Betrieb der eigentlichen (elektronischen) Funktionalität der Teilsysteme. Energieeffizienter als die in Regelkreisen übliche periodische (äquidistante) Abtastung ist – durch eine Verringerung der Nachrichtenrate – eine ereignisbasierte Abtastung. Send-on-Delta-Abtastung ist die am weitesten verbreitete Art der ereignisbasierten Abtastung. Dabei wird der Wert der Regelgröße (im Beispiel die Raumtemperatur) nicht in konstanten Zeitintervallen übertragen, sondern nur dann, wenn er sich um einen bestimmten Betrag geändert hat. Der mit einem Anteil von über 90 % im Praxiseinsatz am weitesten verbreitete Reglertyp ist der PID-Regler, wobei die meisten als „PID-Regler“ bezeichneten Regler aus verschiedenen Gründen keinen D-Anteil (Differential-Anteil) verwenden und daher als „PI-Regler“ bezeichnet werden können. Die vorliegende Arbeit verfolgt das Ziel, systematisch zu untersuchen, wie man PI-Regler einstellen sollte, um neben dem Erreichen einer hohen Regelgüte auch die Vorteile der Send-on-Delta-Abtastung bezüglich der Netzlastreduktion und Energieeffizienz bestmöglich auszunutzen. Die „Gewichtung“ dieser sich teilweise widersprechenden Kriterien ist anwendungsspezifisch einstellbar. / Energy efficiency is very important both in science and everyday life. If different electronic devices work together, for example for solving a control task together, they have to communicate with each other. An everyday life example are room temperature controllers using radio communication between a battery-powered temperature sensor and a heating actuator. This communication often needs more energy than the operation of the actual (electronic) functionality of the components. More energy-efficient than the commonly used periodic sampling is event-based sampling, due to the reduction of the message rate. Send-on-delta sampling is the most widely-known kind of event-based sampling. In that case, the value of the controlled variable (e.g. the room temperature) is not transmitted equidistantly but only when it has changed by a specific amount. The most successful controller in practice is the PID controller. The most so-called “PID controllers” do not use the D part (differential action) for several reasons and can therefore be called “PI controllers”. This work analyses systematically how the parameters of a PI controller should be tuned to reach besides a high control quality also a good exploitation of the advantages of send-on-delta sampling regarding network load reduction and energy efficiency. The “weighting” of these partially contradicting criteria is application specifically adjustable.
9

Triggningskriterier i triggningsmodul för trådlösa dataloggern DL141E / Triggering Criteria in Trigger Module for Wireless Data Logger DL141E

Jovanovic, Aleksandar, Vu, Cong January 2018 (has links)
Dataloggern DL141E möjliggör kontinuerlig loggnig av mätdata från sensorer på upp till 30k sampel/s, som vidare kan överföras till mobiltelefoner via trådlös kommunikation. Detta är dock för stora datamängder per tidsenhet för mobiltelefoner som är tekniskt begränsade. Därför önskas bara relevant mätdata för att reducerar denna onödiga datamängd. I denna studie föreslås ett tillvägagångssätt där enspecifik mindre samling av diskreta försampel loggas i tur och ordning. Varje samling signalbehandlas genom att ställas mot fördefinierade triggningskriterier för att trigga loggning av en stor uppsättning av sampel på bara intressanta signalavvikelser. Dessa triggningskriterier är en särskild nivåöverskridning och signalriktning i kombination med ett antal sampel i följd. Studien förser en granskning av hur signalberäkningsmetoden ”Lebesgue sampling” kan tillämpas med kriterierna för god träffsäkerhet och en skälig beräkningstid i mobiltelefoner. Detta beaktas med dataloggerns vanligaste signaltyper puls och ramp i en miljö där småbrus och transienter förekommer. Träffsäkerheten och beräkningsbördan beaktasför att bedöma Lebesgue metodens effektivitet och antal nödvändiga försampel per uppsättning. Implementeringen görs i Java Android plattform och integreras därefter i en digital triggningsmodul med Graphical User Interface (GUI). / With the data logger DL141E it’s possible to continuously log measurement data from sensors up to 30k samples per second, and then transferring them to a mobile phone with Bluetooth technology. But this is by far too much sample data in a small time for a mobile phone with technical limitations to receive. That’s why only relevant measurement data should be mass logged to reduce the unnecessary data amount. Int his study a new approach is proposed where a specific and smaller amount of discrete pre-samples are logged in sequence. Every set of pre-samples is processed by comparing them to the user pre-defined trigger criterias. Met criterias will trigger logging of a massive set of samples on basis of only interesting signal deviations. The following trigger criterias are used: a specific signal level to cross, a specific signal direction, and both of these in combination with an amount of consecutive samples. The study provides an examination on how the signal processing method ”Lebesgue sampling” can be applied with the above criterias to achieve a god accuracy with reasonable processing time on mobile phones. This is observed using sensors with the most common signal types ramp and pulse in an environment where small noises and transients occur. The accuracy and the processing load are taken into account when estimating the efficiency of Lebesgue method and when estimating how many pre-samples per set might be sufficient. The implementation is written in Java Android platform and then integrated into a digital triggering module with Graphical User Interface (GUI).
10

Modeling the Throughput Performance of the SF-SACK Protocol

Voicu, Laura M. 30 March 2006 (has links)
Besides the two classical techniques used to evaluate the performance of a protocol, computer simulation and experimental measurements, mathematical modeling has been used to study the performance of the TCP protocol. This technique gives an elegant way to gain insights when studying the behavior of a protocol, while providing useful information about its performance. This thesis presents an analytical model for the SF-SACK protocol, a TCP SACK based protocol conceived to be appropriate for data and streaming applications. SF-Sack modifies the multiplicative part of the Additive Increase Multiplicative Decrease of TCP to provide good performance for data and streaming applications, while avoiding the TCP-friendliness problem of the Internet. The modeling of the SF-SACK protocol raises new challenges compared to the classical TCP modeling in two ways: first, the model needs to be adapted to a more complex dynamism of the congestion window, and second, the model needs to incorporate the scheduler that SF-SACK makes use of in order to maintain a periodically updated value of the congestion window. Presented here is a model that is progressively built in order to consider these challenges. The first step is to consider only losses detected by triple-duplicate acknowledgments, with the restriction that one such loss happens each scheduler interval. The second step is to consider losses detected via triple-duplicate acknowledgments, while eliminating the above restriction. Finally, the third step is to include losses detected via time-outs. The result is an analytical characterization of the steady-state send rate and throughput of a SF-SACK flow as a function of the loss probability, the round-trip time (RTT), the time-out interval, and the scheduler interval. The send rate and the throughput of SF-SACK were compared against available results for TCP Reno. The obtained graphs showed that SF-SACK presents a better performance than TCP. The analytical model of the SF-SACK follows the trends of the results that are presently available, using both the ns-2 simulator and experimental measurements.

Page generated in 0.0519 seconds