To see the other types of publications on this topic, follow the link: Embeddedne.

Dissertations / Theses on the topic 'Embeddedne'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Embeddedne.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

ALVARADO, VALENZUELA JUAN FRANCISCO. "SOMETHING NEW, SOMETHING USED, SOMETHING BORROWED: INNOVATION OF MIGRANT ENTREPRENEURS IN THE SERVICE SECTOR." Doctoral thesis, Università degli Studi di Milano, 2019. http://hdl.handle.net/2434/633508.

Full text
Abstract:
Innovation contribute to the socio-economic development of a society, and the role of migrant entrepreneurs is slowly getting attention. This study focuses on migratory experiences translated into business ideas with the exploration of business elements that are new, those adapted from other contexts and those shaped by the interaction with people around the entrepreneur. The theoretical inspirations come from the model of diffusion of innovations and the approach of mixed-embeddedness. The relationships product & entrepreneurs, context & entrepreneurs, and connections & entrepreneurs are analysed with 70 interviews in Brescia, Italy and 41 in Amsterdam, the Netherlands as two parallel, but cross-fertilized, cases. Product & entrepreneurs look at incremental innovation in five features: relative advantage, compatibility, complexity, trialability and observability. Migrant businesses adapted goods and services using past education, work, migration and cultural practices. Digital technology becomes marketing innovation, and cultural traits become product and production innovation. Context & entrepreneurs provides information about innovation programs in Brescia with a lack of incentives for foreigners. The geographical dispersion of immigrants and potential local customers generates an intermittent ethnic demand and the survival of businesses at small scale. Connections & entrepreneurs show that similar and diverse networks are needed: the former to develop and test ideas, and the latter to implement and expand them. Migratory experiences contribute to the adaptation of innovative ideas with the influence of similar networks; nonetheless a limited implementation of innovative ideas where the quality of the connections, rather than quantity, matters.
APA, Harvard, Vancouver, ISO, and other styles
2

AKBARITABAR, ALIAKBAR. "QUANTITATIVE SOCIOLOGY OF ACADEMIC WORK IN AN ERA OF HYPERCOMPETITION AND RANKINGS." Doctoral thesis, Università degli Studi di Milano, 2019. http://hdl.handle.net/2434/635951.

Full text
Abstract:
In recent years, higher education institutes have shifted towards managerial organisational models. Some observers see this as a sign of our neoliberal times, with obsession for rankings, performance indicators and resource allocation. The result is that academic work is more competitive nowadays. Rankings and quantitative analysis of research output are more and more crucial for hiring, promotion and funding allocations. Chapter 2 touches upon these themes and suggests the fruitfulness of cross fertilisation between sociology and science studies. To study this hyper-competitive context, we designed a complex research project to answer different questions regarding multi-faceted aspects of the subject. Our main question was to find what factors drive research collaboration and productivity. These factors are helping some researchers be more successful than others in current evaluation based system. We have employed two sets of data to achieve this goal. One national and one international, both considering the case of sociologists. For individual research productivity measurement and to explore correlates of this productivity (Chapter 3) and macro level policy effect analysis (Chapter 4), we reconstructed the full publication list of all currently hired Italian sociologists on available data. We looked into their research productivity and how they have reacted to the ANVUR national policies by taking into account their embeddedness in different academic contexts. Our aim in Chapter 3 was to explain individual research productivity with organisational embeddedness and we found that male scientists, those working more internationally, and those working with a similar group of coauthors were more productive but not necessarily more cited by other members of the community.In Chapter 4, we analysed the effects of the Italian national research assessment exercise (VQR 2004-2010 by ANVUR) on research productivity and publication behavior of sociologists. Results showed that ANVUR had a limited influence on research productivity. Indeed most differences in individual research productivity of Italian sociologists were due to individual characteristics. Academics who experienced a promotion after 2010 were the most prolific authors.To explore the structural and societal effects on research productivity of sociologists in a more competitive arena at the international level, in Chapter 5, we reconstructed gender, background information and coauthorship networks of all published authors in two top sociology journals, i.e., the American Journal of Sociology (AJS) and the American Sociological Review (ASR). We expected that examining the élite of our community could reveal interesting patterns, especially to understand certain implications of the hyper-competitive academic culture. We found that white male authors affiliated to US institutes were over-represented in these journals. We also found that male authors tended to work more in team and found trace of significant gender and ethnicity penalties. In Chapter 6 we looked into research communities formation and evolution through the time among Italian sociologists. We aimed to investigate if being a member of these communities would inspire different patterns of scientific collaboration among Italian sociologists. We used a sophisticated multi-level design by using temporal community detection. We found the two largest and most stable research communities among Italian sociologists who were political and economic sociologists. We further explored the underlying mechanisms and processes of coauthorship tie existence in multi-level exponential random graph models (ERGMs) trying to take individual, community and macro levels into account in one integrated framework. We found that the collaboration ties were mainly driven by research focus while preferential attachment was also at work and highly prolific researchers attracted further coauthorship ties. In Chapter 7, we conclude by emphasising that academic work has changed drastically in 21st century. Scientific collaboration is a multi-faceted phenomenon and any effort at studying it only with one or two approaches or with one observational unit would yield reductionistic results. That was the main reason behind our effort to investigate this phenomenon from different points of views. Finally, in Appendices Chapter, how to access the data and R and Python scripts developed during this research project is described and an Annotated bibliography on different aspects of academic work is provided.
APA, Harvard, Vancouver, ISO, and other styles
3

Nell, Phillip C., Björn Ambos, and Bodo B. Schlegelmilch. "The MNC as an Externally Embedded Organization: An Investigation of Embeddedness Overlap in Local Subsidiary Networks." Elsevier, 2011. http://dx.doi.org/10.1016/j.jwb.2010.10.010.

Full text
Abstract:
MNCs have been conceptualized as differentiated networks that, in turn, are embedded in external networks. Previous research has predominantly focused on the embeddedness of established subsidiaries into their local environment, omitting to shed light on the phenomenon of headquarters linkages to the local context which creates embeddedness overlap. We develop a model of why MNCs develop overlapping linkages to local subsidiary networks even if the subsidiaries have grown out of the initial start-up phase. Using detailed information on 168 European subsidiaries, we find that MNCs build and maintain more overlapping network ties when subsidiaries are high performers, hold important resources, operate in turbulent environments, and are closely connected to multinational actors as opposed to purely domestic firms. (authors' abstract)
APA, Harvard, Vancouver, ISO, and other styles
4

Purdie, Christopher Dennis. "Embedded." The Ohio State University, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=osu1339443969.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vallius, T. (Tero). "An embedded object approach to embedded system development." Doctoral thesis, University of Oulu, 2009. http://urn.fi/urn:isbn:9789514292941.

Full text
Abstract:
Abstract Building an embedded system from an idea to a product is a slow and expensive process requiring a lot of expertise. Depending on the developer’s expertise, the required quantity and price level of the final product, and the time and money available for development, the developer can build a device from different granularity of components, ranging from ready-made platforms, kits, and modules to individual components. Generally, solutions requiring less expertise, time and money produce products with higher production costs. The main contribution of this thesis is the EOC (Embedded Object Concept) and Atomi II Framework. EOC utilizes common object-oriented methods used in software by applying them to small electronic modules, which create complete functional entities. The conceptual idea of the embedded objects is implemented with the Atomi II framework, which contains several techniques for making the EOC a commercially feasible implementation. The EOC and the Atomi II Framework decreases the difficulty level of making embedded systems by enabling a use of ready-made modules to build systems. It enables automatic conversion of a device made from such modules into an integrated PCB, lowering production costs compared to other modular approaches. Furthermore, it also enables an automatic production tester generation due to its modularity. These properties lower the number of skills required for building an embedded system and quicken the path from an idea to a commercially applicable device. A developer can also build custom modules of his own if he possesses the required expertise. The test cases demonstrate the Atomi II Framework techniques in real world applications, and demonstrate the capabilities of Atomi objects. According to our test cases and estimations, an Atomi based device becomes approximately 10% more expensive than a device built from individual components, but saves up to 50% time, making it feasible to manufacture up to 10-50k quantities with this approach.
APA, Harvard, Vancouver, ISO, and other styles
6

Svangård, Bo. "Power management in embedded ARM HW integrated with Embedded Linux." Thesis, Linköpings universitet, Datorteknik, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-63110.

Full text
Abstract:
Today, more and more embedded hardware devices are reaching the market and consumers with a demand for smaller and better devices than yesterday. Increasing the performance of a device decreases the operating time since more power is consumed, still, decreasing the size of the device also decreases operating time as the battery size decreases.To allow the performance to increase and the size of the device to decrease, the designer must nd techniques allowing the hardware to consume less power during normal usage of a device than during the peak usage.In this thesis an implementation of an ARM based microprocessor system is presented and used for measuring and evaluation of the power consumption possibilities of the system.
APA, Harvard, Vancouver, ISO, and other styles
7

Yin, Hang. "Adaptive Embedded Systems." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-10590.

Full text
Abstract:
Modern embedded systems are evolving in the direction of increased adaptivity and complexity. It is extremely important for a system with limited resource to be adaptive in order to maximize its efficiency of resource usage while guaranteeing a high level of fault tolerance and QoS. This report aims at exploring such a kind of system, i.e. Adaptive Embedded System (AES), which is featured by dynamic reconfiguration at runtime. Based on the investigation and analysis of a variety of case studies related with AES, we proposed the conceptual view and overall architecture of an AES by highlighting its predominant characteristics. We also made an incomplete but detailed summary of the most popular techniques that can be used to realize adaptivity. Those techniques are categorized into dynamic CPU/network resource re-allocation and adaptive fault tolerance. A majority of adaptive applications resort to one or more of those techniques. Besides, there is a separate discussion on dynamic reconfiguration and mode switch for AES. Finally, we classify adaptivity into different modeling problems at a higher abstraction level and build UPPAAL models for two different AESs, a smart phone and an object-tracking robot. Our UPPAAL models provide clear demonstration on how a typical AES works.
APA, Harvard, Vancouver, ISO, and other styles
8

Simmons, Alexander V. "Socially embedded insurgencies." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FSimmons.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009.
Thesis Advisor: Gregg, Heather S. Second Reader: Freeman, Michael E. "December 2009." Description based on title screen as viewed on February 1, 2010. Author(s) subject terms: Hezbollah, Hizbullah, Al Qaeda in Iraq, Insurgency, Counterinsurgency, Socially Embedded Insurgent Groups, Social Movement Theory. Includes bibliographical references (p. 67-72). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Gábor, Tomáš. "Návrh embedded systému." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221248.

Full text
Abstract:
This work deals with application of ARM based development board as platform for remote controlling of attached peripherals. It describes practical experiences with A20- OLinuXino-Micro-4GB development board and it’s available options. Used hardware and testing peripherals are described in the next part along with programming of the software for web interface and for communication in between development board and peripherals. The second half of this document describes design process of own embedded system beginning with schematic, continuing with PCB wiring. Each step of PCB wiring process is described with required details in text, including crucial connections between processor and memory chips. The last part contains details about setting a calibration of memory chips and designing optional peripheral modules.
APA, Harvard, Vancouver, ISO, and other styles
10

Петрушенко, Юрій Миколайович, Юрий Николаевич Петрушенко, and Yurii Mykolaiovych Petrushenko. "Cultural embeddedness of production activity." Thesis, Видавництво СумДУ, 2007. http://essuir.sumdu.edu.ua/handle/123456789/8340.

Full text
Abstract:
Most scientists don’t doubt the accepted in social explorations hypothesis that business relations influence ideas and outlook of people. However much less people state the reverse is also true – various cultural aspects form industrial institutions and processes. To the point of view of Amitai Etzion, a founder of the Society for the Advancement of Socio-Economics (SASE), this direction of scientific research is quite promising in terms of findings to explain numerous globalization and transformation processes. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/8340
APA, Harvard, Vancouver, ISO, and other styles
11

Rehman, Faisal. "Heterogeneous Embedded Network Architecture." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2529.

Full text
Abstract:

In this thesis we focused on high performance embedded real-time networks which are designed for systems like radar signalling processing systems, control systems etc. These high performance embedded networks consist of emerging standards like PCI Express, RapidIO, and standard Ethernet. All of these switched embedded networks communicate with each other through common gateway nodes. As these networks have different rate characteristics, maximum packet size (MTU), packet priorities, addressing schemes etc we have therefore defined the gateway nodes for these heterogeneous embedded networks which will allow these heterogeneous embedded networks to communicate with each other with the help of different translation functions. These gateway nodes allow end-to-end transmission across the heterogeneous embedded networks while keeping bound on end-to-end delay and guaranteed throughput. We need to have some flow control mechanism which will shape the traffic flow in the mentioned embedded networks and will avoid from buffer overflow.

APA, Harvard, Vancouver, ISO, and other styles
12

Qin, Zheng. "An Embedded Shading Language." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/1209.

Full text
Abstract:
Modern graphics accelerators have embedded programmable components in the form of vertex and fragment shading units. Current APIs permit specification of the programs for these components using an assembly-language level interface. Compilers for high-level shading languages are available but these read in an external string specification, which can be inconvenient. It is possible, using standard C++, to define an embedded high-level shading language. Such a language can be nearly indistinguishable from a special-purpose shading language, yet permits more direct interaction with the specification of textures and parameters, simplifies implementation, and enables on-the-fly generation, manipulation, and specification of shader programs. An embedded shading language also permits the lifting of C++ host language type, modularity, and scoping constructs into the shading language without any additional implementation effort.
APA, Harvard, Vancouver, ISO, and other styles
13

Östmark, Åke. "Embedded Internet System Architectures /." Luleå, 2004. http://epubl.luth.se/1402-1757/2004/37.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Bergersen, Erik. "Embedded Unit Testing Framework." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for datateknikk og informasjonsvitenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-22986.

Full text
Abstract:
This thesis addresses the challenges with unit testing of embedded software. Embedded software uses peripheral devices that are not available during testing, which results in higher barriers to use unit testing, compared to normal software. But even with these barriers there are no problems with unit testing of embedded software. The study looks at challenges with unit testing of Energy Micros software library, and solutions to the problems with automated testing of embedded software. Use of automated testing will reduce the number of errors when code is refactored. Use of unit testing will also make it possible to take advantage of agile methods like test-driven development. The main goals for the study is to see if CMock is suitable for generation of mock modules and if testing with mock modules can reduce the number of errors in software.Unity is a test harness that supports the needed assertions for testing of embedded software. CMock is able to automatic generate mock modules, but has a few problems with inline functions and custom types, but it is possible to solve these problems. Even with these problems CMock is able to generate mock modules that is working, and supports the testing of embedded software.An experiment was performed to see if testing of embedded software with mock modules could reduce the number of errors. The result was significant and showed that the number of errors was reduced by using mock modules, compared development without testing. Observations were also done during the experiment, which found some problems with use of mock modules during testing. The experiment was done by undergraduate students in computer science.Use of unit test and mock modules as a substitute for hardware during automated testing on a native computer, it is possible to reduce the numbers of errors and refactor code without breaking the existing functionality.
APA, Harvard, Vancouver, ISO, and other styles
15

Huang, Qiang. "Distributed embedded control system." Thesis, University of Liverpool, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.400230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Potts, Gareth Richard. "Towards the embedded university?" Thesis, University of Reading, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.297675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Zhao, Fanzhou. "Embedded blade row flutter." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/51151.

Full text
Abstract:
Modern gas turbine design continues to drive towards improved performance, reduced weight and reduced cost. This trend of aero-engine design results in thinned blade aerofoils which are more prone to aeroelastic problems such as flutter. Whilst extensive work has been conducted to study the flutter of isolated turbomachinery blades, the number of research concerning the unsteady interactions between the blade vibration, the resulting acoustic reflections and flutter is very limited. In this thesis, the flutter of such embedded blade rows is studied to gain understanding as for why and how such interactions can result in flutter. It is shown that this type of flutter instability can occur for single stage fan blades and multi-stage core compressors. Unsteady CFD computations are carried out to study the influence of acoustic reflections from the intake on flutter of a fan blade. It is shown that the accurate prediction of flutter boundary for a fan blade requires modelling of the intake. Different intakes can produce different flutter boundaries for the same fan blade and the resulting flutter boundary is a function of the intake geometry in front of it. The above finding, which has also been demonstrated experimentally, is a result of acoustic reflections from the intake. Through in-depth post-processing of the results obtained from wave-splitting of the unsteady CFD solutions, the relationship between the phase and amplitude of the reflected acoustic waves and flutter stability of the blade is established. By using an analytical approach to calculate the propagation and reflection of acoustic waves in the intake, a novel low- fidelity model capable of evaluating the susceptibility of a fan blade to flutter is proposed. The proposed model works in a similar fashion to the Campbell diagram, which allows one to identify the region (in compressor map) where flutter is likely to occur at early design stages of an engine. In the second part of this thesis, the influence of acoustic reflections from adjacent blade rows on flutter stability of an embedded rotor in a multi-stage compressor is studied using unsteady CFD computations. It is shown that reflections of acoustic waves, generated by the rotor blade vibration, from the adjacent blade rows have a significant impact on the flutter stability of the embedded rotor, and the computations using the isolated rotor can lead to significant over-optimistic predictions of the flutter boundary. Based on the understanding gained, an alternative strategy, aiming to reduce the computational cost, for the flutter analysis of such embedded blades is proposed. The method works by modelling the propagation and reflection of acoustic waves at the adjacent blade rows using an analytical method, whereby flutter computations of the embedded rotor can be performed in an isolated fashion by imposing the calculated reflected waves as unsteady plane sources. Computations using the proposed model can lead to two orders of magnitude reduction in computational cost compared with time domain full annulus multi-row computations. The computed results using the developed low-fidelity model show good correlation with the results obtained using full annulus multi-row models.
APA, Harvard, Vancouver, ISO, and other styles
18

Chaffin, Jason Edward. "The Embedded American Artist." ScholarWorks@UNO, 2010. http://scholarworks.uno.edu/td/1162.

Full text
Abstract:
As our world ramps up the speed of its connections, our identities merge with increasing speed and angles of confluence. Not only are new identities created, but also the more fringe social and cultural elements of our world are exposed to mainstream consciousness. My work is a product of my own fringe background (namely its sheer breadth of experiences not normally visited upon a single person's life). My aim is to add variables to our social and cultural speed of combination and new variety by creating work that is derived from my own experiences to speak to those who are of the newer combinations and newer social recognition. I am motivated to create this work both to perpetually define and redefine myself, and also to give ground to an ‘identity of no identity' on a global scale, to our artistic dialogue and catalog.
APA, Harvard, Vancouver, ISO, and other styles
19

Ordonez-Delgado, Bartleby. "An Embedded Toeplitz Problem." Diss., Virginia Tech, 2010. http://hdl.handle.net/10919/29007.

Full text
Abstract:
In this work we investigate multi-variable Toeplitz operators and their relationship with KK-theory in order to apply this relationship to define and analyze embedded Toeplitz problems. In particular, we study the embedded Toeplitz problem of the unit disk into the unit ball in C^2. The embedding of Toeplitz problems suggests a way to define Toeplitz operators over singular spaces.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
20

Zeppettella, David L. "Structurally Integrated Embedded System." University of Dayton / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1324051784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Novotný, Václav. "Rozpoznání displeje embedded zařízení." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376924.

Full text
Abstract:
This master thesis deals with usage of machine learning methods in computer vision for classification of unknown images. The first part contains research of available machine learning methods, their limitations and also their suitability for this task. The second part describes the processes of creating training and testing gallery. In the practical part, the solution for the problem is proposed and later realised and implemented. Proper testing and evaluation of resulting system is conducted.
APA, Harvard, Vancouver, ISO, and other styles
22

Li, Xueheng. "The socially embedded individual." Thesis, University of Nottingham, 2018. http://eprints.nottingham.ac.uk/51300/.

Full text
Abstract:
This thesis contains three studies. They are connected by the idea that "no man is an island": each individual contributes to shaping, and is constrained by, the social and economic structures of the organization or the society that the individual is embedded in. The first study, Chapter 2, examines optimal networks with weighted and directed links under complementarities. A group of agents take actions that are endogenously determined by which network the planner implements. Complementarities mean that the best-response action of each agent is increasing in the actions of those who have a link with positive weight pointing to the agent (representing the direction and intensity of influence). Optimal networks are those maximizing the planner's objective function which is an increasing function in the effort of each agent, subject to the constraint that the total weight of the links of the network does not exceed a certain level. The agents' best-response function and the planner's objective function can be convex or concave. We show that every optimal network exhibits dramatic concentration of influence so that a very small number of agents impose significant impact on the productivity of the whole organization. The second study, Chapter 3, investigates how cooperative norms emerge and evolve over time. I construct a stochastic dynamic model based on the idea that cooperation in one-shot interactions is sustained by endogenous social norms. The model shows how cooperation and punishment of defectors co-evolve. It reveals the conditions under which cooperation emerges and persists in the long run. In particular, recent empirical studies find that cooperation in one-shot interactions is positively correlated with law enforcement across societies, and that cooperation is higher in large, modern societies with higher degrees of market integration compared to small-scale societies. I extend the model to explain these regularities. I show that the ability to “vote with feet” is the key to understanding the difference in cooperation between small-scale societies and large, modern societies. The third study, Chapter 4, is an experimental project, a joint work with Lucas Molleman and Dennie van Dolder. Previous studies suggest that whether individuals perceive a behavior as fair depends on its frequency in the population. Using a prisoner's dilemma game, we test experimentally whether informing individuals of a higher proportion of cooperators in the population affects the fairness perception about free riding and changes individuals' punishment of free riders. Different from previous studies, we use the strategy method to obtain each participant's complete punishment strategy. We find a remarkable heterogeneity among participants: some participants increase punishment of free riders as the proportion of cooperators increases, suggesting that they consider free riding to be more unfair when more cooperators are around; yet, many others punish independently of the proportion of cooperators. We show that the heterogeneity cannot be captured by any single existing theory.
APA, Harvard, Vancouver, ISO, and other styles
23

Gibson, Trish J. "Embedded in These Walls." VCU Scholars Compass, 2018. https://scholarscompass.vcu.edu/etd/5642.

Full text
Abstract:
Embedded In These Walls uses photographic imagery, archival ephemera, and written text to examine a specific history of generational trauma through the lens of a singular family of a southern tradition to point to a larger systemic breakdown of accountability and truthfulness regarding abuse
APA, Harvard, Vancouver, ISO, and other styles
24

Stejskal, Tomáš. "Hlukoměr pro embedded systémy." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-220380.

Full text
Abstract:
The aim of this work is the design and implementation of a sound level meter for emdedded systems. It is designed sound level meter sensor. This sensor includes a microphone, microphone preamplifier and ADC. This sensor is connected to a development kit STM32F4 Discovery, where sound is processed. It is processed filtration, time weighting, calculation of sound leve and loudness weighting. The sound level is then sent via the serial communication USART. This thesis includes a theoretical analysis of noise and its human perceptions. It also describes the development platform used.
APA, Harvard, Vancouver, ISO, and other styles
25

Freitag, Melissa E. "Gender Differences in the Relationship Between Gang Sex Composition, Organization and Offending: Understanding the Role of Behavioral and Psychological Embeddedness." Bowling Green State University / OhioLINK, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1491390460994149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Vincent, Tonja S. "From Epistolary Form to Embedded Narratological Device: Embedded Epistles in Austen and Scott." BYU ScholarsArchive, 2016. https://scholarsarchive.byu.edu/etd/6444.

Full text
Abstract:
The perception that the epistolary form was rejected by novelists during the Romantic Era has largely been accepted by scholars. However, in looking at the period's two most prominent authors, Walter Scott and Jane Austen, we see that the epistolary form remained vibrant long after its supposed demise. Throughout their careers, both Austen and Scott employed embedded letters as a tool to create authenticity. Both Austen and Scott use what I call "literary letters" to create a sense of realism in their novels that contributed to the rise of the novel. Scholars often claim that Austen eschewed the epistolary form with Lady Susan and solidified her rejection by revising both Sense and Sensibility and Pride and Prejudice from epistolary novels to third person narration. But a careful examination shows that Austen followed Richardson's tradition with Lady Susan, that Sense and Sensibility was not originally written in epistolary form, and that Austen retained sixteen critical letters in Pride and Prejudice. In fact, Darcy's five-page letter to Elizabeth signals Austen's continued reliance on the form as it completely changes the dynamics of the novel and transforms Elizabeth from a static protagonist to a dynamic heroine. Further indication that Austen found value in the form is seen in her later and often considered more mature novels, Emma and Persuasion, where she found innovate ways to turn the epistolary form into an embedded narratological device. The value of letters in Scott's novels is often overlooked. For instance in Heart of Midlothian, Jeanie Down's claim that letters cannot feel is often cited as an argument that oral testimony is more valuable than written, yet it is a letter that ultimately gets her an audience with the queen. In fact, in both Heart of Midlothian and Redgauntlet, Scott explains the legal implications of the written testimony, its preference over oral testimony, and its power in persuading both in and out of court. And in Guy Mannering, Scott relies on embedded letters to develop important plot points including the identity of the lost heir, create believable characters, and explore the conflict between Scottish traditions and law. And although Redgauntlet is often considered the moment Scott eschewed the epistolary form, the way he employs letters to create the illusion that his characters are authentic historical figures helps him explore notions of national identity.
APA, Harvard, Vancouver, ISO, and other styles
27

Gaboriau-Couanau, Clément. "Security of Embedded Software : An Analysis of Embedded Software Vulnerabilities and Related Security Solutions." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215703.

Full text
Abstract:
The increased use of computer systems for storing private data or doing critical operations leads to some security issues gathered in the area cybersecurity. This neologism leads people to think about the security of information systems and general-purpose computers. However, with the growth of the Internet of Things, embedded systems are also concerned with these issues. The speed of development of this area often leads to a backwardness in the security features. The thesis investigates the security of embedded systems by focusing on embedded software. After classifying the vulnerabilities which could be encountered in this field, a first part of this work introduces the realisation of a document gathering guidelines related to secure development of embedded software. This realisation is based on an analysis of the literature review, but also on the knowledge of engineers of the company. These guidelines are applied to the project of a client. The result of their application allows us to prove their consistency and to write a set of recommendations to enhance the security of the project. The thesis presents the implementation of some of them. Particularly, it introduces a way to secure an Inter-Process Communication (IPC) mean: D-Bus, through a proof of concept. The result shows that the security policy of D-Bus is efficient against some attacks. Nevertheless, it also points out that some att acks remain feasible. The solution is implemented on an embedded board to analyse the computational overhead related to this embedded aspect. As expected, a more complex and detailed a policy is, the higher the overhead tends to be. Nevertheless, this computational overhead is proportional to the number of rules of the policy.
Den ökade användningen av datorsystem för att lagra privata data eller göra kritiska operationer leder till vissa säkerhetsproblem som samlas i området cybersäkerhet. Denna neologism leder människor att tänka på säkerhetssystemen för informationssystem och allmänt tillgängliga datorer. Men med tillväxten av saker i saken är inbyggda system också berörda av dessa frågor. Utvecklingshastigheten för detta område leder ofta till en underutveckling säkerhetsfunktionerna.Avhandlingen undersöker säkerheten för inbyggda system genom att fokusera på inbyggd programvara. Efter att ha klassificerat de sårbarheter som kan uppstå i det här fältet introducerar en första del av det här arbetet realisationen av ett dokument av riktlinjer om säker utveckling av inbyggd programvara. Denna insikt bygger på en analys av litteraturgranskningen, men också på kunskap om ingenjörer i företaget. Dessa riktlinjer tillämpas på en kunds projekt.Resultatet av deras ansökan gör det möjligt för oss att bevisa deras konsistens och att skriva rekommendationer för att förbättra projektets säkerhet. Avhandlingen presenterar genomförandet av några av dem. Ett sätt införs särskilt patt säkra en interprocesskommunikation (IPC) menande: DBus, genom ett konceptbevis. Resultatet visar att D-Busens säkerhetspolitik är effektiv mot vissa attacker. Det påpekar emellertid också att vissa attacker fortfarande är möjliga. Lösningen implementeras på ett inbyggd kort för att analysera beräkningsoverhead som är relaterad till denna inbyggda aspekt. Som förväntat är en mer komplex och detaljerad politik, desto högr e överhuvudtaget tenderar att vara. Ändå är denna beräkningskostnad proportionell mot antalet av regler av säkerhetspolitiken.
APA, Harvard, Vancouver, ISO, and other styles
28

Rumelioglu, Sertac. "Evaluation of Embedded Firewall System." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FRumelioglu.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Dyer, Matthias. "Distributed embedded systems : validation strategies /." Aachen : Shaker Verlag, 2007. http://e-collection.ethbib.ethz.ch/show?type=diss&nr=17189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lessner, Dirk. "Network security for embedded systems /." [St. Lucia, Qld.], 2005. http://adt.library.uq.edu.au/public/adt-QU20060215.160952/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Schmidt, Eike. "Power modeling of embedded memories." [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=967514649.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Tewatia, Rohit. "Security in Distributed Embedded Systems." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-1379.

Full text
Abstract:

Communication in a sensor network needs guaranteed reception of data without fail and providing security to it. The authenticity and confidentiality of the data has to be ensured as sensors have limited hardware resources as well as the bandwidth. This thesis addresses the security aspects in wireless sensor networks. The main task of the project is to identify the critical security parameters for these distributed embedded systems. The sensors have extremely limited resources: small amount of memory, low computation capability and poor bandwidth. For example, a sensor platform can have 8KB of flash memory, a 4MHz 8-bit Atmel processor, and a 900MHz radio interface. Various security threats posed to these small wireless sensor networks has been made and solutions proposed. Secure communication between these communicating partners is to be achieved using cryptography.

APA, Harvard, Vancouver, ISO, and other styles
33

Gong, Shaojie, and Zhongping Deng. "Benchmarks for Embedded Multi-processors." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-660.

Full text
Abstract:

During the recent years, computer performance has increased dramatically. To measure

the performance of computers, benchmarks are ideal tools. Benchmarks exist in many

areas and point to different applications. For instance, in a normal PC, benchmarks can be

used to test the performance of the whole system which includes the CPU, graphic card,

memory system, etc. For multiprocessor systems, there also exist open source benchmark

programs. In our project, we gathered information about some open benchmark programs

and investigated their applicability for evaluating embedded multiprocessor systems

intended for radar signal processing. During our investigation, parallel cluster systems

and embedded multiprocessor systems were studied. Two benchmark programs, HPL and

NAS Parallel Benchmark were identified as particularly relevant for the application field.

The benchmark testing was done on a parallel cluster system which has an architecture

that is similar to the architecture of embedded multiprocessor systems, used for radar

signal processing.

APA, Harvard, Vancouver, ISO, and other styles
34

Larsen, Jarle. "Embedded demonstrator for audio manipulation." Thesis, Norwegian University of Science and Technology, Department of Electronics and Telecommunications, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10959.

Full text
Abstract:
Demonstration of embedded systems is a good way to motivate and recruit students to a future career in electronics. For Department of Electronics and Telecommunication at the Norwegian University of Science and Technology (NTNU), it is thus desirable to have an embedded demonstrator that gives the pupils an insight in what is actually possible when studying electronics at the university, a system that the department may present at different occasions. A good embedded demonstrator provides an interesting presentation of one or more topics related to electronics, and should be presented together with relevant theory in order to provide a level of education to the user.This report covers the implementation of an embedded demonstrator for audio manipulation on Altera's DE2 development and education board. The system is specified to demonstrate signal processing subjects like sampling and filtering through manipulation of analog audio signals. The main modules in the system are the Cyclone II 2C35 FPGA from Altera, running a Nios II soft-CPU, and a Wolfson WM8731 audio-codec. The specification of their operation is made with background in pedagogics theory in order to make the most interesting demonstration. To realize this specification, the system incorporates several design features for both activation and motivation of the user.The audio manipulator provides possibilities for comparison between different sample rates and filter characteristics in real-time operation. This makes the system well suited for practical demonstration of signal processing theory. Due to the presentation of perceivable results, in addition to the implementation of a user interface for interaction, the implemented audio demonstrator is considered to be a well suited platform for demonstration of topics related to electronics.
APA, Harvard, Vancouver, ISO, and other styles
35

Stein, Alexander. "Porting DotGNU to Embedded Linux." Master's thesis, Universitätsbibliothek Chemnitz, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-66724.

Full text
Abstract:
Programming PLC systems is limited by the provided libraries. In contrary, hardware-near programming needs bigger efforts in e. g. initializing the hardware. This work others a foundation to combine advantages of both development sides. Therefore, Portable.NET from the DotGNU project has been used, which is an implementation of CLI, better known as “.NET”. The target system is the PLCcore-5484 microcontroller board, developed by SYS TEC electronic GmbH. Built upon the porting, two variants to use interrupt routines withing the Portabe.NET runtime environment have been analyzed. Finally, the reaction times to occuring interrupt events have been examined and compared
Die Programmierung für SPS-Systeme ist durch die gegebenen Bibliotheken beschränkt, während hardwarenahe Programmierung einen größeren Aufwand durch z.B. Initialisierungen hat. Diese Arbeit bietet eine Grundlage, um die Vorteile beider Entwicklungsseiten zu kombinieren. Dafür wurde Portable.NET des DotGNU-Projekts, eine Implementierung des CLI, bekannter unter dem Namen “.NET”, benutzt. Das Zielsystem ist das PLCcore-5484 Mikrocontrollerboard der SYS TEC electronic GmbH. Aufbauend auf der Portierung wurden zwei Varianten zur Einbindung von Interrupt-Routinen in die Portable.NET Laufzeitumgebung untersucht. Abschließend wurden die Reaktionszeiten zu eintretenden Interrupts analysiert und verglichen
APA, Harvard, Vancouver, ISO, and other styles
36

Wilund, Torbjörn. "Robust Distributed Embedded Systems : Communication." Thesis, KTH, Maskinkonstruktion (Inst.), 2006. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-100998.

Full text
Abstract:
Detta examensarbete diskuterar i sin teoretiska del vad begreppet robusthet betyder för distribuerade inbyggda system. Utvecklingen går idag generellt emot att byta mekaniska och elektriska lösningar mot mekatroniska styrsystem. Det finns sedan mycket att vinna på att göra dessa inbyggda styrsystem distribuerade, bland annat beroende på oberoende mellan noder för intern övervakning och feldetektering. Delresultatet om robusthet säger att det beror på integritet för att uppnå tillgänglighet och tillförlitlighet, det vill säga att informationen är den samma i alla berörda noder. Tillförlitligheten beror på hur fel i tid och värde hanteras under systemexekvering. Informationen skyddas i samtliga undersökta protokoll genom redundans av diverse algoritmer, exempelvis CRC vilket ger möjlighet till feldetektering. Skillnad finns dock i hur tidssynkronisering hanteras om det ens finns hantering av för detta. Ur detta perspektiv är endast tidsstyrda nätverksprotokoll av nuvarande alternativ mest tekniskt lämpliga. Den praktiska delen försöker utvärdera GAST levererad hårdvara. Arbetet med att få igång någon kommunikation på TTP/C misslyckades, detta beroende på brister i den sammansatta plattformen. Mer specifikt beror detta troligtvis på konstruktionsfel i det fysiska lagret av plattformen. Med valt bakplan blir ej signalerna som förväntat vilket gör att informationen tolkas fel av externa kommunikations kretsar. Därför rekommenderas närmare analys av signalen i databussen och eventuell konstruktion av ett filter till bakplanet om nuvarande hopsättning skall användas. Plattformen har med sin öppenhet en framtid för utveckling och forskning kring distribuerade inbyggda system, dock saknas färdiga drivrutiner för de i plattformen integrerade protokollen. Detta är något som måste åtgärdas ifall plattformen skall få någon form av betydelse innan tekniken är för gammal. Undersökningen av den TTP Plan genererade koden visar att det går att extrahera information från verktyget och på så sätt utnyttja verktyget för konfiguration. För att detta skall fungera bör man tillverka någon form av verktyg för detta.
This thesis tries in its theoretical part to discuss what the term of robustness means for distributed embedded systems. Development of today generally tries to exchange mechanical and electrical solutions for embedded control systems. There are a lot of benefits to gain by designing in a distributed way, this due to internal independencies between nodes for monitoring and error detection. The outcome about robustness suggests that it depends on integrity to achieve availability and reliability, or loss of alternations of information in the different nodes in the distributed system. Reliability depends on how faults in terms of time and value are treated during execution. All studied network protocols have protection of information by different redundancy algorithms such as CRC, which gives the opportunity for fault and error detection. However there are differences in how time is handled, if there is any time handling, and possibility for time synchronization in the hardware. From this perspective the best alternatives are time triggered architectures of current technology. The experimental part tries to evaluate the GAST delivered platform. The work to achieve communication on TTP/C controllers failed due to shortage in the assembled platform. More specifically this is probably the case of bugs in the design of the physical layer of the GAST hardware (not the TTP controllers themselves). By use of recommended backplane, the sent signals are not appearing as expected, and information sent is misinterpreted by external communication devices. A suggestion and recommendation for future work is analysis of the signal in the data bus, and possible design of a filter if current assembly shall be used. The platform has a future for development and research in the field of distributed embedded systems due to its openness, however there is a lack of drivers for the platform integrated network protocols. This must be attended if the platform shall have any significance. The evaluation of TTP Plan generated code shows, that there are possibilities to extract configuration information form tool for configuration of platform. To achieve this some kind of extraction script must be developed.
APA, Harvard, Vancouver, ISO, and other styles
37

Dasarathan, Dinesh. "Benchmark Characterization of Embedded Processors." NCSU, 2005. http://www.lib.ncsu.edu/theses/available/etd-05152005-170108/.

Full text
Abstract:
The design of a processor is an iterative process, with many cycles of simulation, performance analysis and subsequent changes. The inputs to these cycles of simulations are generally a selected subset of standard benchmarks. To aid in reducing the number of cycles involved in design, one can characterize these selected benchmarks and use those characteristics to hit at a good initial design that will converge faster. Methods and systems to characterize benchmarks for normal processors are designed and implemented. This thesis extends these approaches and defines an abstract system to characterize benchmarks for embedded processors, taking into consideration the architectural requirements, power constraints and code compressibility. To demonstrate this method, around 25 benchmarks are characterized (10 from SPEC, and 15 from standard embedded benchmark suites - Mediabench and Netbench), and compared. Moreover, the similarities between these benchmarks are also analyzed and presented.
APA, Harvard, Vancouver, ISO, and other styles
38

Kianzad, Vida. "System synthesis for embedded multiprocessors." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3471.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2006.
Thesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
39

Eldh, Erik. "Cloud connectivity for embedded systems." Thesis, KTH, Kommunikationssystem, CoS, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-118746.

Full text
Abstract:
Deploying an embedded system to act as a controller for electronics is not new.  Today these kinds of systems are all around us and are used for a multitude of purposes. In contrast, cloud computing is a relatively new approach for computing as a whole. This thesis project explores these two technologies in order to create a bridge between these two wildly different platforms. Such a bridge should enable new ways of exposing features and doing maintenance on embedded devices. This could save companies not only time and money while dealing with maintenance tasks for embedded systems, but this should also avoid the needed to host this maintenance software on dedicated servers – rather these tasks could use cloud resources only when needed. This thesis explores such a bridge and presents techniques suitable for joining these two computing paradigms together. Exploring what is included in cloud computing by examining available technologies for deployment is important to be able to get a picture of what the market has to offer. More importantly is how such a deployment can be done and what the benefits are. How technologies such as databases, load-balancers, and computing environments have been adapted to a cloud environment and what draw-backs and new features are available in this environment are of interest and how a solution can exploit these features in a real-world scenario.  Three different cloud providers and their products have been presented in order to create an overview of the current offerings.  In order to realize a solution a way of communicating and exchanging data is presented and discussed. Again to realize the concept in a real-world scenario. This thesis presents the concept of cloud connectivity for embedded systems. Following this the thesis describes a prototype of how such a solution could be realized and utilized. The thesis evaluates current cloud providers in terms of the requirements of the prototype. A middle-ware solution drawing strengths from the services offered by cloud vendors for deployment at a vendor is proposed. This middle-ware acts in a stateless manner to provide communication and bridging of functionality between two parties with different capabilities. This approach creates a flexible common ground for end-user clients and reduces the burden of having the embedded systems themselves process and distribute information to the clients.  The solution also provides and abstraction of the embedded systems further securing the communication with the systems by it only being enabled for valid middle-ware services.
Att använda ett inbyggt system som en kontrollenhet för elektronik är inget nytt. Dessa typer av system finns idag överallt och används i vidt spridda användningsområden medans datormolnet är en ny approach för dator användning i sin helhet. Utforska och skapa en länk mellan dessa två mycket olika platformar för att facilitera nya tillvägagångs sätt att sköta underhåll sparar företag inte tid och pengar när det kommer till inbyggda system utan också när det gäller driften för servrar. Denna examensarbete utforskar denna typ av länk och presenterar för endamålet lämpliga tekniker att koppla dem samman medans lämpligheten för en sådan lösning diskuteras. Att utforska det som inkluderas i konceptet molnet genom att undersöka tillgängliga teknologier för utveckling är viktigt för att få en bild av vad marknaden har att erbjuda. Mer viktigt är hur utveckling går till och vilka fördelarna är. Hur teknologoier som databaser, last distrubutörer och server miljöer har adapterats till molnmiljön och vilka nackdelar och fördelar som kommit ut av detta är av intresse och vidare hur en lösning kan använda sig av dessa fördelar i ett verkliget scenario. Tre olika moln leverantörer och deras produkter har presenterats för att ge en bild av vad som för tillfället erbjuds. För att realisera en lösning har ett sett att kommunicera och utbyta data presenterats och diskuterats. Åter igen för att realisera konceptet i ett verkligt scenario. Denna uppsats presenterar konceptet moln anslutbarhet för inbyggda system för att kunna få en lösning realiserad och använd. En mellanprograms lösning som drar styrka ifrån de tjänster som erbjudas av molnleverantörer för driftsättning hos en leverantor föreslås. Denna mellanprogramslösnings agerar tillståndslöst för att erbjuda kommunikation och funktions sammankoppling mellan de två olika deltagarna som har olika förutsätningar. Denna approach skapar en flexibel gemensam plattform för olika klienter hos slutanvändaren och minskar bördan hos de inbyggdasystemet att behöva göra analyser och distrubuera informationen till klienterna. Denna lösning erbjuder också en abstraktion av de inbyggdasystemen för att erbjuda ytterligare säkerhet när kommunikation sker med de inbyggdasystemet genom att den endast sker med giltiga mellanprogram.
APA, Harvard, Vancouver, ISO, and other styles
40

Swere, Erick A. R. "Machine learning in embedded systems." Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/4969.

Full text
Abstract:
This thesis describes novel machine learning techniques specifically designed for use in real-time embedded systems. The techniques directly address three major requirements of such learning systems. Firstly, learning must be capable of being achieved incrementally, since many applications do not have a representative training set available at the outset. Secondly, to guarantee real-time performance, the techniques must be able to operate within a deterministic and limited time bound. Thirdly, the memory requirement must be limited and known a priori to ensure the limited memory available to hold data in embedded systems will not be exceeded. The work described here has three principal contributions. The frequency table is a data structure specifically designed to reduce the memory requirements of incremental learning in embedded systems. The frequency table facilitates a compact representation of received data that is sufficient for decision tree generation. The frequency table decision tree (FTDT) learning method provides classification performance similar to existing decision tree approaches, but extends these to incremental learning while substantially reducing memory usage for practical problems. The incremental decision path (IDP) method is able to efficiently induce, from the frequency table of observations, the path through a decision tree that is necessary for the classification of a single instance. The classification performance of IDP is equivalent to that of existing decision tree algorithms, but since IDP allows the maximum number of partial decision tree nodes to be determined prior to the generation of the path, both the memory requirement and the execution time are deterministic. In this work, the viability of the techniques is demonstrated through application to realtime mobile robot navigation.
APA, Harvard, Vancouver, ISO, and other styles
41

Schmidgall, Ralf. "Automotive embedded systems software reprogramming." Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/7070.

Full text
Abstract:
The exponential growth of computer power is no longer limited to stand alone computing systems but applies to all areas of commercial embedded computing systems. The ongoing rapid growth in intelligent embedded systems is visible in the commercial automotive area, where a modern car today implements up to 80 different electronic control units (ECUs) and their total memory size has been increased to several hundreds of megabyte. This growth in the commercial mass production world has led to new challenges, even within the automotive industry but also in other business areas where cost pressure is high. The need to drive cost down means that every cent spent on recurring engineering costs needs to be justified. A conflict between functional requirements (functionality, system reliability, production and manufacturing aspects etc.), testing and maintainability aspects is given. Software reprogramming, as a key issue within the automotive industry, solve that given conflict partly in the past. Software Reprogramming for in-field service and maintenance in the after sales markets provides a strong method to fix previously not identified software errors. But the increasing software sizes and therefore the increasing software reprogramming times will reduce the benefits. Especially if ECU’s software size growth faster than vehicle’s onboard infrastructure can be adjusted. The thesis result enables cost prediction of embedded systems’ software reprogramming by generating an effective and reliable model for reprogramming time for different existing and new technologies. This model and additional research results contribute to a timeline for short term, mid term and long term solutions which will solve the currently given problems as well as future challenges, especially for the automotive industry but also for all other business areas where cost pressure is high and software reprogramming is a key issue during products life cycle.
APA, Harvard, Vancouver, ISO, and other styles
42

Groufsky, Michael Edward. "An embedded augmented reality system." Thesis, University of Canterbury. Electrical and Computer Engineer, 2011. http://hdl.handle.net/10092/6259.

Full text
Abstract:
This report describes an embedded system designed to support the development of embedded augmented reality applications. It includes an integrated camera and built-in graphics acceleration hardware. An example augmented reality application serves as a demonstration of how these features are accessed, as well as providing an indication of the performance of the device. The embedded augmented reality development platform consists of the Gumstix Overo computer-on-module paired with the custom-built Overocam camera board. This device offers an ARM Cortex-A8 CPU running at 600 MHZ and 256 MB of RAM, along with the ability to capture VGA video at 30 frames per second. The device runs an operating system based on version 2.6.33 of the Linux kernel. The main feature of the device is the OMAP3530 multimedia applications processor from Texas Instruments. In addition to the ARM CPU, it provides an on-board 2D/3D graphics accelerator and a digital signal processor. It also includes a built-in camera peripheral interface, reducing the complexity of the camera board design. A working example of an augmented reality application is included as a demonstration of the device's capabilities. The application was designed to represent a basic augmented reality task: tracking a single marker and rendering a simple virtual object. It runs at around 8 frames per second when a marker is visible and 13 frames per second otherwise. The result of the project is a self-contained computing platform for vision-based augmented reality. It may either be used as-is or customised with additional hardware peripherals, depending on the requirements of the developer.
APA, Harvard, Vancouver, ISO, and other styles
43

Conner, Stephen J. "Distributed dispatching for embedded generation." Thesis, University of Strathclyde, 2003. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21513.

Full text
Abstract:
Electrical power systems are currently moving towards distributed generation, using many small generators instead of a few large ones. This can potentially produce great improvements in efficiency, by allowing utilisation of waste heat (cogeneration). However, it also poses new problems of control and co-ordination of large numbers of generators, which may be connected deep within the distribution network. It is well known that existing schemes for planning, dispatching and protection of central generators are not directly applicable to the new technology, and dispatching (scheduling) of small embedded generators is not currently feasible. In this work, a novel dispatching management system which may meet this requirement is proposed. Instead of using a single control centre, it distributes dispatching functions throughout the network. Some functions are performed by controllers and software agents built into the embedded generators themselves, and others handled by dispatcher software associated with a group of generators and loads. The dispatcher operates a small virtual market where energy can be traded between agents representing: generators, loads, network functions (AVR etc), and other dispatchers. This allows multiple dispatchers to be interconnected, so potentially dealing with very large numbers of generators. To test this concept, some prototype agents, a basic dispatcher, and means of communication were created, in the form of programs on a desktop computer. The "REDMan" suite of software achieved successful trading of energy in a simulated environment. This motivated a more advanced trial where REDMan was developed further and used for experimental dispatching of real generating equipment and loads. Construction and assembly of the experimental apparatus, interfacing of hardware to the computer environment, experiments and results are presented and discussed here. The experimental system was dispatched in a satisfactory manner, and much practical experience was gained in the issues relating to dispatching of EG. Several possible avenues for further research were identified.
APA, Harvard, Vancouver, ISO, and other styles
44

von, Hacht Karl-Johan. "Garden Monitoring with Embedded Systems." Thesis, Linköpings universitet, Datorteknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120706.

Full text
Abstract:
In today’s modern society the process of handling crops in an accountable way withoutloss have become more and more important. By letting a gardener evaluate the progressof his plants from relevant data one can reduce these losses and increase effectiveness ofthe whole plantation. This work is about the construction of such a system composedfrom a developers perspective of three different platforms, from the start of data samplingwithin the context of gardening to and end user easily able to understand the data thentranslated. The first platform will be created from scratch with both hardware andsoftware, the next assembled from already finished hardware components and build withsimpler software. The last will essentially only be a software solution in an alreadyfinished hardware environment.
APA, Harvard, Vancouver, ISO, and other styles
45

Ghamari, Mohammad. "Reliable communication in embedded systems." Thesis, Lancaster University, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.663247.

Full text
Abstract:
Embedded computer systems equipped with wireless communication transceivers are nowadays used in a vast number of application scenarios. Energy consumption is important in many of these scenarios as systems are battery operated and long maintenance free operation is required. To achieve this goal, embedded systems employ low-power communication transceivers and protocols. However, currently used protocols cannot operate efficiently when communication channels are highly erroneous. In many application scenarios, we find this characteristic that a large numbers of transmitted packets maybe lost or received corrupted. This work aims to provide solutions to this particular problem. This thesis focuses on one particular class of low-power MAC protocols in embedded systems and investigates its transmission reliability through erroneous channels. Subsequently, this thesis presents a number of techniques which ameliorate the transmission reliability in conjunction with energy efficiency of existing low-power MAC protocols simultaneously in erroneous channels. In this thesis, average diversity combining (ADC) is applied in low-power MAC protocols to ensure that the received corrupted packets can be used to contribute in decoding process. This thesis demonstrates that how ADC is integrated with low-power MAC protocols. It is also shown that the integrated method improves low-power Communication dramatically. The integrated method always reduces the frame error rate; in some investigated scenarios frame error rates are reduced from 20.85% to 1.25%. Furthermore we have shown that the ADC mechanism can be implemented on existing systems without significant impact on system performance. In addition, transmit/receive diversity along with error correction technique is also applied in existing low-power MAC protocols such that high losses of transmitted packets are preventable. This work demonstrates how transmit/receive diversity along with error correction technique is integrated with low-power MAC protocols. It is illustrated that the integrated scheme prevents high losses of transmitted packets. Subsequently, in order to further analyze the transmission reliability cost of the proposed techniques in low-power embedded systems, we have compared different combinations of proposed hardware and software extensions. Surprisingly, our analysis is demonstrated that, although increasing the number of antennas at one particular side of a communication link which is directly proportional to the system cost, always guarantee better transmission reliability, however, there are cases that applying fewer number of antennas along with using appropriate software extensions can provide better transmission reliability compared with cases with more number of antennas.
APA, Harvard, Vancouver, ISO, and other styles
46

P, Joseph Iype. "Accelerating Java on Embedded GPU." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/30684.

Full text
Abstract:
Multicore CPUs (Central Processing Units) and GPUs (Graphics Processing Units) are omnipresent in today’s market-leading smartphones and tablets. With CPUs and GPUs getting more complex, maximizing hardware utilization is becoming problematic. The challenges faced in GPGPU (General Purpose computing using GPU) computing on embedded platforms are different from their desktop counterparts due to their memory and computational limitations. This thesis evaluates the performance and energy efficiency achieved by offloading Java applications to an embedded GPU. The existing solutions in literature address various techniques and benefits of offloading Java on desktop or server grade GPUs and not on embedded GPUs. Our research is focussed on providing a framework for accelerating Java programs on embedded GPUs. Our experiments were conducted on a Freescale i.MX6Q SabreLite board which encompasses a quad-core ARM Cortex A9 CPU and a Vivante GC 2000 GPU that supports the OpenCL 1.1 Embedded Profile. We successfully accelerated Java code and reduced energy consumption by employing two approaches, namely JNI-OpenCL, and JOCL, which is a popular Java-binding for OpenCL. These approaches can be easily implemented on other platforms by embedded Java programmers to exploit the computational power of GPUs. Our results show up to an 8 times increase in performance efficiency and 3 times decrease in energy consumption compared to the embedded CPU-only execution of Java program. To the best of our knowledge, this is the first work done on accelerating Java on an embedded GPU.
APA, Harvard, Vancouver, ISO, and other styles
47

Alshamali, M. A. M. "Rationalised protection for embedded generation." Thesis, Queen's University Belfast, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Elmikkawy, M. E. A. "Embedded Runge-Kutta-Nystrom methods." Thesis, Teesside University, 1986. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.371400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Moss, Andrew David. "Program transformation of embedded systems." Thesis, University of Bristol, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.432724.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Warkentin, David J. "Embedded electronics for intelligent structures." Thesis, Massachusetts Institute of Technology, 1991. http://hdl.handle.net/1721.1/42514.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography