Spelling suggestions: "subject:"update"" "subject:"uppdate""
191 |
Erstellung von Echtzeitmotormodellen aus den Konstruktionsdaten von VerbrennungsmotorenKämmer, Alexander 30 June 2003 (has links)
Motormanagement Systeme im modernen Kraftfahrzeug werden zunehmend umfangreicher und komplexer. Die Steuergeräte als zentrale Komponente dieser Systeme werden in ihrer Funktionalität durch Hard- und Software bestimmt. Sie sind das Ergebnis eines langen Entwicklungs- und Fertigungsprozesses. Fahrversuche und Versuche am Motorenprüfstand zum Test von Steuergeräten sind sehr zeit- und kostenintensiv. Eine Alternative ist der Test von Steuergeräten außerhalb ihrer realen Umgebung. Das Steuergerät wird dabei auf einem Hardware-in-the-Loop-Prüfstand betrieben. Die große Zahl von Einzelfunktionen und miteinander verknüpften Funktionen des Steuergerätes erfordert einen strukturierten und reproduzierbaren Ablauf beim Test. Diese Tests sind aber erst nach Fertigstellung eines Motorprototypen möglich, da die Parameter der vorhandenen Modelle aus den gemessenen Prüfstandsdaten ermittelt werden. Eine weitere Fragestellung zu diesem Thema bezieht sich auf die Modelltiefe: Heutige Modelle basieren auf Daten, die über einem Arbeitsspiel gemittelt werden. Untersuchungen wie z.B. der Momentanbeschleunigung von Kurbelwellen sind somit nicht möglich. Aus diesem Grund untersucht diese Arbeit Strategien im Hinblick auf den modellbasierten Test von Motormanagement Systemen. Dabei wird das Potenzial zur Zeiteinsparung bei einem neuen Motormodell großer Tiefe betrachtet.
|
192 |
OPTIMIZING DATA FRESHNESS IN INFORMATION UPDATE SYSTEMSBedewy, Ahmed M. 30 September 2021 (has links)
No description available.
|
193 |
The New Infusion Pump System at New Karolinska Solna / Nya Karolinska och det nya InfusionspumpssystemetLindemalm, Josefin, Akkawi, Anna January 2017 (has links)
In November 2016 a brand new and highly technological hospital called New Karolinska Solna opened in Stockholm. In connection with the planning of the hospital, new medical devices were procured, including a new infusion system that is now in use. Previously, each ward at the hospital had their own pumps and was responsible for updates and maintenance. Now, the hospital will instead have a floating pump system, which means that the hospital will own the pumps. The infusion pumps will be floating between the wards without being linked to a specific ward or department. The updates that were previously done when the need arose at the ward will now be a common process for the entire hospital. The aim of the project was to develop new guidelines for how the update process should be done on New Karolinska Solna's new infusion pump system. Through interviews with key personnel during the procurement process, the medical technicians department and caseworkers, new guidelines have been written, given the already existing technical conditions. During the course of the project it has been found that there are major shortcomings of information and communication within the hospital. The guidelines presented in the result are an important part to ensure that information related to the update comes to the caregivers at New Karolinska Solna, thus simplifying and streamlining the update of the infusion pumps.
|
194 |
Do Widget Libraries Need Mutable Data?Arumugasamy, Akshay Kumar 11 1900 (has links)
This thesis examines trends in the academic and professional literature around immutable
data and its relationship with declarative User Interfaces (UIs). Immutable
data types are preferred by academic authors due to their increased safety, and commercial
languages are increasing their support for them over time. More recently,
declarative UIs are an exploding topic in industry, and these are related, although
not as closely as one would expect. Declarative programming tries to focus on highlevel
requirements, not low-level details. It is easier to do this if functions have no
side effects, and immutable data is a guaranteed way of achieving this. To highlight
this property, the declarative UI framework Flutter advertises “stateless widgets”,
but their existence puts in highlights the lack of this property in most widgets. Consequently,
we ask whether it is feasible to build a Graphical User Interface (GUI)
toolkit using purely immutable data structures. To accomplish this objective, a
purely immutable GUI toolkit is sketched and partially developed using Elm, a purely
functional language in which all data structures are immutable. To understand the
requirements of a GUI toolkit, we categorize and put in historical context, different
design paradigms for UIs and relate them to core software-design principles. Leading
toolkits allow developers to visualize and manage multiple views of their interfaces, including the view hierarchy, layout, interface to business logic, and focus management.
By creating a concrete example, the research aims to provide insight into the
limitations of utilizing purely immutable data within a GUI framework and suggests
future work to mitigate these. / Thesis / Master of Science (MSc)
|
195 |
Mitteilungen des URZ 2/2005Blumtritt, Clauß, Fischer, Kempe, Trapp, Richter, Wolf, Ziegler 03 May 2005 (has links)
Informationen des Universitätsrechenzentrums:
- Die Projekte Campusnetz II und IP-Telefonie (VoIP)
- PROWeb - Ein neuer Dienst für Projekt-WWW-Server
- Unterstützte Linux-Distributionen
- WUSCH - Windows-Update-Service an der TU Chemnitz
- Informationen des URZ zur 'Rahmenvereinbarung zum Einkauf von
Standard-PC-Technik'
-Umstellung des Lokalsystems der UB auf LIBERO 5
- Elektronisches Publizieren an der TU Chemnitz - 10 Jahre MONARCH
- Kurzinformationen
- Software-News
|
196 |
Control room agents : an information-theoretic approachVan der Westhuizen, Petra Laura 28 February 2007 (has links)
In this thesis, a particular class of agent is singled out for examination. In order to provide
a guiding metaphor, we speak of control room agents. Our focus is on rational decision-
making by such agents, where the circumstances obtaining are such that rationality is
bounded. Control room agents, whether human or non-human, need to reason and act
in a changing environment with only limited information available to them. Determining
the current state of the environment is a central concern for control room agents if they
are to reason and act sensibly. A control room agent cannot plan its actions without
having an internal representation (epistemic state) of its environment, and cannot make
rational decisions unless this representation, to some level of accuracy, reflects the state
of its environment. The focus of this thesis is on three aspects regarding the epistemic
functioning of a control room agent:
1. How should the epistemic state of a control room agent be represented in order to
facilitate logical analysis?
2. How should a control room agent change its epistemic state upon receiving new
information?
3. How should a control room agent combine available information from different
sources?
In describing the class of control room agents as first-order intentional systems hav-
ing both informational and motivational attitudes, an agent-oriented view is adopted.
The central construct used in the information-theoretic approach, which is qualitative in
nature, is the concept of a templated ordering.
Representing the epistemic state of a control room agent by a (special form of) tem-
plated ordering signals a departure from the many approaches in which only the beliefs
of an agent are represented. Templated orderings allow for the representation of both
knowledge and belief.
A control room agent changes its epistemic state according to a proposed epistemic
change algorithm, which allows the agent to select between two well-established forms of
belief change operations, namely, belief revision and belief update.
The combination of (possibly conflicting) information from different sources has re-
ceived a lot of attention in recent years. Using templated orderings for the semantic
representation of information, a new family of purely qualitative merging operations is
developed. / School of Computing / Ph. D. (Computer Science)
|
197 |
A reclamação no novo Código de Processo Civil: um desafio entre a segurança jurídica e o poder criativo do julgadorMoraes, José Magno Linhares 10 August 2015 (has links)
Made available in DSpace on 2016-04-26T20:23:44Z (GMT). No. of bitstreams: 1
Jose Magno Linhares Moraes.pdf: 904489 bytes, checksum: fa1af1b5d6ab124bbe5ab9f801f41a40 (MD5)
Previous issue date: 2015-08-10 / This thesis aims to study the legal institute of Reclamação in two aspects, which should be seen as complimentary to obtain adequate legal certainty to a complex, pluralist and mutant society, namely, as a guarantee instrument of the authority of court decisons and their respective powers, and, on the other hand, as a legal means of promoting the necessary adjustments of paradigma decision to the case. For this purpose, the study of specialized doctrine, case law of our higher courts and the new civil procedure law was fundamental (Law n. 13.105 of 16 March 2015). Since the recognition of reclamação by the Supremo Tribunal Federal case law, as appropriate legal means to ensure the authority of its decisions, based on the theory of implied powers, it became clear that this institute, genuinely Brazilian, would have great utility in our country, deeply marked by cultural and economic contrasts. Court decisions, as legal rules, may give rise to plurality and interpretive inconsistencies. However, in the Democratic Rule of Law, legal certainty is a value of utmost importance. This certainty, in turn, should allow progress on a social reality that suffers daily influx of economic and political events. Therefore, the analysis of legal certainty in the light of systems theory. Also, it is important to highlight the impacts of the discipline of reclamação in the Brazilian legal system. With the possibility of all the country s courts settle legal arguments with binding power through procedural issues, the assumption of jurisdiction and resolution of repetitive demands, reclamação begins to have far-reaching. This new scenario approaches, in a way, our legal system to the world of the stare decisis theory of common law by privileging, now, respect for the determining reasons for the decision. Thus, through reclamação opens a new path to the desired stability, coherence and equality of law and adjudication / A presente dissertação tem como objetivo principal estudar o instituto jurídico da reclamação sob dois aspectos, que devem ser vistos como complementares para a obtenção de uma segurança jurídica adequada a uma sociedade complexa, pluralista e mutante, a saber: como instrumento de garantia da autoridade das decisões dos tribunais e de suas respectivas competências; e, por outro lado, como meio jurídico para promover os necessários ajustes da decisão paradigma ao caso concreto. Para tanto, foi fundamental o estudo da doutrina especializada, da jurisprudência dos nossos tribunais superiores e da nova legislação processual civil (Lei n. 13.105, de 16 de março de2015). Desde o reconhecimento da reclamação pela jurisprudência do Supremo Tribunal Federal, como meio jurídico adequado a garantir a autoridade de suas decisões, com base na teoria dos poderes implícitos, ficou evidente que esse instituto, genuinamente brasileiro, teria grande utilidade em nosso país, marcado profundamente por contrastes culturais e econômicos. As decisões dos tribunais, como normas jurídicas, podem ensejar pluralidade e inconstâncias interpretativas. Todavia, no Estado Democrático de Direito a segurança jurídica é um valor de alta importância. Essa segurança, por sua vez, deve permitir avanços diante de uma realidade social que cotidianamente sofre influxo de eventos econômicos e políticos. Por isso, a análise da segurança jurídica à luz da teoria dos sistemas. Também é importante ressaltar os impactos do novo disciplinamento da reclamação no sistema processual brasileiro. Com a possibilidade de todos os tribunais do país fixarem teses jurídicas com poder vinculante, por meio de incidentes processuais da assunção de competência e da resolução de demandas repetitivas, a reclamação passa a ter largo alcance. Esse novo cenário aproxima, de certo modo, o nosso sistema jurídico do mundo dos precedentes do direito, do common law, ao privilegiar o respeito aos fundamentos determinantes da decisão. Assim, por meio da reclamação, abre-se um novo caminho para a desejada estabilidade, coerência e igualdade do direito na prestação jurisdicional
|
198 |
Energy-aware scheduling : complexity and algorithmsRenaud-Goud, Paul 05 July 2012 (has links) (PDF)
In this thesis we have tackled a few scheduling problems under energy constraint, since the energy issue is becoming crucial, for both economical and environmental reasons. In the first chapter, we exhibit tight bounds on the energy metric of a classical algorithm that minimizes the makespan of independent tasks. In the second chapter, we schedule several independent but concurrent pipelined applications and address problems combining multiple criteria, which are period, latency and energy. We perform an exhaustive complexity study and describe the performance of new heuristics. In the third chapter, we study the replica placement problem in a tree network. We try to minimize the energy consumption in a dynamic frame. After a complexity study, we confirm the quality of our heuristics through a complete set of simulations. In the fourth chapter, we come back to streaming applications, but in the form of series-parallel graphs, and try to map them onto a chip multiprocessor. The design of a polynomial algorithm on a simple problem allows us to derive heuristics on the most general problem, whose NP-completeness has been proven. In the fifth chapter, we study energy bounds of different routing policies in chip multiprocessors, compared to the classical XY routing, and develop new routing heuristics. In the last chapter, we compare the performance of different algorithms of the literature that tackle the problem of mapping DAG applications to minimize the energy consumption.
|
199 |
Integrated Management of Interface Power (IMIP) FrameworkMahkoum, Hicham 12 1900 (has links)
La présence importante de plusieurs réseaux sans-fils de différentes portées a encouragée le développement d’une nouvelle génération d’équipements portables sans-fils avec plusieurs interfaces radio. Ainsi, les utilisateurs peuvent bénéficier d’une large possibilité de connectivité aux réseaux sans-fils (e.g. Wi-Fi [1], WiMAX [2], 3G [3]) disponibles autour. Cependant, la batterie d’un nœud mobile à plusieurs interfaces sera rapidement épuisée et le temps d’utilisation de l’équipement sera réduit aussi. Pour prolonger l’utilisation du mobile les standards, des réseaux sans-fils, on définie (individuellement) plusieurs états (émission, réception, sleep, idle, etc.); quand une interface radio n’est pas en mode émission/réception il est en mode sleep/idle où la consommation est très faible, comparée aux modes émission/réception. Pourtant, en cas d’équipement portable à multi-interfaces radio, l’énergie totale consommée par les interfaces en mode idle est très importante. Autrement, un équipement portable équipé de plusieurs interfaces radio augmente sa capacité de connectivité mais réduit sa longévité d’utilisation.
Pour surpasser cet inconvénient on propose une plate-forme, qu'on appelle IMIP (Integrated Management of Interface Power), basée sur l’extension du standard MIH (Media Independent Handover) IEEE 802.21 [4]. IMIP permet une meilleure gestion d’énergie des interfaces radio, d’un équipement mobile à multi-radio, lorsque celles-ci entrent en mode idle.
Les expérimentations que nous avons exécutées montrent que l’utilisation de IMIP permet d'économiser jusqu'a 80% de l'énergie consommée en comparaison avec les standards existants. En effet, IMIP permet de prolonger la durée d'utilisation d'équipements à plusieurs interfaces grâce à sa gestion efficace de l'énergie. / The large availability of wireless networks of different ranges, has contributed to the development of new generation of handheld devices with multi-radio interfaces. Thus, the end-users are able to achieve ubiquitous and seamless connectivity across heterogeneous wireless networks (e.g., Wi-Fi [1], WiMAX [2] and 3G_LTE [3]). However, a mobile node with multi-radio interfaces has its battery energy consumed rapidly, which reduces the operation/usage time of the device. To improve battery usage, wireless network standards have defined (individually) different interface states (transmit, receive, idle, sleep, etc.); when an interface is not transmitting or receiving, it goes to sleep/idle state where energy consumption is very low compared to transmit and receive states. However, in the case of multi-radio handheld devices, the total energy consumed by the interfaces in sleep/idle state is significant. Thus, equipping a mobile device with multiple interfaces increases its seamless connectivity but reduces its operation/usage longevity.
To overcome this inconvenient, we proposed a framework, called IMIP (Integrated Management of Interface Power) that consists of an extension of MIH (Media Independent Handover) IEEE 802.21 standard [4]. IMIP allows a better power management of radio interfaces of a multi-radio mobile node; indeed, it reduces considerably energy consumption. The basic idea behind IMIP is to shut down any interface in idle mode and use a proxy that emulates the interface; the proxy wakes up the interface when it receives a connection request directed to this interface. IMIP requires at least one interface in active mode. Experiments show that using IMIP enables a saving of up to 80% of power consumption compared with existing power management standards. Thus, IMIP allows longer usage of multiple interface devices thanks to its effective energy management.
|
200 |
Ενσωματωμένο σύστημα ασφαλούς ελέγχου, προστασίας και ανανέωσης λογισμικού απομακρυσμένου υπολογιστή μέσω διαδικτύουΣπανού, Ελένη 13 September 2011 (has links)
Είναι ευρέως αποδεκτό ότι η ασφάλεια δεδομένων έχει ήδη ξεκινήσει να διαδραματίζει κεντρικό ρόλο στον σχεδιασμό μελλοντικών συστημάτων τεχνολογίας πληροφορίας (IT – Information Technology). Μέχρι πριν από λίγα χρόνια, ο υπολογιστής αποτελούσε την κινητήρια δύναμη της ψηφιακής επικοινωνίας. Πρόσφατα, ωστόσο, έχει γίνει μια μετατόπιση προς τις εφαρμογές τεχνολογίας πληροφορίας που υλοποιούνται σαν ενσωματωμένα συστήματα. Πολλές από αυτές τις εφαρμογές στηρίζονται σε μεγάλο βαθμό σε μηχανισμούς ασφαλείας, περιλαμβάνοντας την ασφάλειας για ασύρματα τηλέφωνα, φαξ, φορητούς υπολογιστές, συνδρομητική τηλεόραση, καθώς και συστήματα προστασίας από αντιγραφή για audio / video καταναλωτικά προϊόντα και ψηφιακούς κινηματογράφους. Το γεγονός ότι ένα μεγάλο μέρος των ενσωματωμένων εφαρμογών είναι ασύρματο, καθιστά το κανάλι επικοινωνίας ιδιαίτερα ευάλωτο και φέρνει στο προσκήνιο την ανάγκη για ακόμη μεγαλύτερη ασφάλεια.
Παράλληλα με τα ενσωματωμένα συστήματα, η εκρηκτική ανάπτυξη των ψηφιακών επικοινωνιών έχει επιφέρει πρόσθετες προκλήσεις για την ασφάλεια. Εκατομμύρια ηλεκτρονικές συναλλαγές πραγματοποιούνται κάθε μέρα, και η ταχεία ανάπτυξη του ηλεκτρονικού εμπορίου κατέστησε την ασφάλεια ένα θέμα ζωτικής σημασίας για πολλές καταναλωτές. Πολύτιμες επιχειρηματικές ευκαιρίες , καθώς επίσης και πολλές υπηρεσίες πραγματοποιούνται κάθε μέρα μέσω του Διαδικτύου και πλήθος ευαίσθητων δεδομένων μεταφέρονται από ανασφαλή κανάλια επικοινωνίας σε όλο τον κόσμο.
Η επιτακτική ανάγκη για την αντιμετώπιση αυτών των προβλημάτων, κατέστησε πολύ σημαντική την συμβολή της κρυπτογραφίας, και δημιούργησε μια πολύ υποσχόμενη λύση, με την οποία ενσωματωμένα συστήματα σε συνδυασμό με κρυπτογραφικά πρωτόκολλα, θα μπορούσαν να μας οδηγήσουν στην εξασφάλιση των επιθυμητών αποτελεσμάτων.
Στην παρούσα εργασία, παρουσιάζουμε την υλοποίηση ενός ενσωματωμένου συστήματος, εμπλουτισμένο με κρυπτογραφικά πρωτόκολλα, που ουσιαστικά μεταμορφώνει έναν κοινό ηλεκτρονικό υπολογιστή σε ένα ισχυρό Crypto System PC, και έχει σαν κύρια αρμοδιότητα να μπορεί να επικοινωνεί με ένα υπολογιστικό σύστημα και να στέλνει πληροφορίες για την κατάσταση του μέσω ασφαλούς σύνδεσης διαδικτύου σε κάποιον απομακρυσμένο υπολογιστή ελέγχου/καταγραφής συμβάντων σε ώρες που δεν είναι εφικτή η παρουσία εξειδικευμένου προσωπικού για τον έλεγχο του.
Αξιολογούμε την απόδοση του και την λειτουργία του με την εκτέλεση διάφορων πειραμάτων, ενώ επίσης προτείνουμε λύσεις για πιο ιδανικές και αποδοτικές συνθήκες λειτουργίας για μελλοντικές εφαρμογές. / It is widely recognized that data security already plays a central role in the design of future IT systems.Until a few years ago, the PC had been the major driver of the digital economy. Recently, however, there has been a shift towards IT applications realized as embedded systems.Many of those applications rely heavily on security mechanisms, including security
for wireless phones, faxes, wireless computing, pay-TV, and copy protection schemes for audio/video consumer products and digital cinemas. Note that a large share of those embedded applications will be wireless, which makes the communication channel especially vulnerable and the need for security even more obvious. In addition to embedded devices, the explosive growth of digital communications also brings additional security challenges. Millions of electronic transactions are completed each
day, and the rapid growth of eCommerce has made security a vital issue for many consumers.
Valuable business opportunities are realized over the Internet and
megabytes of sensitive data are transferred and moved over insecure communication channels around the world. The urgent need to face these problems has made the contribution of cryptography very important , and created a very promising solution, in which embedded systems in combination with cryptographic protocols, could lead us to obtain the desired results.
In this paper, we present the implementation of an embedded system, enriched with cryptographic protocols, which turns a common computer into a powerful Crypto System PC, and has as its primary responsibility to be able to communicate with a computer system and send information for its situation through secure internet connections to a remote computer which is responsible for recording of events, when there is not qualified staff to control the computer system.
We evalauate its performance and operation, by executing various experiments and we also suggest solutions for more optimal and efficient operating conditions for future applications.
|
Page generated in 0.026 seconds