Dissertations / Theses on the topic 'IHS Architecture'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'IHS Architecture.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Musial, Geoffray. "Architecture stratigraphique et modélisation sédimentaire 3-D des réservoirs à IHS (« Inclined heterolithic Stratification ») de la formation du McMurray, Canada." Paris 6, 2010. http://www.theses.fr/2010PA066314.
Full textPelletier, Jonathan. "Faciès, architecture et dynamique d’un système margino-littoral tidal : exemple de la Formation du Dur At Talah (Eocène supérieur, Bassin de Syrte, Libye)." Thesis, Strasbourg, 2012. http://www.theses.fr/2012STRAH016/document.
Full textThis manuscript provides the first exhaustive sedimentological study of the Dur At Talah escarpment (≈120 m high and ≈150 km length). This latter is exposed in the Abu Tumayam Trough, in the southern Sirt Basin (Libya). The Dur At Talah Formation forms a 2nd order regressive sequence, from shallow marine to fluviatile deposits, dated as upper Eocene. This exceptional outcrop allows an extensive and detailed sedimentological analysis (lithofaciès, ichnofaciès, geometries and sequence stratigraphy) leading to a multi-scale characterization of nearshore to paralic environments dominated by tidal dynamic. Among outstanding results, two sedimentary processes have been recognized and characterized: the progradation is expressed by large-scale clinoform structures and the lateral accretion is characterized by inclined heterolithic stratifications (IHS). Several sedimentary bodies are, thus, unequivocally distinguishable such as heterolithic mouth-bars and tidal channel point-bars. Thorough analysis of these sedimentary bodies allows to define diagnostic criteria to recognize them. They can be replaced in a consistent stratigraphic framework explaining their architecture and their vertical evolution in order to be used as reservoir analog
El, Moumouhi Sanaa. "Architecture hybride IMS/P2P autonomique." Paris 6, 2012. http://www.theses.fr/2012PA066703.
Full textPeterström, Dan. "IP Multimedia for Municipalities : The supporting architecture." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91496.
Full textFiberutbyggnad har blivit mycket populärt och ses som ett sätt att öka en stads attraktivitet för nya invånare och företag. Ett nytt öppen nät håller på att växa fram, detta leder till en mer horisontell nätverksarkitektur. Kombinera denna arkitektur med IMS så kan utvecklare lättare utveckla nya och attraktiva tjänster. För att underlätta utvecklingen av nya IMS-tjänster måste det finnas ett lättanvänd utvecklingsmiljö och en pålitlig hårdvaru/mjukvaru plattform att installera dem på. Detta examensarbete kommer att undersöka design, utveckling och utvärdering av nya IMSlösningar riktade till standsnät samt de tjänsteplattformar de används på. Rapporten kommer även granska vilken roll IMS spelar i stadsnät och varför de kan behöva en skräddarsydd IMS-lösning. Under examensarbetet byggdes och testades ett referensnätverk. Olika tjänsteplatformar testades och utvärderades.
Mahamat, charfadine Salim. "Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets." Thesis, Reims, 2019. http://www.theses.fr/2019REIMS011/document.
Full textWith the exponential evolution of the Internet of Things (IoT), ensure the network security has become a big challenge for networkadministrators. Traditionally, the network security is based on multiple independent devices such as firewall, IDS/IPS, NAC where the main role is to monitor the information exchanged between the inside and the outside perimeters of the enterprises networks. However, the administration of these network devices can be complex and tedious with an independent manual configuration. Recently, with the introduction of the Software Defined Networking concept (SDN) and the OpenFlow protocol offers many opportunities by providing a centralized and programmable network administration.As part of this research work, we proposed a new approach to secure the network traffic flows exchanges based on a method of events detection, in an automated manner. This solution is based on the SDN approach coupled to an intrusion detection system which allows analyze, detect and remove security threats. With the implementation, we contribute to change the paradigm of secure the network traffic flows exchanges using the SDN principle, coupled with an IDS in a real use case architecture. In this way, the management of network security becomes simplified, dynamic and scalable
Schünke, Susanne. "Entwicklung in den Chorformen englischer Kirchen vom 11. bis ins 13. Jahrhundert /." Köln : Copy-Star, 1987. http://catalogue.bnf.fr/ark:/12148/cb34925133b.
Full textVezinet, Jérémy. "Study of Future On-board GNSS/INS Hybridization Architectures." Phd thesis, Toulouse, INPT, 2014. http://oatao.univ-toulouse.fr/13835/1/vezinet.pdf.
Full textSundaresan, Vijay. "Architectural Synthesis Techniques for Design of Correct and Secure ICs." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1217424117.
Full textKim, Taekyu. "Ontology/Data Engineering Based Distributed Simulation Over Service Oriented Architecture For Network Behavior Analysis." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/193678.
Full textDaoud, Triki Khadija. "Ufa : une architecture ultra plate pour les réseaux mobiles du futur." Phd thesis, Institut National des Télécommunications, 2011. http://tel.archives-ouvertes.fr/tel-00665221.
Full textKessis, Mehdi. "Gestion intégrée et multi-échelle des systèmes répartis : Architecture et canevas intergiciel orientés composants." Grenoble, 2010. http://www.theses.fr/2010GRENM051.
Full textTiny devices, smart objects, home gateways, sensor networks, have become an integral part of our everyday life and of our socio-economic ecosyste Managing efficiently such environments is just as important as the devices themselves. However, new management challenges such as management i different scales (multi-scale), heterogeneity management or extreme managed resources distribution make this task fiendishly complex. Together, theses challenges result in a new management complexity that breaks CUITent paradigms based on ad-hoc or centralized and rigid monolithic managemel applications. Traditional management systems, that are mainly ad-hoc or centralized, reach their limits in such complex management contexts. This p: work aimes to bring sorne responses to overcome these difficulties by proposing a new management approch based combining advanced softw engineering techniques, component based systems, middlewares, and network management systems concepts. Our proposai breaks with CUITeImanagement paradigms mainly related to quite rigid and monolithic systems. To validate our approach, we have developed DASIMA framewOI (Domain-based Architecture for Scalable Integrated MAnagement midd!eware). DASIMA middleware framework, implements a new managemeJ approach combining domain-based and architecture-based management. Lt was implemented as a fully component-based management middlewaJ intended to scale-up and down accOIding to the number and the distribution of managed resources. DASlMA bas been experimented with a re industrial application in the Machine to Machine (M2M) context. Our experiments were done in reuced context (local network) and large sc, deployement context (GRID 5000) and they confirmed the interest of developing adaptablep1iddleware to manage networked systems in multi-sc contexts
Chalamalasetty, Kalyani. "Architecture for IMS Security to Mobile:Focusing on Artificial Immune System and Mobile Agents Integration." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5795.
Full textkalyani-0046737527800
Kourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.
Full textSrivatsa, Mudhakar. "Security Architecture and Protocols for Overlay Network Services." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16284.
Full textChen, Hao, and Luyang Xu. "Software Architecture and Framework for Programmable Automation Controller: A Systematic Literature Review and A Case Study." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16820.
Full textWyman, Matthew Cody. "The SAP Link: A Controller Architecture for Secure Industrial Control Systems." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8815.
Full textWerapun, Warodom. "Architectures de réseaux pour la délivrance de services à domicile." Thesis, Toulouse, INPT, 2012. http://www.theses.fr/2012INPT0081/document.
Full textWith digital life enhancement, more users would like to get seamless Internet and information with any devices, at any time and from anywhere. More and more home devices need to exchange data or to control other devices. The type of services is labelled Home Service (HS) and it is deployed though a Home Network (HN). Some users need to use their HS outside their HN, some others need to interconnect other HN. Operators have to provide suitable network architectures to ensure this interconnection and to provide at the same time, scalability, remote access, easy deployment and security. Here is the topic of our work. In the fist step, we consider a practical illustration around the Next-Generation Network (NGN) and the secured services. It is the IMS (IP Multimedia Subsystem) approach for the management of services that is generally supported by the NGN network operators. However, various network operator architectures can be developed to support these services. An alternative way is the P2P architectures. We choose to analyze and implement a centralized P2P and we compare it with the IMS solution. Several authentication mechanisms are introduced to secure the centralized P2P. An evaluation of these architectures is conducted. Since the previous solutions present some issues due to their centralized feature, we consider distributed solutions in a second step. The non-structured P2P, called pure P2P, can also support HS. Identity Based Crytography (IBC) is added to these architectures in order to offer authentication and protection to user communications. The different solutions are compared through their signaling and transmission cost. The study shows that searching step in this architecture is really costly, facing a scalability problem. Thus, we propose to use a structured P2P (called Dynamic Hash Table) for delivering HS between HN. This type of architecture is studied by IETF with the REsource Location And Discovery (RELOAD) Base Protocol. This solution is implanted and deployed here to be a proof of the concept. This test-bed enables the study of delay and security overhead in a real system. Eventually, the presented solutions are recaptured in order to see their advantages/ disadvantages. In addition, we introduce other perspectives in terms of HSs and network interconnection
Jones, James R. "A Client-Server Architecture for Collection of Game-based Learning Data." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/51229.
Full textMaster of Science
Adams, Alissa R. "French depictions of Napoleon I's resurrection (1821-1848)." Diss., University of Iowa, 2018. https://ir.uiowa.edu/etd/3236.
Full textAkhlaq, Monis. "Improved performance high speed network intrusion detection systems (NIDS) : a high speed NIDS architectures to address limitations of packet loss and low detection rate by adoption of dynamic cluster architecture and traffic anomaly filtration (IADF)." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5377.
Full textNag, Abhishek. "Understanding the genetic architecture of glaucoma and its endophenotypes." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/understanding-the-genetic-architecture-of-glaucoma-and-its-endophenotypes(2cd26bc9-2015-45eb-b7d5-6007d2d99207).html.
Full textNobôa, Francisco José Viudes. "Análise do mecanismo de segurança da arquitetura IMS." [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260053.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-20T16:13:03Z (GMT). No. of bitstreams: 1 Noboa_FranciscoJoseViudes_M.pdf: 2562716 bytes, checksum: 8090bd81ec54aaeab629033ee45a1ef0 (MD5) Previous issue date: 2012
Resumo: Considerando-se que para controlar e possibilitar a entrega de diversos conteúdos e serviços a qualquer tipo de acesso fazia-se necessário um núcleo bem definido e estruturado, surgiu o IMS (IP Multimedia Subsystem) com o propósito de prover a integração completa das redes e serviços. O IMS define uma arquitetura completa e framework que habilita a convergência de voz, vídeo, dados e tecnologia de rede móvel através de uma infraestrutura baseada em IP, preenchendo a distância entre os dois paradigmas de comunicação mais bem sucedidos, celular e tecnologia IP. Este trabalho apresenta a arquitetura IMS como controle central de todas as redes, e uma arquitetura para o desenvolvimento de aplicações móveis que incorporem voz, vídeo e dados. A arquitetura IMS apesar de promissora apresenta inúmeras oportunidades de melhoria no seu mecanismo de segurança, muitas dessas oportunidades de melhoria estão relacionadas a falhas e até mesmo a falta de especificações de segurança quando a arquitetura foi originalmente implementada. Assim o maior desafio na implantação e globalização da arquitetura IMS são as falhas de segurança e a vulnerabilidade que a arquitetura possui a diversos tipos de ataques que podem atingir e prejudicar, tanto operadoras quanto usuários da rede. O objetivo deste projeto de pesquisa é apresentar uma análise detalhada sobre a estrutura da arquitetura IMS focando principalmente na arquitetura de segurança desenvolvida pela 3GPP, e assim prover análises e soluções para os ataques, vulnerabilidades e falhas de segurança que atingem a arquitetura tanto do ponto de vista de operadoras e provedores de serviço quanto na perspectiva do usuário
Abstract: Considering that to control and enable the delivery of diverse content and services to any type of access it should make necessary a core well-defined and structuralized, appeared the IMS (IP Multimedia Subsystem) in order to provide the complete integration of networks and services. IMS defines a complete architecture and framework that enables the convergence of voice, video, data and mobile network technology over an infrastructure based on IP, in addition to filling the gap between the two communications paradigms most successful, cellular and IP technology. This paper presents the IMS architecture as central control of all networks, and architecture for developing mobile applications that incorporate voice, video and data. The IMS architecture despite being promising presents numerous opportunities for improvement in its security mechanism, many of these opportunities for improvement are related to failures and even the lack of security specifications when creating the architecture. So the biggest challenge in the implementation of the IMS architecture and globalization are the security issues and vulnerabilities that the architecture faces being vulnerable to several types of attacks that can reach and affect carriers and network users. The objective of this research project is to present a detailed analysis on the structure of the IMS architecture focusing primarily on security architecture developed by 3GPP, and thus provide analysis and solutions about the attacks, vulnerabilities and security issues that affect the architecture from the point of view of carriers, service providers and from the network users
Mestrado
Telecomunicações e Telemática
Mestre em Engenharia Elétrica
Cabral, Warren. "Architectural analysis and customised deployment of deceptive cowrie and conpot honeypots." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2021. https://ro.ecu.edu.au/theses/2468.
Full textPantam, Sneha. "BOOK-HUNT! ANDROID MOBILE APPLICATION USING INDOOR POSITIONING TECHNOLOGY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/744.
Full textWlaszyn, Joanna. "Dimension (in)visible : réception technologique comme valeur ajoutée vers une architecture amplifiée." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1187.
Full textThe purpose of this research is to capture and analyze the relationships between architecture and recent technologies in terms of perception. Far from the supposed subjectivity, this analysis guided by the notion of perceptual experience, is based on both phenomenological and aesthetic concepts. This double reflexivity also relates to the conceptual and "concrete" case studies operating the architectural vision of spatiality in speculative tensions between the "digital" and the physical word. The problematic concerns the reception of architecture as a cultural value and intellectual production, coordinated by technological means that amplify it. In keeping with the assumption that today's architecture is far away to "serve" only as a response to formal, structural and functional questions, this research shows that architecture is increasingly approaching the artistic field in phase of permanent experimentations. By analyzing the factors of aestheticization of various concepts, case study seeks to understand the cognitive and the aesthetic value of the technological reception — new notion, introduced as an operational concept to approach the sensitive, hybrid and variables issues of architectural production. The originality of this research consist of analyzing the unstable connections that characterize the current processes of various transitions in the field of architecture. As such, this research proposes to open the scope of the discussion around the "digital" according to the principles of architectural singularity in the plurality of possible receptions
Tantayakul, Kuljaree. "Mobility Management in New Internet Architectures." Phd thesis, Toulouse, INPT, 2018. http://oatao.univ-toulouse.fr/23732/1/Tantayakul_Kuljaree.pdf.
Full textPagna, Disso Jules Ferdinand. "A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.
Full textPagna, Disso Jules F. "A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.
Full textHuang, Cuiting. "Service composition in converged service environment." Thesis, Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0009/document.
Full textThe goal of this thesis is to provide enhanced mechanisms to deploy competitive services in a rapid and cost-effective manner. To achieve this goal, we first propose an automatic service composition model relying on an IMS/Web converged environment. This service composition model is intended to be one in which even non-professional users can easily reuse existing services to create new services. To further improve the automatic service composition feature, three strategies including passive update, active update and hybrid update are proposed and analyzed. We then propose a centralized service exposure framework for a variey of services, including Telecom / Web / Device / user-generated services. This framework aims at enhancing the user-centric and convergence features, and providing the unified access to diverse services.Subsequently, two P2P based service information sharing models are designed to complement the centralized service exposure model : i) A hierarchical P2P based model, which reuses Chord for guaranteeing the service discovery efficiency, meanwhile adopts the concept of abstract service publication and discovery for enabling the ambiguous services searching. ii) A triplex P2P overlay based model, which mainly targets the devices offered services. In this model, we use the gateways to delegate the devices residing in them for the global service exposure, and use a triplex overlay based architecture, which includes an underlying unstructured P2P layer, a Semantic Overlay Network (SON) based overlay and a service dependency overlay, for the service information sharing and discovery
Cargelius, Lovisa. "Mariagårdstäppan." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213418.
Full textThe addition to Mariagårdstäppan will amongst other things house educational facilities for Komvux, conference venues and a restaurant. Currently the site is home to a "blue classed" palace-like building from 1875 built in memory of Oscar I. The Citybana project in the vicinity has directed considerable capital, time and effort to protect the building from collapsing. Therefore the question arises, how can we proceed while at the same time preserve this heritage building? The surrounding area is coloured by contrasting building styles from many different historical eras, and what stands out most are the Malmgårdar (Farmyards) erected around Fatbursparken during the 1700's. To this day many still stand. Typical for these yards is a stone building situated in the center of smaller wooden houses which together form a garden. Drawing inspiration from the Malmgårdar, I have tried to create an architectonic scene with historical roots, in hopes of lifting forth the best of this landmark
Mani, Mehdi. "Stratégies d'overlay de service : d'une architecture centalisée vers le Pair-à-Pair." Paris 6, 2008. http://www.theses.fr/2008PA066188.
Full textLuu, Thanh Tra. "Etude et mise en oeuvre d'une signalisation IP universelle." Paris, ENST, 2006. http://www.theses.fr/2006ENST0046.
Full textThe future generation of the Internet requires a powerful control plane wherein the signaling plays a key role in enabling information exchanges between the network elements to provide the existing and future network services. The thesis develops a generic IP signaling protocol, referred to as GISP, which provides common functionalities required by most IP signaling protocols including state management, transport and security services. The GISP implements a soft-state approach to manage the signaling states established within the network elements. In particular, a new soft-state management mechanism is proposed to significantly reduce the signaling traffic as well as the CPU resource consumption allowing the GISP to meet scalability in the number of signaling sessions. The GISP supports the signaling messages transport between the network elements. A variety of transport services have been specifically developed for GISP such as message bundling, message fragmentation, path MTU discovery, partially reliable transport and congestion control. These services have been designed to provide performance, flexibility and robustness for the generic signaling protocol. Finally, the GISP provides security services to protect the message transport as well as the network from vicious attacks. A GISP implementation has been realized in the context of the thesis to experience the GISP functionalities and evaluate its performance aspects
Yeung, Adah. "Kunskapspalatsen : Vision." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213975.
Full textThe Wisdom Palace is an adult education near the Fatubur Park in Stockholm. The project's starting point was to get inspiration from fictional concepts, that would control the project. I chose to work with the concept of "time", taken from a fictional story about how important time is. Many associate the time with clocks or with the movement of the sun - something that they both have in common is that both move in circles. I then decided that I wanted to work with a circular flow in the building. The finalized project was an oval shaped building, but with straight walls that run parallel to the surrounding buildings. The rounded shape controls the flow of the building, but it also fits with the Fatbur Park's arch shape. It's a form that matches the environment and at the same time , it looks unique in comparison. The main entrance is located on the southern part of the building and its purpose is to catch attention from bypassing people. The hierarchy in the building follows: public spaces and the larger base rooms are all on the entrance plan; The other upper plans are dedicated to students and teachers only.
Hao, Shilun. "IDS---Intelligent Dougong System: A Knowledge-based and Graphical Simulation of Construction Processes of China’s Song-style Dougong System." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1417702752.
Full textRodriguez, Bertha Helena. "Modèle SOA sémantique pour la multimodalité et son support pour la découverte et l'enregistrement de services d'assistance." Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0006/document.
Full textUnimodal inputs and outputs in current systems have become very mature with touch applications or distributed services for geo-localization or speech, audio and image recognition. However, the integration and instantiation of all these modalities, lack of an intelligent management of the acquisition and restitution context, based on highly formalized notions reflecting common sense. This requires a more dynamic behavior of the system with a more appropriate approach to manage the user environment.However, the technology required to achieve such a goal is not yet available in a standardized manner, both in terms of the functional description of unimodal services and in terms of their semantic description. This is also the case for multimodal architectures, where the semantic management is produced by each project without a common agreement in the field to ensure inter-operability, and it is often limited to the processing of inputs and outputs or fusion / fission mechanisms. To fill this gap, we propose a semantic service-oriented generic architecture for multimodal systems. This proposal aims to improve the description and the discovery of modality components for assistance services: this is the architecture SOA2m. This architecture is fully focused on multimodality and it is enriched with semantic technologies because we believe that this approach will enhance the autonomous behavior of multimodal applications, provide a robust perception of the user-system exchanges, and help in the control of the semantic integration of the human-computer interaction.As a result, the challenge of discovery is addressed using the tools provided by the field of the semantic web services
Atencio, Luis, Bruno Aybar, and Padilla Alfredo Barrientos. "Comparative analysis of cross-platform communication mechanisms." Association for Computing Machinery, 2018. http://hdl.handle.net/10757/624690.
Full textThe present research aims to compare the different technologies that allow real-time communication between Android and iOS devices. We conducted a measurement-driven experiment to test the performance of each technology under different scenarios. We determine their functionality according to the environment for which they have been developed, showing competent information about their capabilities based on the communication channel they use, and their performance measured in milliseconds. The final results allow mobile application developers to determine which technologies suits them the best, based on the specific context of their projects.
Revisión por pares
Onesti, Laura. "From F energy rating to Nearly ZEB: project of energy retrofit and architectural upgrade of a brick terraced house in Co. Dublin, Ireland." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016.
Find full textGudimetla, Thakshak Mani Chandra Reddy. "ORGANIZE EVENTS MOBILE APPLICATION." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/772.
Full textMahdi, Mohamed. "Architectures réseaux pour le partage de contenus multimédias avec garantie de qualité de service." Phd thesis, Université Paul Sabatier - Toulouse III, 2011. http://tel.archives-ouvertes.fr/tel-00667635.
Full textArbault, Damien. "Globalized impacts International trade accounting in a hybrid LCI method." Thesis, KTH, Urban and Regional Studies, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-24863.
Full textCOSTA, Wagner Elvio de Loiola. "SISTEMA DE DETECÇÃO DE INTRUSÃO EM REDES BASEADO EM SOA (NIDS-SOA) PARA SUPORTAR A INTEROPERABILIDADE ENTRE IDS S: APLICAÇÃO AO NIDIA." Universidade Federal do Maranhão, 2012. http://tedebc.ufma.br:8080/jspui/handle/tede/497.
Full textThe antivirus system and firewall are protection systems designed to prevent malicious work in the network, thus constituting a barrier to invaders (e.g. vírus, worms e hackers). However, there is no guarantee a full protection to network and computers, invasions can occur by exploiting vulnerabilities, known, and allow running programs remotely, changing privileges within the system and the dissemination of important information. In this case, Intrusion Detection System IDS (Intrusion Detection System) allows the detection of intrusions and subsequent notification to the network administrator or, in conjunction with the firewall blocks the port used in the invasion or the IP address of the attacker. An important factor for the intrusion detection is the quality of subscriber base. However IDS systems are isolated systems and the interoperability among different vendors IDS is complex and difficult to implement. Existing IDS systems in the literature, including the IDS NIDIA (Instrusion-Detection System Network Intrusion Detection System based on Intelligent Agents) are isolated systems, are not easily reused. Generally, they communicate using different protocols and are designed with different programming paradigms. In this work it is proposed an architecture based on the philosophy SOA (Service Oriented Architecture) to support interoperability between IDS systems. The IDS-NIDIA will be adapted and extended according to the SOA philosophy, containing layers of web services in order to provide a static service composition between the layers of the application and reuse of information with other IDS s.
Os sistemas antivírus e firewall são sistemas de proteção que visam impedir a execução de ações maléficas na rede, constituindo, portanto, uma barreira aos invasores (e.g.vírus, worms e hackers). Entretanto, não há como garantir uma proteção total da rede e dos computadores, podendo ocorrer invasões através da exploração de vulnerabilidades, já conhecidas, que permitem a execução de programas remotamente, a alteração de privilégios dentro do sistema e a divulgação de informações importantes. Neste caso, o Sistema de Detecção de Intrusão-IDS(Intrusion Detection System) permite a detecção de intrusões e a consequente notificação ao administrador da rede ou, em conjunto com o firewall, bloqueia a porta utilizada na invasão ou o endereço IP do atacante. Um fator importante para a detecção de intrusões é a qualidade da base de assinaturas. Entretanto os sistemas IDS são sistemas isolados e a interoperabilidade entre IDS de fornecedores diferentes é complexa e de difícil implementação. Os sistemas IDS existentes na literatura, incluindo o IDS-NIDIA (Instrusion Detection System- Network Intrusion Detection System based on Intelligent Agents), são sistemas isolados, não são facilmente reutilizados. Geralmente, estes se comunicam utilizando diferentes protocolos e são criados com paradigmas de programação diferentes. É proposta uma arquitetura baseado na filosofia SOA (Service Oriented Architecture ) para suportar a interoperabilidade entre sistemas IDS. O sistema IDS-NIDIA será adaptado e estendido de acordo com esta filosofia SOA, contendo camadas de serviços web com o propósito de oferecer uma composição de serviço estática entre as camadas de aplicação e o reuso de informações com outros IDS s.
Karachaliou, Ermioni. "The architectural and iconographic identity of Paliochora on Aegina : an introduction to its Late and Post Byzantine churches." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/the-architectural-and-iconographic-identity-of-paliochora-on-aegina-an-introduction-to-its-late-and-post-byzantine-churches(4d5fdfec-712e-4b7b-a875-b74404fba8cc).html.
Full textAndersson, Robin. "CAN-bus Multi-mixed IDS : A combinatory approach for intrusion detection in the controller area network of personal vehicles." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43450.
Full textPint, Alexander Steven. "Building energy codes and their impact on greenhouse gas emissions in the United States." Kansas State University, 2015. http://hdl.handle.net/2097/20534.
Full textArchitectural Engineering and Construction Science
Russell J. Murdock
The purpose of this study is to identify and explore relationships between the building industry, building energy usage, and how both the industry and the energy usage correspond to greenhouse gas (GHG) emissions in the United States. Building energy codes seek to reduce energy usage and, subsequently, GHG emissions. This study specifically seeks to determine the impact that most current U.S. building energy codes could have on national GHG emissions if widespread adoption and enforcement of those codes were a reality. The report initially presents necessary background information about GHG emissions is first discussed. This establishes the current state of global GHG emissions, the position of the U.S. within the global scale, and what portion of the contribution can be attributed to the building industry. The report also describes the current issues and benefits of building energy codes. An overview of building energy codes evaluation is included, with explanation of the energy analysis used to determine the effectiveness of new building energy codes. In order to determine how to improve the building energy code system, an analysis of ANSI/ASHRAE/IES Standard 90.1-2013 (equivalent to 2015 IECC, the most recent standard available) is conducted to reveal unrealized GHG emission reductions that are expected with adoption and compliance to the newest code. Standard 90.1-2013 is analyzed due to the national popularity of the code relative to other building energy codes. This analysis includes compilation of energy usage intensity, square footage, and current code adoption data throughout the United States. Results showed that the excess GHG emission savings from enhanced adoption and compliance was not significant on a national scale. However, in terms of GHG emissions currently saved by building energy codes, the extra savings becomes more significant, proving that increased adoption and compliance is a worthwhile pursuit. Recommendations are then made for how to increase adoption and compliance. This information will give policymakers improved understanding of the current state of the industry when crafting laws regarding GHG emissions and building energy codes. Furthermore, findings from this study could benefit specific states that are attempting to lower GHG emissions.
Stockselius, Johan. "Studiepark: Södermalm." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208870.
Full textStudy Park: Södermalm The right to education is one of our most valuable and should be seen as such regardless of a person’s age. However, the status of adult education in Sweden tends to be lower than that of other forms of education. Venues where the teaching takes place are often outdated and ill-fitted for their purpose. Study Park: Södermalm is a proposal for a new study building dedicated to adult education with the aim of becoming an important symbol for adult education and raising the status of the study form. Study Park: Södermalm is located in Fatbursparken in Södermalm, Stockholm, where it together with the building Oscar I:s Minne forms a new knowledge centre. Courses and seminars will be held both daytime and evenings in the Study Park's many lecture halls of varying sizes. An openness characterizes the building and the spacious communication areas also fill the function of self-study rooms for university and college students in the city. Placing oneself in a public area entails a major responsibility. With the ambition to give something back to the people already on the site, the lower floors are made public with access to an exhibition hall, theatre activities, a restaurant, study guidance, conference rooms, group rooms, computer rooms and a projection room. Parts of the building can be adapted to expo halls at major events. Open and available study rooms ensure that the building is continuously active and bring life and movement on the site.
Gottschling, Paul Thomas. "To submit is to relate : a study of architectural competitions within networks of practice." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/to-submit-is-to-relate-a-study-of-architectural-competitions-within-networks-of-practice(c3f8961d-94a8-4c91-91e2-935a6dcc4bf9).html.
Full textLiotsios, Kyriakos. "3D-Modeling and Energy Simulation of a Single Family House in Southern Greece." Thesis, KTH, Byggvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91394.
Full textWulff, Tobias. "Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment." Thesis, University of Canterbury. Computer Science and Software Engineering, 2010. http://hdl.handle.net/10092/5120.
Full textGad, El Rab Mohammed. "Evaluation des systèmes de détection d'intrusion." Phd thesis, Université Paul Sabatier - Toulouse III, 2008. http://tel.archives-ouvertes.fr/tel-00366690.
Full textGuerriero, Annie. "La représentation de la confiance dans l'activité collective Application à la coordination de l'activité de chantier de construction." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2009. http://tel.archives-ouvertes.fr/tel-00558823.
Full text