To see the other types of publications on this topic, follow the link: ARM protocol.

Dissertations / Theses on the topic 'ARM protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'ARM protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Jonsson, Fredrik. "Arm-P : Almost Reliable Multicast protocol." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-14954.

Full text
Abstract:
<p>Distribution of information across IP based networks is today part of our everyday life. IP is the backbone of the Internet and most office networks. We use IP to access web pages, listen to radio, and to create computation clusters. All these examples use bandwidth, and bandwidth is a limited resource.</p><p>Many applications distribute the same information to multiple receivers, but in many cases the same information is sent to a single receiver at a time, thus multiple copies of the same information is sent, thus consuming bandwidth.</p><p>What if the information could be broadcasted to
APA, Harvard, Vancouver, ISO, and other styles
2

Engstrand, Johan. "A 3D-printed Fat-IBC-enabled prosthetic arm : Communication protocol and data representation." Thesis, Uppsala universitet, Fasta tillståndets elektronik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420051.

Full text
Abstract:
The aim of this thesis is to optimize the design of the Fat-IBC-based communication of a novel neuroprosthetic system in which a brain-machine interface is used to control a prosthetic arm. Fat-based intra-body communication (Fat-IBC) uses the fat tissue inside the body of the bearer as a transmission medium for low-power microwaves. Future projects will use the communication system and investigate ways to control the prosthetic arm directly from the brain. The finished system was able to individually control all movable joints of multiple prosthesis prototypes using information that was recei
APA, Harvard, Vancouver, ISO, and other styles
3

Španihel, Pavol. "Zabezpečovací modul pro reklamní robot FEKT VUT v Brně." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219649.

Full text
Abstract:
The aim of this work is to design a safety module for promotional robot FEEC BUT robot, which is based on evaluation kit RDK-IDM-SBC. The security module allows authorized persons control different parts of the robot (monitors, computers and subsystems included in the robot).
APA, Harvard, Vancouver, ISO, and other styles
4

Zemánek, Petr. "Modulární RGB LED displej s rozhraním Ethernet." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220700.

Full text
Abstract:
This thesis deals with an electronic circuit and a PCB of a modular RGB LED display with the Ehernet interface. Firstly, author describes a RGB colour model, features of RGB LED displays, ways of control them. The next chapter contains a short description of the Ethernet interface, UDP and TCP protocols and a lwIP TCP/IP stack. The last theoretical chapter is an introduction to ARM Cortex-M3 and Cortex-M4 based microcontrollers. The next chaper is deals with a hardware design of the modular RGB LED display. The device is designed to be modular. Individual devices can be combosed together and c
APA, Harvard, Vancouver, ISO, and other styles
5

Krůpa, Tomáš. "Univerzální zavaděč pro mikrokontrolér Kinetis K60." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255480.

Full text
Abstract:
The scope of this work was to design a bootloader for Kinetis K60, an ARM Cortex-M4 microcontroller. The bootloader should simplify the process of loading user applications to the flash memory of the microcontroller on the Minerva development kit. Based on a quick research of existing bootloader solutions, new bootloader was designed together with communication protocol that would suit the needs for transfer of both the file data and configuration information through all the supported communication interfaces - USB, SDHC, Ethernet and RS-232. On the PC side, development of bootloader&#8217;s a
APA, Harvard, Vancouver, ISO, and other styles
6

Pérez, María del Carmen Marín. "Benchmarking and applications of a computational photobiology tool for design of novel and highly fluorescent rhodopsin proteins." Doctoral thesis, Università di Siena, 2019. http://hdl.handle.net/11365/1070289.

Full text
Abstract:
In recent years, world economy and technological advancement have been transformed by Genomics, which allows us to study, design and build biologically relevant molecules. Genomics is already deeply embedded in industries as diverse as pharmaceutical, food and agricultural, environmental and bio-tech in general. Fast and cheap tools for gene sequencing, protein expression and analysis are commonly used for high-throughput genomic-related studies. However, due to experimental difficulties and long time scales (e.g., protein crystallization), protein structure determination, and thus the fundam
APA, Harvard, Vancouver, ISO, and other styles
7

Novotný, Jan. "Zpracování signálu UHF RFID čtečky." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221225.

Full text
Abstract:
The master’s thesis is focused on the UHF RFID reader EXIN-1 signal processing. The first part describes the concept of the EXIN-1 front end, its basic testing and possible communication interfaces for reader control and for receiving and transmitting baseband signals. The second part of this work is aimed to a simple description of EPCglobal Class-1 Generation-2 UHF RFID Protocol, especially to used modulations and codings. In the last part, a block connection between the front end and an ARM Cortex-M4 microcontroller discovery board is designed. The microcontroller is used for generating of
APA, Harvard, Vancouver, ISO, and other styles
8

Sabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.

Full text
Abstract:
Le paysage du monde des téléphones mobiles a changé avec l’introduction des ordiphones (de l’anglais smartphones). En effet, depuis leur avènement, les ordiphones sont devenus incontournables dans des différents aspects de la vie quotidienne. Cela a poussé de nombreux fournisseurs de services de rendre leurs services disponibles sur mobiles. Malgré cette croissante popularité, l’adoption des ordiphones pour des applications sensibles n’a toujours pas eu un grand succès. La raison derrière cela est que beaucoup d’utilisateurs, de plus en plus concernés par la sécurité de leurs appareils, ne fon
APA, Harvard, Vancouver, ISO, and other styles
9

Prítel, Pavol. "Implementace protokolu EtherCAT pro procesor ARM." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240937.

Full text
Abstract:
The aim of this report is introduction and implementation of EtherCAT protocol on Texas Instruments AM437x microcontroller. The primary goal is to implement EtherCAT communication with slave device. The EtherCAT configurable digital output module is implemented as example application.
APA, Harvard, Vancouver, ISO, and other styles
10

Santi, Juliana de 1982. "Gerenciamento ativo de filas para o protocolo "High Speed Transmission Control Protocol" em redes com produto banda-atraso elevado." [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276151.

Full text
Abstract:
Orientador: Nelson Luis Saldanha da Fonseca<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação<br>Made available in DSpace on 2018-08-13T10:35:13Z (GMT). No. of bitstreams: 1 Santi_Julianade_M.pdf: 1658984 bytes, checksum: 8a9f078587406a06815484e4fe057f7d (MD5) Previous issue date: 2008<br>Resumo: A utilização eficiente da banda passante em redes de alta velocidade e grandes atrasos, denominadas redes com produto banda-atraso elevado (PBA), tornou-se um grande desafio. Isto ocorre devido aos ajustes do protocolo Transmission Control Protocol (TCP). O High
APA, Harvard, Vancouver, ISO, and other styles
11

Skopal, Miroslav. "Univerzální hardwarová platforma podporující operační systém Linux." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218709.

Full text
Abstract:
This thesis deals with the development problems and creating of the multi- purpose hardware platform, which supports operating system Linux. It is focused on the microprocessors using ARM architecture with architecture ARM7, ARM9 and ARM11. The scope of the first part of this thesis was searching the sales of available 32 bit ARM microprocessors. The second part is attended to a particular Mini2440 development kit, its animation and the subsequent development of the kernel drivers for OS Linux platform. One of this thesis details was also the development of my own expansive hardware module and
APA, Harvard, Vancouver, ISO, and other styles
12

Talkington, Gregory Joshua. "Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.

Full text
Abstract:
The solutions presented in this dissertation describe a new paradigm in which we shepherd these network security protocols through atmosphere transitions, offering new ways to analyze and monitor the state of the protocol. The approach involves identifying a protocols transitional weaknesses through adaption of formal models, measuring the weakness as it exists in the wild by statically analyzing applications, and show how to use network traffic analysis to monitor protocol implementations going into the future. Throughout the effort, we follow the popular Open Authorization protocol in its at
APA, Harvard, Vancouver, ISO, and other styles
13

Cyr, Geneviève. "Interface configurable pour un processeur ARM basée sur le protocole VCI." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ65560.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Wickramarathna, Thamali Dilusha N. "Modeling and Performance Evaluation of a Delay and Marking Based Congestion Controller." Scholarly Repository, 2008. http://scholarlyrepository.miami.edu/oa_theses/101.

Full text
Abstract:
Achieving high performance in high capacity data transfers over the Internet has long been a daunting challenge. The current standard of Transmission Control Protocol (TCP), TCP Reno, does not scale efficiently to higher bandwidths. Various congestion controllers have been proposed to alleviate this problem. Most of these controllers primarily use marking/loss or/and delay as distinct feedback signals from the network, and employ separate data transfer control strategies that react to either marking/loss or delay. While these controllers have achieved better performance compared to existing T
APA, Harvard, Vancouver, ISO, and other styles
15

Kamran, Mudassar. "Applications of novel imaging protocols and devices in interventional neuroradiology." Thesis, University of Oxford, 2015. http://ora.ox.ac.uk/objects/uuid:ccb2550c-cb28-42f1-bd95-4dcee4ec1ff4.

Full text
Abstract:
The historical development, current practice, and the future of interventional neuroradiology are intricately linked to the advancements in the imaging and devices used for neuroendovascular treatments. This thesis explores the advanced imaging potential of the C-arm imaging systems used in the neurointerventional suite and investigates the initial clinical experience with a new flow diverter device to treat the intracranial aneurysms. A cohort of aneurysmal SAH patients who developed delayed cerebral ischaemia (DCI) were prospectively studied with a new parenchymal blood volume (PBV) research
APA, Harvard, Vancouver, ISO, and other styles
16

PEDRAZA, GONZÁLEZ LAURA MILENA. "Blueprinting, implementation, and application of fully automatic protocols for the QM/MM modeling of photo-excited states of rhodopsin variants." Doctoral thesis, Università di Siena, 2021. http://hdl.handle.net/11365/1141640.

Full text
Abstract:
The semi-automatic building of QM/MM models of rhodopsins has been recently proposed, by means of a new technology called Automatic Rhodopsin Model protocol. In its original version, here called original ARM protocol, published in 2016, the constructed QM/MM models were found to be useful for biophysical studies and for protein engineering, but had the disadvantage of being time-consuming to prepare, error-prone, and, also, difficult to replicate when the same model was independently constructed by different investigators. These issues were a consequence of the &lt;&gt; (i.e., not fully automa
APA, Harvard, Vancouver, ISO, and other styles
17

Huzioka, Daniel Tetsuo. "Um protocolo ALM baseado em desigualdade triangular para distribuição de conteúdo." reponame:Repositório Institucional da UFPR, 2010. http://hdl.handle.net/1884/24864.

Full text
Abstract:
Resumo: A comunicação por difusão seletiva, ou multicast, permite que uma única transmissão seja feita para um grupo de destinatários. Aplicações de distribuição de conteúdo em larga escala na Internet demandam este tipo de comunicação. Por não haver amplo suporte à comunicação multicast na camada de rede da Internet, alguns protocolos (chamados protocolos ALM Application Layer Multicast) simulam a camada de rede através de redes sobrepostas na camada de aplicação, permitindo o uso da comunicação multicast sobre essas redes. Neste trabalho apresentamos o PALMS, um protocolo ALM voltado para a
APA, Harvard, Vancouver, ISO, and other styles
18

Smith, Sarah C. "Evaluating a Stepped Care Protocol for Postpartum Depression in a Pediatric Primary Care Clinic." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etd/3277.

Full text
Abstract:
Postpartum depression (PPD) is a prevalent, complex illness impacting 10% to 20% of mothers and their families. Treatments for PPD, such as medication and psychotherapy, are effective at reducing the severity of symptoms and generally improving quality of life for new mothers and their families. Unfortunately, many mothers with PPD go unrecognized due to a lack of standardized screening methods. Further, mothers regularly encounter barriers to accessible, evidence-based follow-up care to treatment even when symptoms of PPD are detected. The use of a stepped care protocol, set in a pediatric pr
APA, Harvard, Vancouver, ISO, and other styles
19

Pfeffer, Mary Graves. "Venture Capital Investment and Protocol Analysis." Thesis, North Texas State University, 1987. https://digital.library.unt.edu/ark:/67531/metadc331014/.

Full text
Abstract:
This study used protocol analysis to identify key variables in the venture capital investment decision-making process. The study used a fictional business plan which was based on six actual business plans. This fictional business plan was presented to ten venture capitalists who were asked to review it to decide whether to interview the investee. The protocols obtained from these subjects were analyzed to determine patterns within the subjects' review. The sections of the business plan which were commonly reviewed first were the deal structure, the executive summary, and the management section
APA, Harvard, Vancouver, ISO, and other styles
20

Kellams, Ann, Cadey Harrel, Stephanie Omage, Carrie Gregory, and Casey Rosen-Carole. "ABM Clinical Protocol #3: Supplementary Feedings in the Healthy Term Breastfed Neonate, Revised 2017." MARY ANN LIEBERT, INC, 2017. http://hdl.handle.net/10150/626017.

Full text
Abstract:
A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.
APA, Harvard, Vancouver, ISO, and other styles
21

Oberdan, Thomas. "Protocols, truth and convention." Amsterdam ; Atlanta, GA : Rodopi, 1993. http://catalogue.bnf.fr/ark:/12148/cb35609110v.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Chung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.

Full text
Abstract:
Dissertation (Ph.D.) -- Worcester Polytechnic Institute.<br>Keywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
APA, Harvard, Vancouver, ISO, and other styles
23

Negré, Walkmar Silva. "Proposta de protocolos de segurança para a prevenção, a contenção e a neutralização de agente agressor bioativo em incidentes bioterroristas e estudo por docking molecular do fator letal do Bacillus anthracis (Antraz)." Universidade Federal de São Carlos, 2010. https://repositorio.ufscar.br/handle/ufscar/6983.

Full text
Abstract:
Made available in DSpace on 2016-08-17T18:39:39Z (GMT). No. of bitstreams: 1 3802.pdf: 4112819 bytes, checksum: e42717f19397f311cb6978ed3341685c (MD5) Previous issue date: 2010-10-29<br>For centuries, infectious agents have been used as weapons in armed conflicts. In 1972 the Biological Weapons Convention prohibited the creation and stockpiling of biological weapons. However, some countries continued to research and develop these weapons. Proof of this fact was the crash in 1979 in a military factory in the USSR, where Bacillus anthracis were dispersed. Biotechnology in a globalizing world f
APA, Harvard, Vancouver, ISO, and other styles
24

Castro, Bianca Portes de. "PALMS+: protocolo ALM baseado em desigualdade triangular para distribuição de streaming de vídeo." Universidade Federal de Juiz de Fora (UFJF), 2014. https://repositorio.ufjf.br/jspui/handle/ufjf/4831.

Full text
Abstract:
Submitted by Renata Lopes (renatasil82@gmail.com) on 2017-06-06T14:59:44Z No. of bitstreams: 1 biancaportesdecastro.pdf: 1203353 bytes, checksum: 0cd5843bff9e747e5432fff99ec1e565 (MD5)<br>Approved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2017-06-07T11:04:29Z (GMT) No. of bitstreams: 1 biancaportesdecastro.pdf: 1203353 bytes, checksum: 0cd5843bff9e747e5432fff99ec1e565 (MD5)<br>Made available in DSpace on 2017-06-07T11:04:29Z (GMT). No. of bitstreams: 1 biancaportesdecastro.pdf: 1203353 bytes, checksum: 0cd5843bff9e747e5432fff99ec1e565 (MD5) Previous is
APA, Harvard, Vancouver, ISO, and other styles
25

Harrison, Jane. "Indig-curious : what are the challenges for non Aboriginal theatre practitioners in accessing and interpreting Aboriginal themes?" Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/32152/1/Jane_Harrison_Thesis.pdf.

Full text
Abstract:
How do non-Indigenous theatre practitioners, especially actors, access and incorporate Aboriginal themes in the plays they create or perform in? Will it ever be acceptable for a non-Aboriginal actor to play an Aboriginal role? In literature there are clear protocols for writing Aboriginal characters and themes. In the visual arts and in dance, non-Indigenous practitioners might 'reference' Aboriginal themes, but what about in theatre performance? This research embodies one cultural dilemma in a creative project and exegesis: exploring the complex issues which emerge when an Aboriginal playwrig
APA, Harvard, Vancouver, ISO, and other styles
26

Alkubeily, Mothanna. "Les protocoles multicast applicatif : stabilité et sécurité." Compiègne, 2009. http://www.theses.fr/2009COMP1852.

Full text
Abstract:
Le Multicast Applicatif (ALM : Application-Level Multicast) a été proposé comme une alternative prometteuse pour pallier aux problèmes de déploiement d'IP multicast. Toutefois, l'ALM hérite du problème de réarrangement de l'arbre dans les sessions fortement dynamiques. De plus, dans le cas des sessions ALM sécurisées, le processus de réarrangement induit un problème de passage à l'échelle (scalabilité) appelé 1-affects-n où un événement d'arrivée/départ déclenche un processus de renouvellement total des clés pour garantir la confidentialité dans la session. Dans cette thèse, nous commençons pa
APA, Harvard, Vancouver, ISO, and other styles
27

De, Silva Vashista C. "Core-Shell Based Metamaterials: Fabrication Protocol and Optical Properties." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc1062904/.

Full text
Abstract:
The objective of this study is to examine core-shell type plasmonic metamaterials aimed at the development of materials with unique electromagnetic properties. The building blocks of metamaterials under study consist of gold as a metal component, and silica and precipitated calcium carbonate (PCC) as the dielectric media. The results of this study demonstrate important applications of the core-shells including scattering suppression, airborne obscurants made of fractal gold shells, photomodification of the fractal structure providing windows of transparency, and plasmonics core-shell with a ga
APA, Harvard, Vancouver, ISO, and other styles
28

Pierantozzi, Stefano. "Modellazione e comparazione del protocollo TCP in scenari di mobilità." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7440/.

Full text
Abstract:
Nell'ultimo ventennio l'impatto delle tecnologie wireless ha rivoluzionato il modo di comunicare. Tuttavia oltre a svariati benefici sono emersi diversi problemi di integrazione e ottimizzazione. Uno tra i protocolli più conosciuto e utilizzato in ambito di comunicazioni di rete, il TCP, viene sempre più spesso usato all'interno di sistemi wireless, per le sue caratteristiche di affidabilità e controllo, senza però fornire supporto specifico. Ciò è materia di forte dibattito e ricerca, che mira a cercare di raffinare le differenti versioni di TCP per renderle wireless-oriented. In questo lavor
APA, Harvard, Vancouver, ISO, and other styles
29

Schwartz, Joseph Howard. "Development and Application of an Assessment Protocol for Watershed Based Biomonitoring." Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc279219/.

Full text
Abstract:
With numerous bioassessment methodologies available, a regional protocol needs to be developed to ensure that results are comparable. A regional assessment protocol was developed that includes collecting five benthic macroinvertebrate samples, identifying organisms to genus, and calculating the following metrics: Number of Taxa, Total Number of Individuals, Simpson's Diversity Index, Shannon's Diversity Index, Percent Contribution of Dominant Taxa, Hilsenhoffs Biotic Index, and Percent Contribution of Dipterans. Once the protocol was developed, it was used to assess the Bayou Chico tributarie
APA, Harvard, Vancouver, ISO, and other styles
30

Xu, Ke. "Mobile agent security through multi-agent cryptographic protocols." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4473/.

Full text
Abstract:
An increasingly promising and widespread topic of research in distributed computing is the mobile agent paradigm: code travelling and performing computations on remote hosts in an autonomous manner. One of the biggest challenges faced by this new paradigm is security. The issue of protecting sensitive code and data carried by a mobile agent against tampering from a malicious host is particularly hard but important. Based on secure multi-party computation, a recent research direction shows the feasibility of a software-only solution to this problem, which had been deemed impossible by some rese
APA, Harvard, Vancouver, ISO, and other styles
31

Krishnan, Anupama. "The Multipath Fault-Tolerant Protocol for Routing in Packet-Switched Communication Network." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4199/.

Full text
Abstract:
In order to provide improved service quality to applications, networks need to address the need for reliability of data delivery. Reliability can be improved by incorporating fault tolerance into network routing, wherein a set of multiple routes are used for routing between a given source and destination. This thesis proposes a new fault-tolerant protocol, called the Multipath Fault Tolerant Protocol for Routing (MFTPR), to improve the reliability of network routing services. The protocol is based on a multipath discovery algorithm, the Quasi-Shortest Multipath (QSMP), and is designed to work
APA, Harvard, Vancouver, ISO, and other styles
32

Chen, Yan. "Traitement transactionnel dans un environnement OSI." Grenoble 2 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb376126461.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Ayeh, Eric. "An investigation into graph isomorphism based zero-knowledge proofs." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12076/.

Full text
Abstract:
Zero-knowledge proofs protocols are effective interactive methods to prove a node's identity without disclosing any additional information other than the veracity of the proof. They are implementable in several ways. In this thesis, I investigate the graph isomorphism based zero-knowledge proofs protocol. My experiments and analyses suggest that graph isomorphism can easily be solved for many types of graphs and hence is not an ideal solution for implementing ZKP.
APA, Harvard, Vancouver, ISO, and other styles
34

Madrigal-Bauguss, Jessica A. "The Effect of a Brief Acceptance-Based Protocol on Health Related Relational Framing." Thesis, University of North Texas, 2010. https://digital.library.unt.edu/ark:/67531/metadc30488/.

Full text
Abstract:
Behavior analysts who study verbal behavior theorize that people derive relationships between stimuli - forming stimulus classes such that psychological functions transfer among stimuli and therefore affect behavior. Verbal processes are thought to play a role in cancer patients' behavioral flexibility. The current study examined if an analogue intervention produced changes in relations between health-relevant stimuli from pre- to post-test in patient and student samples. A matching-to-sample (MTS) task required participants to form three 4-member classes that included health, treatment, or ne
APA, Harvard, Vancouver, ISO, and other styles
35

Vishwanathan, Roopa. "Exploring Privacy in Location-based Services Using Cryptographic Protocols." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc68060/.

Full text
Abstract:
Location-based services (LBS) are available on a variety of mobile platforms like cell phones, PDA's, etc. and an increasing number of users subscribe to and use these services. Two of the popular models of information flow in LBS are the client-server model and the peer-to-peer model, in both of which, existing approaches do not always provide privacy for all parties concerned. In this work, I study the feasibility of applying cryptographic protocols to design privacy-preserving solutions for LBS from an experimental and theoretical standpoint. In the client-server model, I construct a two-ph
APA, Harvard, Vancouver, ISO, and other styles
36

Niare, Tiéma M. "Simplification du protocole de pesées des agneaux en ferme." Grenoble 2 : ANRT, 1986. http://catalogue.bnf.fr/ark:/12148/cb37600039d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Boukhari, Souha. "Approche unifiée pour le développement et l'intégration de protocole." Grenoble 2 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb376121904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Asfour, Taghrid. "Protocoles de communication multicast fiables." Paris : École nationale supérieure des télécommunications, 2001. http://catalogue.bnf.fr/ark:/12148/cb388211552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Eads, Julie A. (Julie Anne). "Self-Monitoring of Stressors as an Additive Component to a Stress Management Training Protocol." Thesis, University of North Texas, 1992. https://digital.library.unt.edu/ark:/67531/metadc332845/.

Full text
Abstract:
The purpose of this study was to examine whether or not self-monitoring of stressors and physiological response to stressors enhances the effectiveness of a stress management technique, specifically relaxation training. The primary hypothesis which stated that the RSMS group would experience a greater reduction in depression (on the Beck Depression Inventory), and enhancement in self-efficacy (on the General Self-efficacy Scale) than all other groups, was not supported.
APA, Harvard, Vancouver, ISO, and other styles
40

Win, Htoo Aung. "BSM Message and Video Streaming Quality Comparative Analysis Using Wave Short Message Protocol (WSMP)." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538706/.

Full text
Abstract:
Vehicular ad-hoc networks (VANETs) are used for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. The IEEE 802.11p/WAVE (Wireless Access in Vehicular Environment) and with WAVE Short Messaging Protocol (WSMP) has been proposed as the standard protocol for designing applications for VANETs. This communication protocol must be thoroughly tested before reliable and efficient applications can be built using its protocols. In this paper, we perform on-road experiments in a variety of scenarios to evaluate the performance of the standard. We use commercial VANET devices wi
APA, Harvard, Vancouver, ISO, and other styles
41

Jones, Nicole A. (Nicole Amy). "Morning and Afternoon Response to Exercise Using Two Test Protocols." Thesis, University of North Texas, 1995. https://digital.library.unt.edu/ark:/67531/metadc277988/.

Full text
Abstract:
The purpose was to investigate time of day on responses to two types of exhaustive cycle ergometer tests. Sixteen males performed six exercise tests: three - constant power protocol and three - incremental protocol. The first test was a learning trial; the other tests were performed one in the morning and one in the afternoon. ANOVA revealed that O2 deficit and lactate were higher in the afternoon than the morning. Regardless of test type, time to exhaustion tended to be higher in the afternoon. VO2max was unaffected by the time of day and test type. These results confirmprevious reports of a
APA, Harvard, Vancouver, ISO, and other styles
42

Zhou, Yanliang. "Efficient Linear Secure Computation and Symmetric Private Information Retrieval Protocols." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752381/.

Full text
Abstract:
Security and privacy are of paramount importance in the modern information age. Secure multi-party computation and private information retrieval are canonical and representative problems in cryptography that capture the key challenges in understanding the fundamentals of security and privacy. In this dissertation, we use information theoretic tools to tackle these two classical cryptographic primitives. In the first part, we consider the secure multi-party computation problem, where multiple users, each holding an independent message, wish to compute a function on the messages without revealin
APA, Harvard, Vancouver, ISO, and other styles
43

Zakaria, Mahmoud. "Un protocole générique pour les environnements répartis à objets : GRIP /." Paris : École nationale supérieure des télécommunications, 1998. http://catalogue.bnf.fr/ark:/12148/cb37007399r.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Demerjian, Jacques. "Services d'autorisation et intégration au protocole d'attribution dynamique des adresses /." Paris : École nationale supérieure des télécommunications, 2005. http://catalogue.bnf.fr/ark:/12148/cb39977341q.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Gupta, Neeraj Kant. "Modeling and Analysis of Next Generation 9-1-1 Emergency Medical Dispatch Protocols." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc500122/.

Full text
Abstract:
Emergency Medical Dispatch Protocols are guidelines that a 9-1-1 dispatcher uses to evaluate the nature of emergency, resources to send and the nature of help provided to the 9-1-1 caller. The current Dispatch Protocols are based on voice only call. But the Next Generation 9-1-1 (NG9-1-1) architecture will allow multimedia emergency calls. In this thesis I analyze and model the Emergency Medical Dispatch Protocols for NG9-1-1 architecture. I have identified various technical aspects to improve the NG9-1-1 Dispatch Protocols. The devices (smartphone) at the caller end have advanced to a point w
APA, Harvard, Vancouver, ISO, and other styles
46

Chraïbi, Chakib. "Contribution au test de protocoles OSI." Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37603984f.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Nassif, Nadia Adel. "Especificação formal em SDL e simulação de protocolos que combinam a tecnica de Label-Swapping com o roteamento de camada 3 para o transporte do Ip sobre o ARM." [s.n.], 1999. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260009.

Full text
Abstract:
Orientador: Walter da Cunha Borelli<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação<br>Made available in DSpace on 2018-07-25T16:20:30Z (GMT). No. of bitstreams: 1 Nassif_NadiaAdel_M.pdf: 10953982 bytes, checksum: cacb2be7368db5f807502c09fe7bed13 (MD5) Previous issue date: 1999<br>Resumo: A tese trata da especificação formal em SDL (Specification and Description Language) e da simulação através do SDT 1 (SDL Design Tool), de um classificador de fluxo X/V usado no IpSwitching e, do LDP (Label Distribution Protocol) do MPLS (Multi
APA, Harvard, Vancouver, ISO, and other styles
48

Talbi, Mehdi. "Spécification et vérification automatique des propriétés des protocoles de vote électronique en utilisant la logique ADM." Rennes 1, 2010. http://www.theses.fr/2010REN1S073.

Full text
Abstract:
Les systèmes de vote électronique sont basés sur des protocoles cryptographiques faisant usage de primitives avancées (chiffrement homomorphe, signature en aveugle, etc. ) et impliquant des canaux de communication élaborés (anonymes, privés) dans le but de garantir certaines propriétés de sécurité : éligibilité, équité, anonymat, etc. Pour les systèmes critiques tels que celui du vote électronique, l’usage des méthodes formelles, pour prouver que les propriétés prétendues satisfaites par un protocole sont réellement garanties, devrait être incontournable. Dans cette thèse, nous proposons d’uti
APA, Harvard, Vancouver, ISO, and other styles
49

Heitz, Layne. "The Validation of a Short-cycle Formative Assessment Observation Protocol for Science and Mathematics Instruction." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc407820/.

Full text
Abstract:
Over the years, teachers, administrators, and policy makers have been concerned with optimizing learning for all students. The No Child Left Behind Act put an emphasis on summative assessments, which measure what students have learned. In contrast, formative assessment has been shown in many studies to improve student achievement and motivation because it is applied while students are learning. The purpose of this study was to investigate, for middle and high school mathematics and science instruction, the validity and reliability of a newly developed observation instrument called AssessToday
APA, Harvard, Vancouver, ISO, and other styles
50

Joglekar, Sachin P. "Embedded monitors for detecting and preventing intrusions in cryptographic and application protocols." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4414/.

Full text
Abstract:
There are two main approaches for intrusion detection: signature-based and anomaly-based. Signature-based detection employs pattern matching to match attack signatures with observed data making it ideal for detecting known attacks. However, it cannot detect unknown attacks for which there is no signature available. Anomaly-based detection builds a profile of normal system behavior to detect known and unknown attacks as behavioral deviations. However, it has a drawback of a high false alarm rate. In this thesis, we describe our anomaly-based IDS designed for detecting intrusions in cryptographi
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!