Spelling suggestions: "subject:"socket.""
41 |
Developing and Testing the Usability of a Communication Tool to enhance Evidence into Practice - A qualitative pilot studyRasmussen, Rikke, Hansen, Nikolaj E. January 2022 (has links)
Background: Meeting the prosthetists needs, and barriers is important to successful implement evidence into practice. Thus, several implementation methods have been initiated, the authors saw a need to create a Communication Tool based on evidence from transfemoral socket designs, to ease the process of assisting prosthetists in facilitating evidential reasoning. Aim: To investigate if a Communication Tool can facilitate the usage of evidence into practice by assisting the clinical decision making. Method: The study is divided into two parts. First the development of the Communication Tool, which is based on the Knowledge to Action model plus an update of studies from a systematic review by Brodie et al.2021. The second part consists of a qualitative pilot-study using semi-structured synchronously interviews to collect data from two Danish working prosthetists. For the analysis a conventional content analysis with an inductive approach was used. Findings: Findings from the analysis of the interviews compiled eight categories and twenty-five sub-categories covering three key themes identified during the creation of the Communication Tool: Barriers, internal usability, and external usability of the Communication Tool. Conclusion: The Communication Tool showed to be an effective method to assist and facilitate evidence-based reasonings. The participants found the tool to be useful and appraised positively regarding communicating relevant content an easy to navigate in. Minor improvements are needed, which are related to the quality assessment system and the system of reference as well as some linguistic formulations.
|
42 |
Analysis of the Scope of Dynamic Power Management in Emerging Server ArchitecturesHähnel, Markus, Dargie, Waltenegus, Schill, Alexander 16 May 2023 (has links)
The architectures of large-scale Internet servers are becoming more complex each year in order to store and process a large amount of Internet data (Big Data) as efficiently as possible. One of the consequences of this continually growing complexity is that individual servers consume a significant amount of data even when they are idle. In this paper we experimentally investigate the scope and usefulness of existing and proposed dynamic power management strategies to manage power at core, socket, and server levels. Our experiment involves four dynamic voltage and frequency scaling policies, three different workloads having different resource consumption statistics, and the activation and deactivation of different sockets (packets) of a multicore, multi-socket server. Moreover, we establish a quantitative relationships between the workload (w) and the estimated power consumption (p) under different power management strategies to make a quantitative comparison of the different strategies and server configurations.
|
43 |
The Security LayerO'Neill, Mark Thomas 01 January 2019 (has links)
Transport Layer Security (TLS) is a vital component to the security ecosystem and the most popular security protocol used on the Internet today. Despite the strengths of the protocol, numerous vulnerabilities result from its improper use in practice. Some of these vulnerabilities arise from weaknesses in authentication, from the rigidity of the trusted authority system to the complexities of client certificates. Others result from the misuse of TLS by developers, who misuse complicated TLS libraries, improperly validate server certificates, employ outdated cipher suites, or deploy other features insecurely. To make matters worse, system administrators and users are powerless to fix these issues, and lack the ability to properly control how their own machines communicate securely online.
In this dissertation we argue that the problems described are the result of an improper placement of security responsibilities. We show that by placing TLS services in the operating system, both new and existing applications can be automatically secured, developers can easily use TLS without intimate knowledge of security, and security settings can be controlled by administrators. This is demonstrated through three explorations that provide TLS features through the operating system. First, we describe and assess TrustBase, a service that repairs and strengthens certificate-based authentication for TLS connections. TrustBase uses traffic interception and a policy engine to provide administrators fine-tuned control over the trust decisions made by all applications on their systems. Second, we introduce and evaluate the Secure Socket API (SSA), which provides TLS as an operating system service through the native POSIX socket API. The SSA enables developers to use modern TLS securely, with as little as one line of code, and also allows custom tailoring of security settings by administrators. Finally, we further explore a modern approach to TLS client authentication, leveraging the operating system to provide a generic platform for strong authentication that supports easy deployment of client authentication features and protects user privacy. We conclude with a discussion of the reasons for the success of our efforts, and note avenues for future work that leverage the principles exhibited in this work, both in and beyond TLS.
|
44 |
Sledování polohy s využitím GPS a PDA / Position Tracking with GPS and PDAČernohorský, Vilém January 2008 (has links)
This work presents steps in creation of remote position tracking application. Document introduces history of geographical positioning and navigation, and describes development of navigation from primitive utilities to complex radio navigation systems. Global Positioning System is described in more detail including NMEA protocol used by GPS receivers. This work also presents several current navigation applications. Based on obtained information work presents analysis, object-oriented design and implementation of remote position tracking system.
|
45 |
Komunikační zařízení přes GSM/GPRS / Communication devices over GSM/GPRSPrečan, David January 2010 (has links)
This master thesis deals with a data remote transmission by means of SMS and GPRS technology. The overview of current solutions is presented and then a remote temperature measurement and a data transmission employing a communication module GSM/GPRS TM1 through GSM network using GPRS technology is described. As a response to an impulse, the communication module sends SMS. The technical solution is described in details including HW and SW design of the data transfer and processing equipment using a ATmega 162 microprocessor. This equipment communicates with a server (PC), which displays the measured temperature. A prototype which was used for a validation of the design is also described.
|
46 |
Mobilní zdroje elektrické energie / Mobile Power SourcesKvasnička, Karel January 2020 (has links)
Charging station; PV panel; accumulator; battery; lithium; LiFePO4; Arduino
|
Page generated in 0.0525 seconds