Dissertations / Theses on the topic 'REMOTE ACCESS SYSTEM'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 38 dissertations / theses for your research on the topic 'REMOTE ACCESS SYSTEM.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Peña, Selene. "UNIX remote access via IBM S/390 system." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/SPena2006.pdf.
Full textPorter, Logan. "Wireless In-home Ecg Monitoring System with Remote Access." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149653/.
Full textWilliams, Jennifer. "Acceptance of a Remote Desktop Access System to Increase Workspace Awareness." Thesis, University of Waterloo, 2000. http://hdl.handle.net/10012/846.
Full textVelusamy, Vijay. "Adapting Remote Direct Memory Access based file system to parallel Input-/Output." Master's thesis, Mississippi State : Mississippi State University, 2003. http://library.msstate.edu/etd/show.asp?etd=etd-11112003-092209.
Full textGarcía, Moral Daniel Jesús. "Remote File Access System for Generic Ericsson Processor Boards : File transfer service, Random Access Memory-based file system and secure file transfer solution research." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-53448.
Full textRouse, Matthew David. "Design and evaluation of a remote access hydraulic manipulator for system dynamics and controls education." Thesis, Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/18943.
Full textPatel, Sameer H. "Design of the Network Multimedia File System protocol : a protocol for remote access of networked multimedia files /." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-07292009-090502/.
Full textGrape, Felix. "Designing an Access Control System for Internet of Things." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217507.
Full textFör många enheter tillhörande sakernas internet har säkerhet inte varit en prioritet under utvecklingen, men vad händer om tillverkare istället använder ett säkert ramverk för att utveckla sina produkter? I den här rapporten presenteras en utvärdering av några sådana ramverks lämplighet för att användas för att bygga ett accesskontrollsystem kring. Både Vanadium och Protocol of Things (PoT) finns vara lämpliga kandidater. Båda ramverken använder en decentraliserad säkerhetsmodell där ägaren av en enhet kan ge andra användare tillgång till enheten genom att generera en signerad auktorisation. PoT är det ramverk som användes för att utforma accesskontrollsystemprototypen kring för att det ansågs vara något mer lämpligt jämfört med Vanadium. Prototypen använder en rollabstraktion för att underlätta arbetet för administratörer att ge användare rätt behörigheter. På så vis blir det möjligt att konfigurera en klass av användare samtidigt istället för att behöva konfigurera varje användare individuellt. Prototypen kan göra allt detta på ett generiskt sätt. Det innebär att prototypen inte innehåller någon kod eller funktionalitet som är specifik för någon enhet så länge det är en PoT-enhet. Den föreslagna designen och implementationen är skalbar och effektiv. Över ett tusen signerade auktorisationer kan genereras per sekund på en exekveringstråd. I ett system där användare ges behörighet till 200 unika behörigheter på olika enheter uppgår den totala filstorleken för de signerade auktorisationerna och tillhörande metadata till mindre än 150 kB. Det tar uppskattningsvis 70 ms att skapa en säker anslutning mellan klient- och server-mjukvara. För stora dataöverföringar är överföringshastigheten uppskattningsvis 2.6-2.8 MB per sekund, vilket inkluderar kryptering och avkryptering av fråga och svar från klienten till servern.
Jazdi, Nasser. "Universelle Fernservice-Infrastruktur für eingebettete Systeme." Aachen : Shaker, 2003. http://deposit.d-nb.de/cgi-bin/dokserv?idn=969068980.
Full textJedlička, Zdeněk. "Přístupový systém založený na protokolu ACP." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219429.
Full textДідуник, Олег Андрійович, Микола Володимирович Дрозд, Oleh Didunyk, and Mykola Drozd. "Розробка та дослідження автоматизованої системи забезпечення безпеки адміністративного корпусу." Master's thesis, Тернопіль, ТНТУ, 2019. http://elartu.tntu.edu.ua/handle/lib/29664.
Full textДідуник О. А., Дрозд М.В. Розробка та дослідження автоматизованої системи забезпечення безпеки адміністративного корпусу. 151 – автоматизація та комп’ютерно-інтегровані технології. – Тернопільський національний технічний університет імені Івана Пулюя. – Тернопіль, 2019. В магістерській роботі розроблено автоматизовану систему для організації системи охороно та безпеки адміністративної будівлі. Було розглянуто та проаналізовано основні принципи побудови комплексних систем безпеки. Приведено принципи, приклади реалізації та елементи можливої оптимізації та здешевлення такої системи та розширення її функціональних можливостей Didunyk О.А., Drozd M. V. Development and research of the automated security system of the administrative building. 151 - Automation and computer-integrated technologies. - Ternopil National Technical University named after Ivan Puluj. - Ternopil, 2019. In the master's work, an automated system was developed for organizing the system of security and safety of the administrative building. Basic principles of complex security systems construction were considered and analyzed. The principles, examples of implementation and elements of possible optimization and cheapening of such a system and expansion of its functionality are presented.
ВСТУП 9 1. АНАЛІТИЧНА ЧАСТИНА 12 1.1. Загальні положення та методики для організації захисту об’єктів 12 1.2. Класифікація предметів та об’єктів охорони 14 1.3. Основи формування комплексу технічних засобів забезпечення безпеки 20 1.4. Загальні принципи побудови систем безпеки 23 1.5. Умови функціонування систем безпеки 26 1.6 Структура комплексної системи безпеки 29 2. ТЕХНОЛОГІЧНА ЧАСТИНА 35 2.1. Принципи роботи комплексної системи безпеки адміністративного об’єкту 35 2.2 Підсистема протипожежної безпеки 38 2.3. Підсистема відео нагляду 39 2.4. Підсистема контролю проникнення 41 3. КОНСТРУКТОРСЬКА ЧАСТИНА 45 3.1. Система під’єднання камер та структура системи відеоспостереження 47 3.2. Система охоронної сигналізації та протипожежної охорони 50 3.3. Альтернативні системи для вирішення проблемних моментів в системах охорони 54 4. НАУКОВО-ДОСЛІДНА ЧАСТИНА 64 4.1 Дослідження розподілу звукового сигналу 64 4.2. Оптимізація затрат живлення на обслуговування системи давачів проникнення 66 5. СПЕЦІАЛЬНА ЧАСТИНА 70 5.1. Налаштування доступу до системи відеонагляду через хмарний сервіс 70 5.2. Налаштування роутера для доступу до системи безпеки по зовнішній IP адресі 77 5.3 Опис налаштування IVMS для мобільних пристроїв 84 6. ОБГРУНТУВАННЯ-ЕКОНОМІЧНОЇ ЕФЕКТИВНОСТІ 90 6.1. Розрахунок норм часу на виконання науково-дослідної роботи 90 6.2 Визначення витрат на оплату праці та відрахувань на соціальні заходи 91 6.3 Розрахунок матеріальних витрат 94 6.4 Розрахунок витрат на електроенергію 95 6.5 Розрахунок суми амортизаційних відрахувань 96 5.6 Обчислення накладних витрат 97 5.7 Складання кошторису витрат та визначення собівартості науково-дослідницької роботи 98 5.8 Розрахунок ціни розробки системи 99 5.9 Визначення економічної ефективності і терміну окупності капітальних вкладень 100 7 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ 102 7.1 Організація охорони праці при роботі з системою управління 102 7.2 Електробезпека 104 7.3 Розрахунок заземлення 107 8 ЕКОЛОГІЯ 111 8.1 Екологізація виробництва 111 8.2 Зниження енергоємності та енергозбереження. 112 8.3 Джерела електромагнітних полів, іонізуючого випромінення та методи їх знешкодження. 114 ВИСНОВКИ 116 ПЕРЕЛІК ПОСИЛАНЬ 117 ДОДАТКИ 119
Koorland, Neil Karl. "A message-based remote database access facility." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24831.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Digiere, Adriano Ricardo [UNESP]. "Camada de gerenciamento para comunicação entre computadores baseada em redes sem fio (WSE-OS)." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/98660.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
O maior custo de propriedade de computadores não é o hardware ou o software, mas sim o tempo que os profissionais de informática gastam em suporte e manutenção dos ambientes computacionais. Em um conglomerado de computadores em rede, cada computador torna- se uma entidade gerenciada individualmente, o que gera contínuas solicitações de alterações de configuração, como instalação de atualizações de software, conexão e configuração de periféricos, criação de perfis de e-mail e aplicação de patches. Além disso, existe ainda o risco de furto de dados e invasão por hackers quando os computadores dos usuários não estão protegidos. Aliado a este cenário, a constante evolução dos sistemas computacionais e seu potencial de processamento, a cada dia são necessárias novas técnicas de aproveitamento destes recursos. Soluções que visam facilitar o gerenciamento de ambientes com grande massa de computadores de forma a tirar o máximo proveito do poder computacional concentrado em servidores já se tornaram necessidades reais, não só em grandes corporações, mas também em pequenas e médias empresas, além de outros tipos organizações, como por exemplo, instituições de ensino. Frente esta necessidade, focando uma ferramenta compatível neste cenário de crescimento, este trabalho apresenta um modelo de gerenciamento centralizado, nomeado WSE-OS (Wireless Sharing Environment – Operating Systems), baseado em técnicas de virtualização e acesso remoto seguro combinadas a um sistema de arquivos remotos em espaço de usuário. Esta solução elimina a necessidade da instalação e configuração de aplicativos “máquina a máquina”, além de tirar maior proveito do poder computacional existente nos servidores. A principal característica deste modelo que o destaca das soluções atuais é que ele é especificamente elaborado para operar sobre redes...
The largest cost of desktop ownership is not the hardware or software, but the time that administrators spend on support and maintenance of computing environments. In a conglomerate of computers in a network, each computer becomes an entity managed individually, which generates continuous requests for configuration changes, such as installing software updates, configuration and connection of peripherals, profiling email and applying patches. Moreover, there is the risk of data theft and hacking when users' computers are not protected. Allied to this scenario, the constant evolution of computer systems and their potential for processing, each day requires new techniques for exploitation of these resources. Solutions aimed facilitating the management of environments with large mass of computers to take maximum advantage of computing power concentrated on servers have become real needs, not only in large corporations but also small and medium enterprises, besides other types organizations, such as educational institutions. Facing this need, focusing on a tool that supported this growth scenario, this work presents a centralized management model, named WSE-OS (Wireless Sharing Environment – Operating Systems) based on virtualization techniques and secure remote access combined with a remote file system in user space. This solution eliminates the need for installing and configuring applications machine to machine, besides take greater advantage of existing computing power on the servers . The main feature of this model that highlights the current solutions is that it is specifically designed to operate on networks with low transmission rates, such as wireless networks. The WSE-OS is able to perform the replication of operating system images in an environment with WLAN communication, which makes management more flexible and independent of physical connections, besides offer... (Complete abstract click electronic access below)
Digiere, Adriano Ricardo. "Camada de gerenciamento para comunicação entre computadores baseada em redes sem fio (WSE-OS) /." São José do Rio Preto : [s.n.], 2011. http://hdl.handle.net/11449/98660.
Full textBanca: João Paulo Papa
Banca: Regina Helena Carlucci Santana
Resumo: O maior custo de propriedade de computadores não é o hardware ou o software, mas sim o tempo que os profissionais de informática gastam em suporte e manutenção dos ambientes computacionais. Em um conglomerado de computadores em rede, cada computador torna- se uma entidade gerenciada individualmente, o que gera contínuas solicitações de alterações de configuração, como instalação de atualizações de software, conexão e configuração de periféricos, criação de perfis de e-mail e aplicação de patches. Além disso, existe ainda o risco de furto de dados e invasão por hackers quando os computadores dos usuários não estão protegidos. Aliado a este cenário, a constante evolução dos sistemas computacionais e seu potencial de processamento, a cada dia são necessárias novas técnicas de aproveitamento destes recursos. Soluções que visam facilitar o gerenciamento de ambientes com grande massa de computadores de forma a tirar o máximo proveito do poder computacional concentrado em servidores já se tornaram necessidades reais, não só em grandes corporações, mas também em pequenas e médias empresas, além de outros tipos organizações, como por exemplo, instituições de ensino. Frente esta necessidade, focando uma ferramenta compatível neste cenário de crescimento, este trabalho apresenta um modelo de gerenciamento centralizado, nomeado WSE-OS (Wireless Sharing Environment - Operating Systems), baseado em técnicas de virtualização e acesso remoto seguro combinadas a um sistema de arquivos remotos em espaço de usuário. Esta solução elimina a necessidade da instalação e configuração de aplicativos "máquina a máquina", além de tirar maior proveito do poder computacional existente nos servidores. A principal característica deste modelo que o destaca das soluções atuais é que ele é especificamente elaborado para operar sobre redes... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: The largest cost of desktop ownership is not the hardware or software, but the time that administrators spend on support and maintenance of computing environments. In a conglomerate of computers in a network, each computer becomes an entity managed individually, which generates continuous requests for configuration changes, such as installing software updates, configuration and connection of peripherals, profiling email and applying patches. Moreover, there is the risk of data theft and hacking when users' computers are not protected. Allied to this scenario, the constant evolution of computer systems and their potential for processing, each day requires new techniques for exploitation of these resources. Solutions aimed facilitating the management of environments with large mass of computers to take maximum advantage of computing power concentrated on servers have become real needs, not only in large corporations but also small and medium enterprises, besides other types organizations, such as educational institutions. Facing this need, focusing on a tool that supported this growth scenario, this work presents a centralized management model, named WSE-OS (Wireless Sharing Environment - Operating Systems) based on virtualization techniques and secure remote access combined with a remote file system in user space. This solution eliminates the need for installing and configuring applications "machine to machine", besides take greater advantage of existing computing power on the servers . The main feature of this model that highlights the current solutions is that it is specifically designed to operate on networks with low transmission rates, such as wireless networks. The WSE-OS is able to perform the replication of operating system images in an environment with WLAN communication, which makes management more flexible and independent of physical connections, besides offer... (Complete abstract click electronic access below)
Mestre
Karlsson, Johanna. "Nomadic Computing : Security assessment of remote access to workplace systems." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4845.
Full textSintaro, Abel Tariku, and Yemi Emmanuel Komolafe. "SDP And VPN For Remote Access : A Comparative Study And Performance Evaluation." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-103892.
Full textColnago, Guilherme Piazentini. "Desenvolvimento e implementação de um sistema de monitoramento em tempo real da tensão da rede com acesso remoto." Universidade Federal do Espírito Santo, 2009. http://repositorio.ufes.br/handle/10/6212.
Full textNo Brasil, até pouco tempo atrás, a qualidade da energia elétrica estava relacionada, basicamente, com interrupções do fornecimento de energia e a certas cargas especiais da indústria. Porém, nos últimos anos, sob a direção da agência reguladora do setor, a ANEEL (Agência Nacional de Energia Elétrica), juntamente com especialistas, a área de qualidade da energia elétrica passou a receber uma atenção significativa, sendo legislada e adquirindo suas regulamentações iniciais. A área de Qualidade da Energia Elétrica passou, então, a formalmente existir e abranger um conjunto maior de fenômenos e eventos da rede elétrica. Em função dessa recente regulamentação, este trabalho apresenta o projeto de um medidor da qualidade da energia elétrica. Um dos focos do medidor é ser de baixo custo, tornando-o viável para o uso em grande escala. Este medidor é um sistema eletrônico que processa digitalmente os sinais de tensão da rede elétrica, extraindo os dados relacionados à qualidade da energia elétrica; tais dados são armazenados localmente e, posteriormente, acessados remotamente e enviados para um banco de dados, de forma que possam ser analisados.
Some years ago in Brazil the power quality was related, basically, with interruption of supplied energy and certain special loads of industry. In recent years, however, under controls of the regulating agency ANEEL (Agência Nacional de Energia Elétrica) and with specialists, the power quality area received the due attention and was legislated and acquired regulations. So, finally, the area of Power Quality was formally created and now it embraces several electrical phenomena and events. Because of the new regulations, this work presents a project of a power quality meter. One of meter s focuses is to be a low cost system and becomes able to be used in large scale. This power quality meter is an electronic system that processes the voltage signal of electrical network and extracts data related to power quality; the data are locally stored and after they are remotely accessed and transmitted to a data base to be analyzed.
Kientz, Julie A. "Decision support for caregivers through embedded capture and access." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24612.
Full textCommittee Chair: Abowd, Gregory; Committee Member: Ackerman, Mark; Committee Member: Grinter, Rebecca; Committee Member: Mynatt, Elizabeth; Committee Member: Rodden, Thomas
Champion, Caitlin. "A Systems Analysis Approach to Colorectal Cancer Screening Access In the Northwest Territories." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35547.
Full textGill, Khusvinder. "Enhancing the security of wireless sensor network based home automation systems." Thesis, Loughborough University, 2009. https://dspace.lboro.ac.uk/2134/5951.
Full textAbdulwahed, Mahmoud. "Towards enhancing laboratory education by the development and evaluation of the "TriLab" : a triple access mode (virtual, hands-on and remote) laboratory." Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6355.
Full textZhou, Lin. "Energy efficient transmitter design with compact antenna for future wireless communication systems." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33104.
Full textMatoušek, Vojtěch. "Vzdálené získávání dat z digitálního tachografu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413277.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full text"LAN based Remote Access Multiple Users (RAMU) Voice Information Retrieval System." Chinese University of Hong Kong, 1992. http://library.cuhk.edu.hk/record=b5887003.
Full textThesis (M.Sc.)--Chinese University of Hong Kong, 1992.
Includes bibliographical references.
Acknowledgement
Abstract
Thesis
Chapter I --- Introduction --- p.P.1 - P.3
Chapter II --- System Overview of RAMU --- p.P.3 - P.5
Chapter III --- Hardware Implementation of VRU --- p.P.5 - P.8
Chapter IV --- Software Design of RAMU --- p.P.8 - P.15
Chapter V --- Software Support of RAMU --- p.P.15
Chapter VI --- Potential Applications of RAMU --- p.P.16 - P.17
Chapter VII --- Suggested Further Works --- p.P.17 - P.18
Chapter VIII --- Demonstrated Applications Developed on RAMU --- p.P.18 - P.19
Chapter IX --- Conclusion --- p.P.19
Bibliography
Chapter Appendix 1 -- --- TIU
Chapter * --- Circuit layout
Chapter * --- Circuit Operation of TIU
Chapter * --- DIP Switch Settings of TIU
Chapter * --- Data Sheets of8255
Chapter * --- Data Sheets of MC145436
Chapter Appendix 2 -- --- Application Generator
Chapter * --- User Guide of the Application Generator Program
Chapter * --- Program Listing of AppGen. Pas and its supporting units
Chapter - --- M__AppGen.Pas
Chapter - --- DataStru. Pas
Chapter - --- ColorDef. Pas
Chapter Appendix 3 -- --- AEM
Chapter * --- Parameters of Running the AEM
Chapter * --- Program Listing of LAppExec.Pas and its supporting units
Chapter - --- ToneCard. Pas
Chapter - --- VrpSupp. Pas
Chapter - --- MiscUtil. Pas
Chapter - --- DataStru. Pas
Chapter - --- LanMStru. Pas
Appendix 4-- Manufacturer Manual of VRP-70 Voice Card
Khankan, K. "TOMRAS : a Task Oriented Mobile Remote Access System for desktop applications." Thesis, 2009. http://hdl.handle.net/10453/30186.
Full textMobile remote access to desktop applications is a potential enabler to improving the productivity and convenience of individuals and businesses. There is an increasing research interest in developing mobile remote access solutions for desktop applications. The developed proposals, however, are challenged by the hardware limitations of most mobile devices, such as the small display size. These limitations have a direct impact on the way existing desktop applications are presented on mobile devices. This thesis focuses on developing new ways of achieving effective mobile remote access to existing desktop applications. A conceptual model and implementation architecture for a task-oriented mobile remote access system (TOMRAS) have been introduced. The TOMRAS model adopts a user interface refactoring approach to generate task-oriented user interfaces for existing desktop applications without re-developing or modifying these applications. TOMRAS has a number of novel aspects, including, inferring user interface and behaviour knowledge from existing applications and transparently exposing the functionalities of existing desktop applications to be remotely accessible via a wide spectrum of mobile devices and platforms without redeveloping these desktop applications. The TOMRAS strategy of decoupling the generated mobile task's user interface from the functionality of existing applications also allows for a possible enriching of the mobile task's user interface with multimodal interaction capabilities. The thesis describes the TOMRAS conceptual model, and a potential implementation architecture for this model. The proposed implementation architecture articulates the intrinsic building blocks for mobile remote access solutions that adopt the TOMRAS model. The limitations of how widely and generically the model and techniques can be applied are also detailed in the thesis. Furthermore, a prototype that validates the feasibility of the TOMRAS implementation architecture is provided, and an evaluation of the effectiveness of the task-oriented approach is presented.
GUPTA, BISWOJEET KUMAR. "INTEGRATION OF TECHNOLOGY TO ACCESS THE MANUFACTURING PLANT VIA REMOTE ACCESS SYSTEM - A PART OF INDUSTRY 4.0." Thesis, 2021. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19087.
Full textChang, Dun-Kai, and 張敦凱. "Time-limited Reconfigurable Remote Control Using Mobile Phones in Access Management System." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/34087332122937623267.
Full text國立中興大學
電機工程學系所
104
This thesis proposes a reconfigurable access control system by using a mobile phone, an Arduino control board and Bluetooth transmission medium to replace conventional remote control. At the part of mobile phones, we create an APP as a remote control, while the Arduino is used as a local access control center, which is responsible for home security. For the information exchange process, the protection mechanism is inspired by XECryption algorithm using the ASCII conversion to provide the secrecy of the contents. For the second protection mechanism, we utilize the identity of the un-locker (for example: a host or a guest), integrating the effective period of the lock with the addresses of Bluetooth device to complete the authentication. Therefore, by applying the proposed management mechanisms, we may implement a reliable Bluetooth lock for access control.
(9733472), Terri Sue Krause. "STAKEHOLDER PERCEPTIONS OF THE VIABILITY OF A FULLY REMOTE APPRENTICESHIP DELIVERY SYSTEM PRE-COVID-19 WITH UPDATES MID-PANDEMIC—A QUALITATIVE EXPLORATORY STUDY." Thesis, 2020.
Find full textRegateiro, Diogo José Domingues. "Dynamic and secure remote database access with soft access policies integration." Doctoral thesis, 2021. http://hdl.handle.net/10773/31633.
Full textA quantidade de dados criados e partilhados tem crescido nos últimos anos, em parte graças às redes sociais e à proliferação dos dispositivos inteligentes. A gestão do armazenamento e processamento destes dados pode fornecer uma vantagem competitiva quando usados para criar novos serviços, para melhorar a publicidade direcionada, etc. Para atingir este objetivo, os dados devem ser acedidos e processados. Quando as aplicações que acedem a estes dados são desenvolvidos, ferramentas como Java Database Connectivity, ADO.NET e Hibernate são normalmente utilizados. No entanto, embora estas ferramentas tenham como objetivo preencher a lacuna entre as bases de dados e o paradigma da programação orientada por objetos, elas concentram-se apenas na questão da conectividade. Isto aumenta o tempo de desenvolvimento, pois os programadores precisam dominar as políticas de acesso para escrever consultas corretas. Além disso, quando usado em aplicações de bases de dados em ambientes não controlados, surgem outros problemas, como roubo de credenciais da base de dados; autenticação de aplicações; autorização e auditoria de grandes grupos de novos utilizadores que procuram acesso aos dados, potencialmente com requisitos vagos; escuta da rede para obtenção de dados e credenciais; personificação de servidores de bases de dados para modificação de dados; manipulação de aplicações para acesso ilimitado à base de dados e divulgação de dados; etc. Uma arquitetura capaz de resolver esses problemas é necessária para construir um conjunto confiável de soluções de controlo de acesso, para expandir e simplificar os cenários de aplicação destes sistemas. O objetivo, então, é proteger o acesso remoto a bases de dados, uma vez que as aplicações de bases de dados podem ser usados em ambientes de difícil controlo e o acesso físico às máquinas/rede nem sempre está protegido. Adicionalmente, o processo de autorização deve conceder dinamicamente as permissões adequadas aos utilizadores que não foram explicitamente autorizados para suportar grupos grandes de utilizadores que procuram aceder aos dados. Isto inclui cenários em que a definição dos requisitos de acesso é difícil devido à sua imprecisão, geralmente exigindo um especialista em segurança para autorizar cada utilizador individualmente. Este objetivo é atingido no processo de decisão de controlo de acesso com a integração e auditaria das políticas de acesso suaves baseadas na teoria de conjuntos difusos. Uma prova de conceito desta arquitetura é fornecida em conjunto com uma avaliação funcional e de desempenho.
Programa Doutoral em Informática
Liu, Chia-Hui, and 劉嘉惠. "Secure Remote Mobile Access in Health Information Systems." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/07886298454022717945.
Full text國立臺灣大學
電機工程學研究所
99
For the rapid development of wireless networks, mobile computing has greatly in the past few years and would be continue that trend into the future. With advancing computation and storage capacity of mobile devices, the applications of mobile computing also become more various and popular in our lives. It enables mobile users to compute and access information from anywhere, anytime. Therefore, deploying secure remote access is the most important issue when mobile computing applications haves become critical roles of network technology, especially in mobile Health Information Systems (HIS). Because the health information is inherently sensitive, remote access of mobile environment in HIS must be computationally efficient, secure, and require minimal storage capacity. With the abilities of higher autonomy and mobility, a mobile agent is an important breakthrough on the related techniques and applications of mobile computing environment and becomes the most suitable technology for establishing secure remote access in HIS. However, remote access of mobile computing in HIS with mobile agent requires concerning the performance, efficiency, effective computational ability and security issues. Hence, this study proposed an effective and secure remote access in HIS with mobile agent, an improvement strategy for efficient migration of mobile agent and an enhance strategy for HIS in medical networks. The remote access scheme in HIS with mobile agent of this study could allow physicians immediately securely and efficiently obtaining data from different medical organizations. Then, this study proposed an enhanced architecture for the mobile agent in HIS. The scheme, based on the bilinear pairing over elliptic curves, takes the concept of identity-based access control on a hierarchical key management. Furthermore, adapting time-sensitive key management scheme in this study would enhance efficiency and security of access control. This study also proposed secure medical managerial strategies being applied to the mobile computation environments of the HIS so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. From the above proposed three strategies, it can achieve secure mobile computation for remote access in HIS.
Snelson, Pamela. "Relationships between access and use in information systems remote access to and browsing of online catalogs /." 1993. http://books.google.com/books?id=W8zgAAAAMAAJ.
Full textDhaniram, Ajith Deoduth. "The development of SCADA control and remote access for the Indlebe Radio Telescope." Thesis, 2016. http://hdl.handle.net/10321/1504.
Full textThe proposed supervisory control and data acquisition solution is intended to gather data from all sub-systems and provide control commands related to the Indlebe Radio Telescope. Currently the control commands are executed from the command line prompt of the Skypipe software. These control commands are used to change the elevation angle of the antenna. The supervisory control and data acquisition system will be interfaced to sub-systems namely; a programmable logic controller, a weather station, an uninterruptible power supply and a camera. It will be used to manually or automatically control the elevation angle of the antenna, includes a menu structure that allows for easy navigation to the sub-systems and allows for trending, alarming, logging and monitoring of all system parameters. The proposed system will mitigate the lack of information on the existing system. A global system for mobile communication unit has also been installed to monitor the temperature within the Indlebe control room, detect a power failure and communicate this information to supervisors, using its short message service option. Implementing a solution of this nature means that all data from the various sub-systems are brought together, giving a single platform to monitor data and provide manual and automatic control functionality. Problem solving, understanding and maintenance of the system will also become easier.
D
Lin, Zhen-Wei, and 林振瑋. "New Task Selection Policies in Memory-Aware Load Balancing Mechanism for Reducing Remote Memory Access on NUMA Systems." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/46285497022596576005.
Full text國立暨南國際大學
資訊管理學系
105
Multi-core systems with the Non-Uniform Memory Access (NUMA) architecture solve the scalability problem of the Symmetric Multi-Processing (SMP) architecture. However, in a NUMA system, a task and its memories may be allocated on different NUMA nodes. Processor cores accessing memories on remote NUMA node take longer time than on local node. Remote memory access and contention for inter-node interconnect degrade system performance. Although in the Linux kernel, the automatic page migration mechanism is implemented, it migrates only referenced pages to the current node where the task is running on. Whereas, this mechanism is completed by page table invalidation and page fault handling, which incurs additional overhead for memory access. In order to reduce the remote memory access caused by performing load balancing mechanism in the NUMA system, previous work has proposed the Memory-Aware Load Balancing (MLB) mechanism. In the MLB mechanism, the Linux kernel is modified to keep track of each task’s memory usage on each node. The kernel load balancing mechanism is modified to incorporate with task selection policies. These policies will choose suitable task for inter-node migration according to task’s memory usages on each node. The aim is to reduce remote memory access in the future after task migration. In this thesis, we have improved the task selection policies in the MLB mechanism and proposed several new selection policies. The aims are also reducing the remote memory access and improving the opportunity for a task to access the local node memory. Differently, several factors are taken into account in the proposed policies, such as maximum benefit, best cost effectiveness, least shared page, and NUMA factor. These new task selection policies are implemented with the MLB load balancing mechanism in Linux kernel. The experiment results show that our newly proposed task selection policies can effectively reduce the remote memory access and resource contention. The performance of NUMA system is increased by up to 10.67% compared to the default Linux kernel that always migrates the first movable task for inter-node load balancing.
(9816977), Brian Mayahle. "The implementation of Lean thinking in reducing waste, streamlining clinical processes, improving clinical access, efficiency and consumer outcomes in Queensland regional, rural and remote mental health services." Thesis, 2018. https://figshare.com/articles/thesis/The_implementation_of_Lean_thinking_in_reducing_waste_streamlining_clinical_processes_improving_clinical_access_efficiency_and_consumer_outcomes_in_Queensland_regional_rural_and_remote_mental_health_services/13445453.
Full textKamala, R. "MIST : Mlgrate The Storage Too." Thesis, 2013. https://etd.iisc.ac.in/handle/2005/2630.
Full textKamala, R. "MIST : Mlgrate The Storage Too." Thesis, 2013. http://etd.iisc.ernet.in/handle/2005/2630.
Full textVan, Staden Corne Johandia. "User experience evaluation of electronic moderation systems : a case study at a private higher education institution in South Africa." Thesis, 2017. http://hdl.handle.net/10500/23586.
Full textInformation Science
D. Litt. et Phil. (Information Systems)