• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 32
  • 6
  • 5
  • 5
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 77
  • 15
  • 14
  • 9
  • 9
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Implementation of an IO-Link Master : A Research project to find out what it takes to get started with IO-Link

Niklasson, Marcus, Uddberg, Simon January 2022 (has links)
IO-Link is a constantly growing market, bringing more interested parties who want to know if it is a market worth investing in. While deciding if the market is worth investing in is for the companies to decide, this thesis aims to shed some light on what it takes to get started with IO-Link development which could help that decision. This work presents the development of a proof-of-concept IO-Link master stack, which is then evaluated technically and financially. The proof-of-concept stack was then evaluated by testing it with a commercially available IO-Link Device (KT6101). This resulted in a functional proof-of-concept master stack with the physical, data link and application layer implemented, with ISDU support. The master stack supports cyclic Process Data exchange and acyclic On-request Data exchange, which is the minimum needed for IO-Link operations with a fully implemented IO-Link Device. The financial evaluation provides insights about the cost of developing the stack in Sweden, and the varying costs stemming from the place where the development occurs, since the host company has a global scope. Information from this work is a tool for stakeholders and decision makers in regard of the financial viability of the project, while the technical evaluation of the proof-of-concept is positive.
42

Variability of Io’s Aurora and the Moon’s Footprint on Jupiter

Eilers Bischoff, Jens, Jovancic, Sebastian January 2020 (has links)
We study the variability of intensity of Io’s aurora asa function of Jupiter’s rotation measured in system III longitude.The far-ultraviolet intensity of Io’s aurora was measured by theHubble Space Telescope (HST) using the FUV-MAMA photondetector of the STIS. The data was processed using Matlab tofilter background and reflection, and account for the detector’soptical systems. Target regions of the detector were isolated forthe measurement of the OI(1356 ̊A) and SI(1479 ̊A) emissionsrespectively. By sampling photon detections within each emissionregion, we compute intensity reconstructions that we map tosystem III longitude. Curves were then fitted to the reconstruc-tions using a sinus fit. The results show two intensity peaks atsystem III longitudes (140±5)◦and (284±2)◦for both OIandSI. The difference in amplitude between the peaks are (38±6)%and (28±6)% for OIand SIrespectively. The asymmetriespeak intensities is possibly caused by the probability of excitingsulphur being higher than the probability of exciting sulphur.For a full explanation measurement of the oxygen to sulphurproportion in Ios atmosphere would be needed. We compare theresults to peaks of Io’s footprint on Jupiter measured by JUNOand other HST data sets. We find it likely that we confirm furthervariance in peak angle than reported in other research. This isespecially clear in the first intensity peak as it has a significantlylarger angle. Variability in Jupiter’s magnetic field and densityof the Jovian plasma torus is likely to explain peak angle andintensity variability, but further research is necessary to explainthe mechanisms in detail. / Vi studerar hur intensiteten av Ios aurora varierar i relation till Jupiters rotation mätt i system III longitud. Ios aurora mättes inom UVC området av Hubble Space Telescope (HST) med FUV-MAMA fotondetektorn. Matlab användes för att filtrera bort oönskade signaler som reflektion och bakgrund samt ta hänsyn till sensorns optiska system. Observationsområderna på sensorn konstruerades för mätningen av syre OI (1356Å ) och svavel SI (1479Å ) emissionerna. Genom att sampla fo- tondetektioner inom varje observationsområde så rekonstruerar vi en intensitetskurva som vi mappar till system III longitud. En kurva var sedan anpassad till rekonstruktionen med hjälp av en sinusanpassning. Resultaten visar två intensitetstoppar vid system III longituderna (140 ± 5)◦ och (284 ± 2)◦ för både OI och SI . Kvoten mellan topparna var (38 ± 6)% för OI och (28 ± 6)% för SI . Skillnaden i topparna kan förklaras av att sannolikheten att excitera svavel är större än att excitera syre. För fullständig beskrivning av skillnaden i topparna skulle mätningar av syre till svavel proportionen i Ios atmosfär behövas. Vi jämför våra reslutat med mätningar av Ios avtryck på Jupiter från JUNO och andra HST mätningar. Vi finner det sannolikt att vi bekräftar ytterligare varians i topparnas vinkel, främst för den första toppen vars vinkel är signifikant större. Variationer i Jupiters magnetfält och plasmadensitet av Jupiters plasmatorid kan sannolikt förklara positionen av topparna och intensitetsvariationerna. Vidare forskning behövs för att utförligt förklara dessa mekanismer. / Kandidatexjobb i elektroteknik 2020, KTH, Stockholm
43

Informationsoperationer – en amerikansk idé? / Information operations – an American idea?

Gustafsson, Ulrika January 2010 (has links)
<p>I USA infördes begreppet informationsoperationer i mitten av 1990-talet och det har sedan dess skett en stor utveckling inom detta fält. Även i den svenska Försvarsmakten har konceptetinformationsoperationer införts och en utveckling och uppbyggnad av förmågor inom detta koncept pågår. Syftet med denna uppsats är att undersöka huruvida konceptet informationsoperationers uppkomst i Försvarsmakten kan utgöra ett exempel på idéspridning. Utgångspunkten är att USA som en av världens ledande försvarsmakter är trendsättare för andra försvarsmakter i västvärlden, däribland den svenska Försvarsmakten. Med utgångspunkt i teorin om idéspridning undersöks om den amerikanska idén om informationsoperationer har spridit sig och snappats upp av Försvarsmakten som sedan översatt idén efter sina egna förutsättningar. Uppsatsen beskriver informationsoperationers uppkomst i USA och hur begreppet har fått fäste och utvecklats i Försvarsmakten. Vidare beskrivs hur idén tagit organisatorisk form i Försvarsmakten i syfte att utifrån teorin om lokal översättning undersöka hur detta skiljer sig från det amerikanska konceptet. I slutsatserna konstateras att teorin om idéspridning är tillämpbar i det här fallet och att det också skett vissa anpassningar av idén när Försvarsmakten implementerat den i sin egen organisation.</p> / <p>The concept of information operations was introduced in the US in the middle of the 1990’s and has since that time developed and a lot of things have happened in that field during the last decade. The development of information operations is going on in the Swedish Armed Forces as well. The purpose of this essay is to study whether the introduction of the concept of information operationsin the Swedish Armed Forces can be seen as an example of the spreading of ideas according to new institutional theory. With the premise that the US, with one of the worlds leading armed forces, functions as a trend setter for other nations in the western part of the world this essay investigates if it is the American idea about information operations that has been adopted by the Swedish Armed Forces. Furthermore it investigates whether the idea, if it has been adopted, has been copied or translated to fit the new organization. The essay starts with describing the concept of informationoperations in the US, how it was introduced and how it is currently used. Then follows a presentation about how information operations, as a concept, has developed in the Swedish Armed Forces. Differences between how the concept of information operations has been implemented in the organizations is presented and discussed in order to try the theory about local translation of ideas. The major conclusions is that the concept of information operations’ introduction in the Swedish armed forces can function as an example of the new institutional theory about the spreading of ideas and that there has been some adaptations of the concept in order to fit the organization.</p>
44

Informationsoperationer – en amerikansk idé? / Information operations – an American idea?

Gustafsson, Ulrika January 2010 (has links)
I USA infördes begreppet informationsoperationer i mitten av 1990-talet och det har sedan dess skett en stor utveckling inom detta fält. Även i den svenska Försvarsmakten har konceptetinformationsoperationer införts och en utveckling och uppbyggnad av förmågor inom detta koncept pågår. Syftet med denna uppsats är att undersöka huruvida konceptet informationsoperationers uppkomst i Försvarsmakten kan utgöra ett exempel på idéspridning. Utgångspunkten är att USA som en av världens ledande försvarsmakter är trendsättare för andra försvarsmakter i västvärlden, däribland den svenska Försvarsmakten. Med utgångspunkt i teorin om idéspridning undersöks om den amerikanska idén om informationsoperationer har spridit sig och snappats upp av Försvarsmakten som sedan översatt idén efter sina egna förutsättningar. Uppsatsen beskriver informationsoperationers uppkomst i USA och hur begreppet har fått fäste och utvecklats i Försvarsmakten. Vidare beskrivs hur idén tagit organisatorisk form i Försvarsmakten i syfte att utifrån teorin om lokal översättning undersöka hur detta skiljer sig från det amerikanska konceptet. I slutsatserna konstateras att teorin om idéspridning är tillämpbar i det här fallet och att det också skett vissa anpassningar av idén när Försvarsmakten implementerat den i sin egen organisation. / The concept of information operations was introduced in the US in the middle of the 1990’s and has since that time developed and a lot of things have happened in that field during the last decade. The development of information operations is going on in the Swedish Armed Forces as well. The purpose of this essay is to study whether the introduction of the concept of information operationsin the Swedish Armed Forces can be seen as an example of the spreading of ideas according to new institutional theory. With the premise that the US, with one of the worlds leading armed forces, functions as a trend setter for other nations in the western part of the world this essay investigates if it is the American idea about information operations that has been adopted by the Swedish Armed Forces. Furthermore it investigates whether the idea, if it has been adopted, has been copied or translated to fit the new organization. The essay starts with describing the concept of informationoperations in the US, how it was introduced and how it is currently used. Then follows a presentation about how information operations, as a concept, has developed in the Swedish Armed Forces. Differences between how the concept of information operations has been implemented in the organizations is presented and discussed in order to try the theory about local translation of ideas. The major conclusions is that the concept of information operations’ introduction in the Swedish armed forces can function as an example of the new institutional theory about the spreading of ideas and that there has been some adaptations of the concept in order to fit the organization.
45

Novel scalable and real-time embedded transceiver system

Mohammed, Rand Basil January 2017 (has links)
Our society increasingly relies on the transmission and reception of vast amounts of data using serial connections featuring ever-increasing bit rates. In imaging systems, for example, the frame rate achievable is often limited by the serial link between camera and host even when modern serial buses with the highest bit rates are used. This thesis documents a scalable embedded transceiver system with a bandwidth and interface standard that can be adapted to suit a particular application. This new approach for a real-time scalable embedded transceiver system is referred to as a Novel Reference Model (NRM), which connects two or more applications through a transceiver network in order to provide real-time data to a host system. Different transceiver interfaces for which the NRM model has been tested include: LVDS, GIGE, PMA-direct, Rapid-IO and XAUI, one support a specific range for transceiver speed that suites a special type for transceiver physical medium. The scalable serial link approach has been extended with loss-less data compression with the aim of further increasing dataflow at a given bit rate. Two lossless compression methods were implemented, based on Huffman coding and a novel method called Reduced Lossless Compression Method (RLCM). Both methods are integrated into the scalable transceivers providing a comprehensive solution for optimal data transmission over a variety of different interfaces. The NRM is implemented on a field programmable gate array (FPGA) using a system architecture that consists of three layers: application, transport and physical. A Terasic DE4 board was used as the main platform for implementing and testing the embedded system, while Quartus-II software and tools were used to design and debug the embedded hardware systems.
46

The Innovation Strategy Management Study of High Technology Industry in Taiwan COMPEQ Manufacturing Co., Ltd.

Lai, Chung-Hsiao 22 August 2005 (has links)
The purpose of this research is to develop a methodical flowchart of the innovation opportunities, and issue an integrated innovation strategic planning and management by the analytic steps of the systematic strategy. The research is performed according to the following studies: 1. Relative theories & thesis of ¡§Technology Management¡¨, ¡¨Strategic Management¡¨, ¡¨Innovation Management¡¨as the bases of my study. 2. A traditional ¡§Opportunity, Motivation & Capability¡¨ behaviorism as the concept of my study. 3. The process approach of strategic planning & management as the processes of my study. 4. The total analysis of external & internal environment conditions as the scope of my study. And we try to find some innovation opportunities and the relative innovation strategies through the case study by the above flowchart & model. Wish to offer Taiwan technology industries and companies one new strategic planning of innovation domain, and another view of corporation business. The thesis selects Taiwan PCB maker ¡V COMPEQ Manufacturing Co., Ltd. as the subject of our studies to evaluate the reasonablness of the thesis. And the major finding of this study conclusions & results as follow: 1. Facing the strong threat from China, Keeping technology, product, and marketing competitive competence would be the better solution of Taiwan PCB industry in future. Taiwan PCB makers must move toward the trend of ¡§Focus your manufacturing, but also value your research & development more¡¨. And also these companies must recognize ¡§Manufacturing Power¡¨ is not only Taiwan PCB company strength any longer. 2. The corporation growth and survival don¡¦t just need the competitive competence of technology, product, and marketing only. At all times and in all countries, the ¡¨human error¡¨is the major key factor, absolutely forces all kinds of human organization into degeneration and dying. So corporations should be more careful to prevent human error. 3. Innovation is the key to a successful corporation. It is everywhere, and at anytime but it is not easy to find. But innovation has some risks. Successful innovation in the corporation does not only require ¡§Time¡¨, ¡¨Place¡¨, ¡§Support of the People¡¨, but also need a final & important key ¡V the CEOs and all of employees do it together.
47

Extreme scale data management in high performance computing

Lofstead, Gerald Fredrick 15 November 2010 (has links)
Extreme scale data management in high performance computing requires consideration of the end-to-end scientific workflow process. Of particular importance for runtime performance, the write-read cycle must be addressed as a complete unit. Any optimization made to enhance writing performance must consider the subsequent impact on reading performance. Only by addressing the full write-read cycle can scientific productivity be enhanced. The ADIOS middleware developed as part of this thesis provides an API nearly as simple as the standard POSIX interface, but with the flexibilty to choose what transport mechanism(s) to employ at or during runtime. The accompanying BP file format is designed for high performance parallel output with limited coordination overheads while incorporating features to accelerate subsequent use of the output for reading operations. This pair of optimizations of the output mechanism and the output format are done such that they either do not negatively impact or greatly improve subsequent reading performance when compared to popular self-describing file formats. This end-to-end advantage of the ADIOS architecture is further enhanced through techniques to better enable asychronous data transports affording the incorporation of 'in flight' data processing operations and pseudo-transport mechanisms that can trigger workflows or other operations.
48

Enhancing storage performance in virtualized environments: a pro-active approach

Sivathanu, Sankaran 17 May 2011 (has links)
Efficient storage and retrieval of data is critical in today's computing environments and storage systems need to keep up with the pace of evolution of other system components like CPU, memory etc., for building an overall efficient system. With virtualization becoming pervasive in enterprise and cloud-based infrastructures, it becomes vital to build I/O systems that better account for the changes in scenario in virtualized systems. However, the evolution of storage systems have been limited significantly due to adherence to legacy interface standards between the operating system and storage subsystem. Even though storage systems have become more powerful in the recent times hosting large processors and memory, thin interface to file system leads to wastage of vital information contained in the storage system from being used by higher layers. Virtualization compounds this problem with addition of new indirection layers that makes underlying storage systems even more opaque to the operating system. This dissertation addresses the problem of inefficient use of disk information by identifying storage-level opportunities and developing pro-active techniques to storage management. We present a new class of storage systems called pro-active storage systems (PaSS), which in addition to being compatible with existing I/O interface, exerts a limit degree of control over the file system policies by leveraging it's internal information. In this dissertation, we present our PaSS framework that includes two new I/O interfaces called push and pull, both in the context of traditional systems and virtualized systems. We demonstrate the usefulness of our PaSS framework by a series of case studies that exploit the information available in underlying storage system layer, for overall improvement in IO performance. We also built a framework to evaluate performance and energy of modern storage systems by implementing a novel I/O trace replay tool and an analytical model for measuring performance and energy of complex storage systems. We believe that our PaSS framework and the suite of evaluation tools helps in better understanding of modern storage system behavior and thereby implement efficient policies in the higher layers for better performance, data reliability and energy efficiency by making use of the new interfaces in our framework.
49

Dynamical probabilistic graphical models applied to physiological condition monitoring

Georgatzis, Konstantinos January 2017 (has links)
Intensive Care Units (ICUs) host patients in critical condition who are being monitored by sensors which measure their vital signs. These vital signs carry information about a patient’s physiology and can have a very rich structure at fine resolution levels. The task of analysing these biosignals for the purposes of monitoring a patient’s physiology is referred to as physiological condition monitoring. Physiological condition monitoring of patients in ICUs is of critical importance as their health is subject to a number of events of interest. For the purposes of this thesis, the overall task of physiological condition monitoring is decomposed into the sub-tasks of modelling a patient’s physiology a) under the effect of physiological or artifactual events and b) under the effect of drug administration. The first sub-task is concerned with modelling artifact (such as the taking of blood samples, suction events etc.), and physiological episodes (such as bradycardia), while the second sub-task is focussed on modelling the effect of drug administration on a patient’s physiology. The first contribution of this thesis is the formulation, development and validation of the Discriminative Switching Linear Dynamical System (DSLDS) for the first sub-task. The DSLDS is a discriminative model which identifies the state-of-health of a patient given their observed vital signs using a discriminative probabilistic classifier, and then infers their underlying physiological values conditioned on this status. It is demonstrated on two real-world datasets that the DSLDS is able to outperform an alternative, generative approach in most cases of interest, and that an a-mixture of the two models achieves higher performance than either of the two models separately. The second contribution of this thesis is the formulation, development and validation of the Input-Output Non-Linear Dynamical System (IO-NLDS) for the second sub-task. The IO-NLDS is a non-linear dynamical system for modelling the effect of drug infusions on the vital signs of patients. More specifically, in this thesis the focus is on modelling the effect of the widely used anaesthetic drug Propofol on a patient’s monitored depth of anaesthesia and haemodynamics. A comparison of the IO-NLDS with a model derived from the Pharmacokinetics/Pharmacodynamics (PK/PD) literature on a real-world dataset shows that significant improvements in predictive performance can be provided without requiring the incorporation of expert physiological knowledge.
50

Exploitation from malicious PCI express peripherals

Rothwell, Colin Lewis January 2018 (has links)
The thesis of this dissertation is that, despite widespread belief in the security community, systems are still vulnerable to attacks from malicious peripherals delivered over the PCI Express (PCIe) protocol. Malicious peripherals can be plugged directly into internal PCIe slots, or connected via an external Thunderbolt connection. To prove this thesis, we designed and built a new PCIe attack platform. We discovered that a simple platform was insufficient to carry out complex attacks, so created the first PCIe attack platform that runs a full, conventional OS. To allows us to conduct attacks against higher-level OS functionality built on PCIe, we made the attack platform emulate in detail the behaviour of an Intel 82574L Network Interface Controller (NIC), by using a device model extracted from the QEMU emulator. We discovered a number of vulnerabilities in the PCIe protocol itself, and with the way that the defence mechanisms it provides are used by modern OSs. The principal defence mechanism provided is the Input/Output Memory Management Unit (IOMMU). The remaps the address space used by peripherals in 4KiB chunks, and can prevent access to areas of address space that a peripheral should not be able to access. We found that, contrary to belief in the security community, the IOMMUs in modern systems were not designed to protect against attacks from malicious peripherals, but to allow virtual machines direct access to real hardware. We discovered that use of the IOMMU is patchy even in modern operating systems. Windows effectively does not use the IOMMU at all; macOS opens windows that are shared by all devices; Linux and FreeBSD map windows into host memory separately for each device, but only if poorly documented boot flags are used. These OSs make no effort to ensure that only data that should be visible to the devices is in the mapped windows. We created novel attacks that subverted control flow and read private data against systems running macOS, Linux and FreeBSD with the highest level of relevant protection enabled. These represent the first use of the relevant exploits in each case. In the final part of this thesis, we evaluate the suitability of a number of proposed general purpose and specific mitigations against DMA attacks, and make a number of recommendations about future directions in IOMMU software and hardware.

Page generated in 0.0281 seconds