• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 101
  • 9
  • 8
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 174
  • 174
  • 32
  • 27
  • 25
  • 24
  • 24
  • 23
  • 22
  • 19
  • 19
  • 15
  • 14
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Effektiv användning av FIP : En kostnadsnyttoanalys; tidsbesparing vid brand i byggnad för Sveriges räddningstjänster / Efficient use of FIP : A cost-benefit analysis; time savings in fire in building of the Swedish Rescue Services

Strandqvist, Ida January 2015 (has links)
Tidigare studier har visat att det finns en övervägande nytta för samhället som helhet vid införandet och användandet av förstainsatsaktörer. I Sverige har nyttjandet av förstainsatsperson, FIP, inom räddningstjänsten visat på en kortare responstid än övrig styrka vid en olycka. Vid en byggnadsbrand är det enligt räddningstjänstens lagföreskrift ett rökdykarpar som utför livräddningen med resterande styrka (släckbil) verkande i bakgrunden. Den här studien utvärderar på nationell nivå tidsbesparingen (den kortare responstiden för två FIP-enheter jämfört med nästkommande enhet) samt den nytta som införandet och användandet av två FIP-enheter resulterar i för samhället som helhet vid en byggnadsbrand. Metoden för att analysera den minskning i skadevärde som en tidigare påbörjad insats medför genom nyttjandet av två FIP-enheter är en kostnadsnyttometod, även kallad CBA (Cost- benefit analysis). Kostnadsnyttoanalysen ställer den merkostnad som investeringen i FIP- enheter medför i kontrast till den nytta som FIP-enheter bidrar med, har nyttan ett större värde än kostnaden så är projektet samhällsekonomiskt lönsamt. Efter sortering av analysunderlaget genomförts återstod 210 stycken fall med fatal utkomst vid brand i byggnad mellan åren 2010 – 2014. Datamaterialet är från räddningstjänstens insats- samt dödsrapporter som ifyllts vid en olyckshändelse som räddningstjänsten larmats till. Resultatet från analysen visar att den genomsnittliga årliga nyttan av FIP-enheterna är beroende på hur stor andel av den avsedda populationen som återfinns inom stationsområde (benämns som täckningsgrad i studien) samt om stationen väljer att investera i en FIP-enhet eller två FIP-enheter. Täckningsgraden för att det ska vara lönsamt att investera i en FIP-enhet är 5311 stycken individer, för att det ska vara samhällsekonomiskt lönsamt att investera i två FIP-enheter måste stationen täcka 10 621 stycken individer. Investeringsalternativen är till följd av att utgångsläget för räddningstjänstens stationer är av olika art, d.v.s. en del stationer har redan en verksam FIP-enhet. För att stationen i fråga ska kunna ta del av den tänkta åtgärden med tidsbesparingen av två stycken FIP-enheter presenteras därav ett case scenario med investeringsalternativet om en FIP-enhet. Slutsatsen som dras är att det är samhällsekonomiskt lönsamt att implementera och nyttja två FIP-enheter för Sveriges räddningstjänster beroende på hur stor andel av Sveriges befolkning som den aktuella stationen täcker och vilket investeringsalternativ som är av intresse. / Previous studies have shown that there is an overwhelming benefit to society as a whole for the introduction and use of first responders. In Sweden, the use of first responders, FIP, for the civil protection demonstrated a shorter response time than the other rescue force when an accident occurred. When there is a fire in a building, according to rescue services regulations a smoke-diving couple performs the lifesaving operation with the residual rescue force (fire engine) acting in the background. This study evaluates if the national time savings; the shorter response time for two FIP units compared with the next unit arriving at the scene of an accident. If the introduction and use of two FIP units and the time saved results in a benefit to the society as a whole when there is a fire in a building. The method for analyzing the reduction in the damaged value as a previously initiated effort involving the use of two FIP units is a cost-benefit approach, also called CBA. Cost-benefit analysis makes the extra cost an investment in FIP units brings in contrast to the benefits that FIP units contributes, is the benefit of greater value than the cost the project is said to be economically viable. After sorting the analytical framework remained 210 cases, with fatal outcomes, for the variable fire in building between the years 2010 - 2014. The data material obtained is from the emergency input and death reports completed after an accident occurred that the rescue services were alerted to. The results of the analysis show that the average annual benefit of FIP units is dependent on the proportion of the intended population found in the station area (referred to as coverage in the study) and if the station chooses to invest in one FIP unit or two FIP units. Adequacy for it to be profitable to invest in one FIP unit requires that the station covers 5311 individuals, for it to be economically profitable to invest in two FIP units the station must cover 10 621 individuals. The investment options are due to the starting position for the rescue stations are of different kinds, i.e. some stations already have an effective FIP unit. For the station in question to take part of the division and time savings with two FIP units therefore a case scenario is presented with the investment option of one FIP unit. The conclusion is that it is economically viable to implement and use two FIP units for Sweden's emergency services depending on the proportion of the population of Sweden that the current station covers and what investment options that are of interest.
42

Perception-response Time to Emergency Roadway Hazards and the Effect of Cognitive Distraction

D'Addario, Pamela 18 March 2014 (has links)
A critical part of traffic safety is a driver’s ability to detect and respond to emergency roadway hazards. This thesis uses eye movements and motor responses to divide driver perception-response time in three stages: perception, inspection, and movement time. The effects of cognitive distraction and repeated exposure on each stage were investigated for three distinct hazards (left-turning vehicle, pedestrian, right-incursion vehicle). In general, there were varying effects of cognitive distraction observed depending on the hazard being responded to. Cognitive distraction resulted in a significant increase in perception times for the pedestrian and right-incursion vehicle hazards, whereas cognitive distraction resulted in significantly longer inspection times for the left-turning vehicle hazard. When considering the effect of repeated scenario exposure, perception times were the most greatly affected. Perception times were significantly shorter during the second exposure to the left-turning vehicle hazard in the baseline condition, and for all hazards in the distraction condition.
43

Perception-response Time to Emergency Roadway Hazards and the Effect of Cognitive Distraction

D'Addario, Pamela 18 March 2014 (has links)
A critical part of traffic safety is a driver’s ability to detect and respond to emergency roadway hazards. This thesis uses eye movements and motor responses to divide driver perception-response time in three stages: perception, inspection, and movement time. The effects of cognitive distraction and repeated exposure on each stage were investigated for three distinct hazards (left-turning vehicle, pedestrian, right-incursion vehicle). In general, there were varying effects of cognitive distraction observed depending on the hazard being responded to. Cognitive distraction resulted in a significant increase in perception times for the pedestrian and right-incursion vehicle hazards, whereas cognitive distraction resulted in significantly longer inspection times for the left-turning vehicle hazard. When considering the effect of repeated scenario exposure, perception times were the most greatly affected. Perception times were significantly shorter during the second exposure to the left-turning vehicle hazard in the baseline condition, and for all hazards in the distraction condition.
44

Tinklalapio atsako laiko priklausomybės nuo XSS apsaugos tyrimas / Research of Website Response Time Dependence on XSS Protection

Mockus, Dainius 26 August 2013 (has links)
Išaugus internetinių sistemų naudojimo populiarumui, vis daugiau slaptų, asmeninių duomenų talpinama internete, atliekamos įvairios finansinės operacijos. Toks reiškinys tapo viena iš esminių priežasčių, lėmusių išaugusį nusikaltimų skaičių internetinėje erdvėje. Dažnai informacijos perėmimas ar kitos kenkėjiškos operacijos atliekamos įterpiant programinį kodą į vartotojo peržiūrimą tinklapį (XSS ataka). Šių atakų metu bandoma įterpti į svetainę kenkėjišką kodą, kurį naršyklė įvykdys vartotojui atsidarius svetainę. Kodo įterpimo atakos yra sunkiai sustabdomos, nes internete veikiančios programos tampa vis dinamiškesnės ir jos suteikia vartotojui vis daugiau laisvės įvairiausiems veiksmams. XSS atakoms dažniausiai yra naudojami JavaScript programavimo kalba parašyti kodai, tačiau gali būti panaudoti ir HTML, Flash ar bet kokio kito tipo kodai, kuriuos gali įvykdyti vartotojo naršyklė. Šio tipo atakos nukreiptos prieš vartotojus, o ne serverius. Užpuolikai dažniausiai renkasi patikimo turinio svetaines, kuriomis vartotojai pasitiki ir taip tampa lengviau pažeidžiami. / With the increase of popularity in using online systems, more and more sensitive and personal data is stored on the Internet, and a variety of financial transactions are performed there. This phenomenon has become one of the essential reasons that have increased the number of crimes on the Internet. Often transferring information and performing some malicious operations include inserting program code to the website that the user is viewing (XSS attack). During these attacks, cyber criminals attempt to insert malicious code to the website, which the browser will perform when the user opens that website. Code insertion attacks are difficult to stop because the programs that work on the Internet are becoming more dynamic and allow the user to perform actions more freely. Usually, XSS attacks use codes created with JavaScript. However, cyber criminals can also use HTML, Flash or any other type of codes which user’s browser can perform. This type of attacks is directed to the users and not servers. The attackers usually choose websites with reliable content which are trusted by users and this way these websites become more vulnerable.
45

Modeling and Timing Analysis of Industrial Component-Based Distributed Real-time Embedded Systems

Mubeen, Saad January 2012 (has links)
The model- and component-based development approach has emerged as an attractive option for the development of Distributed Real-time Embedded (DRE) systems. In this thesis we target several issues such as modeling of legacy communication, extraction of end-to-end timing models and support for holistic response-time analysis of industrial component-based DRE systems. We introduce a new approach for modeling legacy network communication in component-based DRE systems. By introducing special-purpose components to encapsulate and abstract the communication protocols in DRE systems, we allow the use of legacy nodes and legacy protocols in a component- and model-based software engineering environment. The proposed approach also supports the state-of-the-practice development of component-based DRE systems. The Controller Area Network (CAN) is one of the widely used real-time networks in DRE systems especially in automotive domain. We identify that the existing analysis of CAN does not support common message transmission patterns which are implemented by some high-level protocols used in the industry. Consequently, we extend the existing analysis to facilitate the worst-case response-time computation of these transmission patterns. The extended analysis is generally applicable to any high-level protocol for CAN that uses periodic, sporadic, or both periodic and sporadic transmission of messages. Because an end-to-end timing model should be available to perform the holistic response-time analysis, we present a method to extract the end-to-end timing models from component-based DRE systems. In order to show the applicability of our modeling techniques and extended analysis, we provide a proof of concept by extending the existing industrial component model (Rubus Component Model), implementing the holistic response-time analysis along with the extended analysis of CAN in the industrial tool suite (Rubus-ICE), and conducting an automotive case study. / EEMDEF
46

Real-Time Workload Models : Expressiveness vs. Analysis Efficiency

Stigge, Martin January 2014 (has links)
The requirements for real-time systems in safety-critical applications typically contain strict timing constraints. The design of such a system must be subject to extensive validation to guarantee that critical timing constraints will never be violated while the system operates. A mathematically rigorous technique to do so is to perform a schedulability analysis for formally verifying models of the computational workload. Different workload models allow to describe task activations at different levels of expressiveness, ranging from traditional periodic models to sophisticated graph-based ones. An inherent conflict arises between the expressiveness and analysis efficiency of task models. The more expressive a task model is, the more accurately it can describe a system design, reducing over-approximations and thus minimizing wasteful over-provisioning of system resources. However, more expressiveness implies higher computational complexity of corresponding analysis methods. Consequently, an ideal model provides the highest possible expressiveness for which efficient exact analysis methods exist. This thesis investigates the trade-off between expressiveness and analysis efficiency. A new digraph-based task model is introduced, which generalizes all previously proposed models that can be analyzed in pseudo-polynomial time without using any analysis-specific over-approximations. We develop methods allowing to efficiently analyze variants of the model despite their strictly increased expressiveness. A key contribution is the notion of path abstraction which enables efficient graph traversal algorithms. We demonstrate tractability borderlines for different classes of schedulers, namely static priority and earliest-deadline first schedulers, by establishing hardness results. These hardness proofs provide insights about the inherent complexity of developing efficient analysis methods and indicate fundamental difficulties of the considered schedulability problems. Finally, we develop a novel abstraction refinement scheme to cope with combinatorial explosion and apply it to schedulability and response-time analysis problems. All methods presented in this thesis are extensively evaluated, demonstrating practical applicability.
47

Non-worst-case response time analysis for real-time systems design

Shi, Zhenwu 22 May 2014 (has links)
A real-time system is a system such that the correctness of operations depends not only on the logical results, but also on the time at which these results are available. A fundamental problem in designing real-time systems is to analyze response time of operations, which is defined as the time elapsed from the moment when the operation is requested to the moment when the operation is completed. Response time analysis is challenging due to the complex dynamics among operations. A common technique is to study response time under worst-case scenario. However, using worst-case response time may lead to the conservative real-time system designs. To improve the real-time system design, we analyze the non-worst-case response time of operations and apply these results in the design process. The main contribution of this thesis includes mathematical modeling of real-time systems, calculation of non-worst-case response time, and improved real-time system design. We perform analysis and design on three common types of real-time systems as the real-time computing system, real-time communication network, and real-time energy management. For the real-time computing systems, our non-worst-response time analysis leads a necessary and sufficient online schedulability test and a measure of robustness of real-time systems. For the real-time communication network, our non-worst-response time analysis improves the performance for the model predictive control design based on the real-time communication network. For the real-time energy management, we use the non-worst-case response time to check whether the micro-grid can operate independently from the main grid.
48

Resource based analysis of Ethernet communication between software partitions

Chiru, Cezar January 2015 (has links)
Nowadays, Industrial Control Systems (ICSs) are becoming larger and implement more complex functions. Therefore, technologies that are currently used to implement these functions, like hardware platforms and communication protocols might soon become unusable due to the lack of resources. The industry is trying to adopt new technologies that will allow these functionalities to be developed without an increase in the size of the equipment, or of the development costs. To enumerate some of these technologies: virtualization, multi-core technologies are the ones that show the biggest potential. Because these technologies are not mature, research has to be done in order to fully maximize their potential. Another technology that is highly used by the industry is the Ethernet communication protocol. It presents some advantages, but due to the non-real-time nature of the applications that it was designed for, it has to be extended in order to be used in real-time applications. The objective of this thesis work is to model an Ethernet network comprised of software partitions so that it can provide timing guarantees for the traffic that traverses the network. A Response Time Analysis for real-time flows over such networks is proposed. The model and the RTA are evaluated by experiments.
49

識別性検査 A-1001 の「知覚の速さ・正確さ」領域の IRT 尺度化

野口, 裕之, Noguchi, Hiroyuki 12 1900 (has links)
国立情報学研究所で電子化したコンテンツを使用している。
50

パーソナル・コンピュータをベースとする識別性検査A-1001用項目プールの作成

野口, 裕之, NOGUCHI, Hiroyuki January 1993 (has links)
国立情報学研究所で電子化したコンテンツを使用している。

Page generated in 0.055 seconds