Spelling suggestions: "subject:"datorteknik"" "subject:"datortekniks""
971 |
A Menu-based Universal Control Protocol / Ett menybaserat universiellt kontroll-protokollGustafsson, Per-Ola, Ohlsson, Marcus January 2002 (has links)
This thesis-project aims to research the possibilities of new wireless technologies in general control-situations. We have studied different existing control protocols, and developed a new protocol focusing on textbased menus. Our protocol is scaleable, easy to implement, and platform- and media independent. Since our protocol supports Plug and Play with dynamically allocated id’s, it does not require a unique id in the hardware. To test the protocol we have developed a prototype system, consisting of a mobile phone connected to a server, which in turn is connected to two slave units, controlling peripheral equipment on 220 Volt. The phone is an Ericsson T28, equipped with a Bluetooth unit. The server is runningthe real-time OS eCos on an ARM 7TDMI Evaluation Kit, and the slave units consist of two developer boards equipped with PIC-processors. Communication between the phone and the server is done over Bluetooth. However we did not find a working Bluetooth protocol stack ported to eCos, so a serial cable was used instead. Communication between the server and the slaves is done over a RS-485 serial network which simulates the traffic over a radio-network. The results show that our protocol is working, and that our system would be easy to implement, cheap to produce and very scalable.
|
972 |
Software Evolution in the context of .Net FrameworkWalid, Rohaimi January 2007 (has links)
<p>This paper discusses the process of software evolution and especially software migration in the context of .NET Technologies. Actually most of the companies that uses legacy systems implemented with procedural languages as C, Visual Basic and so on, meet some problems when new requirement specifications have to be integrated.</p><p>One possibility to deal with this situation is to choose a good migration strategy from these legacy systems towards new Object Oriented design.</p><p>There are some migration processes that enable the fulfilment of this task but most of the time theses processes cannot be applied directly without any modification.</p><p>This report presents a migration strategy and migration process applied for a real case of an application in a company. The New Object Oriented design of the application and the result are discussed in the following sections of this document.</p>
|
973 |
Tools and Organisational Measures to Improve Information FlowKhademhosseinieh, Banafsheh, Khan, Muhammad Tahir January 2009 (has links)
<p>In this age, too much information is provided to the users. So that they face information overload problem and spend more time in finding the right information according to their needs. The information available to the right person on the right time can make significant difference in the work tasks and business processes in an organisation.</p><p>This thesis work is on improving information flow within an organisation for a person having a certain role. The concentration of the work is on finding the factors (Qualifiers) which affect the information needs of the user and the actions which should be carried out to fulfil them, as well as suitable IT tools. All these have been presented as Final Result Table. This table shows the information needs, their qualifiers, and suggested actions that can be taken tocarry out a specific need. Besides, we found that there are some General Actions. These kinds of actions are not related to any specific need. Rather, while working to fulfil any of the needs, they can be taken for enhancing the work quality and speed. Further, these actions were classified into two groups: Information System Classification and Organisational Measures.</p>
|
974 |
Finite element methods for surface problemsCenanovic, Mirza January 2017 (has links)
The purpose of this thesis is to further develop numerical methods for solving surface problems by utilizing tangential calculus and the trace finite element method. Direct computation on the surface is possible by the use of tangential calculus, in contrast to the classical approach of mapping 2D parametric surfaces to 3D surfaces by means of differential geometry operators. Using tangential calculus, the problem formulation is only dependent on the position and normal vectors of the 3D surface. Tangential calculus thus enables a clean, simple and inexpensive formulation and implementation of finite element methods for surface problems. Meshing techniques are greatly simplified from the end-user perspective by utilizing an unfitted finite element method called the Trace Finite Element Method, in which the basic idea is to embed the surface in a higher dimensional mesh and use the shape functions of this background mesh for the discretization of the partial differential equation. This method makes it possible to model surfaces implicitly and solve surface problems without the need for expensive meshing/re-meshing techniques especially for moving surfaces or surfaces embedded in 3D solids, so called embedded interface problems. Using these two approaches, numerical methods for solving three surface problems are proposed: 1) minimal surface problems, in which the form that minimizes the mean curvature was computed by iterative update of a level-set function discretized using TraceFEM and driven by advection, for which the velocity field was given by the mean curvature flow, 2) elastic membrane problems discretized using linear and higher order TraceFEM, which makes it straightforward to embed complex geometries of membrane models into an elastic bulk for reinforcement and 3) stabilized, accurate vertex normal and mean curvature estimation with local refinement on triangulated surfaces. In this thesis the basics of the two main approaches are presented, some aspects such as stabilization and surface reconstruction are further developed, evaluated and numerically analyzed, details on implementations are provided and the current state of work is presented.
|
975 |
En undersökning av lyxighet gällande design på en webbapplikation / A study on luxury in terms of design on a web applicationGraf Morin, Harald, Moberg, Adam, Jonsson, Elina, Hedén, Felix, Elsässer, Nathalie, Wester, Oscar, Nilsson, Sara, Henriksson, Simon, Lennmark, Teodor January 2019 (has links)
The luxury segment has been late in its technology adaptation even though e-commerce, and the importance of internet presence, has increased. To succeed the conversion, traders need to know how to keep the customers perception of luxury on a webpage. This report aims to investigate how an e-shop should be designed to be perceived luxurious in terms of design. The question “How should an e-shop be designed to perceived as luxury according to its design?” is answered by developing and designing a web application for self-composed jam giving a luxurious perception. The method used is based on a study investigating homepage design. Several design factors that has a positive effect of customers perception of luxury were identified, whereupon a web application was developed. The web application and conventional one as reference, was individually evaluated on the BLI-scale together and with a Thinking Aloud test. The result showed a significant difference of the average for all dimensions of the BLI scale, where the hypothetically luxurious web application achieved the higher result. The Thinking Aloud test showed that the test page got more comments that pointed to a more luxurious experience, compared to the conventional page. The report concludes that esthetics and an overall impression of uniqueness and quality are important dimensions for the web application to be perceived as luxurious.
|
976 |
Examining the Impact of Microarchitectural Attacks on Microkernels : a study of Meltdown and SpectreGrimsdal, Gunnar, Lundgren, Patrik January 2019 (has links)
Most of today's widely used operating systems are based on a monolithic design and have a very large code size which complicates verification of security-critical applications. One approach to solving this problem is to use a microkernel, i.e., a small kernel which only implements the bare necessities. A system usinga microkernel can be constructed using the operating-system framework Genode, which provides security features and a strict process hierarchy. However, these systems may still be vulnerable to microarchitectural attacks, which can bypassan operating system's security features, exploiting vulnerable hardware. This thesis aims to investigate whether microkernels are vulnerable to the microarchitectural attacks Meltdown and Spectre version 1 in the context of Genode. Furthermore, the thesis analyzes the execution cost of mitigating Spectre version 1 in a Genode's remote procedure call. The result shows how Genode does not mitigate the Meltdown attack, which will be confirmed by demonstrating a working Meltdown attack on Genode+Linux. We also determine that microkernels are vulnerable to Spectre by demonstrating a working attack against two microkernels. However, we show that the cost of mitigating this Spectre attack is small, with a cost of < 3 slowdown for remote procedure calls in Genode.
|
977 |
Time series analysis and forecasting : Application to the Swedish Power GridFagerholm, Christian January 2019 (has links)
n the electrical power grid, the power load is not constant but continuouslychanging. This depends on many different factors, among which the habits of theconsumers, the yearly seasons and the hour of the day. The continuous change inenergy consumption requires the power grid to be flexible. If the energy provided bygenerators is lower than the demand, this is usually compensated by using renewablepower sources or stored energy until the power generators have adapted to the newdemand. However, if buffers are depleted the output may not meet the demandedpower and could cause power outages. The currently adopted practice in the indus-try is based on configuring the grid depending on some expected power draw. Thisanalysis is usually performed at a high level and provide only some basic load aggre-gate as an output. In this thesis, we aim at investigating techniques that are able topredict the behaviour of loads with fine-grained precision. These techniques couldbe used as predictors to dynamically adapt the grid at run time. We have investigatedthe field of time series forecasting and evaluated and compared different techniquesusing a real data set of the load of the Swedish power grid recorded hourly throughyears. In particular, we have compared the traditional ARIMA models to a neuralnetwork and a long short-term memory (LSTM) model to see which of these tech-niques had the lowest forecasting error in our scenario. Our results show that theLSTM model outperformed the other tested models with an average error of 6,1%.
|
978 |
Performance and Energy Efficient Building Blocks for Network-on-Chip ArchitecturesVangal, Sriram R. January 2006 (has links)
The ever shrinking size of the MOS transistors brings the promise of scalable Network-on-Chip (NoC) architectures containing hundreds of processing elements with on-chip communication, all integrated into a single die. Such a computational fabric will provide high levels of performance in an energy efficient manner. To mitigate emerging wire-delay problem and to address the need for substantial interconnect bandwidth, packet switched routers are fast replacing shared buses and dedicated wires as the interconnect fabric of choice. With on-chip communication consuming a significant portion of the chip power and area budgets, there is a compelling need for compact, low power routers. While applications dictate the choice of the compute core, the advent of multimedia applications, such as 3D graphics and signal processing, places stronger demands for self-contained, low-latency floating-point processors with increased throughput. Therefore, this work focuses on two key building blocks critical to the success of NoC design: high performance, area and energy efficient router and floating-point processor architectures. This thesis first presents a six-port four-lane 57 GB/s non-blocking router core based on wormhole switching. The router features double-pumped crossbar channels and destinationaware channel drivers that dynamically configure based on the current packet destination. This enables 45% reduction in crossbar channel area, 23% overall router area, up to 3.8X reduction in peak channel power, and 7.2% improvement in average channel power, with no performance penalty over a published design. In a 150nm six-metal CMOS process, the 12.2mm2 router contains 1.9 million transistors and operates at 1GHz at 1.2V. We next present a new pipelined single-precision floating-point multiply accumulator core (FPMAC) featuring a single-cycle accumulate loop using base 32 and internal carry-save arithmetic, with delayed addition techniques. Combined algorithmic, logic and circuit techniques enable multiply-accumulates at speeds exceeding 3GHz, with single-cycle throughput. Unlike existing FPMAC architectures, the design eliminates scheduling restrictions between consecutive FPMAC instructions. The optimizations allow removal of the costly normalization step from the critical accumulate loop and conditionally powered down using dynamic sleep transistors on long accumulate operations, saving active and leakage power. In addition, an improved leading zero anticipator (LZA) and overflow detection logic applicable to carry-save format is presented. In a 90nm seven-metal dual-VT CMOS process, the 2mm2 custom design contains 230K transistors. The fully functional first silicon achieves 6.2 GFLOPS of performance while dissipating 1.2W at 3.1GHz, 1.3V supply. It is clear that realization of successful NoC designs require well balanced decisions at all levels: architecture, logic, circuit and physical design. Our results from key building blocks demonstrate the feasibility of pushing the performance limits of compute cores and communication routers, while keeping active and leakage power, and area under control. / Report code: LiU-TEK-LIC-2006:36.
|
979 |
Visual Object Detection using Convolutional Neural Networks in a Virtual EnvironmentNorrstig, Andreas January 2019 (has links)
Visual object detection is a popular computer vision task that has been intensively investigated using deep learning on real data. However, data from virtual environments have not received the same attention. A virtual environment enables generating data for locations that are not easily reachable for data collection, e.g. aerial environments. In this thesis, we study the problem of object detection in virtual environments, more specifically an aerial virtual environment. We use a simulator, to generate a synthetic data set of 16 different types of vehicles captured from an airplane. To study the performance of existing methods in virtual environments, we train and evaluate two state-of-the-art detectors on the generated data set. Experiments show that both detectors, You Only Look Once version 3 (YOLOv3) and Single Shot MultiBox Detector (SSD), reach similar performance quality as previously presented in the literature on real data sets. In addition, we investigate different fusion techniques between detectors which were trained on two different subsets of the dataset, in this case a subset which has cars with fixed colors and a dataset which has cars with varying colors. Experiments show that it is possible to train multiple instances of the detector on different subsets of the data set, and combine these detectors in order to boost the performance.
|
980 |
Using Graphical Processors to Implement Radio Base Station Control Plane Functions / Implementera radiobasstationers kontrollplans funktioner med grafikprocessorRingman, Noak January 2019 (has links)
Today more devices are being connected to the Internet via mobile networks. With more devices in mobile networks, the workload on radio base stations increases. Radio base stations must be energy efficient and cheap which makes high-performance central processing units (CPUs) a bad alternative to meet the increasing workload. An alternative could be a graphics processing unit (GPU) which have a different hardware architecture more suitable for data parallel problems. This thesis has investigated the parallelisation possibilities in the user-equipment handling part of radio base stations, and the aim was to use a GPU to take advantage of the parallelism. The investigation found a mixed pipeline and data parallelism in user-equipment handling. A parallelism suitable for a graphics processing unit (GPU) execution. The tasks which handle user-equipment were divided into smaller communication-free sub-tasks. Sub-task batches of user-equipment were collected and offloaded to a GPU. A peak throughput gain of 62.2 times over the single-threaded CPU was achieved, but with an impact on latency with more than a magnitude. The latency was for all workloads at least 1.24 higher for the GPU implementations compared to the CPU implementations. A radio base station with many more user-equipment than the once existing today was simulated. For this radio base station, a gain of 14.0 times the single-threaded CPU was achieved, while the latency increased by 2.4 times. To really make use of a GPU implementation the number of user-equipment, the load, must be higher than in existing radio base stations today.
|
Page generated in 0.0683 seconds