Spelling suggestions: "subject:"dock inn"" "subject:"dock iin""
31 |
Vidareutveckling av doseringsmodul för Dosis® / Development of dosage module for Dosis®Marteleur, Jonatan, Mannberg, Niklas January 2019 (has links)
Dosis® är en digital doseringsask från Victrix AB som med hjälp av en inbyggd datorenhet kan ställas in för att påminna patienter om doseringstillfällen genom alarm, röstmeddelande och vibration. För att vidareanpassa Dosis® till patienter med kognitiva nedsättningar vill Victrix AB implementera en låsfunktion till doseringsfacken. Facken skall endast kunna öppnas under doseringstillfällen för att undvika felmedicinering. Detta arbete fokuserar på att skapa underlag för utvecklingen av denna låsfunktion till Dosis®. Genom att bryta ned låsets funktion i delfunktioner har koncept strategiskt kunnat utvecklas. Genom ett morfologiskt schema har utvalda konceptfragment från alla låsets delfunktioner slutligen kombinerats till sex potentiella lösningar. / Dosis® is a digital pill box from Victrix AB which has a built in computer unit that can be set to remind patients of when it’s time to take their medicine through alarm, voice messages and vibrations. To adapt Dosis® for patients with cognitive dysfunctions Victrix AB wants to implement an automated locking system. The locking system is supposed to prevent patients from opening pill compartments outside of the pre-set time for medication. By doing this Victrix AB hopes to decrease the risk of these patience overdosing. This work is focused on producing a basis from which an automated locking system could be designed. The function of the locking system was broken down into sub functions, making it possible to strategically develop new solutions. Through a morphological schedule chosen concept fragments where combined from all sub functions to finally produce six potential solutions.
|
32 |
Operating system transactionsPorter, Donald E. 26 January 2011 (has links)
Applications must be able to synchronize accesses to operating system (OS)
resources in order to ensure correctness in the face of concurrency
and system failures. This thesis proposes system transactions,
with which the programmer
specifies atomic updates to heterogeneous system resources and the OS
guarantees atomicity, consistency, isolation, and durability (ACID).
This thesis provides a model for system transactions as a concurrency control mechanism.
System transactions efficiently and cleanly solve long-standing
concurrency problems that are difficult to address with other
techniques.
For example, malicious users can exploit
race conditions between distinct system calls in privileged applications,
gaining administrative access to a system.
Programmers can eliminate these vulnerabilities by eliminating these
race conditions with system transactions.
Similarly, failed software installations can leave a system unusable.
System transactions can roll back an unsuccessful software installation
without disturbing concurrent, independent updates to the file system.
This thesis describes the design and implementation of TxOS,
a variant of Linux 2.6.22 that implements
system transactions. The thesis contributes new implementation
techniques that yield fast, serializable transactions
with strong isolation and fairness between system transactions and
non-transactional activity.
Using system transactions,
programmers can build
applications with better performance or stronger correctness guarantees
from simpler code. For instance, wrapping an installation of
OpenSSH in a system transaction guarantees that a failed installation
will be rolled back completely. These atomicity properties are
provided by the OS, requiring no modification to the installer itself
and adding only 10% performance overhead. The prototype implementation of system transactions also
minimizes non-transactional overheads. For instance, a non-transactional
compilation of Linux incurs negligible (less than 2%) overhead on TxOS.
Finally, this thesis describes a new lock-free linked list algorithm,
called OLF, for optimistic, lock-free lists.
OLF addresses key limitations of prior algorithms, which
sacrifice functionality for performance.
Prior lock-free list algorithms can
safely insert or delete
a single item, but cannot atomically compose multiple operations
(e.g., atomically move an item between two lists).
OLF provides
both arbitrary composition of list operations as well as performance scalability
close to previous lock-free list designs.
OLF also removes previous requirements for dynamic memory allocation and garbage collection
of list nodes, making it suitable for low-level system software, such as the Linux kernel.
We replace lists
in the Linux kernel's directory cache with OLF lists, which
currently requires a coarse-grained
lock to ensure invariants across multiple lists.
OLF lists in the Linux kernel improve performance of a filesystem metadata microbenchmark
by 3x over unmodified Linux at 8 CPUs.
The TxOS prototype demonstrates that a mature
OS running on commodity hardware can provide system transactions at a
reasonable performance cost.
As a practical OS abstraction for application developers,
system transactions facilitate
writing correct application code in the presence of
concurrency and system failures.
The OLF algorithm demonstrates that application developers can have both
the functionality of locks and the performance scalability of a lock-free linked list. / text
|
33 |
Design And Development Of An Improved Anti-Lock Braking System For Two-WheelersMohan, S 08 1900 (has links) (PDF)
In today’s fast moving world, automobiles are facing challenges in terms of having to survive road accidents, increasing traffic, bad road-conditions and high/express ways. Brake systems play a vital role in controlling the vehicle speed while avoiding road accidents. The conventional brake systems consist of basically an actuator, transmission and frictional parts. This system is difficult for manipulated control by the driver during emergency and panic braking situations. In particular road and environmental conditions, it requires certain skill to have safe and effective brake control, which is always not possible from all drivers. Wheel locking is a predominant phenomenon during panic braking and this will cause vehicle skidding resulting in injuries and road accidents. In the case of a two-wheeler, being a single-track vehicle, skidding is one of the major causes for fatal road accidents due to loss in lateral balance. As the road safety regulations are becoming more stringent, the anti-lock brake systems (ABS) will replace the conventional brake systems in all road vehicles to avoid accidents and to improve vehicle safety.
Early ABS systems, developed in the last 100-years, use intermittent and cyclic brake pressure control by sensing the wheel speed or wheel-slip as one of the major control inputs. Regulating the brake pressure with a preset threshold value is another method. These ABS systems have used electronics, or hydraulics or pure mechanical control. However, such ABS are not widely used in two-wheelers and other low cost vehicles till now, because of several limitations identified as follows: High cost, power supply needed for its operation in the case of intermittent and cyclic brake control, susceptibility to failure in the electronics system, interference from RF signals (from cell-phones for example), uneasiness to drivers from pedal pulsations with pedal noise, heavier weight, increased vehicle vibrations and failure modes of wheels due to torsional vibrations.
The present research work is carried out to develop a new mechanical ABS concept, which will address most of the above problems. During braking, the change in rider-input force will change wheel reactions. This change is made proportional to the change in rider input force only upto wheel locking. Such a principle is used to develop the new mechanical ABS.
The new concept regulates the output force from the ABS, by sensing the dynamic wheel reactions with increase in rider-response. The ABS output force is regulated by one of the following ways: (a) Slipping-down the lever-ratio or (b) preventing the excessive brake input force. Based on the parameters like less number of parts, least weight, simplicity, reliability, efficiency, durability, time-response, etc., the second method (of preventing the excessive brake input force) has been chosen.
Further a new concept of ABS interconnecting system is proposed for usage between the front and rear wheels of the vehicle. This interconnecting system will ensure that the two mechanical ABS systems function at any kind of braking-balance between the front and rear applications.
An analytical vehicle model has been developed with several input parameters like mass, geometry, inertia, aerodynamic properties, frictions of road and bearing-supports, road gradients, etc. From this analytical model, the dynamic wheel reactions and limiting adhesion of each tyre for various braking conditions are determined and the results are used to design the mechanical ABS. The same analytical model is used to predict the brake performance like stopping distance, vehicle deceleration and the vehicle speed variation for ideal braking conditions.
The new ABS is modelled in Pro-E using the inputs from the analytical model. To evaluate the concept, a functional proto-type is built and fitted on a motorcycle. The ABS is evaluated for its functionality and performance at different road (level surface, up-gradients and down gradients) and environmental conditions (dry and wet road conditions). Using the VBOX II, proximate sensors and load-cells fitted on the vehicle, the vehicle stopping distance, wheel slip and pedal force are measured. The results show that wheel locking does not occur under panic driving conditions, which is the primary objective. In addition, the results show a good agreement with the predicted stopping distance and vehicle deceleration from the analytical model.
As there is good scope for this new mechanical ABS for use in two-wheelers and other low cost vehicles, further research is needed to make this system work in curvilinear motion & banked surfaces.
|
34 |
Performance Modeling of Multi-core Systems : Caches and LocksPan, Xiaoyue January 2016 (has links)
Performance is an important aspect of computer systems since it directly affects user experience. One way to analyze and predict performance is via performance modeling. In recent years, multi-core systems have made processors more powerful while keeping power consumption relatively low. However the complicated design of these systems makes it difficult to analyze performance. This thesis presents performance modeling techniques for cache performance and synchronization cost on multi-core systems. A cache can be designed in many ways with different configuration parameters including cache size, associativity and replacement policy. Understanding cache performance under different configurations is useful to explore the design choices. We propose a general modeling framework for estimating the cache miss ratio under different cache configurations, based on the reuse distance distribution. On multi-core systems, each core usually has a private cache. Keeping shared data in private caches coherent has an extra cost. We propose three models to estimate this cost, based on information that can be gathered when running the program on a single core. Locks are widely used as a synchronization primitive in multi-threaded programs on multi-core systems. While they are often necessary for protecting shared data, they also introduce lock contention, which causes performance issues. We present a model to predict how much contention a lock has on multi-core systems, based on information obtainable from profiling a run on a single core. If lock contention is shown to be a performance bottleneck, one of the ways to mitigate it is to use another lock implementation. However, it is costly to investigate if adopting another lock implementation would reduce lock contention since it requires reimplementation and measurement. We present a model for forecasting lock contention with another lock implementation without replacing the current lock implementation.
|
35 |
Acquiring PN Codes Without Serial Searches Using Modified Correlation LoopsYadati, Uday, Kosbar, Kurt 10 1900 (has links)
International Telemetering Conference Proceedings / October 26-29, 1998 / Town & Country Resort Hotel and Convention Center, San Diego, California / This paper analyzes the performance of a modified correlation, or delay-locked loop (DLL). These devices typically cross-correlate the received signal with a differentiated version of the originally transmitted signal. This paper describes some interesting properties the loop assumes when the differentiator is replaced by a Hilbert transform. The loop will still track the timing offset of the code, but it will also be able to acquire the signal when the initial offset is greater than one chip time. The new loop may also be superior to traditional DLL in low SNR environments, since it is much less likely to lose lock. Since the new loop is highly non-linear, it is studied through the use of computer simulations.
|
36 |
DESIGN OF A PARALLEL MULTI-CHANNEL BPSK DIRECT-SEQUENCE SPREAD-SPECTRUM RECEIVERSanzhong, Li, Qishan, Zhang, Cheng, L L 10 1900 (has links)
International Telemetering Conference Proceedings / October 27-30, 1997 / Riviera Hotel and Convention Center, Las Vegas, Nevada / A parallel multi-channel receiver for binary phase shift keyed (BPSK) direct-sequence (DS) spread-spectrum (SS) is introduced in this paper. It adopts a Costas carrier frequency-tracking loop which maintains frequency lock rather than phase lock, and the delay-lock error can be noncoherently obtained to track the PN code. For airborne applications, this method will extend effectively the receiver’s tracking dynamics range for the carrier Doppler shift. A erasable programmable logic device (EPLD) is applied to get the advantage of smaller size and higher flexibility. A high speed microprocessor (TMS320C30) which acts as the processing unit of the receiver is used for acquiring and tracking of the carrier and PN code by digital signal processing algorithms. This receiver is more flexible and is easily improved by reconfiguring the EPLD and modifying the software algorithms. Its fundamental principle is described in the paper.
|
37 |
Towards more scalable mutual exclusion for multicore architecturesLozi, Jean-Pierre 16 July 2014 (has links) (PDF)
The scalability of multithreaded applications on current multicore systems is hampered by the performance of lock algorithms, due to the costs of access contention and cache misses. The main contribution presented in this thesis is a new lock algorithm, Remote Core Locking (RCL), that aims to improve the performance of critical sections in legacy applications on multicore architectures. The idea of RCL is to replace lock acquisitions by optimized remote procedure calls to a dedicated hardware thread, which is referred to as the server. RCL limits the performance collapse observed with other lock algorithms when many threads try to acquire a lock concurrently and removes the need to transfer lock-protected shared data to the hardware thread acquiring the lock because such data can typically remain in the server's cache. Other contributions presented in this thesis include a profiler that identifies the locks that are the bottlenecks in multithreaded applications and that can thus benefit from RCL, and a reengineering tool developed with Julia Lawall that transforms POSIX locks into RCL locks. Eighteen applications were used to evaluate RCL: the nine applications of the SPLASH-2 benchmark suite, the seven applications of the Phoenix 2 benchmark suite, Memcached, and Berkeley DB with a TPC-C client. Eight of these applications are unable to scale because of locks and benefit from RCL on an x86 machine with four AMD Opteron processors and 48 hardware threads. Using RCL locks, performance is improved by up to 2.5 times with respect to POSIX locks on Memcached, and up to 11.6 times with respect to Berkeley DB with the TPC-C client. On an SPARC machine with two Sun Ultrasparc T2+ processors and 128 hardware threads, three applications benefit from RCL. In particular, performance is improved by up to 1.3 times with respect to POSIX locks on Memcached, and up to 7.9 times with respect to Berkeley DB with the TPC-C client.
|
38 |
Greening of industry : an ecological economic appraisal of eco-innovations and eco-labellingHussain, Syed Salman January 2009 (has links)
In a market economy, the behaviour of firms determines the extent and type of anthropogenic impacts that affect natural ecosystems. As such it is critical that the regulation of corporate behaviour is closely appraised. All economic production systems use natural resource inputs and release waste emissions to environmental sinks; they also contribute to sustainability in terms of income generation. The analysis of economic efficiency is thus coined in terms of juxtaposing and balancing these effects and the role of regulation is to intervene so that the outcome (in terms of corporate behaviour) approximates to this theoretical social optimum. Determining optimal regulation is the core focus of this thesis. The role of environmental regulation has become prominent of late owing to developments in the science (and social science) of climate change and ecosystems functioning. It has also been strongly influenced by the Porter Hypothesis (PH) which challenges the non-interventionist doctrine of neo-classical economics in favour of stricter environmental regulation, based on the presumption that significant pollution offsets are available if and only firms are forced to search for eco-innovations. In order to progress the argument vis-à-vis optimal regulation it is first essential to explore the role of the firm in society, i.e. what the responsibilities of industry ought to be with respect to the sustainability agenda. I juxtapose and critically appraise functionalist theory and its associated utilitarian ethic with social permission theory; the outcome of this analysis is the contention that ‘I&We’ deontological theory is the most defensible alternative and as such a firm’s fiduciaries ought to balance the conflicting claims of stakeholders, i.e. shareholders are important but not paramount. Given this outcome, the role of the regulator is to intervene when the market for ‘green’ corporate behaviour does not function. There are various reasons outlined as to why such intervention might be required. On the demand side, evidence is presented of consumers’ willingness-to-pay for perceived environmental quality. This product attribute is typically a credence attribute and there is asymmetric information; there is an incentive for ‘greenwashing’, i.e. false or misleading environmental marketing claims. The strategic behavioural model developed herein implies that the status quo is potential sub-optimality in that consumers play a mixed strategy and, over time, there is the potential for a vicious cycle in that progressively less and less ‘green’ marketing claims are genuine. On the supply side, firms may be ‘satisficing’ as opposed to optimising with respect to eco-innovations; a firm’s search for and selection of innovation is path-dependent, i.e. the history of innovations is influential. This supports the PH in that stimulating a shift to an eco-innovation trajectory realises benefits not only in the current time period but into the future. I also demonstrate that firms may be ‘locked in’ to technological paths that are sub-optimal (and environmentally damaging) owing to ‘coordination effects’ and as such there is a further role for economically efficient regulatory intervention on the supply side. Well-designed regulation can improve economic welfare in that it might propagate a shift in (as opposed to movement along) abatement cost curves. This in turn implies a convergence between the ‘best’ level of pollution for the polluter and for society, therein ameliorating the potential deadweight losses from the strategic interaction between the polluter and the regulator.
|
39 |
Vendor Lock-in in the transistion to a Cloud Computing platformFawzy Kamel, Menatalla Ashraf January 2015 (has links)
The thesis introduces a study about the vulnerabilities that a company as Scania IT faces towards vendor lock-in in the transition to a cloud computing platform. Cloud computing is a term that refers to anetwork of remote servers hosted on the internet to store, manage and process data, rather than on a local server or a personal computer. Vendor lock-in is an outcome that causes companies to pay a significant cost to move between cloud providers. The effects that cause vendor lock-in that will be described are portability, interoperability and federation are called the lock-in effects. The goal of the research is to help Scania IT understand the vendor lock-in and the vulnerabilities they can face in the transition to the cloud as well as to clarify the concern that they may have against falling in vendor lock-in. The main purpose of the research is to present the various lock-in effects that are related to the transition from one cloud provider to another and the vulnerabilities that cause companies to fall in vendor lock-in. The thesis presents the reasons that motivates why Scania IT would consider using the cloud and the concerns that they may have against usage of a cloud computing platform. The results will be based on a case study of a similar company that has moved to a cloud provider and specifically Microsoft Azure and an interview of Microsoft Azure point of view with the risk of vendor lock-in. Finally, a process of interviews with different people from Scania IT to extract the current bottleneck in the development process that caused the company to think of a cloud computing platform. The results show that companies should consider many risks and factors while moving to the cloud, as vendor lock-in, cloud maturity index and their IT strategies. As a result, the thesis gives recommendations of the steps needed to minimize the risks of the cloud while maintaining the positivity of the cloud. / Uppsatsen presenterar en studie om de sårbarheter som ett företag som Scania IT har mot inlåsning i övergången till molntjänster. Molntjänster är en term som hänvisar till ett nätverk av servrar som finns på internet för att lagra, hantera och processa data, istället för på en lokal server eller en persondator. Inlåsning är ett resultat i vilket orsakar att företagen behöver betala en betydande kostnad för att flytta mellan molnleverantörer. De effekter som orsakar inlåsning vilket kommer att beskrivas är portabilitet, interoperabilitet och federation, dessa kallas inlåsningseffekter. Målet med forskningen är att hjälpa Scania IT att förstå inlåsning och sårbarheter som de kan möta i övergången till molnet. Dessutom är målet att klarlägga riskerna som de kan ha mot att falla i inlåsning. Det huvudsakliga syftet med forskningen är att presentera de olika inlåsningseffekter som är relaterade till övergången från en molnleverantör till en annan samt de sårbarheter som orsakar företagen att falla i inlåsning. Uppsatsen presenterar skäl som motiverar varför Scania IT ska överväga att använda molnet samt den oro som de kan ha mot användning av en molnleverantör. Resultaten kommer att baseras på en fallstudie av ett liknande företag som har flyttat till en molnleverantör och specifikt Microsoft Azure samt en intervju av Microsoft Azure synvinkel med risken för inlåsning. Slutligen, en rad av intervjuer med olika personer från Scania IT för att extrahera den nuvarande flaskhalsen i utvecklingsprocessen som orsakade företaget att tänka på molntjänster. Resultaten visar att företagen bör överväga många risker och faktorer när de flyttar till molnet, som exempelvis inlåsning, cloud maturity index och deras IT-strategier. Som ett resultat ger examensarbetet nödvändiga rekommendationer för att minimera riskerna för molnet samtidigt som positivitet av molnet.
|
40 |
Sitting on the Fence between Management and Marketing, A Strategic look at Psychological Switching CostsButler, Laurence, Lidgren, Jonas January 2010 (has links)
<p><strong>Abstract</strong><strong></strong></p><p>With the Introduction of the internet and human technological advancement, our everyday lives have changed dramatically over the past 20 years and because of this, how we communicate, form social networks and purchase or sell goods have also developed.</p><p>In the light of this, we have completed this thesis which concerns the influence of the internet and the possibilities of forming long lasting relationships between businesses and customers through what we have described as ‘Locking in’ the customer. This is done by forming ‘Psychological Switching Costs’ that make the cognitive process of switching too expensive or un-wanted by the customer. In order to develop an understanding of this we saw it as prudent to interview senior managers of businesses that operate mainly on the internet to discover if they attempt such strategic moves in, ‘Locking in’ customers. Thus forming the research question; How are Companies based on the internet using Psychological Switching Costs as a strategy to Lock in the customers?</p><p>The process by which the information was collected was through a qualitative method and semi-structured interviews. We found from the respondents that were interviewed that when it comes to operating a business on the internet it is important to consider, Transparency, Two-way communication, Simplicity, Agility and Flexibility in creating a loyal customer who is positively locked in. These were the strategies considered by the respondents to have an effect on customers.</p><p>One of the most interesting points that were made was that if the customer was locked in to the business, the business did not have to be as dynamic. Thus, according to the respondents, Psychological Switching Costs do have an influence on how they form strategy to Lock In customers. In that it can be beneficial to attempt to Lock in customers rather than develop other Dynamic Capabilities. This factor seems very relevant when considering communication, agility and flexibility, in that by forming relationships and strategies directly to the customer these companies are creating something that is difficult to substitute, un-imitable for their competitors and convenient to the customer.</p>
|
Page generated in 0.0702 seconds