Spelling suggestions: "subject:"datorteknik"" "subject:"datortekniks""
851 |
InPUTpy : InPUT for PythonFink, Christoffer January 2014 (has links)
There are many problems where the solution depends heavily on parametertuning and therefore on conguration. Examples include Hill Climbers andvarious Evolutionary Algorithms. The Intelligent Parameter Utilization Tool(InPUT) uses a cross-language format for describing congurations of computerexperiments, thereby aiding in documentation and communication. Itis implemented in Java, and a C++ version is being developed. This meansthat only implementations in statically typed languages currently exist. APython port would thus greatly increase the diversity of implementation languages.The goal of this project was to create an InPUT implementation inPython, and to explore the suitability of a dynamically typed language inthis context. A de facto specication was discovered by creating a suite oflearning tests, and the new implementation was developed using a test-drivenapproach. Several features of Python proved advantageous by simplifying thedevelopment process.
|
852 |
Reporting application at SDC : A low bandwidth mobile applicationVesterlund, Elias January 2014 (has links)
The objective of the report is to investigate which kind of mobile appli-cation, native, hybrid or web, that is the best regarding cross-platform support compared to development cost. As there are little information regarding pure web applications for mobile devices a prototype will be constructed to give light in this technology. The prototype should an-swer the questions if it can save a year's usage in the cell phones memory, if it is possible to have support for 100 percent of Sweden area and generally if this approach would suffice. There are also some physi-cal restrictions on the web application. A login must be done in less than 5 second, fetch TOs( timber orders) within 10 seconds, report a row within 5 seconds. This in a 2G environment, in Telias network, which is mostly likely to be used in the forest. To easily test the application the CPN-tools(colored petri nets) are used to graphically model the applica-tion and simulations are thereafter done to get a scenes how the applica-tion would perform during many years of usage. To construct have been constructed with the aid of open web technologies as HTML5,CSS4, JavaScript, JQuery and JQuery mobile. The prototype used asynchronies communication to mask loss of coverage and long loading times. It also utilized HTML5 localStorage to save TOs and employer information so that minimize the need for fetching information many times. The proto-type application cannot be used in 100 percent of Sweden's area because the cellular coverage is not present in big areas in the north of Sweden. Therefore information is stored locally but after the pre fetched work orders are completed new work orders must be fetched where cellular coverage is present. The application still have a big usage area and as most wood products comes from the middle of Sweden this cannot be seen as a big problem. To save a year's usage of data on the other hand is not a problem at all. About 10 percent of the available 5 MB of storage in the HTML5 localStorage would be needed. It did also with ease handle the time limitations. As a conclusion the need for a web applica-tion, for SDC, is only present if both IVR and web reporting through a computer is if these services are liquidated in the long run. There are a bit more work with creating a hybrid native/web application using third-party applications but it in turns would give a better coverage area as that kind of application can pre download all TOs and employers ignoring any limitations in storage. This is not possible to do as a pure web application can't be run in the background on the phone.
|
853 |
Design and Implementation of a Network Manager for Industrial Automation Application in WirelessHART NetworksShahid, Ayaz January 2014 (has links)
Wireless technology has been advancing a lot over the years and it has become mature enough to be used in industrial process control. Wireless sensor networks have overtaken the wired devices and are vastly adapted across the industry. Using wireless technologies in industrial process control results in easy installation and configuration of network and helps in reduction of overall cost. Applying wireless technologies has greater benefits but on the other hand it provides challenges due to harsh industrial environments. Nowadays, wireless sensor devices are smart enough to detect the problems within the network and are capable of producing health reports. To use the capabilities of these smart devices a centralized management is required. A centralized network manager can manage these smart devices to improve the overall network. Network manager plays a pivotal role because it is a central part of the network and a bad network manager results in network performance degradation. This thesis work addresses the need of centralized network management and proposes a design for the network manager based on the WirelessHART standard. Several algorithms are developed based on the layered architecture of WirelessHART and a user-friendly graphical user interface is designed for the network manager which is capable of displaying real-time performance and statistics of the network, adding and configuring the nodes, creating routes for the nodes, showing routing tables and neighbour tables and display the network topology. Any change in the network is reflected and displayed by the GUI at run time. The designed network manager is implemented and tested using both simulated packets and real hardware and the work is evaluated using Average Packet Delivery Ratio, Average End to End Delay and by comparing the work to already designed network managers.
|
854 |
Compiler for an Embedded Extension Language on AndroidRasmus, Svensson January 2012 (has links)
Bytecode interpreters are a common implementation strategy for scripting languages. Source code is translated to bytecode to improve time and memory performance. The Android platform includes the Dalvik virtual machine, which typically executes bytecode compiled from Java source code. This thesis describes how this virtual machine can be reused to execute bytecode compiled from a scripting language. A compiler is written for a test bed scripting language and the time and memory performance is evaluated. The Dalvik virtual machine, designed for a statically typed object-oriented language, was flexible enough to successfully host a dynamically typed scripting language that allows for objects to be transported cheaply between scripts and Java code. The compiled code executes one to two orders of magnitude faster than with a naive interpreting implemetation. Numeric performance is lacking in general, though simpler cases are optimized.
|
855 |
Servervirtualisering : servervirtualisering hos privata företagNilsson, Nina, Nilsson, Tobias January 2015 (has links)
Följande arbete syftar till att få en överblick av hur servervirtualisering ser ut hos privata företag i Sverige samt för att få en djupare förståelse för hur det fungerar rent tekniskt. I utredandeavsnittet presenteras information om hur servervirtualisering fungerar samt information om ett antal aktörer på virtualiseringsmarknaden. Avsnittet tar dessutom upp vilka fördelar servervirtualisering medför ur ett kostnads och miljöperspektiv. Genomförandeavsnittet presenterar intervjuerna som har genomförts genom personliga besök på IT-företag och företag med en intern IT-avdelning. Intervjuerna behandlar frågor om hur, vad och varför de virtualiserar sina serversystem.
|
856 |
High-performance particle simulation using CUDAKalms, Mikael January 2015 (has links)
Over the past 15 years, modern PC graphics cards (GPUs) have changed from being pure graphics accelerators into parallel computing platforms.Several new parallel programming languages have emerged, including NVIDIA's parallel programming language for GPUs (CUDA). This report explores two related problems in parallel: How well-suited is CUDA for implementing algorithms that utilize non-trivial data structures?And, how does one develop a complex algorithm that uses a CUDA system efficiently? A guide for how to implement complex algorithms in CUDA is presented. Simulation of a dense 2D particle system is chosen as the problem domain foralgorithm optimization. Two algorithmic optimization strategies are presented which reduce the computational workload when simulating theparticle system. The strategies can either be used independently, or combined for slightly improved results. Finally, the resultingimplementations are benchmarked against a simpler implementation on a normal PC processor (CPU) as well as a simpler GPU-algorithm. A simple GPU solution is shown to run at least 10 times faster than a simple CPU solution. An improved GPU solution can thenyield another 10 times speed-up, while sacrificing some accuracy.
|
857 |
Kadenssensor med en accelerometer och ANT+Westerholm, Glenn January 2015 (has links)
Rapporten presenterar det examensarbetet som har gått ut på att undersöka möjligheterna att konstruera en sensor som mäter kadens med hjälp av en accelerometer. Implementation av kadensprofilen till ANT+ har gjorts för att möjliggöra synkronisering mellan en sportklocka och sensorn. Kadens är hur fort cyklisten trampar med pedalerna mätt i enheten Varv per minut vanligt förkortat RPM från engelskans Revolutions Per Minute. Hur fort en cyklist trampar påverkar kroppen på många olika sätt och ofta vill cyklisten veta vad aktuell kadens är för att optimera sin prestation. Den undersökta principen att använda en accelerometer för att mäta kadens syftar till att en eventuell prototyp skulle vara lämplig till inomhuscykling även kallad spinning. På en vanlig traditionell cykel har man oftast två hårdvarudelar för att mäta kadens, en monterad på pedalarmen och den andra på cykelramen. Cykelramen på en spinningcykel skiljer sig så pass mot en vanlig cykel att hårdvarudelen som ska sitta på cykelramen inte kan monteras med samma lätthet. Med en accelerometer behövs bara en hårdvarudel som lätt kan monteras på pedalarmen på cykeln. Programutvecklingen har skett med ett Arduino Uno som består av en ATmega328 mikrokontroller från Atmel. Sensorenheten som mäter kadensen består av Arduino Uno, accelerometern LSM303DLHC från STMicroelectronics och ANT-chippet nRF24AP2 från Nordic Semiconductor. Huvudenheten har bestått av en persondator som har agerat mottagare med programmet ANT+ Simulator. Det utvecklade programmet på mikrokontrollen upptäcker när det sker ett pedalvarv och skickar den totala varvtiden tillsammans med antal pedalvarv som totalt inträffat till nRF24AP2 vidare till huvudenheten. Kadensprofilen är den som räknar ut vad aktuell kadens är. Avslutningsvis presenteras ett minimumkrav av hårdvaran och ett förslag av en energisnål mikrokontroller för en eventuell prototyp.
|
858 |
Namecoin as authentication for public-key cryptography / Namecoin som autentisering för asymmetrisk krypteringMelin, Tomas, Vidhall, Tomas January 2014 (has links)
Public-key cryptography is a subject that is very important to everyone who wants confidentiality and privacy in networks. It is important to understand how public-key cryptography systems work and what flaws they have. In the first part of this report we describe some of the most common encryption schemes and key agreements. We carefully investigate their flaws, if they are broken and what threats have dire consequences. We find that the biggest issue is authentication and we present current solutions to the problem. The current solutions are flawed because they rely too much on trusting different entities. It is only required that one trusted entity becomes malicious for the entire authentication system to be compromised. Because of this we propose an alternative system in the second part, Namecoin. A risk analysis in form of an attack tree is performed on the Namecoin system, where we describe how the attacks are executed and what you can do to prevent them. We present different threats against the system and we describe how dire the consequences are and the probability of their execution. Since Namecoin is an implementation of the block chain algorithm we have also explained how the block chain works in detail. We present why we think that Namecoin is a system that should replace the currently used certificate authority system. The certificate authority system is flawed because it is centralized and dependant on that no authority makes any mistakes. The Namecoin system does not become compromised unless more than 50 % of the hashrate in the system is used with malicious intent. We have concluded that the biggest threats against Namecoin have such a low probability that they can be neglected.
|
859 |
Implementation & utvärdering av spelmotor i WebGLWahlin, Yngve, Feldt, Hannes January 2013 (has links)
This report describes an analysis of WebGL together with JavaScript with the aim to examine its limitations, strengths and weaknesses. This analysis was performed by building a 2D game engine containing some dynamic elements such as water, smoke, fire, light, and more. Different algorithms have been tested and analyzed to provide a clearer picture of how these work together. The report will go through the most basic functions of the game engine and describe briefly how these work. The result shows that JavaScript with WebGL can be considered to be a potent toolsets, despite the difficulties caused by JavaScript. In summary, similar projects can be recommended as Javascript and WebGL proved both fun and incredibly rewarding to work with.
|
860 |
Evaluation and Implementation of Linux User-space Fast Path Technologies : Linux, User-spaceKhan, Ahmed January 2013 (has links)
The enormous increase in device connectivity for data and telecom devices places significant challenges on the packet processing techniques used in embedded systems such as IP stacks. Therefore, the traditional packet processing software cannot handle the line rate packet flow even for the most cutting edge devices. A solution to this problem is to allow applications to directly receive packets without passing through the normal kernel stack and drivers i.e. interface directly with the hardware. Two such open source libraries for Linux are PF_RING and Netmap. In addition Freescale has a similar technology called USDPAA. In order to satisfy the first goal of this project, a detailed analysis and evaluation of PF_RING, Netmap and USDPAA has been conducted in order to determine how they compare in relation to a number of criteria such as functionality, support, performance, ease of use, software/ hardware dependencies and project stability etc. Secondly based on the earlier work, a design is proposed that can be used to build and port an application to run on Freescale DPAA based hardware (P4080) on top of USDPAA.
|
Page generated in 0.0353 seconds