Spelling suggestions: "subject:"iim"" "subject:"bmim""
1 |
Design and Implementation of SIM Functionality for TETRA-system on a Smart Card / Design och implementation av SIM-funktionalitet i ett smartcard för TETRA-systemetOlofsson, Jonas January 2012 (has links)
TETRA is an open radio standard developed by ETSI. It is specifically designed for use bygovernment agencies, emergency services such as police forces, fire departments, and ambulance,public safety networks, train radios, transport services, and the military. The TETRAstandard is used in the Swedish public safety net Rakel. Today the hand-held devices inRakel do not use a SIM card to hold the user identity. Instead, the terminal is personalisedby hard coding the user information in the terminal. As the users group grows a need forSIM cards will probably emerge since it simplifies the handling of the users for the networkadministrator, and allows the user to replace a broken terminal by simple moving his/herSIM card to another terminal. This master thesis examines the TSIM standard and extractsa specification of requirements, proposes a suitable software architecture, and partially implementsTSIM functionality on a smart card. The conclusion is that a TSIM applicationcan be integrated with an E2EE application but some modifications are needed compared toonly having the TSIM functionality in the smart card. The design and architecture describedin this master thesis can be used in systems that already use the SIM slot of the hand-helddevices for a smart card that extends the functionality of the terminal.
|
2 |
An orientation program for newcomers in SIM's Western Africa AreaKlotz, Edward C. January 1994 (has links)
Thesis (D. Miss.)--Trinity Evangelical Divinity School, 1994. / Abstract. Includes bibliographical references (leaves 210-217).
|
3 |
GPGPU-Sim / A study on GPGPU-SimAndersson, Filip January 2014 (has links)
This thesis studies the impact of hardware features of graphics cards on performance of GPU computing using GPGPU-Sim simulation software tool. GPU computing is a growing topic in the world of computing, and could be an important milestone for computers. Therefore, such a study that seeks to identify the performance bottlenecks of the program with respect to hardware parameters of the devvice can be considered an important step towards tuning devices for higher efficiency. In this work we selected convolution algorithm - a typical GPGPU application - and conducted several tests to study different performance parameters. These tests were performed on two simulated graphics cards (NVIDIA GTX480, NVIDIA Tesla C2050), which are supported by GPGPU-Sim. By changing the hardware parameters of graphics card such as memory cache sizes, frequency and the number of cores, we can make a fine-grained analysis on the effect of these parameters on the performance of the program. A graphics card working on a picture convolution task releis on the L1 cache but has the worst performance with a small shared memory. Using this simulator to run performance tests on a theoretical GPU architecture could lead to better GPU design for embedded systems.
|
4 |
Förändringsförslag förABB:s godshantering : – Utvärdering av existerandeautomatiska datafångstmetoderNiittula, Anneli, Johar, Johar January 2008 (has links)
Examensarbetet utfördes på uppdrag av ABB i Ludvika. ABB vill öka effektiviseringen förhanteringen av inkommande gods. Detta för att det mesta sker manuellt i dagens läge och det tarmycket tid och kan resultera i felkällor.Arbetet har två syften. Det första syftet är att förändra del av verksamheten, genom att kommamed ett förändringsförslag när det gäller godshanteringen. Det andra syftet är att jämförastreckkoder och RFID för att se vilket alternativ som passar bäst.För att få fram ett förändringsförslag har vi jobbat med FA/SIM-metoden.Vi har tagit fram ett antal förändringsförslag nedan följer ett urval av dessa:• Ställa krav på leverantörerna att de skall använda streckkoder med rätt standard Code128.• Utforma tydliga och enkla kravspecifikationer för att enklare kunna ta till sig.• Förbättra nuvarande kundrelationer. Genomför en uppföljning med jämna mellanrum föratt se hur kundrelationerna sköts.
|
5 |
Windows 10 för inbyggda system : En undersökning av Windows 10 IoT EnterpriseJohansson, Anders, Wassbjer, Robin January 2016 (has links)
Microsoft lanserade Windows 10 i mitten av 2015. Windows 10 är en serie operativ-system med flera versioner anpassade för många olika användningsområden. Windows 10 IoT Enterprise är en av versionerna inriktade på olika typer av inbyggda system. Vid anpassning utefter miljö kan delar av operativsystemet därför låsas ned och begränsas. För konfiguration av Windows 10 finns både gamla och nya verktyg tillgängliga. I detta projekt görs en undersökning av nedlåsnings- och anpassningsmöjligheter, samt konfigurationsverktyg med fokus på Windows 10 IoT Enterprise. De verktyg som har använts är Microsofts helt nya Windows Imaging and Configuration Designer, men även det lite äldre Windows System Image Manager. Med och utan hjälp av dessa verktyg har flera konfigurationsmöjligheter undersökts. Detta inkluderar bl.a. användar- och applikationsbegränsningar, branding (mjukvarumässig produktmärk-ning), och utseendeanpassningar. Utöver detta behandlas även framtagandet av färdig-konfigurerade Windows-avbildningar ytligt. Projektet har bestått av åtskilliga tester, främst baserade på Microsofts egna dokumentation. Majoriteten av de möjligheter och konfigurationer som har undersökts har visat sig fungerande och någorlunda lättanvända. En fungerande funktion har endast bedömts som sådan om denna uppfyller de beskrivningar Microsoft själva har givit ut. Detta utan att för den sakens skull förstöra andra delar av systemet. I slutändan beskriver resultaten till stor del funktioner som finns och fungerar, men inte i vilka praktiska scenarier dessa lämpar sig för användning. Vid konfiguration av större nedlåsningsfunktioner uppvisar Windows ICD problem. Ytterligare problem som också har noterats berör bl.a. möjligheterna för profilkopiering och generalisering i Windows 10. / Microsoft released Windows 10 in the middle of 2015. Windows 10 is a series of operating systems with multiple versions adapted for many different fields of work. Windows 10 IoT Enterprise is one of the versions aimed at various types of embedded systems. During adaptation into certain environments, parts of the operating system may therefore be locked down or limited. For configuration of Windows 10, both old and new tools are available. In this project, an examination of lockdown and adaptation possibilities, as well as configuration tools, focusing on Windows 10 IoT Enterprise is made. The tools used are Microsoft’s brand new Windows Imaging and Configuration Designer, but also their older Windows System Image Manager. Multiple configurations have been examined both with, and without the help of these tools. This includes user and application limitations, branding, and appearance. In addition to this, the creation of fully configured Windows images is superficially addressed. The project has consisted of several tests, mainly based on documentation from Microsoft. A majority of the examined possibilities and configurations have proven functional and quite easy to make use of. A working functionality has only been evaluated as such if it satisfies descriptions released by Microsoft themselves. This, as well as not breaking other parts of the system. In the end, the result mainly describes existing and working functionalities, not in what practical scenarios they fit. During configuration of major lockdown features, Windows ICD displays problems. Other problems has also been noted, among other things related to profile copying and generalization in Windows 10.
|
6 |
Impact of Out-of-Order Delivery in DiffServ NetworksJheng, Bo-Wun 14 September 2006 (has links)
Packet reordering is generally considered to have negative impact on network performance. In this thesis, the packet reordering is used to assist TCP to recover faster in RED-enabled packet switched networks. The RED queue management prevents networks from congestion by dropping packets with a probability earlier than the time when congestion would actually occur. After a RED router drops a packet, packer reordering is introduced during TCP¡¦s recovery process. A new, simple buffer mechanism, called RED with Recovery Queue or R2Q, is proposed to create this type of packet reordering on behalf of TCP with the objective of accelerating TCP¡¦s recovery and thus improving the overall network performance. In R2Q, the original RED queue is segmented into two sub-queues. The first sub-queue remains the function of the original RED while the second picks up the packets discarded by the first. Then, scheduling of the second-chance transmission of the packets in the secondary sub-queue is the key in achieving our objective. In this thesis, we considered two scheduling schemes: priority and weighted round robin. To evaluate the performance of R2Q with these two scheduling schemes, we implemented and evaluated them in the J-Sim network simulation environment. The well-known dumbbell network topology was adopted and we varied different parameters, such as round-trip time, bottleneck bandwidth, buffer size, WRR weight and so on, in order to understand how R2Q performs under different network configurations. We found that R2Q is more effective in the networks of sufficient buffer and larger product of RTT and bandwidth. With WRR, we may achieve as much as 2% improvement over the original RED. The improvement may be more in networks of even higher speed.
|
7 |
Sim ou não? Os discursos do Referendo 2005Xavier Tavares, Mônica 31 January 2009 (has links)
Made available in DSpace on 2014-06-12T16:27:17Z (GMT). No. of bitstreams: 2
arquivo1902_1.pdf: 1227540 bytes, checksum: 6ead4d756605119e6bbcd7704ee94868 (MD5)
license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5)
Previous issue date: 2009 / Este trabalho busca compreender o movimento dos sentidos nas eleições sobre o comércio de armas de fogo e munição que aconteceram em 2005. Para tanto é utilizada, como suporte teórico, a Análise do Discurso Francesa que se mostra como uma disciplina capaz de abranger as questões ideológicas, lingüísticas e as condições de produção do texto. A análise dos discursos políticos do Referendo 2005 se encontra exatamente nesse entrecruzamento. O corpus escolhido são as três maiores revistas semanais de informação do Brasil: Veja, Istoé e Época. Cada uma com uma posição política bem definida na disputa determinou a construção dos sentidos dos discursos sim e não e também daquilo que deixou de ser dito, mas que continuou significando. O principal objetivo deste trabalho é entender os muitos efeitos de sentido que surgem nos discursos de/sobre o Referendo 2005 levando em consideração a memória discursiva, o interdiscurso e as diferentes formações discursivas. Pela análise é possível observar que há um intenso diálogo entre as três revistas e a linha que separa os dois discursos antagônicos é muito tênue. Inicialmente colocados em posições opostas e inconciliáveis, é possível perceber que o sim e o não têm muitos pontos de contato. Esses discursos rivalizaram entre si e desencadearam uma forte polêmica na sociedade. O que se percebeu afinal foi uma grande guerra discursiva em que os sentidos correram de um lado a outro em um processo ininterrupto de (re)construção e (re)significação
|
8 |
Design and Implementation of a Blockchain-based Global Authentication System Using Biometrics and Subscriber Identification ModuleKhalili, Navid 06 June 2022 (has links)
The digital world tolerates a high volume of information and interactions. Considering the usage of electronic services by authorities, User Authentication (UA) is crucial. Numerous authentication methods are proposed in the literature; yet, identifying users based on their actual identities with the capability of global usage and respecting privacy is under research. By adopting Blockchain technology in the software industry, the record management systems have satisfied properties such as transparency, accountability, anonymity, and attack resiliency. Moreover, Smartphones are powerful devices capable of hosting a Subscriber Identification Module (SIM) Card that secures the execution of processes involving use of sensitive information. A combination of these technologies is the foundation of a strong UA in cyberspace. In this thesis, we propose the design and prototype of Blockchain-based Global Authentication System (BBGAS) that offers a secure, privacy-preserving, and transparent authentication system based on users' biometrics via Smartphones appropriate for service provider applications.
|
9 |
PSF Sampling in Fluorescence Image DeconvolutionInman, Eric A 01 March 2023 (has links) (PDF)
All microscope imaging is largely affected by inherent resolution limitations because of out-of-focus light and diffraction effects. The traditional approach to restoring the image resolution is to use a deconvolution algorithm to “invert” the effect of convolving the volume with the point spread function. However, these algorithms fall short in several areas such as noise amplification and stopping criterion. In this paper, we try to reconstruct an explicit volumetric representation of the fluorescence density in the sample and fit a neural network to the target z-stack to properly minimize a reconstruction cost function for an optimal result. Additionally, we do a weighted sampling of the point spread function to avoid unnecessary computations and prioritize non-zero signals. In a baseline comparison against the Richardson-Lucy method, our algorithm outperforms RL for images affected with high levels of noise.
|
10 |
MODELING OF I/O BLOCK AND SWITCH BLOCK FOR SECOND GENERATION MULTI-TECHNOLOGY FIELD PROGRAMMABLE GATE ARRAY (MT-FPGA)SAMSANI, SIVA PRASAD REDDY 03 April 2006 (has links)
No description available.
|
Page generated in 0.0473 seconds