Dissertations / Theses on the topic 'Analysis protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Analysis protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Brachfeld, Lawrence J. "Mobile internet protocol analysis." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369385.
Full text"September 1999". Thesis advisor(s): Bert Lundy, Wolfgang Baer. Includes bibliographical references (p. 53). Also available online.
Kovan, Gerry. "SPP Secure Payment Protocol: Protocol Analysis, Implementation and Extensions." Thesis, University of Waterloo, 2005. http://hdl.handle.net/10012/1079.
Full textO'Shea, Nicholas. "Verification and validation of security protocol implementations." Thesis, University of Edinburgh, 2010. http://hdl.handle.net/1842/4753.
Full textDobson, Lucas E. "Security analysis of session initiation protocol." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FDobson.pdf.
Full textThesis Advisor(s): Dinolt, George ; Eagle, Chris. "June 2010." Description based on title screen as viewed on July 13, 2010. Author(s) subject terms: Session initiation protocol, voice over IP, information security, siproxd, linphone, Qutecom, osip, eXosip Includes bibliographical references (p. 77-78). Also available in print.
Araya, Cristian, and Manjinder Singh. "Web API protocol and security analysis." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208934.
Full textDet finns ett problem i dagens samhälle gällande att varje företag har sin egen kundportal. Detta problem kan lösas genom att skapa en plattform som samlar alla kundportaler på samma plats. För en sådan plattform krävs det ett web API protokoll som är snabb, säker och har kapacitet för många användare. Därför har en undersökning om olika web API protokolls prestanda samt säkerhetstester gjorts. Arbetet gick ut på att ta reda på vilket web API protokoll som erbjuder hög säkerhet och hög prestanda i form av svarstid både vid låg och hög belastning. Det ingick också i arbetet att göra en undersökning av tidigare arbeten för att ta reda på om eventuella protokoll kunde uteslutas. Under arbetet utvecklades också plattformens backend som implementerade de olika web API protokollen för att sedan kunna utföra tester på dessa. Testerna som utfördes var svarstid både med och utan belastning, uppkopplingstid samt belastning. Resultaten analyserades och visade att protokollen hade både för- och nackdelar. Avslutningsvis valdes ett protokoll som var lämpad för plattformen eftersom den hade hög säkerhet samt snabbast uppkopplingstid. Dessutom påverkades inte servern negativt av antalet uppkopplingar. Reactive REST valdes som web API protokoll för denna plattform.
Jayaswal, Tanu. "Events-induced tourism: a protocol analysis." AUT University, 2010. http://hdl.handle.net/10292/897.
Full textJang, Beakcheol. "Wireless MAC Protocol Design and Analysis." NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.
Full textLu, Chun, and Jian Song. "Protocol Analysis for Networked Acquirement System." International Foundation for Telemetering, 2014. http://hdl.handle.net/10150/577516.
Full textThis paper analyzed protocols may be used in each layer in networked telemetry systems, and also presents some deeper researches of the advantages of using synchronous time-division for the physical layer of a networked telemetry system.
Hsu, Yating. "Formal Analysis of Network Protocol Security." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1317230784.
Full textChu, Peil-Ying Mark. "Towards automating protocol synthesis and analysis /." The Ohio State University, 1989. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487598303840366.
Full textPfeffer, Mary Graves. "Venture Capital Investment and Protocol Analysis." Thesis, North Texas State University, 1987. https://digital.library.unt.edu/ark:/67531/metadc331014/.
Full textMajeed, Adnan. "TARMAC timing analysis resilient MAC protocol /." Diss., Online access via UMI:, 2007.
Find full textAhmed, Mahad A. (Mahad Mohamed) 1973 Carleton University Dissertation Engineering Systems and Computer. "Performance analysis and improvement of the Open Shortest Path First routing protocol." Ottawa.:, 1999.
Find full textTalkington, Gregory Joshua. "Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.
Full textFiring, Tia Helene. "Analysis of the Transport Layer Security protocol." Thesis, Norwegian University of Science and Technology, Department of Mathematical Sciences, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10025.
Full textIn this master thesis we have presented a security analysis of the TLS protocol with particular emphasis on the recently discovered renegotiation attack. From our security proof we get that the Handshake protocol with renegotiation, including the fix from IETF, is secure, and hence not vulnerable to the renegotiation attack anymore. We have also analysed the Handshake protocol with session resumption, and the Application data protocol together with the Record protocol. Both of these protocols were deemed secure as well. All the security proofs are based on the UC (Universal Composability) security framework.
Hui, Daniel Hang-Yan. "Protocol validation via reachability analysis : an implementation." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24689.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Hoffmeister, Chris W. "An evaluation methodology for protocol analysis systems." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion.exe/07Mar%5FHoffmeister.pdf.
Full textThesis Advisor(s): George W. Dinolt, Jonathan Herzog. "March 2007." Includes bibliographical references (p. 237-239). Also available in print.
Khan, Muhammad Rashid. "Performance and route stability analysis of RPL protocol." Thesis, KTH, Reglerteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-102884.
Full textBao, Wei. "Modeling, analysis and enhancement of transmission control protocol." Thesis, University of British Columbia, 2011. http://hdl.handle.net/2429/36990.
Full textÅhman, Stefan, and Marcus Wallstersson. "EVH2 protocol : Performance analysis and Wireshark dissector development." Thesis, KTH, Kommunikationssystem, CoS, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-98689.
Full textEVH2 är ett proprietärt applikationslagerprotokoll utvecklat av Aptilo Networks som används i deras mjukvaruprodukt. För närvarande kan EVH2-trafik endast inspekteras med deras egenutvecklade applikation. Denna applikation har inte något stöd för att inspektera annan trafik än EVH2. Eftersom Aptilo kontinuerligt utvecklar detta protokollet är det viktigt att kunna se hur förändringar i protokollet påverkar dess prestanda. Detta examenarbete undersöker möjliga sätt att underlätta användningen och utvecklingen av protokollet. För att kunna inspektera EVH2-trafik tillsammans med trafik från andra protokoll behövs en annan lösning än den nuvarande. Wireshark är en applikation som har stöd för att inspektera flera protokoll samtidigt där protokollpaketen avkodas med dissectors (dissektorer översatt till svenska). I detta examensarbete beskrivs och utvärderas utvecklingen av ett Wireshark dissector plugin för inspektion av EVH2-trafik. Genom att prestandatesta EVH2 kan prestandaskillnader påvisas vid förändringar i protokollet. Detta examensarbete tar fram en plattform för prestandautvärdering genom att introducera en testsvit för prestandatestning. Den utvecklade testsviten användes för att utföra prestandtestning av EVH2.
Kaphuka, Samuel. "The SADC protocol on trade: a critical analysis." Master's thesis, University of Cape Town, 2015. http://hdl.handle.net/11427/19788.
Full textBaker, Robert E. "A study of novice systems analysts' problem solving behaviors using protocol analysis." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23782.
Full textParel, Ilaria. "Validation and application of a shoulder ambulatory motion analysis protocol." Doctoral thesis, Università degli studi di Trieste, 2013. http://hdl.handle.net/10077/8530.
Full textLe principali attività di ricerca svolte durante il dottorato hanno riguardano la validazione e caratterizzazione dell’applicabilità di un protocollo per l’analisi della cinematica di spalla in ambito clinico (ISEO - INAIL Shoulder and Elbow Outpatient protocol). Lo scopo principale era quello di creare uno strumento che fornisse al personale sanitario informazioni sulla performance motoria dei pazienti, supportando, con informazioni di tipo quantitativo, la valutazione ambulatoriale delle patologie della spalla. E’ possibile suddividere l’attività di ricerca in tre temi principali: caratterizzazione e validazione di ISEO; applicazione di ISEO per valutazioni di tipo clinico; applicazione di ISEO per valutazione di performance motoria in ambito sportivo. Grazie ai processi di validazione e caratterizzazione svolti e alle applicazioni di ISEO, ad oggi il protocollo può essere utilizzato in studi clinici e sportivi riguardanti la cinematica di spalla (coordinazione scapolo-omerale), per i quali la sensibilità dello strumento può essere considerata adatta alle esigenze valutative.
The main research activities carried out during the PhD were related to the validation and characterization of the applicability of a protocol for the analysis of the kinematics of the shoulder in a clinical setting (ISEO - Shoulder and Elbow INAIL Outpatient protocol). The main purpose was to create a tool that provides quantitative information about the motor performance of patients, supporting clinicians for the assessment of ambulatory shoulder disorders. The research activity can be split in three main themes: characterization and validation od ISEO; application of ISEO for clinical assessments; application of ISEO for sport performance assessments. Thanks to the validation and characterization of the protocol and its application in several contests, it can be concluded that ISEO can be used to evaluate the kinematics of the shoulder (in particular the scapulohumeral coordination) in clinical and sport performance studies, for which the sensitivity of the protocol can be considered appropriate.
XXV Ciclo
1983
Giancecchi, Nicola. "Analysis and Implementation of the Messaging Layer Security Protocol." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/18467/.
Full textOruk, Tufan. "Simulation and analysis of a wireless MAC protocol : MACAW /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1996. http://handle.dtic.mil/100.2/ADA320868.
Full textThesis advisor(s): Gilbert M. Lundy. "September 1996." Includes bibliographical references (p. 73). Also available online.
Tipici, H. Alphan. "Specification and analysis of a high speed transport protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA268941.
Full textKo, Kai-Chung. "Protocol test sequence generation and analysis using AI techniques." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29192.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Muriithi, Ndiritu. "Radio local area networks : protocol design and performance analysis." Thesis, University of York, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.296384.
Full textCarter, Steven Michael. "Implementation and analysis of the IP measurement protocol (IPMP)." Master's thesis, Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-11152001-090121.
Full textAmoah, Raphael. "Formal security analysis of the DNP3-Secure Authentication Protocol." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93798/1/Raphael_Amoah_Thesis.pdf.
Full textMcLean, Alexander Brown. "Using an Acceptance and Commitment Training Protocol to Decrease Drug Use." Scholar Commons, 2014. https://scholarcommons.usf.edu/etd/5375.
Full textAlmquist, Martin Scott. "Formal specification and analysis of a wireless media access protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA304483.
Full textHensley, David P. "A formal specification and analysis of the resource reservation protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA369656.
Full text"September 1999". Thesis advisor(s): Gilbert M. Lundy. Includes bibliographical references (p. 55). Also available online.
Leong, Ieng Kit. "Formal analysis of Web Services Atomic Transaction protocol using SPIN." Thesis, University of Macau, 2009. http://umaclib3.umac.mo/record=b2099650.
Full textZuniga, Rodriguez Ricardo Francisco. "A comparative analysis of internet protocol telephony in Latin America /." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=32819.
Full textInternet Telephony is one of the most important developments that has resulted from digitization. It raises several legal-regulatory issues at both domestic and international levels.
This thesis analyzes the existing legal-regulatory framework for Internet Telephony in Latin America, and examines its implications and potential developments in the region.
In order to provide a more solid foundation for this analysis, the first chapter provides an overview of the traditional regulatory framework, and describes the technological and economic underpinnings of Internet Telephony.
The second chapter studies the regulatory frameworks for Internet Telephony that have been adopted by Canada, the United States and the European Union. These frameworks could serve as models and provide further guidance to analyze the approaches taken to regulate Internet Telephony in Latin America.
Finally, the third chapter examines the three existing legal-regulatory approaches to Internet Telephony that have been adopted in Latin America and its potential implications.
Charbonneau, Lauren J. "A specification and analysis of the IEEE token bus protocol." Thesis, Monterey, California. Naval Postgraduate School, 1990. http://hdl.handle.net/10945/30633.
Full textIn this thesis a formal description technique, systems of communicating machines, is used to specify and analyze a token bus protocol. A simplified description of the protocol is given, and proofs of certain correctness properties presented. The analysis proves that the protocol is free from deadlocks and non executable transitions, and also that successful message transfer is guaranteed for a network with an arbitrary number of machines. A program written in an object oriented language, C++, demonstrates that the description technique, the specification, and the analysis of the protocol is complete and accurate for a network of three stations. The specification is then extended to allow the transmission of different types of messages, errors in the communication channel, acknowledgements from the receiver, and timeouts.
Khongpun, Somsook. "Composing processes of Thai high school students : a protocol analysis." Virtual Press, 1992. http://liblink.bsu.edu/uhtbin/catkey/862270.
Full textDepartment of English
Raiche, Carl A. "A specification and analysis of the IEEE token ring protocol." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/27279.
Full textLiang, Robert, Bruce Kwan, and Cedric Florens. "ON THROUGHPUT ANALYSIS OF THE MARS IN-SITU ARQ PROTOCOL." International Foundation for Telemetering, 2000. http://hdl.handle.net/10150/607709.
Full textCombating harsh and unpredictable channel environments is a part of the design of any in-situ communication system (i.e. rover to lander, rover to orbiter, etc.). Channel characteristics can range from simple additive white Gaussian noise (AWGN) channels to more bursty fading channels found in rover to orbiter links (i.e. canyon scenarios and typical orbiter passes around mountain ranges). A combination of forward error correction and automatic repeat request (ARQ) schemes are commonly used to provide a more robust communications link. ARQ enhances the communication link particularly for bursty fading channels. Go-Back-N is a commonly used ARQ scheme and is an option in the newly developed Consultative Committee for Space Data Systems (CCSDS) Proximity-1 Link protocol [7], a data link layer protocol targeted specifically for in-situ applications. Optimization of frame sizes and retransmission persistence of the ARQ scheme require a good analytical model of how the scheme performs over various channel conditions. In this paper, an analytical framework for modeling the COP-1 protocol is presented for both AWGN channels along with bursty fading channels. A Gilbert-Elliot two-state Markov model is used to model a bursty fading channel.
Kulkarni, Upendra M. "Performance analysis of HDLC protocol operating in asynchronous balanced mode." Thesis, Virginia Tech, 1988. http://hdl.handle.net/10919/45897.
Full textThe objective of this work is to analyze the performance of HDLC Balanced Class of
Procedures under saturated, full-duplex transmission on error prone links. This thesis
extends work done by Bux et al. [8] by considering errors on both the links. Satellite
links have long propogation delays compared to terrestrial links, and hence, have
longer error recovery times. For such links, errors in acknowledgements have considerable
impact on the throughput. In this analysis, the effect of errors in acknowledgements
is taken in to consideration. An analytical approach is used to derive
performance measures. The concept of "virtual transmission time" introduced by Bux
et al is redefined to accommodate the effect of errors in acknowledgements and
used in the analysis. Resulting throughput calculations show how various parameters,
(e.g. transmission rate, propagation delay, error rate and packet size), interact
and determine the performance.
Master of Science
Li, Pan. "Capacity analysis and cross-layer protocol design in wireless networks." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024777.
Full textNelson, Kevin R. "Critical analysis of XYZ Secondary School's technology education safety protocol." Online version, 2003. http://www.uwstout.edu/lib/thesis/2003/2003nelsonk.pdf.
Full textChen, Yunli. "Performance analysis and enhancement of MAC protocol for IEEE 802.11WLANs." Cincinnati, Ohio : University of Cincinnati, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=ucin1098856121.
Full textMaagh, Stefan. "Performance analysis of the HARQ dynamic decode-and-forward protocol." Thesis, Edinburgh Napier University, 2015. http://researchrepository.napier.ac.uk/Output/8849.
Full textD'Silva, Anil J. "An analysis on the fairness aspects of the DQDB protocol." Thesis, Queensland University of Technology, 1993.
Find full textDeng, Xianglin. "Security of VoIP : Analysis, Testing and Mitigation of SIP-based DDoS attacks on VoIP Networks." Thesis, University of Canterbury. Computer Science and Software Engineering, 2008. http://hdl.handle.net/10092/2227.
Full textBasaran, Cuneyt. "Automated network protocol reachability analysis with supertrace algorithm and TESTGEN : automated generation of test sequence for a formal protocol specification." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1994. http://handle.dtic.mil/100.2/ADA280788.
Full textOndráček, David. "Databáze specifikací bezpečnostních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235438.
Full textRobbins, Bryan Thomas. "Cognitive factors in perspective-based reading (PBR) a protocol analysis study /." Master's thesis, Mississippi State : Mississippi State University, 2009. http://library.msstate.edu/etd/show.asp?etd=etd-04032009-161814.
Full textEdwards, Kim. "Cryptographic protocol specification and analysis using coloured Petri nets and Java." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0006/MQ36026.pdf.
Full text