• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 1
  • Tagged with
  • 6
  • 4
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Advanced Linux Sound Architecture for Embedded Systems

Yang, I-fan 22 August 2006 (has links)
In recent years, more and more vendors adopt Linux to be the embedded operating system for their electronic products because of its combination of reliability, performance, good toolchains, portability, and configurability. However, Linux kernel is complex, and different electronic products may use different platforms. For this reason, it often requires that Linux be ported to different platforms. Vedio and sound have been supported by Linux for a long time. The Open Sound System (OSS) plays an important role in Linux¡¦s sound system. OSS is a device driver for sound cards and other sound devices under various UNIX and UNIX-compatible operating systems. The biggest problem with OSS is that the free implementation that exists in the Kernel is quite limited. For a better support of modern sound cards, a new sound driver project was started by Jaroslav Kysela and others. Jaroslav Kysela started with a sound driver he needed to supporta sound card, and this grew into the ALSA project which he co-ordinates. More and More people become involved in the development of ALSA. This thesis can be divided into two parts. In the first part, we give a detailed description of how we port ALSA to an embedded system, which include both ALSA driver and ALSA library. In the second part, we turn our attention to applications that rely on ALSA, which include a PCM recorder, a PCM player, and a MP3 player.
2

Rugged Portable Communication System

Kamula, Juha, Hansson, Rikard January 2013 (has links)
Todays modern warfare puts high demands on military equipment. Where soldiers are concerned, types of communication equipment such as radios, displays and headsets play a central role. A modern soldier is often required to maintain communication links with other military units. These units can, for example, consist of platoon commanders, headquarters and other soldiers. If the soldier needs to make a report to several units, the message needs to be sent to several radio networks that are connected to these separate units. This multiplicity in turn requires several items of radio equipment connected to the radio network frequencies. Considering all the communication equipment that is used by a modern soldier, the parallel data flow and all the weight a soldier needs to carry, can get quite extensive.  \noindentAt Saab AB it has been proven that a combination of powerful embedded hardware platforms and cross platform software fulfills the communication needs. However, the weight issue still remains as these embedded platforms are quite bulky and hard to carry. In order to increase the portability, a tailored Android application for smaller low-power embedded hardware platform has been developed at Saab AB. Saab AB has also developed a portable analogue interconnection unit for connecting three radios and a headset, the SKE (Sammankopplingsenhet). \noindentSaab AB intends to develop a new product for soldiers, the RPCS (Rugged Portable Communication System), with capacities of running the Android application and combining the audio processing functionality of the SKE. This thesis focuses on developing a hardware platform prototype for the RPCS using Beagleboard. The SKE audio processing functionality is developed as a software application running on the Beagleboard.
3

Monitoring PC Hardware Sounds in Linux Systems Using the Daubechies D4 Wavelet.

Henry, Robert Karns 17 December 2005 (has links)
Users of high availability (HA) computing require systems that run continuously, with little or no downtime. Modern PCs address HA needs by monitoring operating system parameters such as voltage, temperature, and hard drive status in order to anticipate possible system failure. However, one modality for PC monitoring that has been underutilized is sound. The application described here uses wavelet theory to analyze sounds produced by PC hard drives during standard operation. When twenty-nine hard drives were tested with the application and the results compared with the drives' Self-Monitoring, Analysis, and Reporting Technology (S.M.A.R.T.) data, the binomial distribution's low p-value of 0.012 indicated better than chance agreement. While the concurrence between the two systems shows that sound is an effective tool in detecting hardware failures, the disagreements between the systems show that the application can complement S.M.A.R.T. in an HA system.
4

Privacy and Security Analysis : Assessing Risks and Harm to Patients / Analys av Personlig Integritet och Informationssäkerhet : Bedöma Risker och Skador på Patienter

Wairimu, Samuel January 2022 (has links)
Disruptive technologies in the form of e-Health or electronic healthcare (the use of information technology in health) have the ability to provide positive implications to both patients and healthcare professionals. Recently, public health agencies deployed contact tracing apps with the aim of curbing the spread of COVID-19, by aiding manual contact tracing, and lifting restrictions. Despite this, their ubiquitous nature in the sector has opened doors to new threats in the area of information security and privacy, where these apps, for instance, contain security and privacy risks such as violation of the principle of least privilege, which when exploited can cause privacy harms to the user, for example, re-identification of users. In general, information security and privacy in the healthcare sector is essential due to the nature of the data they process, and the need to keep the patient safe. While this is so, the general security posture of the sector, which is poor due to its under-financing in IT security among other reasons such as the use of legacy systems, makes it vulnerable to cyber-attacks that end up with exfiltration of personal health data, among other data, for instance, relevant research data. Such data can be misused incurring privacy harm to patients that have been affected by the breach. This thesis follows an experimental approach to assess the privacy and security risks of m-Health apps, with the selected case study of these m-Health apps, that is, COVID-19 contact tracing apps. In addition, it also contributes with a theoretical approach to assessing impacts and consequences in the healthcare sector, including what harms patients could face in the event of a state-sponsored cyber-attack. In addition, the research aims at contributing to the field by proposing a sector-specific model that can be used to evaluate the impact on the privacy of patients affected by a data breach. / Störande teknologier i form av e-hälsa eller elektronisk sjukvård (användning av informationsteknologi inom hälsa) har förmågan att ge positiva implikationer för både patienter och vårdpersonal. Folkhälsomyndigheter har nyligen implementerat så kallade kontaktspårningsappar i syfte att hindra spridningen av COVID-19, genom att bidra till manuell kontaktspårning och införande av restriktioner. Trots detta har deras allmänt förekommande natur i sektorn öppnat dörrar för nya hot i områdena informationssäkerhet och personlig integritet, Där dessa appar, till exempel, innehåller säkerhets- och integritetshot såsom brott mot lägsta prioritetsprincipen (eng. principle of least privilege), som, när exploaterad, kan orsaka personlig integritets-skador för användaren, exempelvis återidentifiering av användare. Generellt kan sägas att informationssäkerhet och skydd av personlig integritet inom hälso- och sjukvården är absolut nödvändigt med tanke på egenskaperna hos de personuppgifter som behandlas, och behovet av att skydda patienten. Trots detta gäller att sektorns generella hållning , som är svag på grund av dess underfinansiering av IT-säkerhet bland andra skäl på grund av användning av gamla system, gör dem sårbara för IT-angrepp som slutar med exfiltrering av persondata, bland annat forskningsdata. Sådana data kan missbrukas och därmed orsaka skada för de patienters som drabbats. Avhandlingen argumenterar för att hälso- och sjukvårdssektorns låga kvalitet på informationssäkerhet kan leda till att säkerheten och integriteten hos hälsodata, särskilt personlig hälsodata, kan exploateras för att orsaka integritetsskador inte bara från opportunister eller hacktivister, utan också från angripare som sponsras av stater, som exempelvis Fancy Bear i fallet World Anti-Doping Agency år 2016. Det följer ett experimentellt tillvägagångssätt för att säkerställa påverkan och konsekvenser i vårdsektorn, inklusive vilka skador patienter skulle kunna möta om ett angrepp sponsrad av ett annat land skulle ägan rum. I grunden visar forskningen på de kritiska och signifikanta egenskaperna i sektorn och den påverkan en IT-angrepp skulle ha på individer och på sektorn själv. Dessutom strävar forskningen efter att bidra till området genom att föreslå en sektorspecifik modell som kan användas för att evaluera påverkan på de patienters personliga integritet som drabbats av ett dataläckage.
5

Extended Bluetooth Profiles on CCpilot displays

Johnson, Alexander January 2017 (has links)
Bluetooth is used in modern cars to connect smartphones to stream music, to access internet and for phone services such as phone book contacts and making calls. Similar features are now requested by customers of maximatecc's products, e.g. display computers, for offroad vehicles. This thesis is aimed to investigate what is needed to support these features in maximatecc's Linux based displays and how the features can be used in a Qt application. For instance, the connectivity features in personal cars most commonly utilizes the Bluetooth profiles: Advanced Audio Distribution Profile (A2DP) Audio/Video Remote Control Profile (AVRCP) Personal Area Network (PAN) Profile Hands Free Profile (HFP) Phone Book Access Profile (PBAP) Message Access Profile (MAP). In Linux operating system the Bluetooth stack Bluez is used in the lower level implementation. Open source software components recommended to implement the above profiles includes: Obexd (for MAP and PBAP) PulseAudio (for A2DP and HFP) oFono (for HFP) Connman (for PAN) all of which help to implement the top level profiles of the Bluetooth stack needed, easily controlled by a Qt application through DBus. Most of the external software components were not possible to add to the Linux image on the CCpilot VA display during the period of the thesis. Instead some features of the profiles have been tested, through a Qt demo and python test scripts, on a Virtual Machine in an environment similar to the CCpilot VA. All profiles tested had some functionality verified except for AVRCP, which is not supported until later versions of Bluez, not available for the Linux kernel on the CCpilot VA. However, the audio in the HFP only occasionally worked. On the CCpilot VA only PBAP was tested successfully.
6

Knihovna pro efektivní záznam videa v 3D aplikaci / Library for Efficient Video Capture in 3D Application

Pospíšil, Petr January 2012 (has links)
This thesis deals with library for recording video in the background of 3D application. A library is designed to work under the Microsoft Windows and Linux operation systems.  It records image and also sound. Image recording is supported in OpenGL, Direct3D9, Direct3D10 and Direct3D11. To reduce video data size, library supports image compression using MJPG codec. Audio is recorded by WaveForm audio, Windows Core Audio or ALSA. Recorded sound is for whole operation system. A library is able to record up to two audio streams to accommodate possible microphone input. It can mix audio data together if needed. Output data are then written into AVI file. It is possible to write own text information as overlay that is rendered as part of application screen output.

Page generated in 0.0526 seconds