• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 43
  • 22
  • 22
  • 20
  • 8
  • 3
  • 3
  • 3
  • 2
  • 1
  • Tagged with
  • 144
  • 31
  • 30
  • 28
  • 23
  • 20
  • 18
  • 11
  • 11
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Modifying Instruction Sets In The Gem5 Simulator To Support Fault Tolerant Designs

Zhang, Chuan 23 November 2015 (has links)
Traditional fault tolerant techniques such as hardware or time redundancy incur high overhead and are inefficient for checking arithmetic operations. Our objective is to study an alternative approach of adding new instructions to check arithmetic operations. These checking instructions either rely on error detecting code or calculate approximate results and consequently, consume much less execution time. To evaluate the effectiveness of such an approach we wish to modify several benchmarks to use checking instructions and run simulation experiments to find out their execution time and memory usage. However, the checking instructions are not included in the instruction set and as a result, are not supported by current architecture simulators. Therefore, another objective of this thesis is to develop a method for inserting new instructions in the Gem5 simulator and cross compiler. The insertion process is integrated into a software tool called Gtool. Gtool can add an error checking capability to C programs by using the new instructions.
42

Řízení šaržového procesu na bázi receptur v jazyce SCL / Control of batch process on recipe basis in SCL language

Vondráček, Jiří January 2011 (has links)
The thesis is focused on the control of batch processes on recipe basis. The objective of this thesis is to create a philosophy of control batch processes using programming languages SCL and CFC. In the theoretical part of the work, the automation of production are explained and the principles of the control of batch processes based on recipes in accordance with standard S88 are described. In the last part there is a draft concept of such a procedure without the use of batch-oriented type systems like Batch is.
43

Betydelsen av revisorns fysiska närvaro : Vad innebär det om inte revisorn kan vara med fysiskt vid lagerinventeringen?

Bornfleth, Benjamin, Hansen, Theo January 2021 (has links)
Revision är en form av kontroll för att säkerställa att de finansiella rapporter som företag publicerar är i sin väsentlighet sanningsenliga, vilket görs för att skapa förtroende utåt åt intressenter av företaget. En sådan kontroll som revisorn utför om ett företags lager bedöms vara av väsentlig storlek är en granskning av företagets varulager. Från historiska skandaler där företag rapporterat stora lagertillgångar som inte existerat har en huvudregel arbetats fram i ISA standarden, en huvudregel som svenska revisorer är skyldiga att följa. Huvudregeln innefattar att revisorn fysiskt ska närvara vid inspektionen av ett varulager för att säkerställa bland annat varulagrets existens och skick, utvärdera rutiner samt utföra kontrollräkningar. I samband med covid-19 aktualiserades frågan för revisorer om fysiskt deltagande vid lagerinventeringen alltid är en möjlighet och hur de ska hantera en situation där fysisk närvaro inte är lämplig. ISA tillåter nämligen användandet av alternativa granskningsåtgärder i stället för fysisk närvaro, men som följd av diffusa riktlinjer för när alternativa granskningsåtgärder är tillåtna samt otydlighet för vilka alternativ som anses tillåtna har revisorers beslutsprocess blivit mer komplicerad. På grund av covid-19 har distansarbete samt avstånd mellan individer blivit en nödvändig verklighet och tillsammans med den ökande digitaliseringen i samhället väcktes därför frågan om vad betydelsen är av att en revisor närvarar fysiskt under en revision. I sökandet på svar av frågan upptäcktes en bred forskningslucka angående betydelsen av att en revisor är fysiskt närvarande under en revision. För att försöka fylla delar av denna forskningslucka syftar studien till att beskriva hur revisorer ser på betydelsen av fysisk närvaro vid lagerinventering samt analysera vad betydelsen är av att revisorn infinner sig fysiskt på plats under en lagerinventering för att genomföra sin granskning. Studien syftar även till att skapa en större förståelse för hur revisorer förhåller sig till alternativa granskningsåtgärder vid lagerinventering. Genom en kvalitativ studie baserad på intervjuer med verksamma revisorer i Sverige besvaras problemformuleringen: Vad är betydelsen av revisorns fysiska närvaro vid lagerinventering? Slutsatserna som framkommit genom en analys av den insamlade empiriska data pekar mot att revisorns fysiska närvaro har en påverkan på de fyra teman som studien valt att analysera frågeställningen utifrån: kundrelation, legitimitet, arbetssituation och etiska motivatorer. Bland slutsatserna återfinns bland annat att revisorn till större del måste förlita sig på kunden som följd av att revisorn inte kan närvara fysiskt samt att revisorn inte kan utöva sin auktoritära legitimitet i samma grad via digitala hjälpmedel. Dessutom medför en begränsning i revisorns fysiska närvaro en högre arbetsbelastning för revisorer.
44

Development of Classroom Tools for a RISC-V Embedded System

Phillips, Lucas 01 May 2022 (has links)
RISC-V is an open-source instruction set that has been gaining popularity in recent years, and, with support from large chip manufacturers like Intel and the benefits of its open-source nature, RISC-V devices are likely to continue gaining momentum. Many courses in a computer science program involve development on an embedded device. Usually, this device is of the ARM architecture, like a Raspberry Pi. With the increasing use of RISC-V, it may be beneficial to use a RISC-V embedded device in one of these classroom environments. This research intends to assist development on the SiFive HiFive1 RevB, which is a RISC-V embedded device. This device was chosen because of its ease of use, functionality-rich API, and affordability. In order to make developing with this board very approachable for a student, this research involved the development of a small suite of tools. These tools support common functionality like: building a source file into an executable ELF file, converting that ELF executable into an Intel HEX executable format that is required to run on the device, uploading the Intel HEX executable onto the device, and attaching a debug session to the program that is running on the device. With the help of this toolchain, developing on this RISC-V embedded device should be very approachable for most students.
45

Viability and Implementation of a Vector Cryptography Extension for Risc-V

Skelly, Jonathan W 01 June 2022 (has links) (PDF)
RISC-V is an open-source instruction-set architecture (ISA) forming the basis of thousands of commercial and experimental microprocessors. The Scalar Cryptography extension ratified in December 2021 added scalar instructions that target common hashing and encryption algorithms, including SHA2 and AES. The next step forward for the RISC-V ISA in the field of cryptography and digital security is the development of vector cryptography instructions. This thesis examines if it is viable to add vector implementations of existing RISC-V scalar cryptography instructions to the existing vector instruction format, and what improvements they can make to the execution of SHA2 and AES algorithms. Vector cryptography instructions vaeses, vaesesm, vaesds, vaesdsm, vsha256sch, and vsha256hash are proposed to optimize AES encryption and decryption, SHA256 message scheduling, and SHA256 hash rounds, with pseudocode, assembly examples, and a full 32-bit instruction format for each. Both algorithms stand to benefit greatly from vector instructions in reduction of computation time, code length, and instruction memory utilization due to large operand sizes and frequently repeated functions. As a proof of concept for the vector cryptography operations proposed, a full vector-based AES-128 encryption and SHA256 message schedule generation are performed on the 32-bit RISC-V Ibex processor and 128-bit Vicuna Vector Coprocessor in the Vivado simulation environment. Not counting stores or loads for fair comparison, the new Vector Cryptography extension completes a full encryption round in a single instruction compared to sixteen with the scalar extension, and can generate eight SHA256 message schedule double-words in a single instruction compared to the forty necessary on the scalar extension. These represent a 93.75% and 97.5% reduction in required instructions and memory for these functions respectively, at a hardware cost of 19.4% more LUTs and 1.44% more flip-flops on the edited Vicuna processor compared to the original.
46

An Ox and Ass in the Cucumber Field: The Importance of Metaphor to the Exegesis of Meaning, A Frame Semantic Approach to Isaiah 1:2-9

Simmonds, Tamara L. January 2013 (has links)
<p> The focus of this thesis is the importance of metaphor to an understanding of Isa 1:2-9. The argument depends on an understanding of metaphor as an imaginative structuring mechanism of cognitive linguistic behaviour, and a concrete mediator of meaning. The work proceeds from the observation that within contemporary scholarship readings of Isa 1 have failed to give sufficient attention to the occasion of its metaphors. The thesis argues that metaphor is essential to the text, and therefore a critical analysis of metaphor is central to its understanding. Using a Frame Semantic approach to contemporary Metaphor Theory, the interpretation of metaphors in Isa 1:2-9 is informed by insight offered from the historical and literary frames of the Ancient Near East and Hebrew Bible. Root metaphors of kinship, body, and land and their conceptual integration are discussed, and rich layers of meaning are revealed.</p> / Thesis / Master of Theological Studies (MTS)
47

Remote Software Guard Extension (RSGX)

Sundarasamy, Abilesh 21 December 2023 (has links)
With the constant evolution of hardware architecture extensions aimed at enhancing software security, a notable availability gap arises due to the proprietary nature and design-specific characteristics of these features, resulting in a CPU-specific implementation. This gap particularly affects low-end embedded devices that often rely on CPU cores with limited resources. Addressing this challenge, this thesis focuses on providing access to hardware-based Trusted Execution Environments (TEEs) for devices lacking TEE support. RSGX is a framework crafted to transparently offload security-sensitive workloads to an enclave hosted in a remote centralized edge server. Operating as clients, low-end TEE-lacking devices can harness the hardware security features provided by TEEs of either the same or different architecture. RSGX is tailored to accommodate applications developed with diverse TEE-utilizing SDKs, such as the Open Enclave SDK, Intel SGX SDK, and many others. This facilitates easy integration of existing enclave-based applications, and the framework allows users to utilize its features without requiring any source code modifications, ensuring transparent offloading behind the scenes. For the evaluation, we set up an edge computing environment to execute C/C++ applications, including two overhead micro-benchmarks and four popular open-source applications. This evaluation of RSGX encompasses an analysis of its security benefits and a measurement of its performance overhead. We demonstrate that RSGX has the potential to mitigate a range of Common Vulnerability Exposures (CVEs), ensuring the secure execution of confidential computations on hybrid and distributed machines with an acceptable performance overhead. / Master of Science / A vast amount of data is generated globally every day, most of which contains critical information and is often linked to individuals. Therefore, safeguarding data is essential at every stage, whether it's during transmission, storage, or processing. Different security principles are applied to protect data at various stages. This thesis particularly focuses on data in use. To protect data in use, several technologies are available, and one of them is confidential computing, which is a hardware-based security technology. However, confidential computing is limited to certain high-end computing machines, and many resource-constrained devices do not support it. In this thesis, we propose RSGX, a framework to offload secured computation to a confidential computing-capable remote device with a Security as a Service (SECaaS) approach. Through RSGX, users can leverage confidential computing capabilities for any of their applications based on any SDK. RSGX provides this capability transparently and securely. Our evaluation shows that users, by adapting RSGX, can mitigate several security vulnerabilities, thereby enhancing security with a reasonable overhead.
48

Caracterização da população adulta e idosa do município de São Paulo segundo padrões alimentares de refeições - Estudo de base populacional ISA Capital 2008 / Characterization of adult and elderly population living in the city of São Paulo accordingly to meals dietary patterns population based study ISA Capital 2008.

Santos, Roberta de Oliveira 25 September 2014 (has links)
Introdução: A Organização Mundial da Saúde sugere que as recomendações alimentares para populações devem basear-se em alimentos ao invés de nutrientes. No entanto, devem levar em consideração, que os indivíduos não consomem nutrientes ou alimentos isoladamente e sim refeições compostas por uma variedade de alimentos. Objetivo: Identificar os padrões alimentares do café da manhã, almoço e jantar da população adulta e idosa do município de São Paulo e caracterizá-los de acordo com variáveis socioeconômicas, demográficas e antropométricas. Métodos: Foram utilizados dados secundários do estudo transversal de base populacional ISA-Capital 2008 de adultos e idosos (n=1102). O consumo alimentar foi estimado pelo Multiple Source Method considerando dois recordatórios de 24 horas. A partir dos grupos de alimentos de cada refeição aplicou-se análise fatorial por componentes principais (rotação varimax) para derivar os padrões alimentares. Calcularam-se os escores fatoriais, que foram então utilizados para agrupar os indivíduos através da análise de agrupamento. Adicionou-se um grupo com os indivíduos que não realizaram a refeição para cada uma das análises. Os grupos foram caracterizados segundo sexo, faixa etária, renda familiar per capita e estado nutricional. Admitiu-se nível de significância de 0,05 e para caracterização dos grupos considerou-se uma diferença de escore padronizado em pelo menos |0,5| com relação à amostra geral. Resultados: Identificou-se prevalência de 5,6 por cento de omissão do café da manhã, 3,6 por cento do almoço e 12,8 por cento do jantar. Quanto aos que realizaram as refeições, identificaram-se três padrões do Café da Manhã: Saudável, Tradicional e Lanche; quatro padrões do Almoço: Tradicional, Salada, Suco Adoçado e Ocidental; e quatro padrões do Jantar: Café com Leite e Pão, Transição, Tradicional e Sopa e Frutas. Os grupos de indivíduos associados a idosos apresentaram aderência ao café da manhã Saudável, almoço Salada e jantar Sopas e Frutas. Aqueles associados a homens e adultos em geral omitiram o café da manhã e aderiram ao almoço Ocidental e jantar Transição. Os grupos associados a apenas homens aderiram a café da manhã e almoço Tradicional. Aqueles associados a somente adultos apresentaram aderência ao almoço Suco Adoçado. E associados a mulheres aderiram a um jantar Café com Leite e Pão. Grupos associados à baixa escolaridade aderiram a um jantar Sopa e Frutas, e os de escolaridade elevada aderiram a café da manhã Lanche e Omissão do mesmo; e padrão de almoço ocidental. Grupos associados com indivíduos de baixa renda aderiram ao almoço tradicional. Conclusão: Os resultados encontrados no presente estudo indicam que padrões alimentares identificados de acordo com a refeição discriminam bem o consumo alimentar, salientando peculiaridades que não são encontradas em análises globais. E a associação entre a aderência a esses padrões e fatores demográficos e socioeconômicos sugere a existência de públicos-alvo para o planejamento e execução de políticas públicas em alimentação e nutrição. / Introduction: The World Health Organization suggests that dietary recommendations for populations should be based on foods rather than nutrients. However, individuals do not consume foods or nutrients in isolation but meals with variety of foods. Objective: To identify dietary patterns from breakfast, lunch and dinner of the adult and elderly population in São Paulo and characterize them according to socioeconomic, demographic and anthropometric variables. Methods: Data from cross-sectional population-based ISA Capital 2008 of adults and elderly (n = 1102) was used. Dietary intake was estimated by Multiple Source Method considering two 24-hour recalls. Principal component factor analysis (varimax rotation) was used to derive dietary patterns for each meal. Factor scores were calculated and then used in the cluster analysis. Individuals that skipped the meal were added as an extra cluster. The groups were characterized by gender, age, family income and nutritional status. Significance level of 0.05 was assumed for the groups characterization it was considered a difference of standardized score of at least | 0.5 | with respect to the overall sample. Results: We found omission prevalence of 5.6 per cent for breakfast, 3.6 per cent for lunch and 12.8 per cent for dinner. Three patterns of breakfast were identified: Healthy, Traditional and Snack; four patterns to lunch: Traditional, Salad, Sweetened Juice and Western; and four patterns to dinner: Coffee with Milk and Bread, Transitional, Traditional and Soup and Fruits. The groups of individuals associated with the elderly showed adherence to Healthy breakfast, Salad lunch and Soups and Fruit dinner. The groups that were associated with adult and men skipped breakfast and adhered to the Western lunch and Transition dinner. The groups associated with only men showed adherence to Traditional breakfast and lunch. The groups associated with only adults showed adherence to Sweetened Juice lunch. The groups associated with women showed adherence with Coffee with Milk and Bread dinner. The groups associated with low education adhered to Soup and Fruits dinner, and the groups associated with high school skipped breakfast and they adhered to Snack breakfast and Western breakfast. Groups associated with low-income individuals adhered to Traditional lunch. Conclusion: The results of this study indicate that dietary patterns identified by meal discriminated food consumption very well, highlighting peculiarities that a global analysis cannot show. And the adherence to meal patterns associated with socioeconomic and demographic factors suggest there is evidence of risk groups and possible public policies related to health diet.
49

Rapportering mellan revisorer för en internationell koncern : Hur kan införandet av ISA 600 komma att förändra rapporteringen / Reporting between group auditors in an international corporate group : How will the introduction of ISA 600 effect the reporting

Rydén, Heidi, Almqvist, Sara January 2010 (has links)
Background: The environment and the design of auditing regulation can vary significantly between countries, which can affect the form, content and quality of the audit report. The purpose of the International Standards on Auditing, ISA, is to facilitate the work for auditors on an international basis. Sweden today follows the RS 600 which is based on ISA 600, which contains standards for when an auditor use work performed by other auditor. In October 2007, came a revised and redrafted version of ISA 600 that will be enforced in Sweden in the audit of the financial year beginning on 1 January 2011. To what degree the new requirements will affect the group audit is clearly dependent on how the reporting, evaluation and instructions between the group auditor and other auditor has been carried out previously. Aim: The aim with this paper is to explain the reporting between the group auditor and other auditor in an international corporate group. The aim is also to study the factors that can influence the final outcome of this report and why they affect the outcome. Furthermore, the paper will discuss the report process changes that could take place between the group auditor and other auditor after the introduction of ISA 600. Definitions: This paper has a geographic delimitation to Sweden. The paper is delimited to only consider auditing of corporate groups whose parent is located in Sweden and subsidiaries are located abroad. This means that respondents are bounded to the group auditors. Completion and results: Factors affecting reporting between auditors in an international corporate group turned out primarily to be language and communication differences, differences in accounting standards and determination of the materiality level. The risks are considered minimized through documentation reviews and both internal- and external quality controls. An understanding of social and cultural differences is a key factor to be able to have successful cross cultural collaborations. Education, experience and practise are the solutions to understand this issue. This paper demonstrates that cross-cultural training is not given at the accounting firms, which are proposed to be a beneficial investment. The instructions and contact with other auditors are expected to be put earlier after the introduction of ISA 600, also that the report itself will be more detailed.
50

Isan deformation, magmatism and extensional kinematics in the Western Fold Belt of the Mount Isa Inlier

Gordon, Ricky James Unknown Date (has links)
The Mount Isa and May Downs Faults are part of a network of significant faults that define, control, or partition deformation in the Early to mid-Proterozoic Mount Isa Inlier. The middle Proterozoic deformation history includes at least two extensional basin-forming events (Leichhardt Superbasin: ~1800 Ma to ~1700 Ma and Isa Superbasin: ~1700 Ma to ~ 1600 Ma) and a major protracted contractional orogenic event (Isan Orogeny: ~1585 Ma to ~ 1500 Ma). Uplift between the Mount Isa and May Downs Faults during the Isan Orogeny has exposed mid to upper amphibolite facies rocks of the structurally deeper levels of the early rift systems. Also exposed is the Sybella Granite, a composite batholith of variably deformed gneissic granite, which, at ~1660 Ma, is broadly coeval with inception of the Isan Superbasin basin. Two prevailing kinematic models had been proposed for the fault systems during Isan Superbasin formation. The traditionally accepted model involves episodic E-W or NW-SE extension with the N-S Mount Isa Fault, but Southgate et al (2000b) presented an alternative sinistral strike-slip model in which the May Downs Fault acted as a releasing bend fault associated with motion on the Mt Isa Fault. In the Southgate model, the Sybella Granite was interpreted as syn-tectonically filling the dilational releasing bend. This study provides a detailed structural analysis of the 100 km by 40 km area west of Mount Isa City lying between the Mount Isa and May Downs Faults. The aim was to resolve a number of outstanding issues, including those outlined above. The resultant 1:250 000 structural map of the area is based on: reconnaissance-scale mapping; aerial photography, satellite, magnetic and radiometric image interpretation; field observations at locations throughout the area; and local detailed mapping (1:12000 scale or less). The mapping and associated geometrical analysis of the area has shown that the Sybella Batholith consists of two granite sills and a more globular body of microgranite. The deepest, gneissic, sill is up to 5 km thick and was emplaced at about 15 km below the basal Mount Isa Group unconformity (palaeosurface). The other, less deformed, sill formed higher in the crust, and the microgranite intruded to within 1-2 km of the palaeosurface. The two sills are located between two major fault systems (Mount Isa and May Downs Faults) that developed from inherited basin margin faults. The fault systems dip toward each other and the rocks between them have been folded into a single large antiform and uplifted as a wedge. Previous interpretations of the area have suggested that the batholith consists of a single sill folded by tighter, shorter wavelength folds. A cross-sectional reconstruction of the study area suggests that thin-skinned processes dominated much of the Isan Orogeny, contrary to previous interpretations. A three-dimensional reconstruction of the area, evaluated by comparing the predicted strain and amount of shortening with measured strain and shortening estimates, suggests deformation was driven by a rigid block to the west of the May Downs Fault moving toward the northeast. In the restored pre-Isan geometry, both the margins of the lowermost gneissic granite sill and its immediate country rocks have a strong, horizontal, layer-parallel, shear foliation with top-to-the-east asymmetry. The fabrics are strongly constrictional and 2 Abstract the stretching lineation trends east-west. Field observations and thin sectional analysis of these fabrics provide positive evidence that the Sybella Batholith was syn-tectonically emplaced in a basin-forming environment. A kinematic model is presented to show that these features are consistent with granite emplacement into a dilational jog in a sub-horizontal shear zone with a top-to-the-east shear sense. A component of east-west directed horizontal simple shear across the dilating zone explains the strongly constrictional fabrics in the granite. Under these conditions significant north-south shortening in the deforming zone leads to the initiation of folds parallel to the stretching direction (as observed). The shear zone into which the granite was emplaced developed at about fifteen kilometres depth and was probably at or near the brittle-ductile transition. The consistent shear sense, very high strains and implied 30 km of translation required to accommodate the sill indicates that this was a major crustal structure, rather than a simple detachment at the brittle-ductile transition in a crustal pure shear extension. The results are consistent with the east-west extensional model for basin development and totally inconsistent with the sinistral strike-slip model.

Page generated in 0.0653 seconds