• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 3
  • 2
  • 1
  • 1
  • Tagged with
  • 8
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

"Fallbacks" - betydelsen av vandringstid för Atlantlax (Salmo salar L.) som faller nedströms vandringshinder / "Fallbacks" - the importance of migration time for Atlantic salmon (Salmo salar L.) that fall downstream of migration barriers

Larsson, Pia January 2013 (has links)
In Lake Vänern, Sweden, there is an endemic population of Atlantic salmon (Salmo salar L.) that lives its entire life in fresh water. The salmon is hindered from migrating to its natural spawning sites in the northern part of the River Klarälven by nine hydro-electric power plants. None of the hydro-electric power plants have fishways so that salmon migrating upstream or downstream may pass. In the current situation, the upward migrating salmon are caught in a fish trap at the most downstream located power plant in Forshaga. From there, the salmon are driven in a truck, past eight power plants and released a few kilometers upstream of the eighth power plant at Edsforsen. This study investigated the difference in the proportion of fallbacks between early (June-July) and late (August-September) migrating salmons in 2011-2013. The results showed that there was a significant difference in the proportion of fallbacks between the early and the late-migrating salmon. Fifty-one percent of the early salmon and 13% of the late salmon fell back during these 3 years. Further, there was no significant difference between males and females that became fallbacks. Nor was there any difference in the length of early and late-migrating salmon or fallbacks and non-fallbacks. / I sjön Vänern, Sverige, finns en endemisk population av Atlantlax (Salmo salar L.) som lever hela sitt liv i sötvatten. Laxen hindras från att migrera till sina naturliga lekplatser i norra delen av Klarälven av nio vattenkraftverk. Inget av vattenkraftverken har fiskvägar så att lax som migrerar uppströms eller nedströms kan passera. I dagsläget fångas lax som vandrar uppströms in i en fiskfälla vid det mest nedströms belägna kraftverket i Forshaga. Därifrån körs laxen i lastbil förbi åtta kraftverk och släpps ut några kilometer uppströms det åttonde kraftverket i Edsforsen. Den här studien undersökte skillnaden i andelen fallbacks mellan tidigt (juni-juli) och sent (augusti-september) migrerande laxar under åren 2011-2013. Resultaten visade att det fanns en signifikant skillnad i andelen fallbacks mellan den tidiga och den sent migrerande laxen. Femtioen procent av den tidiga laxen och 13% av den sena laxen föll tillbaka under dessa 3 år. Vidare fanns det ingen signifikant skillnad mellan hanar och honor som blev fallbacks. Det fanns inte heller någon skillnad i längden av tidigt och sent migrerande lax eller lax som föll tillbaka och lax som inte föll tillbaka.
2

Vývoj a ověření aplikace na podporu výuky HACMP clusteru pod OS IBM AIX / Development and verification of application for support of HACMP clustering education in IBM AIX OS

BENDOVÁ, Dagmar January 2015 (has links)
This thesis describes development and verification of application for support of HACMP clustering education in IBM AIX OS. In fact, development of this application can help students to understand basic functions of this type of cluster. Users, eventually, can verify full function of input configuration cluster in real environment. Ultimately, it can simulate basic cluster function and create basic configuration file, which can be direct apply to operational installation of HACMP software of version 5.3.
3

A Study of Online Security Practices

January 2017 (has links)
abstract: Data from a total of 282 online web applications was collected, and accounts for 230 of those web applications were created in order to gather data about authentication practices, multistep authentication practices, security question practices, fallback authentication practices, and other security practices for online accounts. The account creation and data collection was done between June 2016 and April 2017. The password strengths for online accounts were analyzed and password strength data was compared to existing data. Security questions used by online accounts were evaluated for security and usability, and fallback authentication practices were assessed based on their adherence to best practices. Alternative authentication schemes were examined, and other security considerations such as use of HTTPS and CAPTCHAs were explored. Based on existing data, password policies require stronger passwords in for web applications in 2017 compared to the requirements in 2010. Nevertheless, password policies for many accounts are still not adequate. About a quarter of online web applications examined use security questions, and many of the questions have usability and security concerns. Security mechanisms such as HTTPS and continuous authentication are in general not used in conjunction with security questions for most web applications, which reduces the overall security of the web application. A majority of web applications use email addresses as the login credential and the password recovery credential and do not follow best practices. About a quarter of accounts use multistep authentication and a quarter of accounts employ continuous authentication, yet most accounts fail to combine security measures for defense in depth. The overall conclusion is that some online web applications are using secure practices; however, a majority of online web applications fail to properly implement and utilize secure practices. / Dissertation/Thesis / Combination of Security Practices / Coded Account Data for 282 and 230 Web Applications / Password Recovery Statistics and Graphs / Password Policies Statistics and Graphs / Security Question Statistics and Graphs / Masters Thesis Computer Science 2017
4

Le ballon des pèlerins : sociogenèse du recours au religieux dans les trajectoires carcérales. / The jail of the pilgrims : sociogenesis of the use of religion in prison trajectories

Ducloux, Thibault 22 November 2018 (has links)
Partant du constat d’une diversification des comportements des personnes incarcérées, ce travail de thèse se propose de modéliser les processus de socialisation se déployant au sein de la configuration carcérale. En effet, au regard des vies qu’ils ont vécues, les prisonniers adoptent des postures et des pratiques inédites. Mais, en réalité, l’ampleur des effets empiriquement observables de ces dynamiques contredit l’espoir de pouvoir décrire ces dernières en abordant de front le phénomène de la diversification. Comment les prisonniers sont-ils socialement amenés à adopter les pratiques qu’ils adoptent ? Embrassant une démarche indistinctement diachronique et indicielle, l’analyse se dote d’un outil sociologique à même de révéler les mouvements agitant la vie des gens en prison : Le recours au religieux. / Based on the premise of a diversification in inmates’ behaviors, this thesis proposes to model socializing processes within a carceral configuration. Indeed, considering the lives they lived, inmates adopt unprecedentedpostures and practices. But, in reality, the extent of empirically observable effects of those dynamics contradicts the hope of being able to describe those latter in addressing the diversification phenomenon head-on. How are prisoners socially brought to adopt the practices they embrace ? Using an approach both diachronic and semiological, this analysis provides itself with a sociological tool able to reveal the motions agitating peoples’ lives in prison: the fallback on religion.
5

Examining the morphological and behavioral paradox of aye-ayes (Daubentonia madagascariensis) in Torotorofotsy, Madagascar

Sefczek, Timothy Mikhail January 2018 (has links)
No description available.
6

Take-over performance in evasive manoeuvres

Happee, Riender, Gold, Christian, Radlmayr, Jonas, Hergeth, Sebastian, Bengler, Klaus 30 September 2020 (has links)
We investigated after effects of automation in take-over scenarios in a high-end moving-base driving simulator. Drivers performed evasive manoeuvres encountering a blocked lane in highway driving. We compared the performance of drivers 1) during manual driving, 2) after automated driving with eyes on the road while performing the cognitively demanding n-back task, and 3) after automated driving with eyes off the road performing the visually demanding SuRT task. Both minimum time to collision (TTC) and minimum clearance towards the obstacle disclosed a substantial number of near miss events and are regarded as valuable surrogate safety metrics in evasive manoeuvres. TTC proved highly sensitive to the applied definition of colliding paths, and we prefer robust solutions using lane position while disregarding heading. The extended time to collision (ETTC) which takes into account acceleration was close to the more robust conventional TTC. In line with other publications, the initial steering or braking intervention was delayed after using automation compared to manual driving. This resulted in lower TTC values and stronger steering and braking actions. Using automation, effects of cognitive distraction were similar to visual distraction for the intervention time with effects on the surrogate safety metric TTC being larger with visual distraction. However the precision of the evasive manoeuvres was hardly affected with a similar clearance towards the obstacle, similar overshoots and similar excursions to the hard shoulder. Further research is needed to validate and complement the current simulator based results with human behaviour in real world driving conditions. Experiments with real vehicles can disclose possible systematic differences in behaviour, and naturalistic data can serve to validate surrogate safety measures like TTC and obstacle clearance in evasive manoeuvres.
7

On Optimizing Transactional Memory: Transaction Splitting, Scheduling, Fine-grained Fallback, and NUMA Optimization

Mohamedin, Mohamed Ahmed Mahmoud 01 September 2015 (has links)
The industrial shift from single core processors to multi-core ones introduced many challenges. Among them, a program cannot get a free performance boost by just upgrading to a new hardware because new chips include more processing units but at the same (or comparable) clock speed as the previous generation. In order to effectively exploit the new available hardware and thus gain performance, a program should maximize parallelism. Unfortunately, parallel programming poses several challenges, especially when synchronization is involved because parallel threads need to access the same shared data. Locks are the standard synchronization mechanism but gaining performance using locks is difficult for a non-expert programmers and without deeply knowing the application logic. A new, easier, synchronization abstraction is therefore required and Transactional Memory (TM) is the concrete candidate. TM is a new programming paradigm that simplifies the implementation of synchronization. The programmer just defines atomic parts of the code and the underlying TM system handles the required synchronization, optimistically. In the past decade, TM researchers worked extensively to improve TM-based systems. Most of the work has been dedicated to Software TM (or STM) as it does not requires special transactional hardware supports. Very recently (in the past two years), those hardware supports have become commercially available as commodity processors, thus a large number of customers can finally take advantage of them. Hardware TM (or HTM) provides the potential to obtain the best performance of any TM-based systems, but current HTM systems are best-effort, thus transactions are not guaranteed to commit in any case. In fact, HTM transactions are limited in size and time as well as prone to livelock at high contention levels. Another challenge posed by the current multi-core hardware platforms is their internal architecture used for interfacing with the main memory. Specifically, when the common computer deployment changed from having a single processor to having multiple multi-core processors, the architects redesigned also the hardware subsystem that manages the memory access from the one providing a Uniform Memory Access (UMA), where the latency needed to fetch a memory location is the same independently from the specific core where the thread executes on, to the current one with a Non-Uniform Memory Access (NUMA), where such a latency differs according to the core used and the memory socket accessed. This switch in technology has an implication on the performance of concurrent applications. In fact, the building blocks commonly used for designing concurrent algorithms under the assumptions of UMA (e.g., relying on centralized meta-data) may not provide the same high performance and scalability when deployed on NUMA-based architectures. In this dissertation, we tackle the performance and scalability challenges of multi-core architectures by providing three solutions for increasing performance using HTM (i.e., Part-HTM, Octonauts, and Precise-TM), and one solution for solving the scalability issues provided by NUMA-architectures (i.e., Nemo). • Part-HTM is the first hybrid transactional memory protocol that solves the problem of transactions aborted due to the resource limitations (space/time) of current best-effort HTM. The basic idea of Part-HTM is to partition those transactions into multiple sub-transactions, which can likely be committed in hardware. Due to the eager nature of HTM, we designed a low-overhead software framework to preserve transaction's correctness (with and without opacity) and isolation. Part-HTM is efficient: our evaluation study confirms that its performance is the best in all tested cases, except for those where HTM cannot be outperformed. However, in such a workload, Part-HTM still performs better than all other software and hybrid competitors. • Octonauts tackles the live-lock problem of HTM at high contention level. HTM lacks of advanced contention management (CM) policies. Octonauts is an HTM-aware scheduler that orchestrates conflicting transactions. It uses a priori knowledge of transactions' working-set to prevent the activation of conflicting transactions, simultaneously. Octonauts also accommodates both HTM and STM with minimal overhead by exploiting adaptivity. Based on the transaction's size, time, and irrevocable calls (e.g., system call) Octonauts selects the best path among HTM, STM, or global locking. Results show a performance improvement up to 60% when Octonauts is deployed in comparison with pure HTM with falling back to global locking. • Precise-TM is a unique approach to solve the granularity of the software fallback path of best-efforts HTM. It provide an efficient and precise technique for HTM-STM communication such that HTM is not interfered by concurrent STM transactions. In addition, the added overhead is marginal in terms of space or execution time. Precise-TM uses address-embedded locks (pointers bit-stealing) for a precise communication between STM and HTM. Results show that our precise fine-grained locking pays off as it allows more concurrency between hardware and software transactions. Specifically, it gains up to 5x over the default HTM implementation with a single global lock as fallback path. • Nemo is a new STM algorithm that ensures high and scalable performance when an application workload with a data locality property is deployed. Existing STM algorithms rely on centralized shared meta-data (e.g., a global timestamp) to synchronize concurrent accesses, but in such a workload, this scheme may hamper the achievement of scalable performance given the high latency introduced by NUMA architectures for updating those centralized meta-data. Nemo overcomes these limitations by allowing only those transactions that actually conflict with each other to perform inter-socket communication. As a result, if two transactions are non-conflicting, they cannot interact with each other through any meta-data. Such a policy does not apply for application threads running in the same socket. In fact, they are allowed to share any meta-data even if they execute non-conflicting operations because, supported by our evaluation study, we found that the local processing happening inside one socket does not interfere with the work done by parallel threads executing on other sockets. Nemo's evaluation study shows improvement over state-of-the-art TM algorithms by as much as 65%. / Ph. D.
8

Från PSD2 till Open Banking : En analys av införandet av öppna API:er i enlighet med PSD2 och de kompletterande tekniska standarderna / From PSD2 to Open Banking : An analysis of the implementation of open APIs in accordance with PSD2 and the supplementing technical standards

Christerson, Johan January 2019 (has links)
Konceptet open banking i EU är resultatet av införandet av det andra betaltjänstdirektivet och de kompletterande tekniska standarderna för sträng kundautentisering och säker kommunikation. Regelverket syftar till att upprätta en harmoniserad betaltjänstmarknad som balanseras mellan en hög nivå av säkerhet och en generös åtkomst till kunddata, för att främja innovation och konkurrens. I framställningen som görs i uppsatsen presenteras marknadens utveckling, de huvudsakliga aktörerna, den tidigare betaltjänstregleringen, samt motiven bakom och syftena med den nya regleringen. Genom att ge tredjepartsleverantörer direkt åtkomst till kontoinstitutens kontosystem förändras betaltjänstmarknaden i grunden. Det redogörs även för hur betaltjänstmarknaden har, och framöver sannolikt kommer att, förändras till följd av kravet på införandet av öppna API:er, men även hur konsekvenserna förhåller sig till de uttalade syftena. Regleringen har goda möjligheter att få ämnad effekt, men det faktum att ansvaret för harmoniseringen till stor del har överlämnats till marknadens aktörer är problematiskt. Det är i huvudsak två områden som är centrala; harmoniseringen av öppna API:er och förbudet mot datahämtningsmetoden screen scraping. I uppsatsen riktas kritik mot avsaknaden av lagstiftade gemensamma standarder för API:er och den förskjutning av ansvaret som har skett från lagstiftaren till marknadens aktörer. En brist som potentiellt skulle kunna leda till en fragmenterad betaltjänstmarknad. Det klargörs även att det traditionella användandet av screen scraping nu inte är tillåtet eftersom förfarandet inte uppfyller de krav som ställs på datainhämtning i RTS:en. Övergången till öppna API:er innebär en stor förändring för alla aktörer. Det återstår ännu en viss osäkerhet avseende harmoniseringen och implementeringen av öppna API:er, samt hur bestämmelserna och dess effekter förhåller sig till regelverkets syften. I uppsatsen presenteras en potentiell lösning på harmoniseringsproblematiken i form av de långt gångna och till stora delar anammade standardiseringsinitiativen som har utvecklats av marknaden. Det är framledes av största vikt att de marknadsdrivna initiativen för gemensamma standarder anammas av kontoinstituten för att åstadkomma en harmoniserad miljö med open banking.

Page generated in 0.0441 seconds