Dissertations / Theses on the topic 'Hypertext Transfer Protocol (HTTP)'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Hypertext Transfer Protocol (HTTP).'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Chen, Xin. "Performance analysis of persistent hypertext transfer protocol (HTTP) over satellite links." Ohio : Ohio University, 1997. http://www.ohiolink.edu/etd/view.cgi?ohiou1177605718.
Full textGilis, Matteus, David Hörnsten, and David Larsson. "Filöverföring i modern tid : En jämförelse av SMTP, SFTP och HTTP." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45684.
Full textTransferring and receiving computer files are something most of us do on a regularbasis whether it is for private purposes or if it is work related. FTP is a protocolused for this very purpose which was launched during a time when personal computerswere growing increasingly popular in both home and workplace environments.Since then, more protocols have been introduced and today there are a number ofoptions available bringing new and common features alike to the market. The SMTPprotocol, extended with the MIME standard, is currently a widely used alternative tothe pure file transfer protocols due to the user familiarity and past experiences withthese mail services. Sending and receiving files through e-mail does however implysome limitations together with the fact that some security aspects need to be takeninto consideration, particularly for company users handling sensitive data. In thisthesis, three different file transfer protocols (SMTP, SFTP and HTTP) have all beenevaluated in account of their user friendliness as well as their security features. Theresults indicate that HTTP(S) combined with the WebDAV extension can be considereda viable alternative for organizations due to its user friendliness and security.The remaining protocols, SMTP and SFTP, also have their uses where SFTP wouldseem to be an appealing option for advanced users and where SMTP remains a passablealternative for private usage by regular users under the right conditions.
Bersack, Evelyn Louise. "Implementation of a hypertext transfer protocol server on a high assurance multilevel secure platform." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA386364.
Full textMichálek, Branislav. "Aktualizace programu v zařízení s obvody Zynq." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400680.
Full textElza, Dethe. "Browser evolution document access on the World Wide Web." Ohio : Ohio University, 1998. http://www.ohiolink.edu/etd/view.cgi?ohiou1176833339.
Full textKalibjian, Jeffrey R. "Group Telemetry Analysis Using the World Wide Web." International Foundation for Telemetering, 1996. http://hdl.handle.net/10150/607611.
Full textToday it is not uncommon to have large contractor teams involved in the design and deployment of even small satellite systems. The larger (and more geographically remote) the team members, the more difficult it becomes to efficiently manage the disbursement of telemetry data for evaluation and analysis. Further complications are introduced if some of the telemetry data is sensitive. An application is described which can facilitate telemetry data sharing utilizing the National Information Infrastructure (Internet).
Klingestedt, Kashmir. "Client-Server Communications Efficiency in GIS/NIS Applications : An evaluation of communications protocols and serialization formats." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-233581.
Full textGeografiska informationssystem och nätverksinformationssystem är viktiga redskap för vårt samhälle, vilka används för hantering av geografisk data och stora informationsnätverk. Det är därför viktigt att se till att sådana system är av hög kvalitet. GIS/NIS-applikationer behandlar vanligtvis stora mängder data, vilket kan resultera i mycket nätverkstrafik. I det här arbetet utvärderas två olika kommunikationsprotokoll och serialiseringsformat för kommunikationseffektivitet mellan klient och server i GIS/NIS-applikationer. Specifikt är dessa HTTP/1.1, HTTP/2, Java Objektserialisering och Googles Protocol Buffers. De implementerades var och en i en kommersiell GIS/NIS-miljö och utvärderades genom mätningar av två signaturanrop i systemet. De aspekter som observerades är kommunikationstiden, mängden HTTP-overhead och mängden HTTP-payload. Resultaten tyder på att HTTP/2 och Googles Protocol Buffers presterar bättre än HTTP/1.1 respektive Java Objektserialisering. En 87% minskning av mängden HTTP overhead uppnåddes då HTTP/1.1 ersattes med HTTP/2. En minskning av mängden HTTP payload observeras också med användning av Protocol Buffers snarare än Java Objektserialisering, särskilt för kommunikationer där data innehåller många olika objekttyper. Gällande kommunikationstiden tyder resultaten på att valet av kommunikationsprotokoll påverkar mer än valet av serialiseringsformat för kommunikationer med små mängder data, medan motsatsen gäller för kommunikationer med mycket data.
Amaro, da Cruz Mauro. "An enhanced multi-protocol middleware solution for Internet of things." Thesis, Mulhouse, 2021. https://www.learning-center.uha.fr/.
Full textIn Internet of Things (IoT), data is handled and stored by software known as middleware (located on a server). The evolution of the IoT concept led to the construction of many IoT middleware, software that plays a key role since it supports the communication among devices, users, and applications. Several aspects can impact the performance of a middleware. Based in a deep review of the related literature and in the proposal of a Reference Model for IoT middleware, this thesis proposes a new IoT middleware, called In.IoT, a scalable, secure, and innovative middleware solution based on a deep review of the state of the art and following the reference middleware architecture that was proposed along with this research work. In.IoT addresses the middleware concerns of the most popular solutions (security, usability, and performance) that were evaluated, demonstrated, and validated along this study, and it is ready and available for use. In.IoT architectural recommendations and requirements are detailed and can be replicated by new and available solutions. It supports the most popular application-layer protocols (MQTT, CoAP, and HTTP). Its performance is evaluated in comparison with the most promising solutions available in the literature and the results obtained by the proposed solution are extremely promising. Furthermore, this thesis studies the impact of the underlying programming language in the solution's overall performance through a performance evaluation study that included Java, Python, and Javascript, identifying that globally, Java demonstrates to be the most robust choice for IoT middleware. IoT devices communicate with the middleware through an application layer protocol that may differ from those supported by the middleware, especially when it is considered that households will have various devices from different brands. The thesis offers an alternative for such cases, proposing an application layer gateway, called MiddleBridge. MiddleBridge translates CoAP, MQTT, DDS, and Websockets messages into HTTP (HTTP is supported by most IoT middleware). With MiddleBridge, devices can send a smaller message to an intermediary (MiddleBridge), which restructures it and forwards it to a middleware, reducing the time that a device spends transmitting. The proposed solutions were evaluated in comparison with other similar solutions available in the literature, considering the metrics related to packet size, response times, requests per second, and error percentage, demonstrating their better results and tremendous potential. Furthermore, the study used XGBoost (a machine learning technique) to detect the occurrence of replication attacks where an attacker obtains device credentials, using it to generate false data and disturb the IoT environment. The obtained results are extremely promising. Thus, it is concluded that the proposed approach contributes towards the state of the art of IoT middleware solutions
Prasetijo, Agung Budi. "Application-level proxy firewalls." Thesis, Queensland University of Technology, 2001.
Find full textSezgin, Veliddin Eran. "File transfer with SNR high-speed transport protocol." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA306590.
Full textIrey, Philip Musser IV. "From specification to realization: implementing the express transfer protocol." Thesis, Virginia Tech, 1989. http://hdl.handle.net/10919/43088.
Full textMaster of Science
Saqibuddin, Mohammad, and Iplu Saha. "Using Simple Mail Transfer Protocol on the Last Hop." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92016.
Full textPå senaste tiden har mobilindustrin utvecklas och tagit stora steg framåt. Högprestanda mobiler med hög upplösning, färgskärmar och epost klienter (eller så kallade plug-ins) har gjort användingen av epost på mobiltelefoner både lätt och intressant. Användarna har funnit att det är bekvämt att ha förmågan att kunna ta emot och skicka epost vart som helst. En viktig skillnad mellan mobiltelefoner och t.ex. en dator är att mobiltelefonen har en begränsad elförsörjning. Olika Funktioner till mobiltelefoner har utvecklas mycket på sistonde men undertiden har batteritiden förblivit nästintill konstant. Programmen som har utvecklas kräver mer och mer kraft av mobiltelefonen och speciellt den senaste trenden med multimedia applikationer, så som mp3 spelare och kamera, som används mycket frekvent av användarna. Tratitionellt så skickar en epost klient förfrågningarn med jämna mellanrum till epost servern för att ta reda på om det har kommit några nya e-mails. Detta fungerar väl för datorer som inte har några elförsörjnings problem men för en mobil så kostar den periodiska förfrågningen mycket batteritid. En lösning till problemet vore att höja periodstiden mellan varje förfrågning. Detta skulle dock leda till en högre fördröjning på leveransen av eposten. I det här examensarbetet har vi undersökt och implementerat ett nytt system för epost leverans utan att förändra den underliggande infrastrukturen. Det nya systemet tar bort behovet av periodisk förfrågan, för att ta emot nya e-mails, genom att låta nätverket initiera leveransen. Detta betyder att e-mail servern kommer att vidarebefordra ett inkommande e-mail direkt till mobiltelefonen. Prestandan, i form av elförbrukning och leverans fördröjning, på det nya systemet har mätts genom att testa en prototyp och jämföra prototypen med de systemen som finns tillgängliga idag. Testen har visat att det nya systemet reducerar både ström förbrukningen och leverans fördröjningen.
Sayadian, Edward V. "Video transfer application transport protocol design over ATM networks." Master's thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-03172010-020223/.
Full textCheng, Heng Seng. "Enhancement of asynchronous transfer mode over satellite links." Thesis, University of Aberdeen, 1998. http://digitool.abdn.ac.uk/R?func=search-advanced-go&find_code1=WSN&request1=AAIU106658.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textSacha, David Joseph. "Design and specification of the Xpress transfer high-speed protocol /." Monterey, California : Naval Postgraduate School, 1988. http://handle.dtic.mil/100.2/ADA274941.
Full textSacha, David Joseph. "Design and specification of the Xpress transfer high-speed protocol." Thesis, Monterey, California. Naval Postgraduate School, 1993. http://hdl.handle.net/10945/41934.
Full textThe use of fiber optics in high-speed data networks has significantly increased throughput and reliability at the physical layer. Consequently, the transport layer has become a bottleneck to the data transfer potential of highspeed networks. This bottleneck has forced an investigation of transport protocols and standards to be used in future networks. The Xpress Transfer Protocol (XTP) is a transport layer protocol designed to perform efficiently in networks where high data rates, densely packed bit pipes and low bit error rates are normal operating conditions. However, XTP is a relatively new protocol which has not yet undergone extensive testing and analysis to verify its ability to resolve the transport layer bottleneck. In this thesis the specification and analysis of the XTP protocol, using the System of Communicating Machines (SCM) model is presented. A comparison is then made with an alternative high-speed protocol called SNR, originated at AT&T Bell Labs. Based on this study, it is concluded that the XTP protocol provides several mechanisms, such as rate control and extended sequence numbering, that should be included in developing high-speed transport protocols. Furthermore, it is concluded that XTPs flexible characteristics allow for multiple paradigm implementations at the cost of some complexity, making a more complete analysis of this protocol difficult. As work on high-speed transport protocols continues many of the XTP mechanisms should be considered for inclusion into evolving standards. It is also concluded that there are some critical features for high-speed protocols that are not in XTP.
Högberg, Marcus. "A Cross-platform Picture Transfer Protocol for Linux-based Camera." Thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-114188.
Full textGrobler, Reinette. "Signalling and scheduling for efficient bulk data transfer in circuit-switched networks." Pretoria : [s.n.], 2006. http://upetd.up.ac.za/thesis/available/etd-05312006-114524/.
Full textIyengar, Janardhan R. "End-to-end concurrent multipath transfer using transport layer multihoming." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.67 Mb., p. 123, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220807.
Full textJohnson, Robert. "MAC protocol performance for ATM cells over a SuperPON." Thesis, Manchester Metropolitan University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266831.
Full textChe, Wan Putra Che Wan Fadhil. "CAPE construction application protocol for data transfer : a building data model." Thesis, University of Salford, 1998. http://usir.salford.ac.uk/14726/.
Full textPantoleon, Periklis K. "Reliable content delivery using persistent data sessions in a highly mobile environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FPantoleon.pdf.
Full textPartika, Marek. "Publikace dat ze sítě meteostanic ve formátu DATEX II." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240798.
Full textWright, Stephen. "An algorithm to improve ATM cell processing in SDH multiplexers." Thesis, University of Ulster, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.250777.
Full textSimpson, Michael. "The development of a facile, non-toxic protocol for atom transfer cyclisations." Thesis, Connect to electronic version (PDF), 2008. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?application=DIGITOOL-3&owner=resourcediscovery&custom_att_2=simple_viewer&pid=25494.
Full textRay, Tim. "CCSDS FILE DELIVERY PROTOCOL (CFDP) – WHY IT’S USEFUL AND HOW IT WORKS." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/606731.
Full textReliable delivery of data products is often required across space links. For example, a NASA mission will require reliable delivery of images produced by an on-board detector. Many missions have their own (unique) way of accomplishing this, requiring custom software. Many missions also require manual operations (e.g. the telemetry receiver software keeps track of what data is missing, and a person manually inputs the appropriate commands to request retransmissions). The Consultative Committee for Space Data Systems (CCSDS) developed the CCSDS File Delivery Protocol (CFDP) specifically for this situation. CFDP is an international standard communication protocol that provides reliable delivery of data products. It is designed for use across space links. It will work well if run over the widely used CCSDS Telemetry and Telecommand protocols. However, it can be run over any protocol, and will work well as long as the underlying protocol delivers a reasonable portion of the data. The CFDP receiver will autonomously determine what data is missing, and request retransmissions as needed. The CFDP sender will autonomously perform the requested transmissions. When the entire data product is delivered, the CFDP receiver will let the CFDP sender know that the transaction has completed successfully. The result is that custom software becomes standard, and manual operations become autonomous. This paper will consider various ways of achieving reliable file delivery, explain why CFDP is the optimal choice for use over space links, explain how the core protocol works, and give some guidance on how to best utilize CFDP within various mission scenarios. It will also touch on additional features of CFDP, as well as other uses for CFDP (e.g. the loading of on-board memory and tables).
Ray, Tim. "Using the CCSDS File Delivery Protocol (CFDP) on the Global Precipitation Measurement mission." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605342.
Full textThe Consultative Committee for Space Data Systems (CCSDS) developed the CCSDS File Delivery Protocol (CFDP) to provide reliable delivery of files across space links. Space links are typically intermittent, requiring flexibility on the part of CFDP. Some aspects of that flexibility will be highlighted in this paper, which discusses the planned use of CFDP on the Global Precipitation Measurement (GPM) mission. The operational scenario for GPM involves reliable downlink of science data files at a high datarate (approximately 4 megabits per second) over a space link that is not only intermittent, but also one-way most of the time. This paper will describe how that scenario is easily handled by CFDP, despite the fact that reliable delivery requires a feedback loop.
Afonso, Francisco Carlos. "Virtual reality transfer protocol (VRTP) : implementing a monitor application for the Real-time Transport Protocol (RTP) using the Java Media Framework (JMF) /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1999. http://handle.dtic.mil/100.2/ADA375849.
Full text"September 1999". Thesis advisor(s): Don Brutzman. Includes bibliographical references (p. 213-215). Also available online.
Allman, Mark. "Improving TCP performance over satellite channels." Ohio : Ohio University, 1997. http://www.ohiolink.edu/etd/view.cgi?ohiou1177615641.
Full textNoghani, Babak S. "Reducing latency on the Internet using Component-Based Download and File-Segment Transfer Protocol." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ57567.pdf.
Full textRoskvist, Filip, and Anton Roskvist. "Optimala inställningar för MTU vid filöverföring : En utredning i Linuxmiljö baserad på protokoll och filstorlek." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-19708.
Full textThis report concerns the subject of file transfer. The focal point of the report is to study the effect that the MTU has on the speed of file transfers based on the protocol used and the size of the transferred files. During the course of the work, several experiments have been performed in order to determine this, as well as to find which protocol gives the overall best result based on the circumstances of the file transfers. Various file transfer protocols, file distribution protocols, MTUs and file sizes have been tested in order to find what results in the best file transfer speed over an Ethernet based network. The results show that a high MTU has the best performance when transferring large files, while a standard MTU gives better results for transferring very small files.
Goh, Mei Jean. "On implementing the ISO File Transfer, Access and Management protocol for a UNIX 4.2 BSD environment." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26263.
Full textScience, Faculty of
Computer Science, Department of
Graduate
Pailom, Chayutra. "API development for persistent data sessions support." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FPailom.pdf.
Full textRamos, Reuben Elroy. "The design and performance evaluation of a point-to-multipoint millimetric radio network." Thesis, King's College London (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.286158.
Full textBera, Soumava. "Design and Implementation of a MAC protocol for Wireless Distributed Computing." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/33678.
Full textMaster of Science
Lööf, Sam. "Evaluation of Protocols for Transfer of Automotive Data from an Electronic Control Unit." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-176080.
Full textNuförtiden används styrenheter (ECUer) för att styra delar av ett fordons funktion i så gott som alla motoriserade fordon. Ett bra sätt att förstå ett fordons beteende är att analysera loggningsdata som innehåller interna styrenhetsvariabler. Data måste då överföras från styrenheten till en dator för att data ska kunna studeras. Idag används Keyword Protocol-förfrågningar (KWP-förfrågningar) för att läsa data från Scanias styrenheter. Metoden är inte lämplig om man vill logga många variabler med en högre överföringshastighet än den som används idag. I detta examensarbete studeras kommunikationsprotokoll som tillåter en styrenhet att kommunicera med en dator. Examensarbetets syfte är undersöka hur överföringshastigheten av variablerna, från Scanias styrenheter till en dator, kan ökas jämfört med den metod som används idag för att få en mer frekvent loggning av variablerna. Metoden som valdes implementerades, utvärderades och jämfördes med metoden som används idag. Busslasten, totala CPU-lasten och CPU-lasten för den frekvens som användes under experimenten 100 Hz har också undersökts och evaluerats. De utförda experimenten visar att den valda metoden, data acquisition (DAQ) med CAN Calibration Protocol (CCP), ökade överföringshastigheten av de interna styrenhetsvariablerna betydligt jämfört med metoden KWP-förfrågningar. Experimenten visar också att antalet signaler har stor inverkan på busslasten för DAQ. Busslasten är den parameter som begränsar antalet signaler som kan loggas. Den totala CPU-lasten och CPU-lasten för 100 Hz påverkas inte betydligt jämfört med när inga överföringar görs. DAQ med CCP är att föredra framför KWP-förfrågningar även om busslasten blir hög för DAQ då den stora ökningen i överföringshastighet av de interna styrenhetsvariablerna medför en mer frekvent loggning av variablerna.
Chung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.
Full textKeywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
Sobek, Jiří. "Pokročilý systém umožňující zálohování počítačových dat." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219449.
Full textMascarenhas, da Veiga Alves Manoel Eduardo. "Characterisation of end-to-end performance for web-based file server respositories." Title page, contents and abstract only, 2001. http://web4.library.adelaide.edu.au/theses/09ENS/09ensm395.pdf.
Full textBatista, Luís Augusto Pires. "Telejornalismo na Amazônia: o FTP como instrumento de integração regional." Universidade Federal do Amazonas, 2010. http://tede.ufam.edu.br/handle/tede/4508.
Full textApproved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-07-27T15:09:52Z (GMT) No. of bitstreams: 2 Dissertação - Luis A P Batista.pdf: 26709847 bytes, checksum: 825021f874056d390e50bc5fa98b137a (MD5) Capa.pdf: 223609 bytes, checksum: 8831f2d4b1dd1604ea6ed1e33e2a0bf6 (MD5)
Approved for entry into archive by Divisão de Documentação/BC Biblioteca Central (ddbc@ufam.edu.br) on 2015-07-27T15:17:55Z (GMT) No. of bitstreams: 2 Dissertação - Luis A P Batista.pdf: 26709847 bytes, checksum: 825021f874056d390e50bc5fa98b137a (MD5) Capa.pdf: 223609 bytes, checksum: 8831f2d4b1dd1604ea6ed1e33e2a0bf6 (MD5)
Made available in DSpace on 2015-07-27T15:17:55Z (GMT). No. of bitstreams: 2 Dissertação - Luis A P Batista.pdf: 26709847 bytes, checksum: 825021f874056d390e50bc5fa98b137a (MD5) Capa.pdf: 223609 bytes, checksum: 8831f2d4b1dd1604ea6ed1e33e2a0bf6 (MD5) Previous issue date: 2010-06-01
Não Informada
This thesis is intended to look into the FTP (File Transfer Protocol) system on the News Broadcasting production from stations belonging to Rede Amazônica (TV Amazonas, TV Rondônia, TV Acre, TV Roraima and TV Amapá), at the Central de Jornalismo (journalism Center) located in the capital of the State of Amazonas and its effects on the routine of the community from the municipality of Manacapuru, which has become not only consumer of information, but also its protector. As a theoretical reference underlying Castells’ (1999, 2001, 2003) approaches, with the theory of network society through access to information; Dizard (2000) with the theory of old and new medias, analyzed on a time-space scale, in the context of the Amazon Region; and Milanesi (1978) with a reflection regarding the impact influence of old and new medias on peripheral areas, in regards to the existence of a central area. The research, an exploratory-descriptive case study, comprises communication as a result of a historical process which, in order to meet the society’s constantly changing demands, produces at the same time, through science, new technologies. The applied investigative techniques consist of document research with quantitative and qualitative data collection survey, by using resources such as questionnaires, semistructured interviews, semi-structured and participative observation. Unpublished and standardized data collected in this study aimed at contributing to the successful scientific knowledge production regarding the Amazon reality, as there is an expectation the results may be used as reference to other areas and investigations.
Esta dissertação investiga o efeito do sistema FTP (File Transfer Protocol ou Protocolo de Transferência de Arquivo) no processo de produção do telejornalismo das emissoras da Rede Amazônica (TV Amazonas, TV Rondônia, TV Acre, TV Roraima e TV Amapá), a partir da Central de Jornalismo sediada na capital do estado no Amazonas e seus efeitos no cotidiano da comunidade do município de Manacapuru, que passou a ser não apenas consumidora de informação, mas também produtora dela. Como referencial teórico embasa a reflexão nas abordagens de Castells (1999, 2001, 2003) com a teoria da sociedade em rede por meio do acesso à informação; Dizard (2000) com a teoria das velhas e novas mídias, analisadas, em uma escala tempo-espaço, ao contexto da região amazônica; e Milanesi (1978) com a reflexão acerca da influência do impacto das velhas e novas mídias em áreas periféricas, em relação à existência de uma área central. A pesquisa, um estudo de caso de caráter exploratório-descritivo, compreende a comunicação como resultado de um processo histórico que para atender as demandas da sociedade em constante transformação, produz em paralelo, por meio da ciência, novas tecnologias. As técnicas de investigação empregadas consistem em pesquisa documental com levantamento de dados quantitativos e qualitativos, pautadas no recurso de questionários, entrevistas semi-estruturadas, observação semi-estruturada e participante. Os dados inéditos levantados e sistematizados neste estudo tiveram por objetivo contribuir com o processo de produção do conhecimento científico acerca da realidade amazônica, na expectativa dos resultados virem a servir como referência para outras áreas e investigações.
Popelka, Herzfeld Juan Carlos. "Development of a genetic transformation protocol for rye (Secale cereale L.) and characterisation of transgene expression after biolistic or Agrobacterium mediated gene transfer." [S.l. : s.n.], 2002. http://deposit.ddb.de/cgi-bin/dokserv?idn=964315939.
Full textPoyraz, Furkan, and Pavel Sakalouski. "Vilken metod kan användas för att bredda IT-system mot nya marknader? : Framtagning av en utvecklingsprocess med tillämpning i en fallstudie." Thesis, KTH, Data- och elektroteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-215168.
Full textWithin each activity, there is always some kind of project planning when you want to do business in a new market. These types of preparation are done in different ways and the challenge for companies is to make use of the right establishment strategy. To succeed in implementing a project, on the respective market that organizations are working on, one of the success factors is to have a clear and thoughtful approach. The company Beta offers cloud-based customs management services, which provide solutions that help other companies handle their customs issues. Beta is established in the Swedish market and wants to try to offer their IT solutions in Norway. The company therefore has a need to investigate how the Norwegian market looks, if there is an opportunity to broaden their existing system solutions and, if so, how they should go about getting a working system that can communicate with the Norwegian customs office. The report proposes a method that can be used as a basis for expanding a business to new markets. The development process presented should also be generalized, serve as a basis, and used by other companies facing the same challenge as Beta. This report also contains an analysis of the Norwegian market. There is a comparison between parts of the Swedish and Norwegian customs system and a presentation of the changes that need to be made based on differences. As a result, the report provides a clear picture of how one might possibly be able to address similar problems. The project members also present a result describing a solution to Beta's problems.
Xiong, Lixiang. "Scheduling in packet switches with relaxed constraint." School of Electrical, Computer and Telecommunications Engineering - Faculty of Informatics, 2004. http://ro.uow.edu.au/theses/372.
Full textRash, James, Keith Hogie, Ed Criscuolo, and Ron Parise. "RANGE AND SPACE NETWORKING - WHAT’S MISSING." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605586.
Full textA large selection of hardware and software components are readily available for supporting Internet communication in the ground network environment. These components can be used to construct very powerful and flexible communication systems. The Operating Missions as Nodes on the Internet (OMNI) project at NASA/GSFC has been defining and demonstrating ways to use standard Internet technologies for future space communication. Theses concepts and technologies are also applicable to test range telemetry applications. This paper identifies the network equipment and protocols to support end-to-end IP communication from range sensors and spacecraft instruments to end users. After identifying the end-to-end network hardware and software components, the paper discusses which ones are currently available and lists specific examples of each. This includes examples of space missions currently using Internet technology for end-to-end communication. It also lists missing pieces and includes information on their current status. The goal of this paper is also to stimulate thought and discussion on what steps need to be taken to start filling in the remaining missing pieces for end-to-end range and space network connectivity.
Guo, Wen-Da, and 郭玟達. "A Bandwidth Sensitive Hypertext Transfer Protocol for Wireless." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/67479861148954804172.
Full textArtback, Jonathan. "Comparison of Video file transmission : over Dat protocol and Hypertext transfer protocol." Thesis, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17937.
Full textLin, Chi-Hsuan, and 林季玄. "Reusable Oblivious Transfer Protocol." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/62876393658199007448.
Full text南台科技大學
資訊管理系
94
Oblivious transfer is an important and basic technique in the field of cryptography. Basically, an oblivious transfer protocol includes two parties, Sender and Receiver. Sender has many secrets, and Receiver can freely choose one from those secrets. However, Receiver’s choice is a secret to Sender; Receiver learns nothing from the other secrets. Oblivious transfer protocols can be applied to private information retrieval, exchange secret, fair electronic contract signing, and Internet auction. Oblivious transfer protocols often need to be reused in many applications. After the initial phase of oblivious transfer protocols is completed and the initial parameters can be used repeatedly, the computation cost and transmission cost will be reduced. However, some security problems could be appeared because of reuse. In 2005, Huang and Chang proposed an efficient t-out-of-n oblivious transfer protocol, but this protocol suffers from the un-chosen message replay attack. This thesis will propose a reusable oblivious transfer protocol, which can resist the un-chosen message replay attack. Besides, Wu, Zhang, and Wang in 2003 proposed another t-out-of-n oblivious transfer protocol, which mentioned it cannot efficiently prevent the man-in-the-middle attack in an insecure channel. Hence, this study proposes two authenticated oblivious transfer protocols. One is an oblivious transfer protocol with explicated user authentication, and the other is an oblivious transfer protocol with implicated user authentication. Both protocols can efficiently avoid man-in-the-middle attack.
Chen, I.-Chao, and 陳怡兆. "Quantum Oblivoius Transfer Protocol." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/19140466810269171336.
Full text國立成功大學
資訊工程學系碩博士班
95
In most of classic cryptosystems today, the security is based on the computational difficulty of certain number theoretic problems, e.g., solving the discrete logarithm problem and factoring large numbers. However, most people believe that these number theoretic problems can be efficiently solved by quantum computers. Therefore, it is significant to combine the properties of quantum physics with classical cryptography to propose unconditional secure quantum protocols against classical or quantum computers. The oblivious transfer is used as an important primitive in many cryptographic protocols and is widely adopted in many applications. Many variants of the oblivious transfer protocols had been proposed in the literature. To resist the threat of quantum computers, quantum oblivious transfer was proposed. This thesis proposed several one-out-of-two quantum oblivious protocols and one-out-of-n quantum oblivious protocols. The newly proposed protocol possesses the following advantages: (1) no special assumptions and quantum memory are required; and (2) only one quantum transmission and few classical communications during the whole protocol execution; Therefore, the proposed protocols are very efficient. In addition, we design the security models, and then use them to show that the proposed protocols satisfy the security requirements of the quantum oblivious transfer. Besides, the efficiency of these proposals can be known from the comparison tables which compare our protocols with existing quantum oblivious protocols.
Yang, Chen-Wei, and 楊震偉. "Secure Wireless Transfer Protocol." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/87150335057891092390.
Full text大同大學
資訊工程學系(所)
93
TKIP Protocol is a method which 802.11i [1] Draft proposed the improvement of 802.11[2] WEP (Wired Equivalent Privacy) encryption method. This protocol can solve current WEP’s loopholes which including actively attack and passively attack methods, especially in secret key’s generation and management which use more conscientious and careful way to dispose. Also, it can be use in only upgrading software, without change hardware equipments. But TKIP Protocol is obviously causing transmission function decrease greatly for current market’s hardware equipments. This dissertation is aimed at without changing and increasing hardware equipments, and changes its encryption method for improving the circumstance of TKIP transmission data flow rate’s decrease. Also, it reaches the transmission security as TKIP Protocol’s anticipation. For these reasons, bring up new protocol method which more suitable for current market products. Besides, it can be used and collocated with current extended or reinforced encryption methods, 802.0x[3] and VPN[8]. This dissertation will compare this new Protocol with TKIP Protocol’s differences and advantages.