• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5991
  • 1920
  • 1
  • Tagged with
  • 7912
  • 7912
  • 7912
  • 7851
  • 862
  • 801
  • 627
  • 613
  • 590
  • 546
  • 447
  • 392
  • 388
  • 328
  • 327
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Evaluation of OKL4 / Virtualisering med OKL4

Bylund, Mathias January 2009 (has links)
Virtualization is not a new concept in computer science. It has been used since the middle of the sixties and now software companies has interested in this technology. Virtualization is used in server side to maximize the capacity and reduce power consumption. This thesis focuses on virtualization in embedded system. The technology uses a hypervisor or a virtual machine monitor as a software layer that provide the virtual machine and to isolate the underlying hardware. One of most interesting issue is that is supports several operating system and applications running on the same hardware platform and the hypervisor has complete control of system resources. The company Open Kernel Labs is one of the leading providers of embedded systems software virtualization technology and OKL4 is one of theirproducts, which is based on L4 family of second-generation microkernel’s. In this thesis, we will evaluate the kernel contains, the performance, the security and the environment of the OKL4. Finally we conclude the advantages and disadvantages of the product and technology.
72

Frequency Oriented Scheduling onParallel Processors

Zhong, Siqi January 2009 (has links)
No description available.
73

Frequency Oriented Scheduling onParallel Processors

Zhong, Siqi January 2009 (has links)
No description available.
74

Tekniskt lyft av PaperLine : Uppgradering av klient till Single Page Application i ett Manufacturing Execution System.

Skogum, Filip, Bennetoft, Alexander January 2017 (has links)
No description available.
75

A Survey of Automated Tools for Probing Vulnerable Web Applications

Barsomo, Milad January 2017 (has links)
The development of web applications have increased exceedingly in the last few years. Without the concern of security development, these web applications are exposed to a great amount of cyber threats. This thesis provides a survey of automated tools, or so called black box web scanners, that are used to find vulnerabilities, without any internal knowledge, in a web application. The web scanners was evaluated by running them on an vulnerable web application called XVWA and comparing the scanning results with two criteria. First criterion is to see if it is as accurate as stated, and the second criterion is to check if they pass the requirements of NIST for a web scanner of this type. All of the web scanners included in this thesis are open source/free to use. The results of eight different web scanners shows that most of the scanners does not follow the NIST requirements fully, however the majority still performs well. It has also been seen that the newer and most active developed scanners performs the best which is logical. One of the drawn conclusions is that none works perfect or is above all the other scanners.
76

Speed-invariant video comparison for robust human action recognition

Weiss, Jan January 2017 (has links)
As cameras and especially 3D cameras got affordable within recent years they can be used by a wider range of people. Human action recognition based on 3D coordinates recorded with such devices including a depth camera made it possible to compute video data easier. Many already published papers ignore the difference of speed within the execution of the same action. This paper suggests and evaluates multiple algorithms handling that problem based on Dynamic Time Warping and compares them with regard to runtime and accuracy. An additional algorithm from Softwerk AB is analyzed, adjusted and compared. An approach for a fast and robust algorithm able to compute a massive amount of stored sequences is proposed within this paper. The new algorithm depends on further research as not all prerequisites are met yet.
77

VIRTUAL REALITY – STREAMING AND CONCEPTS OF MOVEMENT TRACKING

Carlsson, Mikael January 2014 (has links)
This thesis was created to support research and development of a virtual reality application allowing users to explore a virtual world. The main focus would be on creating a solution for streaming the screen of a PC to a mobile phone, for the purpose of taking advantage of the computer’s rendering capability. This would result in graphics with higher quality than if the rendering was done by the phone. The resulting application is a prototype, able to stream images from one PC to another, with a delay of about 200ms. The prototype uses TCP as its transmission protocol and also uses the Graphics Device Interface (GDI) to capture the host computer’s screen.This thesis also provides some information and reflections on different concepts of tracking the movement of the user, e.g. body worn sensors used to capture relative positions and translating into a position and orientation of the user. The possibility of using magnetic fields, tracking with a camera, inertial sensors, and finally triangulation and trilateration together with Bluetooth, are all concepts investigated in this thesis. The purpose of investigating these methods is to help with the development of a motion tracking system where the user is not restricted by wires or cameras, although one camera solution was also reviewed.
78

Porting AODV-UU Implementation to ns-2 and Enabling Trace-based Simulation

Wiberg, Björn January 2002 (has links)
In mobile ad-hoc networks, autonomous nodes with wireless communication equipment form a network without any pre-existing infrastructure. The functionality of these networks heavily depends on so called ad-hoc routing protocols for determining valid routes between nodes. The main goal of this master’s thesis has been to port AODV-UU, a Linux implementation of the AODV (Ad hoc On-Demand Distance Vector) routing protocol, to run in the ns-2 network simulator. Automated source code extraction lets the ported version use the same source code as the conventional Linux version, to the extent this is possible. The second goal was to use logfiles from the APE testbed, a Linux-based ad-hoc protocol evaluation testbed, for enabling trace-based simulations with AODV-UU. Results of trace-based simulations show that it is possible to obtain packet delivery ratios closely corresponding to those of real-world experiments.
79

Förutsättningar för ett lyckat IT-införande : samordning, engagemang och kompetens

Björkman, Jonas January 1998 (has links)
Detta arbete tar upp hur företag skapar förutsättningar för att en IT-investering kommer att bli lyckad. Med en lyckad IT-investering menas att ett anpassat system skapas där dess användning blir så effektiv så att den fulla potentialen hos systemet utnyttjas. Arbetet som ligger bakom rapporten är en litteraturstudie av olika teorier varav en legat som grund för mitt fortsatta arbete. Dessutom har en fallstudie genomförts genom fem stycken djupintervjuer av företagsledare och systemutvecklare. Deras arbetsätt och synsätt har sedan jämförts med den baserande teorin. Teorin som jag baserat mig på tar upp tre stycken kritiska faktorer, samordning, engagemang och kompetens, som alla måste till för att en IT-investering skall nå sin fulla potential. Dessa faktorer skall genomsyra hela utvecklingsprocessen av systemet och sedan i en ständigt pågående process förbättra och effektivisera dess användning. Rapporten tar även upp om det går att förutse vilken effekt och påverkan ett nytt IT-system kommer att ha på användarna. De slutsatser som dragits under arbetet är att många företag är medvetna om vilka faktorer som skall beaktas vid en IT-investering. Insikten om de tre kritiska faktorernas betydelse är också mycket god. Trots detta ger inte IT-investeringarna det resultat som det finns förutsättningar till. Detta beror på att kompetens och samordning försummas efter att systemet har implementerats. Effekten blir i många fall att den fulla potentialen hos ett infört IT-system inte utnyttjas.
80

Intranäts positiva och negativa sidor

Bringle, Per January 1998 (has links)
Detta arbetets syfte är att klargöra om de olika för- och nackdelar som ett införande av intranät medför enligt facklitteratur även stämmer överens med verklighetens företag. Även frågan om informationsflödet förändras efter införandet av ett intranät i ett företag behandlas i denna rapport. För att kunna dra slutsatser utifrån problemställningen har intervjuer genomförts i fyra företag som har haft intranät olika lång tid. Slutsatserna är i stort sett att de fördelar som litteraturen tar upp i samband med intranät stämmer ganska bra överens med de företag som ingått i undersökningen. Dock innebär inte intranätinförandet att alla fördelar kommer direkt utan det kan dröja några år och en hel del arbete kan behöva läggas ned innan ett företag kan utnyttja intranätet på ett maximalt sätt. De företag som ingått i undersökningen känner dock inte att de nackdelar som tas upp i facklitteraturen uppkommer med intranätet. Informationsflödet har förändrats lite grand i de företag som ingått i undersökningen och det kommer troligtvis förändras ännu mer ju längre tid som går. Bland annat visar slutsatserna på att mer information som dessutom alltid är aktuell kan spridas i företaget snabbare.

Page generated in 0.0799 seconds