To see the other types of publications on this topic, follow the link: REMOTE ACCESS SYSTEM.

Dissertations / Theses on the topic 'REMOTE ACCESS SYSTEM'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 38 dissertations / theses for your research on the topic 'REMOTE ACCESS SYSTEM.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Peña, Selene. "UNIX remote access via IBM S/390 system." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/SPena2006.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Porter, Logan. "Wireless In-home Ecg Monitoring System with Remote Access." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc149653/.

Full text
Abstract:
The thesis work details the design and testing of a wireless electrocardiogram (ECG) system. This system includes a wireless ECG device, as well as software packages to visually display the waveform locally on a computer and remotely on a web page. The remote viewing capability also extends to using an Android phone application. The purpose of the system is to serve as a means for a doctor or physician to check up on a patient away from a hospital setting. This system allows for a patient to be in their home environment while giving health vital information, primarily being the heart’s activity through the ECG, to medical personnel.
APA, Harvard, Vancouver, ISO, and other styles
3

Williams, Jennifer. "Acceptance of a Remote Desktop Access System to Increase Workspace Awareness." Thesis, University of Waterloo, 2000. http://hdl.handle.net/10012/846.

Full text
Abstract:
Awareness systems are being designed and implemented to improve employee connections. This study examines the variables that affect the acceptance of an awareness system. The awareness system that was used for this research was a remote desktop access system. The independent variables investigated were the degree of detail that can be viewed on a desktop, whether the users can control who can access their desktops, whether the users can control when others have access to their desktops, the equality of access to others' desktops, and task-technology fit. In determining the effect of the independent variables on acceptance, the dependent variable, the mediating variables of privacy and fairness were taken into account. There was a preliminary survey conducted to determine appropriate situations to be used in the scenario descriptions for the survey for the main study. The methodology of policy-capturing surveys was utilized to conduct the survey for the main study in order to investigate the model developed in this study. The policy-capturing survey was pre-tested on University of Waterloo students. The main study was conducted in two different organizations, the subjects for the first study were employees from the Information Systems and Technology Department at the University of Waterloo and the subjects for the second study were employees from Ciber Incorporated. Results indicate that perceptions of privacy and perceptions of fairness have significant effects on acceptance. Also, perceptions of privacy and fairness are related to details in the design of the remote desktop access system. This research may be a contribution to this field since little research has been conducted in this area and implications can be drawn for future research on acceptance of awareness systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Velusamy, Vijay. "Adapting Remote Direct Memory Access based file system to parallel Input-/Output." Master's thesis, Mississippi State : Mississippi State University, 2003. http://library.msstate.edu/etd/show.asp?etd=etd-11112003-092209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

García, Moral Daniel Jesús. "Remote File Access System for Generic Ericsson Processor Boards : File transfer service, Random Access Memory-based file system and secure file transfer solution research." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-53448.

Full text
Abstract:
Generic Ericsson Processor boards are general purpose hardware platforms which provide generic processing services. They support the Unified Extensible Firmware Interface Specification. They have several network interfaces available and they are connected to Ericsson’s laboratory network. Several servers are also connected to this network. These boards require periodic firmware upgrades. They also require acquiring new firmware components and data files. Currently, an application to download or upload files from and to Ericsson’s laboratory servers when an Operating System has not already been booted does not exist. Therefore, the files have to be transferred to USB drives which are connected later to the boards in order to transfer the files. This is a time consuming operation which decreases Ericsson’s productivity. In addition, although Generic Ericsson Processor boards have an optional solid-state drive as secondary storage, Ericsson wants to be able to operate without it. This is because this secondary storage is not always available and Ericsson does not want to use it when the Generic Ericsson Processor boards are operating before an Operating System has been loaded. They prefer to use Random Access Memory storage. This project is focused on studying possible solutions for those two problems. Several file transfer protocols are analyzed. Several file system solutions mounted on Random Access Memory are also explored. A Trivial File Transfer Protocol client application and a Random Access Memory Disk driver prototype are designed, implemented and tested. They are tailored to work on a pre-boot environment, when the boards have not booted an Operating System yet, in Ericsson’s laboratory network. Finally, a secure file transfer protocols’ study is developed. This study will be used to assess Ericsson on the optimal secure file transfer protocol choice in order to implement possible secure future versions of the system.
APA, Harvard, Vancouver, ISO, and other styles
6

Rouse, Matthew David. "Design and evaluation of a remote access hydraulic manipulator for system dynamics and controls education." Thesis, Georgia Institute of Technology, 2001. http://hdl.handle.net/1853/18943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Patel, Sameer H. "Design of the Network Multimedia File System protocol : a protocol for remote access of networked multimedia files /." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-07292009-090502/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Grape, Felix. "Designing an Access Control System for Internet of Things." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217507.

Full text
Abstract:
For many Internet of Things (IoT) devices security have not been a priority during the development, but what happens if the makers of IoT devices use a secure framework for developing their devices? In this thesis a number of such frameworks have been evaluated for their suitability to build an access control system around. Both Vanadium and Protocol of Things (PoT) were found to be suitable candidates. Both frameworks employ a distributed access control model where the owner of a device can grant other users access to the device by generating a signed authorization. PoT was ultimately chosen as the framework around which to design the prototype access control system because it was deemed to be slightly more suitable than Vanadium. The prototype takes the rule based and discretionary access control model from the underlying framework and makes it possible for administrators to transparently authorize users to devices through role abstractions. Thus it is possible to transparently manage a class of users at the same time instead of having to manage each individual user. Furthermore the prototype is able to do this in a generic way. The prototype does not contain any code of functionality for any specific device it manages, it is capable of managing access to any PoT device. The design and implementation is deemed both scalable and efficient. Running on a single thread it is possible to generate over one thousand signed authorizations per second. In a system where users are granted access to 200 unique device permissions the total file size of the signed authorizations and accompanying meta data does not exceed 150 kB. It takes approximately 70 ms to establish a secure connection between the client and server software. For large data transfers the throughput is approximately 2.6-2.8 MB per second, including encryption and decryption of request and response from the client to the server.
För många enheter tillhörande sakernas internet har säkerhet inte varit en prioritet under utvecklingen, men vad händer om tillverkare istället använder ett säkert ramverk för att utveckla sina produkter? I den här rapporten presenteras en utvärdering av några sådana ramverks lämplighet för att användas för att bygga ett accesskontrollsystem kring. Både Vanadium och Protocol of Things (PoT) finns vara lämpliga kandidater. Båda ramverken använder en decentraliserad säkerhetsmodell där ägaren av en enhet kan ge andra användare tillgång till enheten genom att generera en signerad auktorisation. PoT är det ramverk som användes för att utforma accesskontrollsystemprototypen kring för att det ansågs vara något mer lämpligt jämfört med Vanadium. Prototypen använder en rollabstraktion för att underlätta arbetet för administratörer att ge användare rätt behörigheter. På så vis blir det möjligt att konfigurera en klass av användare samtidigt istället för att behöva konfigurera varje användare individuellt. Prototypen kan göra allt detta på ett generiskt sätt. Det innebär att prototypen inte innehåller någon kod eller funktionalitet som är specifik för någon enhet så länge det är en PoT-enhet. Den föreslagna designen och implementationen är skalbar och effektiv. Över ett tusen signerade auktorisationer kan genereras per sekund på en exekveringstråd. I ett system där användare ges behörighet till 200 unika behörigheter på olika enheter uppgår den totala filstorleken för de signerade auktorisationerna och tillhörande metadata till mindre än 150 kB. Det tar uppskattningsvis 70 ms att skapa en säker anslutning mellan klient- och server-mjukvara. För stora dataöverföringar är överföringshastigheten uppskattningsvis 2.6-2.8 MB per sekund, vilket inkluderar kryptering och avkryptering av fråga och svar från klienten till servern.
APA, Harvard, Vancouver, ISO, and other styles
9

Jazdi, Nasser. "Universelle Fernservice-Infrastruktur für eingebettete Systeme." Aachen : Shaker, 2003. http://deposit.d-nb.de/cgi-bin/dokserv?idn=969068980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Jedlička, Zdeněk. "Přístupový systém založený na protokolu ACP." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219429.

Full text
Abstract:
Work is focused on the possibility of implementation of ACP into applications for mobile devices using the Android operating system ogether with the implementation of this Protocol in the hardware device. Communication is based on standard TCP / IP and UDP protocol.
APA, Harvard, Vancouver, ISO, and other styles
11

Дідуник, Олег Андрійович, Микола Володимирович Дрозд, Oleh Didunyk, and Mykola Drozd. "Розробка та дослідження автоматизованої системи забезпечення безпеки адміністративного корпусу." Master's thesis, Тернопіль, ТНТУ, 2019. http://elartu.tntu.edu.ua/handle/lib/29664.

Full text
Abstract:
Роботу виконано на кафедрі ком’пютерно-інтегрованих технологій Тернопільського національного технічного університету імені Івана Пулюя Міністерства освіти і науки України Захист відбудеться 23 грудня 2019 р. о 12 .30 годині на засіданні екзаменаційної комісії № 45 у Тернопільському національному технічному університеті імені Івана Пулюя за адресою: 46001, м. Тернопіль, вул.Руська, 56, навчальний корпус №1, ауд. 401
Дідуник О. А., Дрозд М.В. Розробка та дослідження автоматизованої системи забезпечення безпеки адміністративного корпусу. 151 – автоматизація та комп’ютерно-інтегровані технології. – Тернопільський національний технічний університет імені Івана Пулюя. – Тернопіль, 2019. В магістерській роботі розроблено автоматизовану систему для організації системи охороно та безпеки адміністративної будівлі. Було розглянуто та проаналізовано основні принципи побудови комплексних систем безпеки. Приведено принципи, приклади реалізації та елементи можливої оптимізації та здешевлення такої системи та розширення її функціональних можливостей Didunyk О.А., Drozd M. V. Development and research of the automated security system of the administrative building. 151 - Automation and computer-integrated technologies. - Ternopil National Technical University named after Ivan Puluj. - Ternopil, 2019. In the master's work, an automated system was developed for organizing the system of security and safety of the administrative building. Basic principles of complex security systems construction were considered and analyzed. The principles, examples of implementation and elements of possible optimization and cheapening of such a system and expansion of its functionality are presented.
ВСТУП 9 1. АНАЛІТИЧНА ЧАСТИНА 12 1.1. Загальні положення та методики для організації захисту об’єктів 12 1.2. Класифікація предметів та об’єктів охорони 14 1.3. Основи формування комплексу технічних засобів забезпечення безпеки 20 1.4. Загальні принципи побудови систем безпеки 23 1.5. Умови функціонування систем безпеки 26 1.6 Структура комплексної системи безпеки 29 2. ТЕХНОЛОГІЧНА ЧАСТИНА 35 2.1. Принципи роботи комплексної системи безпеки адміністративного об’єкту 35 2.2 Підсистема протипожежної безпеки 38 2.3. Підсистема відео нагляду 39 2.4. Підсистема контролю проникнення 41 3. КОНСТРУКТОРСЬКА ЧАСТИНА 45 3.1. Система під’єднання камер та структура системи відеоспостереження 47 3.2. Система охоронної сигналізації та протипожежної охорони 50 3.3. Альтернативні системи для вирішення проблемних моментів в системах охорони 54 4. НАУКОВО-ДОСЛІДНА ЧАСТИНА 64 4.1 Дослідження розподілу звукового сигналу 64 4.2. Оптимізація затрат живлення на обслуговування системи давачів проникнення 66 5. СПЕЦІАЛЬНА ЧАСТИНА 70 5.1. Налаштування доступу до системи відеонагляду через хмарний сервіс 70 5.2. Налаштування роутера для доступу до системи безпеки по зовнішній IP адресі 77 5.3 Опис налаштування IVMS для мобільних пристроїв 84 6. ОБГРУНТУВАННЯ-ЕКОНОМІЧНОЇ ЕФЕКТИВНОСТІ 90 6.1. Розрахунок норм часу на виконання науково-дослідної роботи 90 6.2 Визначення витрат на оплату праці та відрахувань на соціальні заходи 91 6.3 Розрахунок матеріальних витрат 94 6.4 Розрахунок витрат на електроенергію 95 6.5 Розрахунок суми амортизаційних відрахувань 96 5.6 Обчислення накладних витрат 97 5.7 Складання кошторису витрат та визначення собівартості науково-дослідницької роботи 98 5.8 Розрахунок ціни розробки системи 99 5.9 Визначення економічної ефективності і терміну окупності капітальних вкладень 100 7 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ 102 7.1 Організація охорони праці при роботі з системою управління 102 7.2 Електробезпека 104 7.3 Розрахунок заземлення 107 8 ЕКОЛОГІЯ 111 8.1 Екологізація виробництва 111 8.2 Зниження енергоємності та енергозбереження. 112 8.3 Джерела електромагнітних полів, іонізуючого випромінення та методи їх знешкодження. 114 ВИСНОВКИ 116 ПЕРЕЛІК ПОСИЛАНЬ 117 ДОДАТКИ 119
APA, Harvard, Vancouver, ISO, and other styles
12

Koorland, Neil Karl. "A message-based remote database access facility." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24831.

Full text
Abstract:
We present a design for a remote database access facility, which uses a message system as its communication medium. Adopting a message-based design offers a number of advantages over more conventional connection-oriented architectures for those remote database applications where the interaction between user and DBMS involves a single query followed by a single result. By complying with the CCITT X.400 Recommendations on Message Handling Systems, the design allows for networkwide access to remote DBMSs that is independent of the nature of DBMSs being accessed, the systems on which they reside and the network over which they are accessed. An initial implementation using the EAN distributed message system, developed at the University of British Columbia, is described as a means of demonstrating the design's feasibility.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
13

Digiere, Adriano Ricardo [UNESP]. "Camada de gerenciamento para comunicação entre computadores baseada em redes sem fio (WSE-OS)." Universidade Estadual Paulista (UNESP), 2011. http://hdl.handle.net/11449/98660.

Full text
Abstract:
Made available in DSpace on 2014-06-11T19:29:40Z (GMT). No. of bitstreams: 0 Previous issue date: 2011-03-31Bitstream added on 2014-06-13T19:59:30Z : No. of bitstreams: 1 digiere_ar_me_sjrp.pdf: 1496121 bytes, checksum: 2cc2450b0bec5e0610a6820222483893 (MD5)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES)
O maior custo de propriedade de computadores não é o hardware ou o software, mas sim o tempo que os profissionais de informática gastam em suporte e manutenção dos ambientes computacionais. Em um conglomerado de computadores em rede, cada computador torna- se uma entidade gerenciada individualmente, o que gera contínuas solicitações de alterações de configuração, como instalação de atualizações de software, conexão e configuração de periféricos, criação de perfis de e-mail e aplicação de patches. Além disso, existe ainda o risco de furto de dados e invasão por hackers quando os computadores dos usuários não estão protegidos. Aliado a este cenário, a constante evolução dos sistemas computacionais e seu potencial de processamento, a cada dia são necessárias novas técnicas de aproveitamento destes recursos. Soluções que visam facilitar o gerenciamento de ambientes com grande massa de computadores de forma a tirar o máximo proveito do poder computacional concentrado em servidores já se tornaram necessidades reais, não só em grandes corporações, mas também em pequenas e médias empresas, além de outros tipos organizações, como por exemplo, instituições de ensino. Frente esta necessidade, focando uma ferramenta compatível neste cenário de crescimento, este trabalho apresenta um modelo de gerenciamento centralizado, nomeado WSE-OS (Wireless Sharing Environment – Operating Systems), baseado em técnicas de virtualização e acesso remoto seguro combinadas a um sistema de arquivos remotos em espaço de usuário. Esta solução elimina a necessidade da instalação e configuração de aplicativos “máquina a máquina”, além de tirar maior proveito do poder computacional existente nos servidores. A principal característica deste modelo que o destaca das soluções atuais é que ele é especificamente elaborado para operar sobre redes...
The largest cost of desktop ownership is not the hardware or software, but the time that administrators spend on support and maintenance of computing environments. In a conglomerate of computers in a network, each computer becomes an entity managed individually, which generates continuous requests for configuration changes, such as installing software updates, configuration and connection of peripherals, profiling email and applying patches. Moreover, there is the risk of data theft and hacking when users' computers are not protected. Allied to this scenario, the constant evolution of computer systems and their potential for processing, each day requires new techniques for exploitation of these resources. Solutions aimed facilitating the management of environments with large mass of computers to take maximum advantage of computing power concentrated on servers have become real needs, not only in large corporations but also small and medium enterprises, besides other types organizations, such as educational institutions. Facing this need, focusing on a tool that supported this growth scenario, this work presents a centralized management model, named WSE-OS (Wireless Sharing Environment – Operating Systems) based on virtualization techniques and secure remote access combined with a remote file system in user space. This solution eliminates the need for installing and configuring applications machine to machine, besides take greater advantage of existing computing power on the servers . The main feature of this model that highlights the current solutions is that it is specifically designed to operate on networks with low transmission rates, such as wireless networks. The WSE-OS is able to perform the replication of operating system images in an environment with WLAN communication, which makes management more flexible and independent of physical connections, besides offer... (Complete abstract click electronic access below)
APA, Harvard, Vancouver, ISO, and other styles
14

Digiere, Adriano Ricardo. "Camada de gerenciamento para comunicação entre computadores baseada em redes sem fio (WSE-OS) /." São José do Rio Preto : [s.n.], 2011. http://hdl.handle.net/11449/98660.

Full text
Abstract:
Orientador: Roberta Spolon
Banca: João Paulo Papa
Banca: Regina Helena Carlucci Santana
Resumo: O maior custo de propriedade de computadores não é o hardware ou o software, mas sim o tempo que os profissionais de informática gastam em suporte e manutenção dos ambientes computacionais. Em um conglomerado de computadores em rede, cada computador torna- se uma entidade gerenciada individualmente, o que gera contínuas solicitações de alterações de configuração, como instalação de atualizações de software, conexão e configuração de periféricos, criação de perfis de e-mail e aplicação de patches. Além disso, existe ainda o risco de furto de dados e invasão por hackers quando os computadores dos usuários não estão protegidos. Aliado a este cenário, a constante evolução dos sistemas computacionais e seu potencial de processamento, a cada dia são necessárias novas técnicas de aproveitamento destes recursos. Soluções que visam facilitar o gerenciamento de ambientes com grande massa de computadores de forma a tirar o máximo proveito do poder computacional concentrado em servidores já se tornaram necessidades reais, não só em grandes corporações, mas também em pequenas e médias empresas, além de outros tipos organizações, como por exemplo, instituições de ensino. Frente esta necessidade, focando uma ferramenta compatível neste cenário de crescimento, este trabalho apresenta um modelo de gerenciamento centralizado, nomeado WSE-OS (Wireless Sharing Environment - Operating Systems), baseado em técnicas de virtualização e acesso remoto seguro combinadas a um sistema de arquivos remotos em espaço de usuário. Esta solução elimina a necessidade da instalação e configuração de aplicativos "máquina a máquina", além de tirar maior proveito do poder computacional existente nos servidores. A principal característica deste modelo que o destaca das soluções atuais é que ele é especificamente elaborado para operar sobre redes... (Resumo completo, clicar acesso eletrônico abaixo)
Abstract: The largest cost of desktop ownership is not the hardware or software, but the time that administrators spend on support and maintenance of computing environments. In a conglomerate of computers in a network, each computer becomes an entity managed individually, which generates continuous requests for configuration changes, such as installing software updates, configuration and connection of peripherals, profiling email and applying patches. Moreover, there is the risk of data theft and hacking when users' computers are not protected. Allied to this scenario, the constant evolution of computer systems and their potential for processing, each day requires new techniques for exploitation of these resources. Solutions aimed facilitating the management of environments with large mass of computers to take maximum advantage of computing power concentrated on servers have become real needs, not only in large corporations but also small and medium enterprises, besides other types organizations, such as educational institutions. Facing this need, focusing on a tool that supported this growth scenario, this work presents a centralized management model, named WSE-OS (Wireless Sharing Environment - Operating Systems) based on virtualization techniques and secure remote access combined with a remote file system in user space. This solution eliminates the need for installing and configuring applications "machine to machine", besides take greater advantage of existing computing power on the servers . The main feature of this model that highlights the current solutions is that it is specifically designed to operate on networks with low transmission rates, such as wireless networks. The WSE-OS is able to perform the replication of operating system images in an environment with WLAN communication, which makes management more flexible and independent of physical connections, besides offer... (Complete abstract click electronic access below)
Mestre
APA, Harvard, Vancouver, ISO, and other styles
15

Karlsson, Johanna. "Nomadic Computing : Security assessment of remote access to workplace systems." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4845.

Full text
Abstract:
Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered. For this purpose a futuristic scenario has been used as a method to identify challenges within nomadic computing. After looking at the state of the art of wireless communication and security techniques, evaluating the focused techniques and looking at future trends, some preliminary conclusions could be made. A model of technology uptake has been used. The main concept of the model is to show that the uptake is depending on a co-evolution between different parts and not only the technique. One conclusion is therefore that the users must have confidence in the technique, but also in the organisation and the organisational use of the technique or else they will not use it. Security is important in order to create this trust and is thus of decisive importance to the technology uptake. Another conclusion is that the three focused techniques; rule-based access, authentication and policy/contract can be used today, but also in the future to increase the security for remote access. Finally, education and user awareness seems to be important in the future, even though the users interact less in the security management.
APA, Harvard, Vancouver, ISO, and other styles
16

Sintaro, Abel Tariku, and Yemi Emmanuel Komolafe. "SDP And VPN For Remote Access : A Comparative Study And Performance Evaluation." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-103892.

Full text
Abstract:
Remote access is a way of providing access to networks from outside the premises of the network. Virtual Private Network (VPN) is one solution used to provide remote access. Software-Defined Perimeter (SDP) is another solution that is capable of providing access to resources from a remote location. These two technologies use different security models yet provide comparable remote access functionalities. This thesis project investigates the basic components, architecture, and security services of SDP and IPSec VPN. Additionally, a performance evaluation is conducted on SDPand VPN on their connection setup time and network throughput. Our result shows that both SDP and VPN provide secure access, however, SDP has additional features that make it a more secure solution. This thesis project is written in the hopes that it can help enterprises with or without a VPN solution already in place to consider SDP as an alternative solution and learn SDP in comparison with VPN.
APA, Harvard, Vancouver, ISO, and other styles
17

Colnago, Guilherme Piazentini. "Desenvolvimento e implementação de um sistema de monitoramento em tempo real da tensão da rede com acesso remoto." Universidade Federal do Espírito Santo, 2009. http://repositorio.ufes.br/handle/10/6212.

Full text
Abstract:
Made available in DSpace on 2016-12-23T14:07:25Z (GMT). No. of bitstreams: 1 Texto.pdf: 1767882 bytes, checksum: f8f65214aa10171d5d8bab0355646542 (MD5) Previous issue date: 2009-10-05
No Brasil, até pouco tempo atrás, a qualidade da energia elétrica estava relacionada, basicamente, com interrupções do fornecimento de energia e a certas cargas especiais da indústria. Porém, nos últimos anos, sob a direção da agência reguladora do setor, a ANEEL (Agência Nacional de Energia Elétrica), juntamente com especialistas, a área de qualidade da energia elétrica passou a receber uma atenção significativa, sendo legislada e adquirindo suas regulamentações iniciais. A área de Qualidade da Energia Elétrica passou, então, a formalmente existir e abranger um conjunto maior de fenômenos e eventos da rede elétrica. Em função dessa recente regulamentação, este trabalho apresenta o projeto de um medidor da qualidade da energia elétrica. Um dos focos do medidor é ser de baixo custo, tornando-o viável para o uso em grande escala. Este medidor é um sistema eletrônico que processa digitalmente os sinais de tensão da rede elétrica, extraindo os dados relacionados à qualidade da energia elétrica; tais dados são armazenados localmente e, posteriormente, acessados remotamente e enviados para um banco de dados, de forma que possam ser analisados.
Some years ago in Brazil the power quality was related, basically, with interruption of supplied energy and certain special loads of industry. In recent years, however, under controls of the regulating agency ANEEL (Agência Nacional de Energia Elétrica) and with specialists, the power quality area received the due attention and was legislated and acquired regulations. So, finally, the area of Power Quality was formally created and now it embraces several electrical phenomena and events. Because of the new regulations, this work presents a project of a power quality meter. One of meter s focuses is to be a low cost system and becomes able to be used in large scale. This power quality meter is an electronic system that processes the voltage signal of electrical network and extracts data related to power quality; the data are locally stored and after they are remotely accessed and transmitted to a data base to be analyzed.
APA, Harvard, Vancouver, ISO, and other styles
18

Kientz, Julie A. "Decision support for caregivers through embedded capture and access." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24612.

Full text
Abstract:
Thesis (Ph.D.)--Interactive Computing, Georgia Institute of Technology, 2009.
Committee Chair: Abowd, Gregory; Committee Member: Ackerman, Mark; Committee Member: Grinter, Rebecca; Committee Member: Mynatt, Elizabeth; Committee Member: Rodden, Thomas
APA, Harvard, Vancouver, ISO, and other styles
19

Champion, Caitlin. "A Systems Analysis Approach to Colorectal Cancer Screening Access In the Northwest Territories." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35547.

Full text
Abstract:
Introduction The Northwest Territories as a rural and remote region of Canada has higher colorectal cancer rates and lower uptake of colorectal cancer screening compared to the rest of the country. Understanding the complex health system processes involved in screening is necessary to develop informed solutions to improve screening access amongst marginalized populations. A systems approach to describe and understand the health care processes and system-level factors influencing colorectal cancer screening access was undertaken. Methods Semi-structured interviews with health care providers (N=29) involved in colorectal cancer screening in all health authorities within the Northwest Territories (N=8) were performed from September to December 2015. Interview transcripts were analyzed using qualitative content analysis methods within a Collaborative Information Behaviour (CIB) and Continuity of Care framework. Exploratory models of colorectal cancer screening processes were developed and translated into quantitative parameters for simulation modelling. Results Colorectal cancer screening access was defined by patient health care interactions supported by foundational information processes. Eighteen models of colorectal cancer screening access within the territory were identified, with varying complexity in care access seen across communities. Screening access problems included screening initiation, colonoscopy scheduling, screening recall and information silos, and were influenced by multiple contextual factors including a transient health work force, social health determinants, and patient travel. Qualitative models were translated into a system dynamics (SD) design framework for development of further quantitative modeling. Conclusions Colorectal cancer screening access in the Northwest Territories is a complex process comprising patient interactions and information processes linking primary care and hospital care processes, which are influenced by challenging contextual factors in the rural and remote health care environment. In developing screening access solutions the foundational role of information support and the need for system trade-offs in restructuring health system processes are necessary considerations. Optimizing information processes through the utilization of health informatics tools such as standardized referral forms and EMRs may also support health system transformation to improve screening access across the Northwest Territories. Understanding and evaluating system trade-offs may be best achieved using a combination of qualitative and quantitative modeling through future application of SD modeling research.
APA, Harvard, Vancouver, ISO, and other styles
20

Gill, Khusvinder. "Enhancing the security of wireless sensor network based home automation systems." Thesis, Loughborough University, 2009. https://dspace.lboro.ac.uk/2134/5951.

Full text
Abstract:
Home automation systems (HASs)seek to improve the quality of life for individuals through the automation of household devices. Recently, there has been a trend, in academia and industry, to research and develop low-cost Wireless Sensor Network (WSN) based HASs (Varchola et al. 2007). WSNs are designed to achieve a low-cost wireless networking solution, through the incorporation of limited processing, memory, and power resources. Consequently, providing secure and reliable remote access for resource limited WSNs, such as WSN based HASs, poses a significant challenge (Perrig et al. 2004). This thesis introduces the development of a hybrid communications approach to increase the resistance of WSN based HASs to remote DoS flooding attacks targeted against a third party. The approach is benchmarked against the dominant GHS remote access approach for WSN based HASs (Bergstrom et al. 2001), on a WSN based HAS test-bed, and shown to provide a minimum of a 58.28%, on average 59.85%, and a maximum of 61.45% increase in remote service availability during a DoS attack. Additionally, a virtual home incorporating a cryptographic based DoS detection algorithm, is developed to increase resistance to remote DoS flooding attacks targeted directly at WSN based HASs. The approach is benchmarked against D-WARD (Mirkovic 2003), the most effective DoS defence identified from the research, and shown to provide a minimum 84.70%, an average 91.13% and a maximum 95.6% reduction in packets loss on a WSN based HAS during a DoS flooding attack. Moreover, the approach is extended with the integration of a virtual home, hybrid communication approach, and a distributed denial of defence server to increase resistance to remote DoS attacks targeting the home gateway. The approach is again benchmarked against the D-WARD defence and shown to decrease the connection latency experienced by remote users by a minimum of 90.14%, an average 90.90%, and a maximum 91.88%.
APA, Harvard, Vancouver, ISO, and other styles
21

Abdulwahed, Mahmoud. "Towards enhancing laboratory education by the development and evaluation of the "TriLab" : a triple access mode (virtual, hands-on and remote) laboratory." Thesis, Loughborough University, 2010. https://dspace.lboro.ac.uk/2134/6355.

Full text
Abstract:
This thesis contributes to the general body of knowledge of research into engineering education. The main scope of the thesis is on enhancing laboratory education. There are three main types of laboratory: virtual, hands-on and remote. The hands-on lab is the oldest and most commonly used medium for experiential education in undergraduate degrees of science and engineering. The literature review of laboratory education has shown that hands-on labs suffer from many disadvantages, which can be overcome by utilizing hybrid laboratory structures that incorporate virtual and/or remote modes. The investigation into enhanced laboratory education is achieved via implementing new technical and pedagogical models of conducting laboratories. The technical model incorporates three access modes (virtual, hands-on and remote) to the laboratory experience in one software package called the TriLab. The TriLab concept has been applied to the Process Control Lab at the Chemical Engineering Department of Loughborough University and has been implemented using LabVIEW. The Joomla web content management system was used to develop an online portal for disseminating the remote component of the TriLab resulting in the first remote lab portal of Loughborough University and one of the few available in the UK. A pedagogical model of laboratory education based on Kolb's experiential learning theory and by the utilization of the TriLab concept is proposed. The model is built on a hypothesis, which states that the poor learning outcomes of hands-on laboratory sessions can be associated with poor activation of the stages of Kolb's experiential learning cycle. It has been proposed that access to a virtual lab in a preparatory session will play a role in activating the stages of Kolb's cycle. To verify this, educational experimentation procedures were designed and applied to two groups, control and experimental. Measurements via pre- and post-lab tests, marks for the laboratory report and the final exam of the module have been performed. The statistical analysis of the measurements has supported the stated hypothesis and solution proposal. The proposed pedagogical model is one of the few that provide a way of conducting laboratory education based on constructivist educational theories. (Continues...).
APA, Harvard, Vancouver, ISO, and other styles
22

Zhou, Lin. "Energy efficient transmitter design with compact antenna for future wireless communication systems." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/33104.

Full text
Abstract:
This thesis explores a novel technique for transceiver design in future wireless systems, which is cloud radio access networks (CRANs) with single radio frequency (RF) chain antennas at each remote radio head (RRH). This thesis seeks to make three contributions. Firstly, it proposes a novel algorithm to solve the oscillatory/unstable behaviour of electronically steerable parasitic array radiators (ESPAR) when it provides multi-antenna functionality with a single RF chain. This thesis formulates an optimization problem and derives closed-form expressions when calculating the configuration of an ESPAR antenna (EA) for arbitrary signals transmission. This results in simplified processing at the transmitter. The results illustrate that the EA transmitter, when utilizing novel closed-form expressions, shows significant improvement over the performance of the EA transmitter without any pre-processing. It performs at nearly the same symbol error rate (SER) as standard multiple antenna systems. Secondly, this thesis illustrates how a practical peak power constraint can be put into an EA transceiver design. In an EA, all the antenna elements are fed centrally by a single power amplifier. This makes it more probable that during use, the power amplifier reaches maximum power during transmission. Considering limited power availability, this thesis proposes a new algorithm to achieve stable signal transmission. Thirdly, this thesis shows that an energy efficiency (EE) optimization problem can be formulated and solved in CRANs that deploy single RF chain antennas at RRHs. The closed-form expressions of the precoder and power allocation schemes to transmit desired signals are obtained to maximise EE for both single-user and multi-user systems. The results show that the CRANs with single RF chain antennas provide superior EE performance compared to the standard multiple antenna based systems.
APA, Harvard, Vancouver, ISO, and other styles
23

Matoušek, Vojtěch. "Vzdálené získávání dat z digitálního tachografu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413277.

Full text
Abstract:
Thesis deals with device firmware design located in lorry, which provides remote access to vehicle digital tachograph data according to valid EU legislation. The result of this work is a system, which downloads digital data from digital tachograph and save them on remote server. The system for remote data downloading from automotive digital tachograph consists of three kinds of applications: server application, user application and firmware for communication device. Communication between applications uses encrypted TCP connection and own special designed messages.
APA, Harvard, Vancouver, ISO, and other styles
24

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
25

"LAN based Remote Access Multiple Users (RAMU) Voice Information Retrieval System." Chinese University of Hong Kong, 1992. http://library.cuhk.edu.hk/record=b5887003.

Full text
Abstract:
Sum Wai Chun.
Thesis (M.Sc.)--Chinese University of Hong Kong, 1992.
Includes bibliographical references.
Acknowledgement
Abstract
Thesis
Chapter I --- Introduction --- p.P.1 - P.3
Chapter II --- System Overview of RAMU --- p.P.3 - P.5
Chapter III --- Hardware Implementation of VRU --- p.P.5 - P.8
Chapter IV --- Software Design of RAMU --- p.P.8 - P.15
Chapter V --- Software Support of RAMU --- p.P.15
Chapter VI --- Potential Applications of RAMU --- p.P.16 - P.17
Chapter VII --- Suggested Further Works --- p.P.17 - P.18
Chapter VIII --- Demonstrated Applications Developed on RAMU --- p.P.18 - P.19
Chapter IX --- Conclusion --- p.P.19
Bibliography
Chapter Appendix 1 -- --- TIU
Chapter * --- Circuit layout
Chapter * --- Circuit Operation of TIU
Chapter * --- DIP Switch Settings of TIU
Chapter * --- Data Sheets of8255
Chapter * --- Data Sheets of MC145436
Chapter Appendix 2 -- --- Application Generator
Chapter * --- User Guide of the Application Generator Program
Chapter * --- Program Listing of AppGen. Pas and its supporting units
Chapter - --- M__AppGen.Pas
Chapter - --- DataStru. Pas
Chapter - --- ColorDef. Pas
Chapter Appendix 3 -- --- AEM
Chapter * --- Parameters of Running the AEM
Chapter * --- Program Listing of LAppExec.Pas and its supporting units
Chapter - --- ToneCard. Pas
Chapter - --- VrpSupp. Pas
Chapter - --- MiscUtil. Pas
Chapter - --- DataStru. Pas
Chapter - --- LanMStru. Pas
Appendix 4-- Manufacturer Manual of VRP-70 Voice Card
APA, Harvard, Vancouver, ISO, and other styles
26

Khankan, K. "TOMRAS : a Task Oriented Mobile Remote Access System for desktop applications." Thesis, 2009. http://hdl.handle.net/10453/30186.

Full text
Abstract:
University of Technology, Sydney. Faculty of Engineering and Information Technology.
Mobile remote access to desktop applications is a potential enabler to improving the productivity and convenience of individuals and businesses. There is an increasing research interest in developing mobile remote access solutions for desktop applications. The developed proposals, however, are challenged by the hardware limitations of most mobile devices, such as the small display size. These limitations have a direct impact on the way existing desktop applications are presented on mobile devices. This thesis focuses on developing new ways of achieving effective mobile remote access to existing desktop applications. A conceptual model and implementation architecture for a task-oriented mobile remote access system (TOMRAS) have been introduced. The TOMRAS model adopts a user interface refactoring approach to generate task-oriented user interfaces for existing desktop applications without re-developing or modifying these applications. TOMRAS has a number of novel aspects, including, inferring user interface and behaviour knowledge from existing applications and transparently exposing the functionalities of existing desktop applications to be remotely accessible via a wide spectrum of mobile devices and platforms without redeveloping these desktop applications. The TOMRAS strategy of decoupling the generated mobile task's user interface from the functionality of existing applications also allows for a possible enriching of the mobile task's user interface with multimodal interaction capabilities. The thesis describes the TOMRAS conceptual model, and a potential implementation architecture for this model. The proposed implementation architecture articulates the intrinsic building blocks for mobile remote access solutions that adopt the TOMRAS model. The limitations of how widely and generically the model and techniques can be applied are also detailed in the thesis. Furthermore, a prototype that validates the feasibility of the TOMRAS implementation architecture is provided, and an evaluation of the effectiveness of the task-oriented approach is presented.
APA, Harvard, Vancouver, ISO, and other styles
27

GUPTA, BISWOJEET KUMAR. "INTEGRATION OF TECHNOLOGY TO ACCESS THE MANUFACTURING PLANT VIA REMOTE ACCESS SYSTEM - A PART OF INDUSTRY 4.0." Thesis, 2021. http://dspace.dtu.ac.in:8080/jspui/handle/repository/19087.

Full text
Abstract:
During Covid-19 many manufacturing industries had to stop production operations and close the plant for someday as there was a lockdown and people were not allowed to go out. Meanwhile, the IT sector and some other industries are growing very fast. The reason is that they have the facility of Work from Home. Why shouldn't the manufacturing industry have such a system through which production operations can be monitored and controlled from home? Remote Access System is such technology through which manufacturing operations can be monitored and controlled remotely from any part of the world. This is formed by integrating the existing technology such as SCADA, microcontroller, OPC server, Internet, Sensor, and Actuator. The simulation model of the Remote Access System is designed on Proteus and Wonderware Intouch to demonstrate its possibility and how it will work. The SCADA model of the manufacturing plant which is designed in Intouch successfully communicated with the Arduino model of Proteus. Operators with Desktop remote connection software get access to HMI and control the operation which is designed in the simulation model. The simulation model shows a latency of 326 milliseconds which shows the requirement of a fast data transmission network with proper protocol for the industrial device. From this study, we conclude that the Remote Access system is possible but it will not be effective until the infrastructure of IIoT is developed. Remote Access System is a part of Industry 4.0 as in this model of the industry every device is connected with the central controlling unit which can monitor and control them. Much research is carried out under Industry 4.0 which will develop infrastructure for IIoT and make the Remote Access system effective.
APA, Harvard, Vancouver, ISO, and other styles
28

Chang, Dun-Kai, and 張敦凱. "Time-limited Reconfigurable Remote Control Using Mobile Phones in Access Management System." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/34087332122937623267.

Full text
Abstract:
碩士
國立中興大學
電機工程學系所
104
This thesis proposes a reconfigurable access control system by using a mobile phone, an Arduino control board and Bluetooth transmission medium to replace conventional remote control. At the part of mobile phones, we create an APP as a remote control, while the Arduino is used as a local access control center, which is responsible for home security. For the information exchange process, the protection mechanism is inspired by XECryption algorithm using the ASCII conversion to provide the secrecy of the contents. For the second protection mechanism, we utilize the identity of the un-locker (for example: a host or a guest), integrating the effective period of the lock with the addresses of Bluetooth device to complete the authentication. Therefore, by applying the proposed management mechanisms, we may implement a reliable Bluetooth lock for access control.
APA, Harvard, Vancouver, ISO, and other styles
29

(9733472), Terri Sue Krause. "STAKEHOLDER PERCEPTIONS OF THE VIABILITY OF A FULLY REMOTE APPRENTICESHIP DELIVERY SYSTEM PRE-COVID-19 WITH UPDATES MID-PANDEMIC—A QUALITATIVE EXPLORATORY STUDY." Thesis, 2020.

Find full text
Abstract:
This study explores the perceptions of critical stakeholders as to the viability of a fully remote apprenticeship delivery system (FRADS), as well as its ability to serve as a functionally equivalent path of inclusion for access-limited populations. One of the first recorded pedagogical models, apprenticeship was also one of the first to be regulated. The effectiveness of the method of training a novice to enter the adult world of work through apprenticeship is undisputed, when it is conducted in a manner approximate to that from which it derived: a process that occurs over time, with continuous interaction between novice and expert. Despite millennia of practice, and a few emerging programs called Virtual Apprenticeships, the critical real-time skills-based mentoring component (on the job instruction/training, or OJI/OJT) of the modern apprenticeship is still only carried out fully in face-to-face programs. With the move to work-from-home (WFH) resulting from the global COVID-19 pandemic of 2020, assessing the viability of a FRADS is timely. This qualitative exploratory study is a first step in the discussion. Bounded by the parameters of the U.S. Certified Apprenticeship Guidelines for Registered Apprenticeships and the constructs of viability and functional equivalence, participants of three critical stakeholder groups—policy makers, service managers, and front-line service workers—offer their pre-pandemic perceptions of the construct of a FRADS. Guided by the work of Jahoda, et al., (1957), Northrop (1949,1959), and Swedberg (2018), this qualitative exploratory methodology identified perceptual data points that are then compared against a framework of viability derived from IEG’s Service Delivery Evaluation Framework (Caceres, et al., 2016). And, because this represents a large systems change (LSC), I included aspects of Weiner’s (2009) Organizational Readiness for Change—valance and efficacy—as additional indicators of potential viability. Stakeholders examined key components of IEG’s evaluative criteria applied to a face-to-face apprenticeship as a functionally equivalent, technology-mediated apprenticeship delivery system. Additional stakeholder perceptions, mid-pandemic, along with a review of scholarly articles, media reports, and Department of Labor statistics concerning the impact of the WFH mandates foreground the gap a purposeful FRADS might fill. Analysis of some of the findings are represented in a preliminary process map.
APA, Harvard, Vancouver, ISO, and other styles
30

Regateiro, Diogo José Domingues. "Dynamic and secure remote database access with soft access policies integration." Doctoral thesis, 2021. http://hdl.handle.net/10773/31633.

Full text
Abstract:
The amount of data being created and shared has grown greatly in recent years, thanks in part to social media and the growth of smart devices. Managing the storage and processing of this data can give a competitive edge when used to create new services, to enhance targeted advertising, etc. To achieve this, the data must be accessed and processed. When applications that access this data are developed, tools such as Java Database Connectivity, ADO.NET and Hibernate are typically used. However, while these tools aim to bridge the gap between databases and the object-oriented programming paradigm, they focus only on the connectivity issue. This leads to increased development time as developers need to master the access policies to write correct queries. Moreover, when used in database applications within noncontrolled environments, other issues emerge such as database credentials theft; application authentication; authorization and auditing of large groups of new users seeking access to data, potentially with vague requirements; network eavesdropping for data and credential disclosure; impersonating database servers for data modification; application tampering for unrestricted database access and data disclosure; etc. Therefore, an architecture capable of addressing these issues is necessary to build a reliable set of access control solutions to expand and simplify the application scenarios of access control systems. The objective, then, is to secure the remote access to databases, since database applications may be used in hard-to-control environments and physical access to the host machines/network may not be always protected. Furthermore, the authorization process should dynamically grant the appropriate permissions to users that have not been explicitly authorized to handle large groups seeking access to data. This includes scenarios where the definition of the access requirements is difficult due to their vagueness, usually requiring a security expert to authorize each user individually. This is achieved by integrating and auditing soft access policies based on fuzzy set theory in the access control decision-making process. A proof-of-concept of this architecture is provided alongside a functional and performance assessment.
A quantidade de dados criados e partilhados tem crescido nos últimos anos, em parte graças às redes sociais e à proliferação dos dispositivos inteligentes. A gestão do armazenamento e processamento destes dados pode fornecer uma vantagem competitiva quando usados para criar novos serviços, para melhorar a publicidade direcionada, etc. Para atingir este objetivo, os dados devem ser acedidos e processados. Quando as aplicações que acedem a estes dados são desenvolvidos, ferramentas como Java Database Connectivity, ADO.NET e Hibernate são normalmente utilizados. No entanto, embora estas ferramentas tenham como objetivo preencher a lacuna entre as bases de dados e o paradigma da programação orientada por objetos, elas concentram-se apenas na questão da conectividade. Isto aumenta o tempo de desenvolvimento, pois os programadores precisam dominar as políticas de acesso para escrever consultas corretas. Além disso, quando usado em aplicações de bases de dados em ambientes não controlados, surgem outros problemas, como roubo de credenciais da base de dados; autenticação de aplicações; autorização e auditoria de grandes grupos de novos utilizadores que procuram acesso aos dados, potencialmente com requisitos vagos; escuta da rede para obtenção de dados e credenciais; personificação de servidores de bases de dados para modificação de dados; manipulação de aplicações para acesso ilimitado à base de dados e divulgação de dados; etc. Uma arquitetura capaz de resolver esses problemas é necessária para construir um conjunto confiável de soluções de controlo de acesso, para expandir e simplificar os cenários de aplicação destes sistemas. O objetivo, então, é proteger o acesso remoto a bases de dados, uma vez que as aplicações de bases de dados podem ser usados em ambientes de difícil controlo e o acesso físico às máquinas/rede nem sempre está protegido. Adicionalmente, o processo de autorização deve conceder dinamicamente as permissões adequadas aos utilizadores que não foram explicitamente autorizados para suportar grupos grandes de utilizadores que procuram aceder aos dados. Isto inclui cenários em que a definição dos requisitos de acesso é difícil devido à sua imprecisão, geralmente exigindo um especialista em segurança para autorizar cada utilizador individualmente. Este objetivo é atingido no processo de decisão de controlo de acesso com a integração e auditaria das políticas de acesso suaves baseadas na teoria de conjuntos difusos. Uma prova de conceito desta arquitetura é fornecida em conjunto com uma avaliação funcional e de desempenho.
Programa Doutoral em Informática
APA, Harvard, Vancouver, ISO, and other styles
31

Liu, Chia-Hui, and 劉嘉惠. "Secure Remote Mobile Access in Health Information Systems." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/07886298454022717945.

Full text
Abstract:
博士
國立臺灣大學
電機工程學研究所
99
For the rapid development of wireless networks, mobile computing has greatly in the past few years and would be continue that trend into the future. With advancing computation and storage capacity of mobile devices, the applications of mobile computing also become more various and popular in our lives. It enables mobile users to compute and access information from anywhere, anytime. Therefore, deploying secure remote access is the most important issue when mobile computing applications haves become critical roles of network technology, especially in mobile Health Information Systems (HIS). Because the health information is inherently sensitive, remote access of mobile environment in HIS must be computationally efficient, secure, and require minimal storage capacity. With the abilities of higher autonomy and mobility, a mobile agent is an important breakthrough on the related techniques and applications of mobile computing environment and becomes the most suitable technology for establishing secure remote access in HIS. However, remote access of mobile computing in HIS with mobile agent requires concerning the performance, efficiency, effective computational ability and security issues. Hence, this study proposed an effective and secure remote access in HIS with mobile agent, an improvement strategy for efficient migration of mobile agent and an enhance strategy for HIS in medical networks. The remote access scheme in HIS with mobile agent of this study could allow physicians immediately securely and efficiently obtaining data from different medical organizations. Then, this study proposed an enhanced architecture for the mobile agent in HIS. The scheme, based on the bilinear pairing over elliptic curves, takes the concept of identity-based access control on a hierarchical key management. Furthermore, adapting time-sensitive key management scheme in this study would enhance efficiency and security of access control. This study also proposed secure medical managerial strategies being applied to the mobile computation environments of the HIS so as to avoid the external or internal information security events, allow the medical system to work smoothly and safely that not only benefits the patients, but also allows the doctors to use it more conveniently, and further promote the overall medical quality. From the above proposed three strategies, it can achieve secure mobile computation for remote access in HIS.
APA, Harvard, Vancouver, ISO, and other styles
32

Snelson, Pamela. "Relationships between access and use in information systems remote access to and browsing of online catalogs /." 1993. http://books.google.com/books?id=W8zgAAAAMAAJ.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Dhaniram, Ajith Deoduth. "The development of SCADA control and remote access for the Indlebe Radio Telescope." Thesis, 2016. http://hdl.handle.net/10321/1504.

Full text
Abstract:
Submitted in fulfillment of the academic requirements for the Degree Master of Engineering (Electronic), Department of Electronic Engineering, Durban University of Technology, Durban, South Africa, 2016.
The proposed supervisory control and data acquisition solution is intended to gather data from all sub-systems and provide control commands related to the Indlebe Radio Telescope. Currently the control commands are executed from the command line prompt of the Skypipe software. These control commands are used to change the elevation angle of the antenna. The supervisory control and data acquisition system will be interfaced to sub-systems namely; a programmable logic controller, a weather station, an uninterruptible power supply and a camera. It will be used to manually or automatically control the elevation angle of the antenna, includes a menu structure that allows for easy navigation to the sub-systems and allows for trending, alarming, logging and monitoring of all system parameters. The proposed system will mitigate the lack of information on the existing system. A global system for mobile communication unit has also been installed to monitor the temperature within the Indlebe control room, detect a power failure and communicate this information to supervisors, using its short message service option. Implementing a solution of this nature means that all data from the various sub-systems are brought together, giving a single platform to monitor data and provide manual and automatic control functionality. Problem solving, understanding and maintenance of the system will also become easier.
D
APA, Harvard, Vancouver, ISO, and other styles
34

Lin, Zhen-Wei, and 林振瑋. "New Task Selection Policies in Memory-Aware Load Balancing Mechanism for Reducing Remote Memory Access on NUMA Systems." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/46285497022596576005.

Full text
Abstract:
碩士
國立暨南國際大學
資訊管理學系
105
Multi-core systems with the Non-Uniform Memory Access (NUMA) architecture solve the scalability problem of the Symmetric Multi-Processing (SMP) architecture. However, in a NUMA system, a task and its memories may be allocated on different NUMA nodes. Processor cores accessing memories on remote NUMA node take longer time than on local node. Remote memory access and contention for inter-node interconnect degrade system performance. Although in the Linux kernel, the automatic page migration mechanism is implemented, it migrates only referenced pages to the current node where the task is running on. Whereas, this mechanism is completed by page table invalidation and page fault handling, which incurs additional overhead for memory access. In order to reduce the remote memory access caused by performing load balancing mechanism in the NUMA system, previous work has proposed the Memory-Aware Load Balancing (MLB) mechanism. In the MLB mechanism, the Linux kernel is modified to keep track of each task’s memory usage on each node. The kernel load balancing mechanism is modified to incorporate with task selection policies. These policies will choose suitable task for inter-node migration according to task’s memory usages on each node. The aim is to reduce remote memory access in the future after task migration. In this thesis, we have improved the task selection policies in the MLB mechanism and proposed several new selection policies. The aims are also reducing the remote memory access and improving the opportunity for a task to access the local node memory. Differently, several factors are taken into account in the proposed policies, such as maximum benefit, best cost effectiveness, least shared page, and NUMA factor. These new task selection policies are implemented with the MLB load balancing mechanism in Linux kernel. The experiment results show that our newly proposed task selection policies can effectively reduce the remote memory access and resource contention. The performance of NUMA system is increased by up to 10.67% compared to the default Linux kernel that always migrates the first movable task for inter-node load balancing.
APA, Harvard, Vancouver, ISO, and other styles
35

(9816977), Brian Mayahle. "The implementation of Lean thinking in reducing waste, streamlining clinical processes, improving clinical access, efficiency and consumer outcomes in Queensland regional, rural and remote mental health services." Thesis, 2018. https://figshare.com/articles/thesis/The_implementation_of_Lean_thinking_in_reducing_waste_streamlining_clinical_processes_improving_clinical_access_efficiency_and_consumer_outcomes_in_Queensland_regional_rural_and_remote_mental_health_services/13445453.

Full text
Abstract:
Mental health has become a high priority for many countries, including Australia, due to the increasing number of mental health consumers presenting for treatment. The increase in service demand is not being matched with availability of resources world-wide. In line with the current health blue print document that emphasises the need for efficiencies, mental health service managers are under pressure to streamline processes so that consumers will continue to receive the same quality of care despite reduction in funding. A plethora of research demonstrates that business principles are being employed successfully in healthcare organisations; for example, in emergency departments, to improve quality of care, safety of consumers, efficiency in consumer flows, and admission and discharge processes. However, there is a noticeable paucity of research studies conducted in mental health with regards to applying contemporary business principles to reduce waste. This study follows Creswell’s convergent mixed methods design to explore the Lean-inspired improvement efforts in regional, rural and remote Central Queensland mental health services. Several Lean thinking tools were used to ascertain applicability in mental health services in relation to effectiveness in reducing waste and improving mental health consumer outcomes.

APA, Harvard, Vancouver, ISO, and other styles
36

Kamala, R. "MIST : Mlgrate The Storage Too." Thesis, 2013. https://etd.iisc.ac.in/handle/2005/2630.

Full text
Abstract:
We address the problem of migration of local storage of desktop users to remote sites. Assuming a network connection is maintained between the source and destination after the migration makes it possible for us to transfer a fraction of storage state while trying to operate as close to disconnected mode as possible. We have designed an approach to determine the subset of storage state that is to be transferred based on past accesses. We show that it is feasible to use information about files accessed to determine clusters and hot-spots in the file system. Using the tree structure of the file system and by applying an appropriate similarity measure to user accesses, we can approximate the working sets of the data accessed by the applications running at the time. Our results indicate that our technique reduces the amount of data to be copied by two orders of magnitude, bringing it into the realm of the possible.
APA, Harvard, Vancouver, ISO, and other styles
37

Kamala, R. "MIST : Mlgrate The Storage Too." Thesis, 2013. http://etd.iisc.ernet.in/handle/2005/2630.

Full text
Abstract:
We address the problem of migration of local storage of desktop users to remote sites. Assuming a network connection is maintained between the source and destination after the migration makes it possible for us to transfer a fraction of storage state while trying to operate as close to disconnected mode as possible. We have designed an approach to determine the subset of storage state that is to be transferred based on past accesses. We show that it is feasible to use information about files accessed to determine clusters and hot-spots in the file system. Using the tree structure of the file system and by applying an appropriate similarity measure to user accesses, we can approximate the working sets of the data accessed by the applications running at the time. Our results indicate that our technique reduces the amount of data to be copied by two orders of magnitude, bringing it into the realm of the possible.
APA, Harvard, Vancouver, ISO, and other styles
38

Van, Staden Corne Johandia. "User experience evaluation of electronic moderation systems : a case study at a private higher education institution in South Africa." Thesis, 2017. http://hdl.handle.net/10500/23586.

Full text
Abstract:
The transformation of a manual paper-based moderation process into an electronic moderation (eModeration) process poses unique challenges. These challenges concern academic processes, people and the user experience of interactive systems. eModeration can improve the user experience of assessment processes while lowering the risk of delaying the process or losing scripts. Despite the benefits associated with optimising assessment procedures, particularly examination procedures, the use of eModeration in South Africa is limited. There are several possible reasons for a lack of eModeration adoption ranging from infrastructure and technical issues through to organisational and human factors. The focus of this study is on the human factors involved in eModeration. Since no User Experience Evaluation Framework for eModeration existed at the time of this research, an in-depth study was conducted based on the experiences of eModeration users in the context of private higher education institutions. The study focused on identifying the most important user experience constructs for the evaluation of an eModerate system within the context of private higher education institutions in South Africa towards proposing a framework. The study was based in the fields of Information Systems and Human-Computer Interaction with eModeration being the application domain. The research used a Design Science Research methodology, which involved the development and testing of a User Experience Evaluation Framework for eModeration. The data generation methods included interviews with deans, eModerators and management, as well as a survey that included responses from both moderators and deans. The research was conducted at Midrand Graduate Institute and evaluated at Monash University. The study makes a validated contribution towards identifying the most important user experience constructs. The identified constructs were utilised in the design and development of the User Experience Evaluation Framework for eModeration, which can be used along with the evaluation criteria tool to evaluate eModerate systems.
Information Science
D. Litt. et Phil. (Information Systems)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography