Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: New protocol.

Dissertationen zum Thema „New protocol“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "New protocol" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Lukovicsová, Nicola. „The history of diplomatic protocol with the emphasis on French influence on diplomatic protocol and new cultural influences on today´s diplomatic protocol“. Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193888.

Der volle Inhalt der Quelle
Annotation:
The Master's Thesis on "The History of Diplomatic Protocol with the Emphasis on French Influence on Diplomatic Protocol and New Cultural Influences on Today's Diplomatic Protocol" aims at introducing the topic of History of Diplomatic protocol and is further elaborating on the topic in terms of various influences on Diplomacy and Diplomatic protocol. The purpose was to show that the evolution of the practices, protocols and etiquette is a gradual process of change. Nowadays we live in the world strongly influenced by the European tradition that mainly comes from France. However, the changing world and process of globalization makes it easier for people to interact, share their values and spread their ideas.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Redden, Toby Lynn. „New Referral Hepatitis C Protocol: The New Standard“. Diss., North Dakota State University, 2014. https://hdl.handle.net/10365/27581.

Der volle Inhalt der Quelle
Annotation:
The Gastroenterology (GI) clinic at Sanford Health anticipates an increase in patients with hepatitis C virus (HCV) based on the 2012 Centers for Disease Control (CDC) screening recommendations. With a disproportionately high prevalence in the baby-boomer population, 75% of all documented HCV cases, the CDC recommended a ?one-time testing of all persons born during 1945-1965 without prior ascertainment of HCV risk? (CDC, 2012a). The purpose of this practice improvement project was to refine the existing workflow of the GI clinic when caring for and managing patients with HCV. The Plan, Do, Study, Act method was followed to improve the processes and address the clinic goals. The project first assessed the existing referral protocol for hepatitis C to improve the quality of care for HCV patients, to increase the clinic?s efficiency, and to identify opportunities for improvement. HCV is a complicated, intense disease process, necessitating chart reviews, patient education, and depression monitoring. To meet these time commitments the department added a new role, the designated hepatitis C nurse. The hepatitis C nurse would serve as a liaison for all HCV patients and providers. The assessment further identified an incomplete process within the referral system. During the pre-appointment chart review for new hepatitis C referrals, many required tests were incomplete. To address the gap with referrals from primary care, a brochure containing a hepatitis C screening algorithm was created. The assessment also identified a need for depression monitoring. To provide safe, up-to-date, treatment monitoring for depression in patients, the Patient Health Questionnaire (PHQ-9) was implemented. The inclusion of PHQ-9 monitoring by the hepatitis C nurse has helped the GI clinic reach its goals for administration compliance. iv Staff members and providers have reported positive impacts at the clinic after the implementation of the new change processes at the GI clinic. Patients have expressed positive satisfaction with the services, particularly the ease of communicating with the GI clinic and consistent personnel since the implementation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Talkington, Gregory Joshua. „Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis“. Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.

Der volle Inhalt der Quelle
Annotation:
The solutions presented in this dissertation describe a new paradigm in which we shepherd these network security protocols through atmosphere transitions, offering new ways to analyze and monitor the state of the protocol. The approach involves identifying a protocols transitional weaknesses through adaption of formal models, measuring the weakness as it exists in the wild by statically analyzing applications, and show how to use network traffic analysis to monitor protocol implementations going into the future. Throughout the effort, we follow the popular Open Authorization protocol in its attempts to apply its web-based roots to a mobile atmosphere. To pinpoint protocol deficiencies, we first adapt a well regarded formal analysis and show it insufficient in the characterization of mobile applications, tying its transitional weaknesses to implementation issues and delivering a reanalysis of the proof. We then measure the prevalence of this weakness by statically analyzing over 11,000 Android applications. While looking through source code, we develop new methods to find sensitive protocol information, overcome hurdles like obfuscation, and provide interfaces for later modeling, all while achieving a false positive rate of below 10 percent. We then use network analysis to detect and verify application implementations. By collecting network traffic from Android applications that use OAuth, we produce a set of metrics that when fed into machine learning classifiers, can identify if the OAuth implementation is correct. The challenges include encrypted network communication, heterogeneous device types, and the labeling of training data.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Wu, Chen. „A new TCP protocol based on end-to-end available bandwidth measurement /“. View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Horn, Stacey Lynn. „Evaluation of a new standardized modified ramp protocol : the modified BSU ramp protocol“. Virtual Press, 1999. http://liblink.bsu.edu/uhtbin/catkey/1129626.

Der volle Inhalt der Quelle
Annotation:
The purpose of this study was to develop a prediction equation for peak oxygen uptake using the Modified BSU Ramp protocol. Thirty-four subjects (14 men and 20 women, age 32-83 years) completed the standard Ball State University Adult Physical Fitness Program quiet and exercise testing sessions, with the maximal exercise test conducted with the Modified BSU Ramp protocol. The modified ramp protocol increases speed and grade every 20 seconds, and it increases by - 0.15 METs every increment for the first 6 minutes and --0.3 METs per increment thereafter. The Modified BSU ramp protocol was developed to allow for reasonable exercise test times from a standardized ramp protocol with individuals with low functional capacities < 10 METs. Pre-test procedures included height and weight measurements, resting blood pressure, resting heart rate, body fat measures, a blood lipid profile, and resting electrocardiogram (ECG). Exercise testing included ECG, heart rate, and blood pressure that were recorded prior to, during, and in the recovery phase of exercise. Subjects were instructed to continue exercise until fatigue, and respiratory gases were collected to determine V02 . Data was then analyzed using multiple regression techniques. Gender, age, body weight, and treadmill test time were the significant predictors, which were used in the regression equation (R2 = 0.586, SEE = 3.54 ml-kg-'.min'). An equation was developed from the lone predictor, treadmill test time with R2 = .37 and SEE = 4.1 ml•kg'•min'. The equation is as follows: VOA = 4.932 + 1.934 (test time (min)). Of the tests conducted on the Modified BSU ramp protocol, 82% were within an "ideal" test time window of 812 minutes, and 97% were within an "acceptable" test time window of 6-15 minutes. In conclusion, VOA can be estimated with acceptable accuracy (i.e. SEE - ± I MET) from the Modified BSU Ramp protocol, and for clinical purposes it is a suitable protocol to use when testing low fit individuals.
School of Physical Education
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Tudorache, Ion Gabriel. „Peripheral Routing Protocol : a new routing protocol proposal for a realistic WSN mobility model“. Thesis, University of Leeds, 2014. http://etheses.whiterose.ac.uk/7871/.

Der volle Inhalt der Quelle
Annotation:
Wireless sensor networks (WSNs) are changing our way of life just as the internet has revolutionized the way people communicate with each other. Future wireless networks are envisioned to be robust, have simple and efficient communication between nodes and self-organizing dynamic capabilities. When new nodes join in, a self-configuring network has to have the ability to include these nodes in its structure in real time, without human or machine interference. The need for a destination node (D) which moves at the periphery of wireless sensor networks can be argued from different points of view: the first is that different WSN scenarios require data gathering in such a way; the second point is that this type of node movement maximizes network lifetime because it offers path diversity preventing the case where the same routes are used excessively. However the peripheral movement model of the mobile destination does not resemble any mobility models presented in the WSN literature. In this thesis a new realistic WSN sink mobility model entitled the “Marginal Mobility Model” (MMM) is proposed. This was introduced for the case when the dynamic destination (D), moving at the periphery, frequently exits and enters the WSN coverage area. We proved through Qualnet simulations that current routing protocols recommended for Mobile Ad Hoc Networks (MANETs) do not support this sink mobility model. Because of this, a new routing protocol is proposed to support it called the Peripheral Routing Protocol (PRP). It will be proven through MATLAB simulations that, for a military application scenario where D’s connectivity to the WSN varies between 10%-95%, compared with the 100% case, PRP outperforms routing protocols recommended for MANETs in terms of throughput (T), average end to end delay (AETED) and energy per transmitted packet (E). Also a comparison will be made between PRP and Location-Aided Routing (LAR) performance when D follows the MMM. Analytical models for both PRP and LAR are proposed for T and E. It is proved through MATLAB simulations that, when compared with LAR, PRP obtains better results for the following scenarios: when the WSN size in length and width is increased to 8000 m and one packet is on the fly between sender and sink, PRP sends 103% more data and uses 84% less energy; when more data packets are on the fly between sender and sink, PRP sends with 99.6% more data packets and uses 81% less energy; when the WSN density is increased to 10,000 nodes PRP uses 97.5% less energy; when D’s speed in increased to 50 Km/h, PRP sends 74.7% more data packets and uses 88.4% less energy.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Shivarudraiah, Ranjitha. „STCP: A New Transport Protocol for High-Speed Networks“. Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cs_theses/67.

Der volle Inhalt der Quelle
Annotation:
Transmission Control Protocol (TCP) is the dominant transport protocol today and likely to be adopted in future high‐speed and optical networks. A number of literature works have been done to modify or tune the Additive Increase Multiplicative Decrease (AIMD) principle in TCP to enhance the network performance. In this work, to efficiently take advantage of the available high bandwidth from the high‐speed and optical infrastructures, we propose a Stratified TCP (STCP) employing parallel virtual transmission layers in high‐speed networks. In this technique, the AIMD principle of TCP is modified to make more aggressive and efficient probing of the available link bandwidth, which in turn increases the performance. Simulation results show that STCP offers a considerable improvement in performance when compared with other TCP variants such as the conventional TCP protocol and Layered TCP (LTCP).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

ROSEMBERG, MARCIO RICARDO. „SRAP: A NEW AUTHENTICATION PROTOCOL FOR SEMANTIC WEB APPLICATIONS“. PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2014. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=24515@1.

Der volle Inhalt der Quelle
Annotation:
PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE EXCELENCIA ACADEMICA
Normalmente, aplicações semânticas utilizam o conceito de linked data, onde é possível obter dados de diversas fontes e em múltiplos formatos. Desta forma, as aplicações semânticas processam muito mais dados do que as aplicações tradicionais. Uma vez que nem todas as informações são públicas, alguma forma de autenticação será imposta ao usuário. Consultar dados de múltiplas fontes pode requerer muitos pedidos de autenticação, normalmente através de uma combinação de conta de usuário e senha. Tais operações consomem tempo e, considerando-se o tempo extra que uma aplicação semântica leva para processar os dados coletados, pode tornar a experiência frustrante e incômoda para os usuários, devendo ser minimizado, sempre que possível. O propósito desta dissertação é o de analisar e comparar as técnicas de autenticação disponíveis para as aplicações semânticas e propor um protocolo mais rápido e mais seguro para autenticação em aplicações semânticas.
Usually, Linked Data makes Semantic Web Applications query much more information for processing than traditional Web applications. Since not all information is public, some form of authentication may be imposed on the user. Querying data from multiple data sources might require many authentication prompts. Such time consuming operations, added to the extra amount of time a Semantic Web application needs to process the data it collects might be frustrating to the users and should be minimized. The purpose of this thesis is to analyze and compare several Semantic Web authentication techniques available, leading to the proposal of a faster and more secure authentication protocol for Semantic Web Applications.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Sivada, Siva Rupesh. „A new multicasting protocol based on modified reverse path forwarding /“. Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1797219891&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Nikolaev, Ruslan. „A New QoS Routing Protocol for Mobile Ad-hoc Network“. Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1796121001&sid=2&Fmt=2&clientId=1509&RQT=309&VName=PQD.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Sabouri, Shirin. „A new multiparametric MRI protocol for diagnosis of prostate cancer“. Thesis, University of British Columbia, 2017. http://hdl.handle.net/2429/62882.

Der volle Inhalt der Quelle
Annotation:
In this thesis, a new magnetic resonance imaging (MRI) quantitative T2 mapping technique, called Luminal water imaging (LWI), has been developed and used for non-invasive detection and grading of prostatic tumours. Using this technique, we measured what we hypothesized to be the fractional amount of water content of luminal spaces in prostate, and called it Luminal Water Fraction, LWF. Based on the differences in tissue composition and fractional amount of luminal space between malignant and normal prostatic tissues and between tumors of different grades, we hypothesized that the measurements of LWF could be used for the detection and grading of prostatic tumours. To verify these hypotheses, we performed two patient studies in which we compared MR measurements of LWI with whole-mount histology. In the first study, we evaluated the correlation between LWF and the percentage area of luminal space in the prostatic tissue. The results of this study demonstrated that LWF is significantly and strongly correlated with the percentage area of luminal space in the prostatic tissue. In the second study, we investigated the feasibility of LWI in the detection and grading of prostate cancer. The results of this study showed that LWI provides high accuracy both in the detection and grading of prostatic tumours. After verifying our hypotheses, we performed a detailed comparison between the diagnostic accuracy of LWI and the more established MRI techniques: Dynamic Contrast-Enhanced (DCE) and Diffusion-Weighted MRI (DW-MRI). The results of this pilot study showed that LWI alone performs better than DCE, DW-MRI, or their combination, in the detection of prostatic tumours and also in correlation with GS. Based on the results of this study, we proposed a guideline for making a more efficient, abbreviated multi-parametric MRI protocol for the diagnosis of prostate cancer. Finally, as a side project, we explored some potential areas of improvement in DCE-MRI by investigating the impact of temporal resolution on the accuracy of DCE-MRI in detection of prostatic tumours. Our results showed that within a certain range of temporal resolutions, the diagnostic accuracy of DCE-MRI would be independent of the temporal resolution.
Science, Faculty of
Physics and Astronomy, Department of
Graduate
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Aronica, Pietro. „Development of a new protocol for computatinal site-directed mutagenesis“. Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/40433.

Der volle Inhalt der Quelle
Annotation:
Mutagenesis, the technique of mutating individual amino acids on proteins and peptides, is an important part of protein engineering and analysis. By changing residues and measuring the effect of the mutation on the properties of the protein such as its structure and interaction, a deeper understanding can be gained, which can be used to design new, better biomolecules. However, when performed experimentally, mutagenesis can be expensive, time-consuming and a rate-limiting step in research. Computational tools can be used to aid within this context, but a review of existing methods revealed gaps in the current literature. The Parasol Protocol was developed in order to address these issues and provide a new method that would be suitable for virtual scans and which relied on molecular dynamics. The Parasol Protocol is a tool which utilises the AMBER package framework to mutate at will between any pair of natural amino acids, incorporating a wide range of possible different functional groups and transformations. It is cheap, quick and easy to use while still allowing a high degree of control. After the development, work focused on validating the protocol by applying it to various test cases. Experimentally observed interactions and structures were compared with those obtained via computational simulations, performed using the Parasol Protocol. Our understanding of those systems has deepened thanks to these studies and in some cases it had remarkable agreement with laboratory results, indicating predictive power. We think that the Parasol Protocol has performed well so far and could become a standard method used in molecular dynamics and protein design.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Datson, Hugh Edward. „The development of a new protocol for directional dust monitoring“. Thesis, University of Leeds, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.530840.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Sivada, Siva Rupesh. „A New Multicasting Protocol Based On Modified Reverse Path Forwarding“. OpenSIUC, 2008. https://opensiuc.lib.siu.edu/theses/429.

Der volle Inhalt der Quelle
Annotation:
In this work we have proposed a practical approach for multicasting in wide area networks. It is a modification of the classical RPF approach. Though our approach is a modification of the RPF, it retains all the advantages of the RPF method and has an additional important advantage of efficient utilization of bandwidth by reducing the number of duplicate packets generated when compared to RPF. We have shown that the proposed approach offers better utilization of network bandwidth and router's memory when compared to the well known Distance Vector Multicast Routing Protocol.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Long, Shitian. „Database syncrhonization between devices : A new synchronization protocol for SQLite databases“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-46712.

Der volle Inhalt der Quelle
Annotation:
Today people have multiple personal computers, personal digital assistants and smart phones. Today's advanced handheld devices have powerful processors, with a process frequency of up to 1 GHz, huge storage capacities, flash storage capacities up to 32 GB, a large (multi) touch screen, and a user-friendly user interface. Additionally, the device may have various input and output devices, thus leading to people utilizing different devices for different use cases. In order to provide the latest information to the users via any of their devices, data synchronization becomes a requirement for users. There are many data synchronization solutions for synchronizing database records and files. In the current database synchronization solutions, there is no clear source and target. For example, consider the case where a PDA synchronizes with a PC; the record could have been edited (changed) on both the PDA and PC. In this case it is not clear which should be synchronized with what should be the source for the value. In contrast, a files synchronization system has a clearly specified synchronizatiom sourse and destination structure. In this case the client Synchronizes their files with that of the server. In a version control system the client synchronize files with a repository acting as a version control server. There are many synchronizing protocols and each has been designed for different purpose. Protocols for synchronizing database records often provide continuous synchronization, leading to a lot of data being exchanging during the synchronization process, as a result the synchronization process takes a longer period of time, but maintains the semantics of the database updates (either a complete transaction completes or it must be rolled back). On the other hand, protocols for synchronizing files may require a short synchronization time, as the whole file transferred and replaces the previous version of the file at the destination. Note file synchronization may also transfer only the differences between the files, with a local transformation of an existing file copy of the by applying these differences as updates to the files. Sending only the updates to a file enables large files with a small number of changes to be quickly updated. However, file based updated does not efficiently support record level updates of a database. In this thesis we designed a new synchronization protocol for synchronizing two SQLite databases. This synchronization protocol borrows from (and hence offers the advantages of) a version control system in order to rapidly perform SQLite database synchronization. Moreover, this solution brings SQLite database additional functions, for example supporting multiple-user, transaction logs, and data roll-back.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Yan, Shuqian. „Implementation and evaluation of QoSMIC, a new Internet multicast routing protocol“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0003/MQ45998.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Parr, Gerard Patrick. „A new self-stabilizing bridge protocol for extended-local area networks“. Thesis, University of Ulster, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.317565.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Chandramohan, Vijay. „Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol“. [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000128.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Mitra, Bijeta. „Development of new protocols towards construction of bioactive hetero cyclic compounds“. Thesis, University of North Bengal, 2021. http://ir.nbu.ac.in/handle/123456789/4368.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Holl, David J. „A performance analysis of TCP and STP implementations and proposals for new QoS classes for TCP/IP“. Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0501103-111419.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S.)--Worcester Polytechnic Institute.
Keywords: TCP; RED; satellite; PEP; STP; performance enhancing proxy; segment caching; IP-ABR; Internet; bandwidth reservation; IP-VBR; congestion avoidance; bandwidth sharing. Includes bibliographical references (p. 98-99).
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

GRAMAJO, JAVIER GUSTAVO SANTIVANEZ. „D-RAMA: A NEW ACCESS PROTOCOL FOR THIRD GENERATION WIRELESS INTEGRATED SERVICES“. PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1998. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7498@1.

Der volle Inhalt der Quelle
Annotation:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
TELECOMUNICAÇÕES BRASILEIRAS S/A
Existe um crescente interesse na introdução de serviços integrados no ambiente de comunicações móveis e sem fio. Estes serviços podem incluir, em alguns casos, informação na forma de áudio, vídeo, imagens e dados simultaneamente junto com o serviço existente de voz nas redes celulares. Devido à necessidade por maior faixa, o aumento da capacidade da interface rádio continuará sendo um dos principais requisitos para a introdução destes novos serviços. Para atender esta necessidade, vários métodos de acesso estão sendo propostos. Esta tese propõe um novo protocolo de acesso, D-RAMA, que visa extender os métodos de acesso determinísticos TRAMA e FRAMA. A validação do algoritmo é feita por meio de simulação considerando diversas interfaces rádio, assim como diferentes tipos de tráfegos.
Third generation systems will present several new enhancements while compared with current second generation technologies. Some of the most important ones are the support of integrated services (audio, video, data) as well as speech, operation in different radio environments with several propagation conditions and increased capacity. These features demand an efficient media access control (MAC) protocol, supporting both Constant Bit Rate (CBR) and Variable Bit Rate (VBR) traffic types with different Quality of Service (QoS) requeriments. In order to supply this demand, several packet access methods are being proposed. This thesis presents a new media access protocol, D-RAMA (Dynamic Priorities Resource Auction Multiple Access) and FRAMA (Fair resource Auction Multiple Access) methods, and is designed to fulfill the requirements of third generation systems. The protocol is validated through simulations, considering several radio interfaces and traffic sources.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Masmali, Ali Mohammed. „Development of a tear ferning test protocol and a new grading scale“. Thesis, Cardiff University, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646158.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Nanukuttan, Sreejith V. „Development of a new test protocol for the permit ion migration test“. Thesis, Queen's University Belfast, 2007. https://pure.qub.ac.uk/portal/en/theses/development-of-a-new-test-protocol-for-the-permit-ion-migration-test(1c6008d6-3dba-4249-8a11-08e6a61fd295).html.

Der volle Inhalt der Quelle
Annotation:
Chloride induced corrosion of steel in concrete is one of the most common reasons for the deterioration of reinforced concrete in both marine and transportation structures. In order to assess the chloride penetration resistance of concrete, the common practice is to remove cores from the structure and test them in a laboratory to determine the chloride diffusion coefficient using the steady state diffusion test. This test is not popular due to its long test duration to achieve a steady state of flow of chlorides through the test specimen, which is used to calculate the diffusion coefficient. Therefore, applied voltage tests (known as migration tests) have become quite common, in which the transport of chlorides ions through the test specimens is accelerated by applying a potential difference across them. The measurements during either the non-steady state condition or the steady state condition are used to calculate a chloride migration coefficient, which has been reported to correlate well with the corresponding coefficient from the diffusion based tests. The chloride diffusion coefficient of concrete can also be predicted more rapidly using other indirect methods, such as the electrical resistivity test. By following the principle of the migration test, a new in situ migration test (called the Permit ion migration test) was developed at Queen's University Belfast in the late 90s. The validity of this test was established for concretes containing normal Portland cement, by comparing the in situ migration coefficient with both the coefficient of diffusion (from both steady state and non-steady state diffusion tests) and the migration coefficient from the steady state migration test. However, it was considered to be necessary to broaden its applicability for testing concretes containing supplementary cementitious materials, by repeating the validation study on concretes containing such materials. Furthermore, there was a need to redesign the apparatus to make it more reliable and user-friendly for site applications. Therefore, a detailed investigation was carried out, initially as part of a European Round Robin Test programme (viz. EU FP5 Growth Programme - Chlortest) to identify the most reliable laboratory-based methods for assessing the chloride diffusivity of concretes which are commonly used in practice. This was followed by a detailed laboratory study on concretes containing supplementary cementitious materials, such as microsilica (ms), pulverised fuel ash (pfa) and ground granulated blast furnace slag (ggbs), in addition to normal Portland cement (ope) as a control. In this investigation, not only the tests identified in the initial investigation were used, but also were additional tests such as the new Permit ion migration test and the Wenner four probe resistivity test. The results from these investigations were used to establish the validity of the Permit ion migration test for testing concretes containing supplementary cementitious materials and to improve its test protocol. As part of the Chlortest programme, a non-steady state diffusion test (to act as a reference method), a non-steady state migration test, a steady state migration test and a resistivity test were selected and a comparative (reliability) study was carried out using concretes, manufactured by four different EU countries, containing ope, pfa,ggbs and ms as binders. The results indicated that both the non-steady state migration test and the bulk resistivity test are the most reliable tests in assessing the chloride diffusivity of these. The results from the steady state migration test were found to be affected by the use of a thickness of the test sample less than the maximum size of the coarse aggregate. In the validation study that was carried out using the Permit ion migration test, the insitu migration coefficient correlated well with the non-steady state migration coefficient, the steady state migration coefficient and the bulk resistivity for a range of concrete mixes containing different types of binders, such as ope, ms, pfa andggbs. For the determination of the onset of the steady state condition and the estimation of the steady state chloride flux, it was found that the conductivity of the anolyte could effectively be used, which in turn could eliminate the need for sampling chloride solutions from the anolyte periodically. Further, there existed an excellent degree of correlation between the peak current and the steady state migration coefficient from both the steady state migration test and the Permit ion migration test, which indicated that the former could be used to predict the latter, with much lesser effort and complexity of the test protocol. On the basis of the findings from both sets of investigation, a new test protocol was developed for the Permit ion migration test and the Permit was redesigned. The new test protocol used conductivity of the anolyte instead of the chloride concentration to identify the onset of the steady state condition and there is the option to calculate the chloride migration coefficient from either the peak current or the steady state of chloride flux. The new Permit was designed to work as a stand-alone instrument onsite, with little interference from the operation once the test had been started, but at any stage a computer could be connected to view the progress of the test.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Delgado, Segura Sergi. „Towards a better understanding of Bitcoin: from system analyses to new protocol designs“. Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/664349.

Der volle Inhalt der Quelle
Annotation:
Bitcoin ha donat peu a un dels majors canvis de paradigma de l’últim segle respecte a com entenem i utilitzem els diners. El naixement de les criptomonedes ha obert la porta a un sistema econòmic distribuït on la necessitat de terceres parts de confiança, o d’entitats centrals, ha estat substituïda per la criptografia i el flux obert d’informació entre tots els actors del sistema, construint d’aquesta forma un registre de transaccions comú conegut com a blockchain. Aquest canvi de paradigma, però, comporta certes implicacions que, de no ser tractades adientment, poden comprometre la seguretat del sistema. En aquesta tesis ens hem centrat en analitzar dos dels grans components de Bitcoin: la seva xarxa P2P i el conjunt de monedes en circulació. Amb aquest anàlisis es pretén identificar els punts forts i les febleses de Bitcoin, amb l’objectiu de proposar solucions i/o millores per aquestes. Aquests anàlisis ens han permès, per una banda, caracteritzar les xarxes P2P de criptomonedes, i, per altra banda, identificar un dels actuals problemes d’escalabilitat de Bitcoin: les monedes no rentables. D’altra banda, i un cop assolit un coneixement suficient del sistema, la tesis s’ha centrat en el disseny de protocols per estendre la funcionalitat de Bitcoin en diferents escenaris de pagament. A més a més, s’ha proposat una solució per reduir la probabilitat de ser estafat a l’utilitzar transaccions sense confirmar. I finalment, s’ha dissenyat un protocol de compra-venta de dades utilitzant Bitcoin, eliminant la necessitat inherent de confiança per part del comprador.
Bitcoin has kicked off one of the biggest paradigm shifts of the last century regarding how we understand and use money. The birth of criptocurrencies lays the foundations of a new financial system, where the need of trusted third parties, or central authorities, has been replaced by cryptography and an open flow of information between all the actors of the system. By sharing all the information regarding the operations of the system, all users can eventually agree in a distributed ledger, known as blockchain. Such a paradigm shift, however, poses some threads that, if not properly handled, may compromise the security of the system. In this thesis we have studied two of the core components of Bitcoin: its P2P network, and the set of unspent Bitcoins. Such analysis aimed to spot the strengths and weaknesses of the system in order to design solutions for them. The outcomes of our analyses have been, on the one side, characterizing the cryptocurrency P2P networks and, on the other side, spotting one of the current Bitcoin scalability problems: the unprofitable coins. Moreover, after analysing the system and obtaining a deep understanding of it, the thesis has focused on designing protocols to extend Bitcoin’s functionality in different payment scenarios. First, we have designed a solution to reduce the likelihood of a merchant of being deceived when accepting zero-confirmation transactions. Finally, we have designed a fair protocol for data trading using Bitcoin, where the exchange between data and coins is performed atomically.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Robinson, James Beresford. „Lntp : the implementation and performance of a new local area network transport protocol“. Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26523.

Der volle Inhalt der Quelle
Annotation:
In the past it has been convenient to adopt existing long haul network (LHN) protocols for use in local area networks (LANs). However, due to the different operating parameters that exist between these two types of networks, it is not possible for a LHN protocol to fully exploit the characteristics of a LAN. Thus, the need arises for a protocol designed specifically for use in a LAN environment. LNTP is one such transport level protocol. It was designed for exclusive use in LANs, and thus does not incorporate those features which are not relevant to a LAN environment. The result of this is a simpler and more efficient protocol. As well, LNTP employs a novel deferred flow control strategy which minimizes the time that a transmitting process will be blocked. This thesis examines the implementation of LNTP in the 4.2 BSD UNIX operating system. Various measurements are taken, and LNTP's performance is compared to that of TCP/IP, a LHN protocol which is often used in LAN environments. Several formulas are developed to determine the optimum values for various LNTP parameters, and these theoretical results are compared to the experimentally observed values. We conclude that LNTP does indeed outperform TCP/IP. However, due to the overhead of the non-LNTP specific protocol layers, this improvement is not as great as it might be. Nonetheless, LNTP proves itself to be a viable replacement for TCP/IP.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Ijaz, Muhammad. „TRASMISSION CONTROL PROTOCOL (TCP) PERFORMANCE EVALUATION IN MANET“. Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5097.

Der volle Inhalt der Quelle
Annotation:
Mobile Ad hoc network routing protocols have been divided in several different categories such as Reactive and Proactive Routing Protocol. The performances of these categories are evaluated in different scenario with TCP variants. We present a comprehensive TCP performance evaluation study to understand the nature of the TCP performance in different scenarios with variable amount of payload and number of nodes. The traffic consists of three different packet sizes i.e. 512, 1000, 1500 bytes each. Three different routing protocols (AODV, DSR and TORA) are to be evaluated with three different TCP variants (Tahoe, Reno and New Reno) in three different scenarios having 3, 5 and 8 nodes. The performances parameters on the basis of which routing protocols are to be graded are mainly throughput, congestion window and delay. Conclusions are drawn based on the simulation results and the comparisons between them have been elaborated.
N.W.F.P PAKISTAN. Mobile no: 0092-3339173438
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Melloh, Markus. „Intercultural comparison of effect modification and cost-utility of surgical and conservative treatment of chronic low back pain : a study protocol /“. Bern, 2007. http://www.public-health-edu.ch/new/Abstracts/MM_18.09.07.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Canbolat, Musa Aykut. „A new multi-channel MAC protocol for wireless ad hoc networks with single transceiver“. Thesis, Wichita State University, 2007. http://hdl.handle.net/10057/1508.

Der volle Inhalt der Quelle
Annotation:
Although IEEE 802.11a/b/g standards allow use of multiple channels, only a single channel is popularly used, due to the lack of efficient protocols that enable use of Multiple Channels. There are some papers challenging this problem. Some of them have requirements that will increase the cost, like requirement of multiple transceivers. Some others address the problem with single transceivers, but are very hard to be employed in highly mobile Ad Hoc networks due to network-wide synchronization requirements. In this Thesis, multiple channel use in a wireless network with single transceiver nodes is addressed, and attempted to be solved with a new efficient Ad Hoc network MAC protocol, which intends to remove the requirement of network-wide synchronization.
Thesis (M.S): Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering
"July 2007."
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Mauk, Andrew W. „A new modeling protocol for G-protein coupled receptors : molecular simulation of phospholipid assemblies“. Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/11033.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Khengar, Piyush. „Design and performance evaluation of a new routing protocol for mobile ad hoc networks“. Thesis, King's College London (University of London), 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.408590.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Ibrahim, Idris Skloul. „A new routing protocol for ad hoc wireless networks design, implementation and performance evaluation“. Thesis, Heriot-Watt University, 2011. http://hdl.handle.net/10399/2472.

Der volle Inhalt der Quelle
Annotation:
A collection of mobile nodes can form a multi-hop radio network with a dynamic topology and without the need for any infrastructure such as base stations or wired network. Such a Mobile Ad Hoc Networks (MANETs) maintain their structure and connectivity in a decentralised and distributed fashion. Each mobile node acts as both a router for other nodes traffic, as well as a source of traffic of its own In this thesis we develop and present a new hybrid routing protocol called Multipath Distance Vector Zone Routing Protocol, which is referred to as MDVZRP. In MDVZRP we assume that all the routes in the routing table are active and usable at any time, unless the node received or discovered a broken link. There is no need to periodically update the routing tables, therefore reducing the periodic update messages and hence reducing the control traffic in the entire network. The protocol guarantees loop freedom and alternative disjoint paths. Routes are immediately available within each routing zone. For destinations outside the zone, MDVZRP employs a route discovery technique known as routing information on demand. Once the node is informed by either the MAC layer or itself that it should discover the non- reachable nodes, MDVZRP adopts a new technique. First, we discuss the Ad Hoc networks and routing in general, then the motivation of MDVZRP regarding the nodes‟ flat view, and the selection and acquisition of multipath getting and selection. Furthermore, we describe the stages of MDVZRP and the protocol routing process with examples. The performance of MDVZRP is then evaluated to determine its operating parameters, and also to investigate its performance in a range of different scenarios. Finally, MDVZRP is compared with DSDV and AODV ordinary routing protocols (standard) delivering CBR traffic. Simulation results show that MDVZRP gives a better performance than DSDV in all circumstances, it is also better than AODV in most of the scenarios, especially at low mobility.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Canbolat, Musa Aykut Cetinkaya Coskun. „A new multi-channel MAC protocol for wireless ad hoc networks with single transceiver /“. Thesis, A link to full text of this thesis in SOAR, 2007. http://hdl.handle.net/10057/1508.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Stepana, Daniel Topaleku Motenava. „A Protocol For Epidemiological Pathfinder Oral Health Survey In Papua New Guinea Defence Force“. Thesis, Faculty of Dentistry, 1999. http://hdl.handle.net/2123/4188.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Eroglu, Muammer. „A New Stack Architecture For Sensor Networks“. Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607590/index.pdf.

Der volle Inhalt der Quelle
Annotation:
In this thesis, a new stack architecture for sensor networks is proposed. The stack consists of the following layers: application, query, aggregation, network, MAC and physical. Various algorithms are implemented using this stack and it is shown that this stack is modular. Following an overview of sensor networks, the previous protocol stack suggestions for sensor networks are examined. Sensor network algorithms that can be classified as sensor data management systems are surveyed and compared with each other. Four of the surveyed algorithms, namely, TAG, Synopsis Diffusion, Tributary-Delta and Directed Diffusion are implemented using the introduced stack. The implementation is performed using a sensor network model developed with OMNeT++ simulator. The simulation results are compared to the original results of these algorithms. Obtaining similar results, the stack and algorithm implementations are validated, moreover, it is shown that the stack does not induce any performance degradation. Using the implementation details of the algorithms, the modularity of the suggested stack is demonstrated. Finally, additional benefits of the stack are discussed.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Turan, Ulas. „Implementing And Evaluating The Coordination Layer Andtime-synchronization Of A New Protocol For Industrialcommunication Networks“. Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613576/index.pdf.

Der volle Inhalt der Quelle
Annotation:
Currently automation components of large-scale industrial systems are realized with distributed controller devices that use local sensor/actuator events and exchange shared events with communication networks. Fast paced improvement of Ethernet provoked its usage in industrial communication networks. The incompatibility of standard Ethernet protocol with the real-time requirements encouraged industry and academic researchers to provide a resolution for this problem. However, the existing solutions in the literature suggest a static bandwidth allocation for each controller device which usually leads to an inefficient bandwidth use.Dynamic Distributed Dependable Real-time Industrial Communication Protocol (D3RIP) family dynamically updates the necessary bandwidth allocation according to the messages generated by the control application. D3RIP is composed of two protocols
interface layer that provides time-slotted access to the shared medium based on an accurate clock synchronization of the distributed controller devices and coordination layer that decides the ownership of real-time slots. In this thesis, coordination layer protocol of D3RIP family and the IEEE 1588 time synchronization protocol is implemented and tested on the real hardware system that resembles a factory plant floor. In the end, we constructed a system that runs an instance of D3RIP family with 3ms time-slots that guarantees 6.6ms latency for the real-time packets of control application. The results proved that our implementation may be used in distributed controller realizations and encouraged us to further improve the timing constraints.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Anna, Kiran Babu. „A NEW FRAMEWORK FOR QOS PROVISIONING IN WIRELESS LANS USING THE P-PERSISTENT MAC PROTOCOL“. Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2381.

Der volle Inhalt der Quelle
Annotation:
The support of multimedia traffic over IEEE 802.11 wireless local area networks (WLANs) has recently received considerable attention. This dissertation has proposed a new framework that provides efficient channel access, service differentiation and statistical QoS guarantees in the enhanced distributed channel access (EDCA) protocol of IEEE 802.11e. In the first part of the dissertation, the new framework to provide QoS support in IEEE 802.11e is presented. The framework uses three independent components, namely, a core MAC layer, a scheduler, and an admission control. The core MAC layer concentrates on the channel access mechanism to improve the overall system efficiency. The scheduler provides service differentiation according to the weights assigned to each Access Category (AC). The admission control provides statistical QoS guarantees. The core MAC layer developed in this dissertation employs a P-Persistent based MAC protocol. A weight-based fair scheduler to obtain throughput service differentiation at each node has been used. In wireless LANs (WLANs), the MAC protocol is the main element that determines the efficiency of sharing the limited communication bandwidth of the wireless channel. In the second part of the dissertation, analytical Markov chain models for the P-Persistent 802.11 MAC protocol under unsaturated load conditions with heterogeneous loads are developed. The Markov models provide closed-form formulas for calculating the packet service time, the packet end-to-end delay, and the channel capacity in the unsaturated load conditions. The accuracy of the models has been validated by extensive NS2 simulation tests and the models are shown to give accurate results. In the final part of the dissertation, the admission control mechanism is developed and evaluated. The analytical model for P-Persistent 802.11 is used to develop a measurement-assisted model-based admission control. The proposed admission control mechanism uses delay as an admission criterion. Both distributed and centralized admission control schemes are developed and the performance results show that both schemes perform very efficiently in providing the QoS guarantees. Since the distributed admission scheme control does not have a complete state information of the WLAN, its performance is generally inferior to the centralized admission control scheme. The detailed performance results using the NS2 simulator have demonstrated the effectiveness of the proposed framework. Compared to 802.11e EDCA, the scheduler consistently achieved the desired throughput differentiation and easy tuning. The core MAC layer achieved better delays in terms of channel access, average packet service time and end-to-end delay. It also achieved higher system throughput than EDCA for any given service differentiation ratio. The admission control provided the desired statistical QoS guarantees.
Ph.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Judge, John Thomas. „A new model for the marginal distribution of HTTP request rate“. School of Electrical, Computer and Telecommunications Engineering - Faculty of Informatics, 2004. http://ro.uow.edu.au/theses/265.

Der volle Inhalt der Quelle
Annotation:
This thesis proposes a new model for the marginal distribution of HTTP request rate. The model applies to aggregate network traffic generated by a population of users accessing the Web on the Internet. The new model is relatively simple and allows for both the accurate estimation of peak HTTP request rate and the development of two new rules of thumb concerning HTTP request rate. Previous models of HTTP request rate have generally been single user models of a form that are both complex to transform into a model of aggregate traffic and apply to the estimation of peak aggregate HTTP request rate. One comparable model of aggregate HTTP traffic models HTTP request inter-arrival time rather than HTTP request rate and is shown to over estimate peak HTTP request rate. There are few existing rules of thumb concerning HTTP request rate. The two rules proposed here are the first for the estimation of either standard deviation or peak HTTP request rate at the second time scale. The new model for the marginal distribution of aggregate per second HTTP request rate is based on the P�lya-Aeppli probability distribution. The selection of the P�lya-Aeppli distribution can be justified from observed distributions of HTTP request rate of individual Web users and the number of active users per second in a population of Web users. The results are based on the analysis of five independent traces of Web traffic. One trace, collected by the candidate, is of per-user Web traffic generated in a postgraduate research laboratory at the University of Wollongong (UOW) between 1994 and 1997. The other four traces are large independent traces of aggregate Web traffic collected between 1996 and 2002.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Calarasanu, Stefania Ana. „Improvement of a text detection chain and the proposition of a new evaluation protocol for text detection algorithms“. Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066524/document.

Der volle Inhalt der Quelle
Annotation:
Le nombre croissant d'approches de détection de texte proposé dans la littérature exige une évaluation rigoureuse de la performance. Un protocole d'évaluation repose sur trois éléments: une vérité terrain fiable, une stratégie d'appariement et enfin un ensemble de métriques. Peu de protocoles existent et ces protocoles manquent souvent de précision. Dans cette thèse, nous proposons un nouveau protocole d'évaluation qui résout la plupart des problèmes rencontrés dans les méthodes d'évaluation actuelles. Ce travail est axé sur trois contributions principales : tout d’abord, nous introduisons une représentation complexe de la vérité terrain qui ne contraint pas les détecteurs de texte à adopter un niveau de granularité de détection spécifique ou une représentation d'annotation ; d’autre part, nous proposons un ensemble de règles capables d'évaluer tous types de scénario qui peuvent se produire entre les objets de la vérité terrain et les détections correspondantes ; et enfin, nous montrons comment nous pouvons analyser un ensemble de résultats de détection, non seulement à travers un ensemble de mesures, mais aussi à travers une représentation visuelle intuitive. Un défi fréquent pour de nombreux systèmes de détection de texte est d'aborder la variété des caractéristiques de texte dans des images naturelles ou d’origine numérique pour lesquels les OCR actuels ne sont pas bien adaptées. Par exemple, des textes en perspective sont fréquemment présents dans les images réelles. Dans cette thèse, nous proposons également une procédure de rectification capable de corriger des textes hautement déformés, évalué sur un ensemble de données difficiles
The growing number of text detection approaches proposed in the literature requires a rigorous performance evaluation and ranking. An evaluation protocol relies on three elements: a reliable text reference, a matching strategy and finally a set of metrics. The few existing evaluation protocols often lack accuracy either due to inconsistent matching or due to unrepresentative metrics. In this thesis we propose a new evaluation protocol that tackles most of the drawbacks faced by currently used evaluation methods. This work is focused on three main contributions: firstly, we introduce a complex text reference representation that does not constrain text detectors to adopt a specific detection granularity level or annotation representation; secondly, we propose a set of matching rules capable of evaluating any type of scenario that can occur between a text reference and a detection; and finally we show how we can analyze a set of detection results, not only through a set of metrics, but also through an intuitive visual representation. A frequent challenge for many Text Understanding Systems is to tackle the variety of text characteristics in born-digital and natural scene images for which current OCRs are not well adapted. For example, texts in perspective are frequently present in real-word images because the camera capture angle is not normal to the plane containing the text regions. Despite the ability of some detectors to accurately localize such text objects, the recognition stage fails most of the time. In this thesis we also propose a rectification procedure capable of correcting highly distorted texts evaluated on a very challenging dataset
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Shinohara, Kiyomi. „Protocol registration and selective outcome reporting in recent psychiatry trials: new antidepressants and cognitive behavioural therapies“. Kyoto University, 2016. http://hdl.handle.net/2433/217138.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Lööw, Linn. „The Principle of Subsidiarity : An Examination of the Swedish Parliament’s Application of the New Protocol on Subsidiarity“. Thesis, Uppsala universitet, Juridiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-196923.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Norén, Henrik. „Industrial Ethernet and new possibilities - Simplifying function tests of industrial devices“. Thesis, Institutionen för systemteknik, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-52533.

Der volle Inhalt der Quelle
Annotation:

What do you do if you are implementing a new fieldbus protocol in your embed- ded industrial system and want to test it? This was the question that a group of engineers at ABB Corporate Research was asking themselves. Normally, the easiest way would probably be to buy a matching device supporting the same protocol and hook it up to the system. You might also need some equipment to listen in on the traffic between the two, so you’d need to buy that too.

But what if you are working with a limited budget? Or what if this protocol is fairly new, and matching devices are hard to find? Or what if you want to test cases that can’t normally be achieved with normal usage?

Normally, with traditional fieldbus standards, this could be complicated. You would probably need an additional sample of your new system, with some cus- tom made test code, and use this to test the original system. This is not a bad method, but this report will give an example of the new possibilities that comes with the new Ethernet base fieldbus standards emerging on the market today. It will highlight the possibility to create a test tool for your industrial system to use on a standard PC.

”Why?” you might ask. The report suggests that this solution is cheap, fast and flexible. First of all, no special hardware was needed, which had a posi- tive impact on cost. The only thing used was a PC and some standard office equipment.

Second, once the test tool was created, new test cases was really fast and easy to make. The test tool was designed to function as a general framework for creating dynamic test sequences based on Ethernet.

Third, the tool is flexible enough to test a lot of different cases, even cases not allowed by the standard. It made it possible to test cases that would have required the use of several samples of test system simultaneously to work. Also, because Ethernet is such a well known standard, there are a lot of existing software tools at your disposal. For example, free software for capturing and analyzing the test results was used during the tests. Furthermore, since the test tool was designed to be easily extendable to handle more protocols, it is even more flexible and useable for future similar problems.

APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Smith, Sean. „Trocantheric Femoral Fractures - a retrospective cohort study comparing reoperation rates before and after implementation of new treatment protocol“. Thesis, Örebro universitet, Institutionen för medicinska vetenskaper, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-86763.

Der volle Inhalt der Quelle
Annotation:
Introduction: Hip fractures are very common in Sweden. Keeping reoperation rates as low as possible is critical. One factor correlated to mechanical complications and thereby reoperation rates is the tip-apex distance. In April of 2017 the Orthopedic clinic at Karlstad’s Central Hospital in Sweden implemented new routines for the choice of treatment method of pertrocantheric and subtrocantheric femoral fractures. Aim: The primary aim of this study was to compare reoperation rates of pertrocantheric and subtrocantheric femoral fractures before and after implementation of new routines. Secondly, we wanted to study the association between the tip-apex distance and reoperation rates for pertrocantheric femoral fractures treated at Karlstad’s Central Hospital. Method: This was an internal quality control designed as a retrospective cohort study. Data on patients treated for pertrocantheric or subtrocantheric femoral fractures were retrieved from the Swedish Fracture Registry. Tip-apex distances were measured on patients’ radiographic images. P-values for comparison of the two study periods were created using the chi2 test. Association between the tip-apex distance and reoperation rate was presented as odds ratio. Result: The reoperation rates were the same for both time periods. The reoperation rates of unstable fractures were lower for the study period after implementation of new routines. Neither of these results were statistically significant. There was also no statistically significant association between the tip-apex distance and reoperation rates. Conclusion: No statistically significant decrease in reoperation rates was seen after implementation of new routines. There was no association between the tip-apex distance and reoperation rates.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Trinh, Tuyet Anh Nipunporn Voramongkol. „Factors related to the acceptance of the new antenatal care protocol among health personnel in Suphan Buri province, Thailand /“. Abstract, 2007. http://mulinet3.li.mahidol.ac.th/thesis/2550/cd399/4938009.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Hagström, Jesper, und Lukas Lindblom. „Performance of Network and Transport Protocols in the Implementation of a New Cryptocurrency“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240985.

Der volle Inhalt der Quelle
Annotation:
It has been suggested that some cryptocurrencies have potential to take the role as a global digital payment system. However, as the current technology stands, all cryptocurrencies have shortcomings which are growing when scaling parameters. This emphasizes the importance of fast and reliable data transmissions when implementing network protocols to handle the transactions. However, little research has been conducted to specifically support the development of cryptocurrencies regarding protocol performance comparison. This study will be assisting the development of a new cryptocurrency, proposed by HAJ Enterprise. The report uses a theoretical framework of economic perspectives to investigate if the proposed cryptocurrency could take the role as a form of good money. Furthermore, the main purpose of the study is to identify which existing transport protocol with appurtenant parameters would be the most suitable in an implementation of the proposed cryptocurrency. To answer these questions, the study measures latency, throughput and reliability of protocols in a test simulating a real case of long distance data transmission. These results are then compared to findings from similar studies. From the results, it was suggested that proposed cryptocurrency satisfies the requirements of good money, as intrinsic value was found through the monetary policy. Moreover, it was found that TCP IPv6 showed the best performance regarding data transmission. However, considering the current state of the IPv6 adoption rate into consideration, it is suggested that TCP IPv4 with a packet size in the range of 1024-2048 would be beneficial. Further research in different settings is required for more nuanced results.
Det har föreslagits att kryptovalutor har potential att fungera som ett globalt digitalt betalmedel. Den bakomliggande tekniken medför dock att alla kryptovalutor har brister. Dessa brister är växande när parametrar skalas upp. Detta understryker vikten av snabba och pålitliga överföringar av data och passande val vid implementering av protokoll för att hantera transaktionerna. Forskning inom området för effektiv dataöverföring inom kryptovalutor tillåter fler möjligheter i betraktande av lösningar till storskaliga nätverk. Dessvärre har en begränsad mängd forskning bedrivits som specifikt understödjer utvecklingen av kryptovalutor genom jämförelse av protokollprestanda. Denna studie medverkar i utvecklingen av en ny kryptovaluta, föreslagen av HAJ Enterprise. Rapporten använder ett teoretiskt ramverk av ekonomiska perspektiv på kryptovalutor för att undersöka om den föreslagna kryptovalutan kan klassas som good money. Vidare är det huvudsakliga syftet med studien att identifiera vilka befintliga transportprotokoll, med tillhörande parametrar, som skulle vara mest lämpade att implementera i den föreslagna kryptovalutan. För att besvara dessa frågor mäts fördröjning, genomströmning och tillförlitlighet av protokoll i en testmiljö som simulerar ett verkligt fall med dataöverföring mellan långa avstånd. Dessa resultat jämförs därefter med resultat från liknande studier. Från resultaten kunde rapporten visa att den föreslagna kryptovalutan kan klassificeras som en form av pengar, då inneboende värde kunde identifieras genom kryptovalutans monetära policy. Det var också visat att TCP IPv6 hade bäst prestanda gällande dataöverföring. Men med hänsyn till den globala etablering av IPv6 föreslås TCP IPv4 med en paketstorlek inom en räckvidd mellan 1024 till 2048 byte som mest fördelaktig. Fortsatt forskning inom området och utökade tester inom olika miljöer krävs för ett mer nyanserat resultat.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Nashwan, Shadi Ismail. „Performance analysis of a new dynamic authentication protocol DAKA of 3G mobile systems based on a novel Cryptography algorithm 'Anglia'“. Thesis, Anglia Ruskin University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492950.

Der volle Inhalt der Quelle
Annotation:
Numerous examinations of the weaknesses with Authentication of Key Agreement protocol (AKA) of Universal Mobile Telecommunications System (UMTS) have been presented by various researchers. It is plausible to suggest that the majority of the proposed solutions of authentication protocols in the reported investigative works are formulated based on asymmetric algorithms which consume more computational overhead than symmetric algorithms. There is no evidence that the symmetric algorithms could lead to the existing weaknesses.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Sathitwiriyawong, Chanboon. „New protocol-less LAN bridge algorithms designed for the efficient handling of topology reconfigurations and an improved resilience to frame errors“. Thesis, University of Salford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360443.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

ZHUANG, WEN-SHENG, und 莊文勝. „New protocol for digital multisignatures“. Thesis, 1993. http://ndltd.ncl.edu.tw/handle/39328893560840516116.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

LIN, CHUNG-SUNG, und 林中嵩. „A New Public Key Distribution Protocol“. Thesis, 1993. http://ndltd.ncl.edu.tw/handle/61815890571008908295.

Der volle Inhalt der Quelle
Annotation:
碩士
淡江大學
資訊工程研究所
81
Sharing resource or exchanging information through computer network between mainframes or between nodes of a large-scale network become widely accepted by the computer users. Meanwhile, many important and secret information must be transmitted through network, which makes the necessity of network security of information flowing in the network. However, this result in another problem - "How to administrator, store, and distribute the key efficiently and safely?", especially when the nodes on nowadays open network system are often over one thousand. Consequently, the application of public key distribution protocol on the network is more and more important. Thus, the main purpose of this thesis is to offer a new public key distribution protocol, using a new method to accomplish the distribution of key on the network. Since Diffie and Hellman develop the first public key distribution protocol from discrete exponential in 1976, there are continuously many public key distribution protocol announced. All these systems make use of the numeric feature of one-way function and one-way trapdoor function to achieve the transfer and distribution of key. In the thesis, an infinite differentiable function and the commutative feature of differential function are used to develop a new public key distribution protocol. This distribution protocol can be used to distribute a function, and its security is based on the grade of difficulty in the calculation of symbol integral. At last, a system which computed the differential of triangle function is given as an example to put the public key distribution protocol in practice.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

Kuo, Chn-Jung, und 郭至容. „A New Voting Protocol With Electronic Board“. Thesis, 1994. http://ndltd.ncl.edu.tw/handle/64197675064742495072.

Der volle Inhalt der Quelle
Annotation:
碩士
國立交通大學
資訊管理研究所
82
With the development of computer networks, it''s feasible. to apply anonymous and verifiable voting on today''s computer networks. To protect the privacy of voters and prevent tally center from cheating, a voting protocol is needed. This research first enumerates the requirements of a just voting scheme. Protocols proposed to date are either too complex or do not meet all the requirements of a sound voting scheme.  In this thesis, we propose a new voting protocol that has the following properties: (1)An electronic bulletin board is used to reveal the voting process to prevent the tally center from cheating; (2)The power of tally center is divided into two parts; (3)Voters'' privacy can be protected by using cryptography; (4)Each voter may check that his/her vote has been counted.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

„Multi-destination control protocol: a new distributed scheduling protocol for optical flow switching network“. Thesis, 2011. http://library.cuhk.edu.hk/record=b6075125.

Der volle Inhalt der Quelle
Annotation:
OFS provisions bandwidth in the granularity of one wavelength. With such a coarse granularity, most applications including video download, HDTV, 3D movie, and 3D TV etc. will have very short flow sizes, in the order of seconds or even sub-second, which brings challenges to the utilization efficiency of bandwidth capacity. In this thesis we study the performance of OFS for short flows. The constraint of network resources is investigated. The effect of destination and path blocking is studied. A distributed scheduling protocol called Multi-Destination Control Protocol (MDCP) is proposed to deal with such constraint. Both single wavelength and multi-wavelength configurations are studied and characterized. Simulation results demonstrate that MDCPcan improve the OFS network throughput significantly and can be as much as eighty to one hundred percent for a single-wavelength OFS network. Even for an OFS network with four wavelengths, the throughput improvement can still approach 40%.
The Internet traffic has been growing tremendously. China Telecom predicts that the compound annual growth rate of IP traffic for the next decade is at 56% - 80% and the backbone capacity will grow by another two orders of magnitudes. Furthermore, the power consumption incurred by the next generation of huge electronic IP packet switching routers in the backbone will exceed gigawatts. In view of the grave enviromnental concerns, there is a great need for a more efficient way of transporting and switching the bits. This thesis investigates a new all-optical networking technology called optical flow switching (OFS). OFS bypasses electronic routers, and provides end-to-end transparent connections, thus taking full advantage of the enormous transmission capacity of optical networks and enjoying the extremely low error rate of transparent data transmission. The most important point about OFS is that it reduces the electrical power consumption by off-loading the huge electronic routers, which could be a major constraint for future Internet growth. Unlike many other exotic all-optical switching technologies, OFS is immediately deployable using the current optical technologies, Therefore OFS is very attractive for the next generation optical networks.
Qian, Zhengfeng.
Adviser: Kwok-wai Cheung.
Source: Dissertation Abstracts International, Volume: 73-04, Section: B, page: .
Thesis (Ph.D.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (leaves 113-118).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstract also in Chinese.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie