To see the other types of publications on this topic, follow the link: IHS Architecture.

Dissertations / Theses on the topic 'IHS Architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'IHS Architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Musial, Geoffray. "Architecture stratigraphique et modélisation sédimentaire 3-D des réservoirs à IHS (« Inclined heterolithic Stratification ») de la formation du McMurray, Canada." Paris 6, 2010. http://www.theses.fr/2010PA066314.

Full text
Abstract:
Cette étude concerne les sables bitumineux Crétacé de l’Athabasca, au Canada. Du fait de la forte viscosité des hydrocarbures, il est important de caractériser les hétérogénéités internes de ces réservoirs. Ce travail se base sur la stratigraphie, la sédimentologie, la modélisation réservoir et les simulations de production dans les sables à IHS (“Inclined Heterolithic Stratification”) de la formation du McMurray. Les études centrées sur les faciès, les ichnofaciès et les palynofaciès soulignent quatre environnements de dépôts: (i) un environnement continental; (ii) un environnement fluvio-estuarien; (iii) un environnement marin restreint; (iv) un environnement marin ouvert. Ces environnements de dépôts ne sont pas synchrones et les études montrent des séquences d’incision-remplissage de vallées incisées depuis la fin du Barrémien jusqu’au début de l’Albien. Les réservoirs à IHS sont contenus dans des dépôts de barres de méandre influencées par les courants tidaux dans un environnement saumâtre des cortèges transgressifs fluvio-estuariens. L’antagonisme existant entre les processus fluviaux et tidaux génère des hétérogénéités réservoir traduites par (i) des dépôts d’argiles à l’origine des IHS, (ii) des surfaces de réactivations et (iii) des accumulations de brèches argileuses. Ces hétérogénéités sont prises en compte dans la construction d’un modèle stratigraphique de terrain dans lequel est réalisé une modélisation réservoir et une simulation de récupération de bitume. Les simulations présentent des résultats très réalistes. Les hétérogénéités sédimentaires liées aux processus de dépôts, conformes à une ligne temps, sont restituées dans le modèle stratigraphique
APA, Harvard, Vancouver, ISO, and other styles
2

Pelletier, Jonathan. "Faciès, architecture et dynamique d’un système margino-littoral tidal : exemple de la Formation du Dur At Talah (Eocène supérieur, Bassin de Syrte, Libye)." Thesis, Strasbourg, 2012. http://www.theses.fr/2012STRAH016/document.

Full text
Abstract:
Ce manuscrit de thèse propose la première étude sédimentologique exhaustive de l’escarpement du Dur At Talah (150 km de long sur 120 m de hauteur). Ce dernier affleure dans la dépression d’Abu Tumayam, dans la partie méridionale du Bassin de Syrte (Libye). La Formation du Dur At Talah offre une séquence sédimentaire régressive (au 2nd ordre), allant de faciès marins peu profonds à des faciès fluviatiles, datée de l’Eocène supérieur. Les exceptionnelles conditions d'affleurement ont permis une analyse sédimentologique approfondie (lithofaciès, ichnofaciès, géométries et découpage séquentiel) conduisant à une caractérisation multiscalaire d'un système margino-littoral dominé par la dynamique tidale. Parmi les résultats saillants de cette étude figure l'identification de deux processus sédimentaires : la progradation signée par des structures clinoformes et l’accrétion latérale caractérisée par des stratifications hétérolithiques inclinées (IHS). Dès lors, plusieurs corps sédimentaires se distinguent sans ambiguïté tel que les barres d’embouchure hétérolithiques et les barres de méandres de chenaux tidaux. L'auscultation de ces grands corps sédimentaires permet alors d'en définir les critères de reconnaissance et le contexte séquentiel de mise en place, mais aussi d'en contraindre le potentiel réservoir
This manuscript provides the first exhaustive sedimentological study of the Dur At Talah escarpment (≈120 m high and ≈150 km length). This latter is exposed in the Abu Tumayam Trough, in the southern Sirt Basin (Libya). The Dur At Talah Formation forms a 2nd order regressive sequence, from shallow marine to fluviatile deposits, dated as upper Eocene. This exceptional outcrop allows an extensive and detailed sedimentological analysis (lithofaciès, ichnofaciès, geometries and sequence stratigraphy) leading to a multi-scale characterization of nearshore to paralic environments dominated by tidal dynamic. Among outstanding results, two sedimentary processes have been recognized and characterized: the progradation is expressed by large-scale clinoform structures and the lateral accretion is characterized by inclined heterolithic stratifications (IHS). Several sedimentary bodies are, thus, unequivocally distinguishable such as heterolithic mouth-bars and tidal channel point-bars. Thorough analysis of these sedimentary bodies allows to define diagnostic criteria to recognize them. They can be replaced in a consistent stratigraphic framework explaining their architecture and their vertical evolution in order to be used as reservoir analog
APA, Harvard, Vancouver, ISO, and other styles
3

El, Moumouhi Sanaa. "Architecture hybride IMS/P2P autonomique." Paris 6, 2012. http://www.theses.fr/2012PA066703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Peterström, Dan. "IP Multimedia for Municipalities : The supporting architecture." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91496.

Full text
Abstract:
Fiber deployment is becoming popular and is seen as a way to increase a community’s attractiveness to new inhabitants and companies. A new Open Access network is emerging, leading to a more horizontal network architecture. Combining this architecture with IMS enables developers to easily develop new and attractive services. To facilitate the development of new IMS services there needs to be an easy to use development environment and a reliable hardware/software platform upon which to deploy them. This thesis project will explore the design, development, and evaluation of new IMS applications targeted at municipal networks as well as the service platforms they are deployed on. The thesis will also examined what role IMS plays in Municipalities and why they may need a tailored IMS solution. During the thesis a reference network for Municipalities was put together and tested. Different service platforms were tested and evaluated.
Fiberutbyggnad har blivit mycket populärt och ses som ett sätt att öka en stads attraktivitet för nya invånare och företag. Ett nytt öppen nät håller på att växa fram, detta leder till en mer horisontell nätverksarkitektur. Kombinera denna arkitektur med IMS så kan utvecklare lättare utveckla nya och attraktiva tjänster. För att underlätta utvecklingen av nya IMS-tjänster måste det finnas ett lättanvänd utvecklingsmiljö och en pålitlig hårdvaru/mjukvaru plattform att installera dem på. Detta examensarbete kommer att undersöka design, utveckling och utvärdering av nya IMSlösningar riktade till standsnät samt de tjänsteplattformar de används på. Rapporten kommer även granska vilken roll IMS spelar i stadsnät och varför de kan behöva en skräddarsydd IMS-lösning. Under examensarbetet byggdes och testades ett referensnätverk. Olika tjänsteplatformar testades och utvärderades.
APA, Harvard, Vancouver, ISO, and other styles
5

Mahamat, charfadine Salim. "Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets." Thesis, Reims, 2019. http://www.theses.fr/2019REIMS011/document.

Full text
Abstract:
Avec l'évolution exponentielle de l'Internet des Objets (IoT), assurer la sécurité des réseaux est devenue un grand défi pour les administrateurs réseaux. La sécurité des réseaux est basée sur de multiples équipements indépendants tels que Firewall, IDS/IPS, NAC dont le rôle principal est de contrôler les informations échangées entre le réseau de l'entreprise et l'extérieur. Or, l'administration de ces équipements peut s'avérer très complexe et fastidieuse si elle est réalisée manuellement, équipement après équipement. L'introduction du concept de Software Defined Networking (SDN) depuis ces dernières années, et du protocole OpenFlow, offre beaucoup d'opportunités pour l'amélioration de la sécurité des réseaux en proposant une administration centralisée et programmable.Dans le cadre de cette thèse, nous avons proposé une nouvelle approche de sécurisation des échanges dans un réseau en fonction des événements détectés et de manière automatisée. Cette solution basée sur l'approche SDN couplé avec un système de détection d'intrusion permet d’analyser, de détecter et de supprimer des menaces de sécurité dans un réseau et de manière automatisée. En implémentant cette solution, nous contribuons à faire évoluer la manière de sécuriser les échanges dans un réseau avec du SDN couplé avec un IDS à travers la mise en place d'une architecture réelle de cas d'usage. Ainsi, la gestion de la sécurité du réseau devient simplifiée, dynamique et évolutive
With the exponential evolution of the Internet of Things (IoT), ensure the network security has become a big challenge for networkadministrators. Traditionally, the network security is based on multiple independent devices such as firewall, IDS/IPS, NAC where the main role is to monitor the information exchanged between the inside and the outside perimeters of the enterprises networks. However, the administration of these network devices can be complex and tedious with an independent manual configuration. Recently, with the introduction of the Software Defined Networking concept (SDN) and the OpenFlow protocol offers many opportunities by providing a centralized and programmable network administration.As part of this research work, we proposed a new approach to secure the network traffic flows exchanges based on a method of events detection, in an automated manner. This solution is based on the SDN approach coupled to an intrusion detection system which allows analyze, detect and remove security threats. With the implementation, we contribute to change the paradigm of secure the network traffic flows exchanges using the SDN principle, coupled with an IDS in a real use case architecture. In this way, the management of network security becomes simplified, dynamic and scalable
APA, Harvard, Vancouver, ISO, and other styles
6

Schünke, Susanne. "Entwicklung in den Chorformen englischer Kirchen vom 11. bis ins 13. Jahrhundert /." Köln : Copy-Star, 1987. http://catalogue.bnf.fr/ark:/12148/cb34925133b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vezinet, Jérémy. "Study of Future On-board GNSS/INS Hybridization Architectures." Phd thesis, Toulouse, INPT, 2014. http://oatao.univ-toulouse.fr/13835/1/vezinet.pdf.

Full text
Abstract:
The quick development of air traffic has led to the improvement of approach and landing operations by using flexible flight paths and by decreasing the minima required to perform these operations. Most of the aircraft operations are supported by the GNSS augmented with GBAS, SBAS and ABAS. SBAS or GBAS allow supporting navigation operations down to precision approaches. However, these augmentations do require an expensive network of reference receivers and real-time broadcast to the airborne user. To overcome, the ABAS system integrates on-board information provided by an INS so as to enhance the performance of the navigation system. In that scheme, INS is coupled with a GPS receiver in a GPS/baro-INS hybridization solution that is already performed on current commercial aircraft. This solution allows reaching better performance in terms of accuracy, integrity, availability and continuity than the two separated solutions. However the most stringent requirements for precision approaches or automatic landings cannot be fulfilled with the current hybridization. The main idea of this PhD study is then to extend the hybridization process by including other sensors already available on commercial aircraft or not and, to assess the performance reached by a global hybridization architecture. It aims at providing most of the navigation parameters in all operations with the required level of performance. The operations targeted by this hybridization are precision approaches, with a particular focus on CAT III precision approach and roll out on the runway. The study of video sensor has been particularly focused on in the thesis. Indeed video based navigation is a complete autonomous navigation opportunity only based on sensors that provide information from the dynamic of the vehicle and from the observation of the scenery. Moreover, from a possible compensation of any loss or degradation of a navigation system to the improvement of the navigation solution during the most critical operations, the interests of video are numerous.
APA, Harvard, Vancouver, ISO, and other styles
8

Sundaresan, Vijay. "Architectural Synthesis Techniques for Design of Correct and Secure ICs." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1217424117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Taekyu. "Ontology/Data Engineering Based Distributed Simulation Over Service Oriented Architecture For Network Behavior Analysis." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/193678.

Full text
Abstract:
As network uses increase rapidly and high quality-of-service (QoS) is required, efficient network managing methods become important. Many previous studies and commercial tools of network management systems such as tcpdump, Ethereal, and other applications have weaknesses: limited size of files, command line execution, and large memory and huge computational power requirement. Researchers struggle to find fast and effective analyzing methods to save maintenance budgets and recover from systematic problems caused by the rapid increment of network traffic or intrusions. The main objective of this study is to propose an approach to deal with a large amount of network behaviors being quickly and efficiently analyzed. We study an ontology/data engineering methodology based network analysis system. We design a behavior, which represents network traffic activity and network packet information such as IP addresses, protocols, and packet length, based on the System Entity Structure (SES) methodology. A significant characteristic of SES, a hierarchical tree structure, enables systems to access network packet information quickly and efficiently. Also, presenting an automated system design is the secondary purpose of this study. Our approach shows adaptive awareness of pragmatic frames (contexts) and makes a network traffic analysis system with high throughput and a fast response time that is ready to respond to user applications. We build models and run simulations to evaluate specific purposes, i.e., analyzing network protocols use, evaluating network throughput, and examining intrusion detection algorithms, based on Discrete Event System Specification (DEVS) formalism. To study speed up, we apply a web-based distributed simulation methodology. DEVS/Service Oriented Architecture (DEVS/SOA) facilitates deploying workloads into multi-servers and consequently increasing overall system performance. In addition to the scalability limitations, both tcpdump and Ethereal have a security issue. As well as basic network traffic information, captured files by these tools contain secure information: user identification numbers and passwords. Therefore, captured files should not allow to be leaked out. However, network analyses need to be performed outside target networks in some cases. The distributed simulation--allocating distributing models inside networks and assigning analyzing models outside networks--also allows analysis of network behaviors out of networks while keeping important information secured.
APA, Harvard, Vancouver, ISO, and other styles
10

Daoud, Triki Khadija. "Ufa : une architecture ultra plate pour les réseaux mobiles du futur." Phd thesis, Institut National des Télécommunications, 2011. http://tel.archives-ouvertes.fr/tel-00665221.

Full text
Abstract:
Les réseaux mobiles ont un modèle en couches, avec: (1) un réseau d'accès IP offrant une connectivité IP aux utilisateurs; (2) une couche de contrôle de service, l'IMS; (3) une couche d'interaction pour le contrôle des politiques réseau, le PCC. Ce modèle, centralisé et hiérarchique, serait à l'origine de problèmes de passage à l'échelle et de qualité de service en cas d'explosion du volume de trafic de données à transporter. Dans cette thèse, un nouveau modèle pour les réseaux mobiles du futur est proposé: Ultra Flat Architecture (UFA). UFA utilise l'IMS pour le contrôle de tout type d'applications. UFA est dite plate car elle réduit le nombre de types de nœuds réseau à 2 principalement: (1) une Gateway UFA regroupant à la fois l'ensemble des fonctionnalités du réseau d'accès IP, de l'IMS et du PCC; (2) le terminal. Après la conception de l'architecture, nous avons spécifié et évalué trois procédures réseau principales pour UFA : l'enregistrement/authentification, l'établissement de service et la mobilité. Nous avons optimisé les deux premières procédures par rapport aux procédures standardisées de l'IMS. Par exemple, la procédure d'établissement de service présente un délai réduit et permet une configuration du service ou de la couche de transport selon les ressources disponibles dans le réseau. Nous avons développé une procédure de mobilité pour UFA, se basant sur le transfert, d'une Gateway UFA à une autre, des contextes de toutes les couches OSI liés au terminal, et sur la détermination proactive par la Gateway UFA des paramètres de toutes les couches du terminal. Tous les résultats obtenus montrent le grand intérêt d'UFA et des architectures plates plus généralement.
APA, Harvard, Vancouver, ISO, and other styles
11

Kessis, Mehdi. "Gestion intégrée et multi-échelle des systèmes répartis : Architecture et canevas intergiciel orientés composants." Grenoble, 2010. http://www.theses.fr/2010GRENM051.

Full text
Abstract:
Les deux dernières décennies ont été marquées par un essor remarquable de l'informatique répartie (réseaux pair à pair, grilles de calcul, informatique pervasive, etc. ) et des services de télécommunication. Désormais, les nouvelles technologies de l'information et de télécommunication font parti intégrante du quotidien des entreprises et des particuliers. Malgré ces avancées technologiques, !es systèmes informatiques restent souvent vulnérable: menacés de pannes, de dysfonctionnements et d'utilisation anarchique ou intempestive des leurs ressources. De plus, !es systèmes informatiques deviennent de plus en plus complexes, et entraînent une complexité de leur gestion. Cette vulnérabilité et complexité sont fortement amplifiées par l'extension géographique des réseaux et des systèmes informatiques, leur hétérogénéité et l'intégration toujours plus importante de l'informatique et des télécommunications. Dans ce contexte, les outils d'administration sont devenus un instrument incontournable de planification, d'organisation et gestion des systèmes informatiques dans leur ensemble. Ils sont même devenus aussi importants que les systèmes administrés eux-mêmes. Toutefois malgré la multitude des acteurs concernés par la problématique d'administration (éditeurs, constructeurs, organismes de standardisation. , etc. ) ces systèmes présentent souvent des limitations sur le plan technologique et architectural. D'où le besoin de développer de nouvelles approches et d'explorer de nouvelles technologies mieux adaptées aux défis d'échelles et d'hétérogénéité des ressources administrées. Cette thèse s'inscrit au cœur de cette problématique d'administration. Elle aborde la question d'administration intégrée dans des contextes multi-échelles. Afin de répondre à cette question nous nous appuyons sur une approche pluridisciplinaire: architecture logicielle à base de composants, middleware, systèmes et approche d'administration réseaux. Ainsi, nous proposons une approche d'administration multi-échelles basée sur le concept de Domaine d'administration,orientée par l'architecture des systèmes administrés. Pour la validation de l'approche nous proposons le canevas DASIMA, un canevas d'administration à base de composants logiciels dotée d'une double flexibilité (architecturale et comportementale) et d'une capacité à d'auto-introspection. Ces propriétés le distinguent des systèmes d'administration existants et favorisent une administration plus souple dans des contextes multi-échelles. Dans le cadre de la validation de notre approche, le canevas DASIMA a été mis en œuvre pour l'administration d'une application M2M d'Orange. Plusieurs expérimentations à différentes échelles, géographiques et numériques, ont été menées sur la plateforme expérimentale Grid5000 afin de valider la capacité de passage à l'échelle de l'approche proposée
Tiny devices, smart objects, home gateways, sensor networks, have become an integral part of our everyday life and of our socio-economic ecosyste Managing efficiently such environments is just as important as the devices themselves. However, new management challenges such as management i different scales (multi-scale), heterogeneity management or extreme managed resources distribution make this task fiendishly complex. Together, theses challenges result in a new management complexity that breaks CUITent paradigms based on ad-hoc or centralized and rigid monolithic managemel applications. Traditional management systems, that are mainly ad-hoc or centralized, reach their limits in such complex management contexts. This p: work aimes to bring sorne responses to overcome these difficulties by proposing a new management approch based combining advanced softw engineering techniques, component based systems, middlewares, and network management systems concepts. Our proposai breaks with CUITeImanagement paradigms mainly related to quite rigid and monolithic systems. To validate our approach, we have developed DASIMA framewOI (Domain-based Architecture for Scalable Integrated MAnagement midd!eware). DASIMA middleware framework, implements a new managemeJ approach combining domain-based and architecture-based management. Lt was implemented as a fully component-based management middlewaJ intended to scale-up and down accOIding to the number and the distribution of managed resources. DASlMA bas been experimented with a re industrial application in the Machine to Machine (M2M) context. Our experiments were done in reuced context (local network) and large sc, deployement context (GRID 5000) and they confirmed the interest of developing adaptablep1iddleware to manage networked systems in multi-sc contexts
APA, Harvard, Vancouver, ISO, and other styles
12

Chalamalasetty, Kalyani. "Architecture for IMS Security to Mobile:Focusing on Artificial Immune System and Mobile Agents Integration." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5795.

Full text
Abstract:
The IP Multimedia Subsystem (IMS) is an open IP based service infrastructure that enables an easy deployment of new rich multimedia services mixing voice and data. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. As an emerging technology, the SIP standard will certainly be the target of Denial of Service (DoS) attacks and consequently IMS will also inherit this problem. The objective of proposed architecture for IMS is to cram the potential attacks and security threats to IP Multimedia Subsystem (IMS) and explore the security solutions developed by 3GPP. This research work incorporates the ideas of immune system and multiagent architecture that is capable of detecting, identifying and recovering from an attack. The proposed architecture protects IMS core components i.e. P-CSCF (Proxy- Call Session Control Function), I-CSCF (Interrogating-Call Session Control Function), S-CSCF (Serving Call Session Control Function) and HSS (Home Subscriber Server) from external and internal threats like eavesdropping, SQL injection and denial-ofservice (DoS) attacks. In the first level i.e. CPU under normal load all incoming and out going messages were investigated to detect and prevent SQL injection. Second level considers Denial of Service (DOS) attacks when CPU load exceeds threshold limit. Proposed architecture is designed and evaluated by using an approach called Architecture Tradeoff Analysis Method (ATAM). The results obtained confirm consistency of the architecture.
kalyani-0046737527800
APA, Harvard, Vancouver, ISO, and other styles
13

Kourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.

Full text
Abstract:
Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vul­nerabilities in order to penetrate into the system internals and cause damage. Having a standard architecture/configuration supporting the needed services saves time and re­sources while it reduces security risks. A server architecture protected by a security policy can secure the integrity and quality of the overall services. This research demon­strates building a secure server architecture protected by a security policy. To achieve this a security policy and a checklist was designed and combined with a host based IDPS, a NMS and a WAF.
APA, Harvard, Vancouver, ISO, and other styles
14

Srivatsa, Mudhakar. "Security Architecture and Protocols for Overlay Network Services." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16284.

Full text
Abstract:
Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a proactive approach that cleanly retrofits security solutions into existing system architectures. The first step in this approach is to identify security threats, vulnerabilities and potential attacks on a system or an application. The second step is to develop security tools in the form of customizable and configurable plug-ins that address these security issues and minimally modify existing system code, while preserving its performance and scalability metrics. This thesis uses overlay network applications to shepherd through and address challenges involved in supporting security in large scale distributed systems. In particular, the focus is on two popular applications: publish/subscribe networks and VoIP networks. Our work on VoIP networks has for the first time identified and formalized caller identification attacks on VoIP networks. We have identified two attacks: a triangulation based timing attack on the VoIP network's route set up protocol and a flow analysis attack on the VoIP network's voice session protocol. These attacks allow an external observer (adversary) to uniquely (nearly) identify the true caller (and receiver) with high probability. Our work on the publish/subscribe networks has resulted in the development of an unified framework for handling event confidentiality, integrity, access control and DoS attacks, while incurring small overhead on the system. We have proposed a key isomorphism paradigm to preserve the confidentiality of events on publish/subscribe networks while permitting scalable content-based matching and routing. Our work on overlay network security has resulted in a novel information hiding technique on overlay networks. Our solution represents the first attempt to transparently hide the location of data items on an overlay network.
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Hao, and Luyang Xu. "Software Architecture and Framework for Programmable Automation Controller: A Systematic Literature Review and A Case Study." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16820.

Full text
Abstract:
Background. PAC controller is a strengthened version of PLC controller. Its function is very similar, but its essence and construction are different. PLC and PAC have many successful applications in the field of industrial automation control. There is a lot of literature about the software architecture of PLC control system. However, there is almost no relevant literature on software architecture based on PAC control system. A well-performing and stable automatic control system is indispensable to the design and development of suitable software architecture. The quality and pattern of software architecture can even affect the stability and efficiency of the control system. Objectives. Based on these problems, we defined two primary objectives. The first is to investigate the architecture of some existing large industrial control systems, to analyze and summarize the scenarios and advantages and disadvantages of these architectural patterns. The second, based on the results of effort for the first objective, we want to propose and design a set of automated control solution architecture model based on PAC control system, which is implemented and applied in a printing house. In the process, we sum up the challenges and obstacles encountered in implementing the solution and provide some guidance or reference for those involved in the field. Methods. For the first objective, we used a systematic literature review to collect data about existing ICS architecture. Concerning the second objective, a case study was conducted in a printing house in Karlskrona Sweden, in the study, we proposed a software architecture model suitable for PAC automation control system. Then, we developed and tested the automation control system and summarized some challenges and obstacles in the process of the implementation. Results. The existing ICS (Industrial Control System) architecture models and critical problems and challenges in the implementation of ICS are identified. From the existing literature, we have summarized five commonly used large industrial control system architecture models, which are mainly using composite structures, that is, a combination of multiple architecture patterns. Also, some critical problems in the industrial control system, such as information security, production reliability, etc. are also identified. In the case study, we put forward an automatic control solution for Printing House based on SLR results. We designed the hardware deployment architecture of the system and the software control architecture. Generally speaking, this architecture is based on C/S architecture. In the development of client, we adopt the popular MVC architecture mode. In the longitudinal view of the whole system, an extended hierarchical architecture model is adopted. In the core control system, we adopt the modular architecture design idea. The whole control system is composed of 6 parts, four subsystems of PAC terminal, one server-side program and one client program. After a long time, development and test, our system finally goes online for the production, and its production efficiency is improved compared with the old system. Its expansion functions, such as Production Report and Tag Print, are deeply satisfying for the customers. Conclusions. In this research, we summarize and compare the advantages and disadvantages of several commonly used industrial control systems. Besides, we proposed a software architecture model and developed an automation control system based on PAC. We fill the gap that there is a lack of studies about the software architecture about the implementation of the automation control system based on PAC. Our result can help software engineers and developers in ICS fields to develop their own PAC based automation control system.
APA, Harvard, Vancouver, ISO, and other styles
16

Wyman, Matthew Cody. "The SAP Link: A Controller Architecture for Secure Industrial Control Systems." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8815.

Full text
Abstract:
Industrial Control Systems are essential to modern life. They are utilized in hundreds of processes including power distribution, water treatment, manufacturing, traffic management, and amusement park ride control. These systems are an essential part of modern life and if compromised, could result in significant economic loss, safety impacts, damage to the environment, and even loss of life. Unfortunately, many of these systems are not properly secured from a cyber attack. It is likely that a well-funded and motivated attack from a nation-state will successfully compromise an industrial control system's network. As cyber war becomes more prevalent, it is becoming more critical to find new and innovative ways to reduce the physical impacts from a cyber attack.This thesis presents a new architecture for a secure industrial controller. This architecture protects the integrity of the controller logic, including the safety logic which is responsible for keeping the process in a safe condition. In particular, it would prevent malicious or accidental modification or bypassing of the controller logic. This architecture divides the controller into three components; the logic controller, the interface controller and the SAP link. The logic controller is responsible for controlling the equipment and contains the safety logic. The interface controller communicates with the rest of the control system network. The Simple As Possible (SAP) link is a bridge between the logic and interface controllers that ensures the integrity of the logic controller by drastically limiting the external interface of the logic controller. We implement this new architecture on a physical controller to demonstrate the process of implementing the architecture and to demonstrate its feasibility.
APA, Harvard, Vancouver, ISO, and other styles
17

Werapun, Warodom. "Architectures de réseaux pour la délivrance de services à domicile." Thesis, Toulouse, INPT, 2012. http://www.theses.fr/2012INPT0081/document.

Full text
Abstract:
Avec l’omniprésence au quotidien du numérique et de l’informatique, de plus en plus d’utilisateurs souhaitent avoir accès à Internet et à leurs applications via n’importe quel périphérique, de n’importe où et n’importe quand. Les appareils domestiques intelligents se développant, les besoins d’échanger des données au domicile même se font de plus en plus sentir. C’est dans ce contexte, celui des services à domicile avec besoin d’interconnexion que se situe notre étude. Ce type de service est qualifié de Home Service (HS) alors que le réseau à domicile est nommé Home Network (HN). La problématique pour les opérateurs est alors de concevoir des architectures appropriées à l’interconnexion des HN de manière sécurisée tout en permettant un déploiement facile et à grande échelle. Dans la première étape, nous considérons la livraison de services sécurisés à travers un réseau de nouvelle génération (NGN) : IMS (IP Multimedia Subsystem). IMS étant l’architecture de référence pour son caractère réseau NGN des opérateurs, diverses architectures peuvent être développées comme support aux HS. Nous avons choisi d'analyser et de mettre en place une architecture P2P centralisée et de le comparer à l’architecture de référence. Plusieurs mécanismes d'authentification sont mis en place autour du P2P centralisé afin de sécuriser la prestation de services. La modélisation et l’évaluation de notre proposition ont permis d’identifier sa relation à l’IMS mais aussi des problèmes inhérents aux solutions centralisées : la protection des données personnelles, l’impact de la taille sur réseau sur les performances, l’existence d’un point de faiblesse unique face aux attaques et la congestion au niveau du serveur centralisé. Par conséquent, nous nous sommes tournés vers les solutions distribuées pour résoudre ces problèmes. Dans la deuxième étape, nous considérons l’architecture P2P non-structurée, qualifiée de pur P2P. La cryptographie basée sur l'identité (IBC) est ajoutée au P2P pur afin d’authentifier les utilisateurs et de protéger leurs communications. Pour chacune des solutions une analyse du coût de signalisation est effectuée révélant une faiblesse en ce qui concerne l’étape de recherche. Dans un déploiement à grande échelle, le coût de cette phase est trop élevé. Aussi, nous examinons le P2P structuré basé sur les Dynamic Hash Tables, une autre solution distribuée. Cette architecture est étudiée par l'IETF en tant qu’une des dernières générations de P2P: REsource LOcation And Discovery (RELOAD) Base Protocol. Nous proposons son utilisation dans le cadre des HSs. Comme preuve du concept, cette solution a été implantée et déployée sur un petit réseau en utilisant TLS/SSL comme mécanisme de sécurité. Cette plateforme nous a permis d’étudier les délais et les coûts de cette solution. Pour terminer, un bilan est établi sur toutes les solutions proposées En outre, nous introduisons d’autres types de HS et leurs possibilités de déploiement futur
With digital life enhancement, more users would like to get seamless Internet and information with any devices, at any time and from anywhere. More and more home devices need to exchange data or to control other devices. The type of services is labelled Home Service (HS) and it is deployed though a Home Network (HN). Some users need to use their HS outside their HN, some others need to interconnect other HN. Operators have to provide suitable network architectures to ensure this interconnection and to provide at the same time, scalability, remote access, easy deployment and security. Here is the topic of our work. In the fist step, we consider a practical illustration around the Next-Generation Network (NGN) and the secured services. It is the IMS (IP Multimedia Subsystem) approach for the management of services that is generally supported by the NGN network operators. However, various network operator architectures can be developed to support these services. An alternative way is the P2P architectures. We choose to analyze and implement a centralized P2P and we compare it with the IMS solution. Several authentication mechanisms are introduced to secure the centralized P2P. An evaluation of these architectures is conducted. Since the previous solutions present some issues due to their centralized feature, we consider distributed solutions in a second step. The non-structured P2P, called pure P2P, can also support HS. Identity Based Crytography (IBC) is added to these architectures in order to offer authentication and protection to user communications. The different solutions are compared through their signaling and transmission cost. The study shows that searching step in this architecture is really costly, facing a scalability problem. Thus, we propose to use a structured P2P (called Dynamic Hash Table) for delivering HS between HN. This type of architecture is studied by IETF with the REsource Location And Discovery (RELOAD) Base Protocol. This solution is implanted and deployed here to be a proof of the concept. This test-bed enables the study of delay and security overhead in a real system. Eventually, the presented solutions are recaptured in order to see their advantages/ disadvantages. In addition, we introduce other perspectives in terms of HSs and network interconnection
APA, Harvard, Vancouver, ISO, and other styles
18

Jones, James R. "A Client-Server Architecture for Collection of Game-based Learning Data." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/51229.

Full text
Abstract:
Advances in information technology are driving massive improvement to the education industry. The ubiquity of mobile devices has triggered a shift in the delivery of educational content. More lessons in a wide range of subjects are being disseminated by allowing students to access digital materials through mobile devices. One of the key materials is digital-based educational games. These games merge education with digital games to maximize engagement while somewhat obfuscating the learning process. The effectiveness is generally measured by assessments, either after or during gameplay, in the form of quizzes, data dumps, and/or manual analyses. Valuable gameplay information lost during the student's play sessions. This gameplay data provides educators and researchers with specific gameplay actions students perform in order to arrive at a solution, not just the correctness of the solution. This problem illustrates a need for a tool, enabling educators and players to quickly analyze gameplay data. in conjunction with correctness in an unobtrusive manner while the student is playing the game. This thesis describes a client-server software architecture that enables the collection of game-based data during gameplay. We created a collection of web services that enables games to transmit game-data for analysis. Additionally, the web application provides players with a portal to login and view various visualization of the captured data. Lastly, we created a game called "Taffy Town", a mathematics-based game that requires the player to manipulate taffy pieces in order to solve various fractions. Taffy Town transmits students' taffy transformations along with correctness to the web application. Students are able to view several dynamically created visualizations from the data sent by Taffy Town. Researchers are able to log in to the web application and see the same visualizations, however, aggregated across all Taffy Town players. This end-to-end mapping of problems, actions, and results will enable researchers, pedagogists, and teachers to improve the effectiveness of educational games.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
19

Adams, Alissa R. "French depictions of Napoleon I's resurrection (1821-1848)." Diss., University of Iowa, 2018. https://ir.uiowa.edu/etd/3236.

Full text
Abstract:
Despite the inherently multivalent nature of images of Napoleon Bonaparte created during the middle of the nineteenth century, scholars often employ only one lens to interpret them: the political context of the age in which they were created. In doing so, they effectively separate these images from the wider art historical narrative. A second—and equally fraught—effect of this tendency is the perpetuation of dominant assumptions that the popularity of his image was due to his status as a “Great Man.” This dissertation examines a subset of mid-century Napoleonic imagery that demonstrates the flawed nature of neglecting other approaches to interpreting these works: depictions of the Emperor’s resurrection. These images frequently portray the Emperor as an inherently democratic, republican, or Populist force that derives its power not from Napoleon’s identity, but from the creativity, commemorative work, or critical thinking of the audience and the French people. This dissertation closely examines these images in their artistic and cultural contexts, applying cultural art historical methodology and close iconographical analysis to works that are either absent from or marginalized in the art historical narrative. In doing so, it reveals Napoleonic resurrection imagery’s potential for commenting on changing social mores that privileged the cultural agency of the French people at mid-century. The underlying argument of this study is that Napoleon was a popular artistic subject not because of his status as a “Great Man,” but because of his endlessly mutable identity. This mutability facilitated the creation of new forms of art and knowledge while allowing the French people to reflect upon their place in the changing cultural and artistic milieu. By demonstrating that this admittedly narrow subset of Napoleonic representation is open to cultural analysis, this dissertation opens up new avenues of inquiry for scholars of the Napoleonic Revival. The first chapter of this study is a largely theoretical examination of Napoleonic “ghosts” and their connection to the strained relationship between fine art and popular culture as well as the masses and “Great Men.” Chapter two analyzes several images in which academically trained artists use Christ-like Napoleonic imagery to engage with the rising cultural and creative agency of the lower classes. The third chapter examines the political implications of the Napoleonic Revival. However, unlike earlier studies, it does so through the lens of the ongoing conflict between cultural narratives passed down from a centralized authority and popular culture that challenges these narratives. In particular, it contrasts the July Monarchy regime’s marginalization of the “real” Napoleon with public enthusiasm for the image of his corpse. Finally, the dissertation considers Paul Delaroche’s Napoleonic series in the context of the shifting locus of artistic production during the period.
APA, Harvard, Vancouver, ISO, and other styles
20

Akhlaq, Monis. "Improved performance high speed network intrusion detection systems (NIDS) : a high speed NIDS architectures to address limitations of packet loss and low detection rate by adoption of dynamic cluster architecture and traffic anomaly filtration (IADF)." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5377.

Full text
Abstract:
Intrusion Detection Systems (IDS) are considered as a vital component in network security architecture. The system allows the administrator to detect unauthorized use of, or attack upon a computer, network or telecommunication infrastructure. There is no second thought on the necessity of these systems however; their performance remains a critical question. This research has focussed on designing a high performance Network Intrusion Detection Systems (NIDS) model. The work begins with the evaluation of Snort, an open source NIDS considered as a de-facto IDS standard. The motive behind the evaluation strategy is to analyze the performance of Snort and ascertain the causes of limited performance. Design and implementation of high performance techniques are considered as the final objective of this research. Snort has been evaluated on highly sophisticated test bench by employing evasive and avoidance strategies to simulate real-life normal and attack-like traffic. The test-methodology is based on the concept of stressing the system and degrading its performance in terms of its packet handling capacity. This has been achieved by normal traffic generation; fussing; traffic saturation; parallel dissimilar attacks; manipulation of background traffic, e.g. fragmentation, packet sequence disturbance and illegal packet insertion. The evaluation phase has lead us to two high performance designs, first distributed hardware architecture using cluster-based adoption and second cascaded phenomena of anomaly-based filtration and signature-based detection. The first high performance mechanism is based on Dynamic Cluster adoption using refined policy routing and Comparator Logic. The design is a two tier mechanism where front end of the cluster is the load-balancer which distributes traffic on pre-defined policy routing ensuring maximum utilization of cluster resources. The traffic load sharing mechanism reduces the packet drop by exchanging state information between load-balancer and cluster nodes and implementing switchovers between nodes in case the traffic exceeds pre-defined threshold limit. Finally, the recovery evaluation concept using Comparator Logic also enhance the overall efficiency by recovering lost data in switchovers, the retrieved data is than analyzed by the recovery NIDS to identify any leftover threats. Intelligent Anomaly Detection Filtration (IADF) using cascaded architecture of anomaly-based filtration and signature-based detection process is the second high performance design. The IADF design is used to preserve resources of NIDS by eliminating large portion of the traffic on well defined logics. In addition, the filtration concept augment the detection process by eliminating the part of malicious traffic which otherwise can go undetected by most of signature-based mechanisms. We have evaluated the mechanism to detect Denial of Service (DoS) and Probe attempts based by analyzing its performance on Defence Advanced Research Projects Agency (DARPA) dataset. The concept has also been supported by time-based normalized sampling mechanisms to incorporate normal traffic variations to reduce false alarms. Finally, we have observed that the IADF has augmented the overall detection process by reducing false alarms, increasing detection rate and incurring lesser data loss.
APA, Harvard, Vancouver, ISO, and other styles
21

Nag, Abhishek. "Understanding the genetic architecture of glaucoma and its endophenotypes." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/understanding-the-genetic-architecture-of-glaucoma-and-its-endophenotypes(2cd26bc9-2015-45eb-b7d5-6007d2d99207).html.

Full text
Abstract:
Heritability estimates for glaucoma and its endophenotypes [intraocular pressure (IOP) and vertical cup-to-disc ratio (VCDR)] indicate that genetic factors determine a significant part of the susceptibility to glaucoma or variance of its endophenotypes. Identification and characterization of glaucoma susceptibility genes will therefore help strengthen our understanding and provide insights into novel mechanisms underlying glaucoma pathogenesis. The GWAS era saw a surge in the identification of susceptibility genes for glaucoma and its endophenotypes. As has been the experience with most other complex human traits, the genetic variants identified so far collectively explain only a minority of glaucoma’s estimated heritability. The scope of this thesis is to understand the role of some of the possible determinants of the unexplained heritability of glaucoma using an endophenotype-based approach, which would in turn help build a more complete picture of its underlying genetic architecture. Findings of several individual study GWAS so far suggest that common genetic variants determine part of the genetic architecture of the glaucoma endophenotypes. In order to boost the power to detect some of the common genetic variants that might still remain unidentified, a large international collaborative effort named the International Glaucoma Genetics Consortium (IGGC) was established. Findings related to the investigation of the glaucoma endophenotypes in the IGGC have been described in this thesis. The role of structural genetic variation such as copy number variation (CNV) has been under-explored with relation to glaucoma. The hypothesis that CNVs might influence part of the susceptibility to glaucoma was therefore investigated and has been described in this thesis. Low frequency (rare) single nucleotide variants (SNVs) with intermediate effect size, which were neither common enough to be tagged in GWAS nor did they have effects strong enough to be captured by linkage studies, might determine a part of the unexplained genetic architecture of glaucoma. The role of this class of variants has been explored using a unique dataset of ~2000 subjects from the TwinsUK cohort that have had their whole genome sequenced as a part of the UK10K project. This thesis describes the various analytical strategies that have been explored to ascertain their role in relation to the glaucoma endophenotypes, and the findings pertaining to them. Finally, this thesis also discusses the potential implications of the novel findings obtained, and makes suggestions for future work in this field in order to build on our understanding of the genetic basis of glaucoma.
APA, Harvard, Vancouver, ISO, and other styles
22

Nobôa, Francisco José Viudes. "Análise do mecanismo de segurança da arquitetura IMS." [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260053.

Full text
Abstract:
Orientador: Yuzo Iano
Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-20T16:13:03Z (GMT). No. of bitstreams: 1 Noboa_FranciscoJoseViudes_M.pdf: 2562716 bytes, checksum: 8090bd81ec54aaeab629033ee45a1ef0 (MD5) Previous issue date: 2012
Resumo: Considerando-se que para controlar e possibilitar a entrega de diversos conteúdos e serviços a qualquer tipo de acesso fazia-se necessário um núcleo bem definido e estruturado, surgiu o IMS (IP Multimedia Subsystem) com o propósito de prover a integração completa das redes e serviços. O IMS define uma arquitetura completa e framework que habilita a convergência de voz, vídeo, dados e tecnologia de rede móvel através de uma infraestrutura baseada em IP, preenchendo a distância entre os dois paradigmas de comunicação mais bem sucedidos, celular e tecnologia IP. Este trabalho apresenta a arquitetura IMS como controle central de todas as redes, e uma arquitetura para o desenvolvimento de aplicações móveis que incorporem voz, vídeo e dados. A arquitetura IMS apesar de promissora apresenta inúmeras oportunidades de melhoria no seu mecanismo de segurança, muitas dessas oportunidades de melhoria estão relacionadas a falhas e até mesmo a falta de especificações de segurança quando a arquitetura foi originalmente implementada. Assim o maior desafio na implantação e globalização da arquitetura IMS são as falhas de segurança e a vulnerabilidade que a arquitetura possui a diversos tipos de ataques que podem atingir e prejudicar, tanto operadoras quanto usuários da rede. O objetivo deste projeto de pesquisa é apresentar uma análise detalhada sobre a estrutura da arquitetura IMS focando principalmente na arquitetura de segurança desenvolvida pela 3GPP, e assim prover análises e soluções para os ataques, vulnerabilidades e falhas de segurança que atingem a arquitetura tanto do ponto de vista de operadoras e provedores de serviço quanto na perspectiva do usuário
Abstract: Considering that to control and enable the delivery of diverse content and services to any type of access it should make necessary a core well-defined and structuralized, appeared the IMS (IP Multimedia Subsystem) in order to provide the complete integration of networks and services. IMS defines a complete architecture and framework that enables the convergence of voice, video, data and mobile network technology over an infrastructure based on IP, in addition to filling the gap between the two communications paradigms most successful, cellular and IP technology. This paper presents the IMS architecture as central control of all networks, and architecture for developing mobile applications that incorporate voice, video and data. The IMS architecture despite being promising presents numerous opportunities for improvement in its security mechanism, many of these opportunities for improvement are related to failures and even the lack of security specifications when creating the architecture. So the biggest challenge in the implementation of the IMS architecture and globalization are the security issues and vulnerabilities that the architecture faces being vulnerable to several types of attacks that can reach and affect carriers and network users. The objective of this research project is to present a detailed analysis on the structure of the IMS architecture focusing primarily on security architecture developed by 3GPP, and thus provide analysis and solutions about the attacks, vulnerabilities and security issues that affect the architecture from the point of view of carriers, service providers and from the network users
Mestrado
Telecomunicações e Telemática
Mestre em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
23

Cabral, Warren. "Architectural analysis and customised deployment of deceptive cowrie and conpot honeypots." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2021. https://ro.ecu.edu.au/theses/2468.

Full text
Abstract:
Honeypots are progressively becoming a fundamental cybersecurity tool to detect, prevent, and record new threats and attack methodologies used by attackers to penetrate systems. A honeypot is a deceptive or fake computer system that presents itself as a real computer system with actual sensitive information. A range of open-source honeypots are available today, such as Cowrie and Conpot, which can be easily downloaded and deployed within minutes—with default settings. Cowrie is a medium-interaction secure shell (SSH) and Telnet honeypot intended to log brute force and shell interaction attacks. In contrast, Conpot is a low-interaction SCADA honeypot, which attempts to mimic an active SCADA system. These honeypots operate on a standardised configuration file that encompass options for deployment such as hostnames, IPs, network services, protocols, applications, and fingerprint information. These options are convoluted and must be used in an integrated and granular fashion to make the deception presented by the honeypot to be plausible and effective. The current issue with the default configurations is that it is easily detected by adversaries using default parameters, automated scripts and scanners such as Shodan and NMAP. Nonetheless, cybersecurity specialists deploy most honeypots with default configurations. This is because modern systems do not provide a standard framework for optimal deployment of these honeypots based on the various configuration options available to produce a non-default configuration. Hence, default honeypot deployments are counterproductive and a surplus network resources and personnel. A quantitative empirical learning approach driven by a quasi-experimental methodology was undertaken to develop a solid understanding about the deceptive capabilities of the Cowrie and Conpot honeypots. This was accomplished by developing a framework created from the analysis of numerous Cowrie and Conpot configurations and linking these artefacts to their deceptive potential. This framework provides for customised honeypot configuration, thereby enhancing their functionality to achieve a high degree of deceptiveness and realism. Thereafter, these configured honeypots were then deployed in association with banners and firewall rules to prevent Shodan and NMAP detections and to prevent attackers from acknowledging default parameters. The results of these deployments show an exponential increase in attackerhoneypot interaction in comparison to their subsequent default implementations. In turn, they inform and educate cybersecurity audiences how important it is to deploy honeypots with advanced deceptive configurations to bait cybercriminals and mitigate counterproductive distributions.
APA, Harvard, Vancouver, ISO, and other styles
24

Pantam, Sneha. "BOOK-HUNT! ANDROID MOBILE APPLICATION USING INDOOR POSITIONING TECHNOLOGY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/744.

Full text
Abstract:
Indoor Positioning System (IPS) focuses on locating objects inside Buildings. Till date, GPS has helped us obtain accurate locations outdoors. These locations have helped us in many ways like navigating to a destination point, tracking people etc. Indoor Positioning System aims at navigating and tracking objects inside buildings. [1] IndoorAtlas is a technology that works on the theory of Indoor Positioning System. Book-Hunt is an Android mobile application which majorly makes use of IndoorAtlas therefore making use of the technique of indoor tracking. This Android mobile application is designed for Libraries. It is designed specifically for John M. Pfau Library, CSUSB, to help the students locate a book in the Library. When a student selects a book, a marker is pointed towards the book and also on the student’s current location. This application aims at saving time for student searching a particular book in the Library. Book- Hunt makes use of three tools Android Studio, Google Maps and IndoorAtlas
APA, Harvard, Vancouver, ISO, and other styles
25

Wlaszyn, Joanna. "Dimension (in)visible : réception technologique comme valeur ajoutée vers une architecture amplifiée." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1187.

Full text
Abstract:
L'objet de cette recherche consiste à capturer et analyser les relations entre l'architecture et les technologies récentes sous l'angle de la perception. Loin de la subjectivité supposée, l‘analyse guidée par la notion d'expérience perceptive s'appuie à la fois sur des concepts esthétiques et phénoménologiques. Cette double réflexivité porte également sur une étude de cas conceptuels et « concrets » qui opèrent la vision de la spatialité architecturale dans des tensions spéculatives entre le monde « numérique » et physique. La problématique porte sur la réception de l'architecture comme valeur culturelle et production intellectuelle, coordonnée par des moyens technologiques qui l'amplifient. S'inscrivant dans l'hypothèse qu'aujourd'hui l'architecture est loin de « servir » uniquement de réponse aux questions formelles, structurelles et fonctionnelles, la recherche démontre que l'architecture s'approche de plus en plus du champ artistique en phase d'expérimentations permanentes. Analysant les facteurs d'esthétisation de concepts variés, l'étude des cas vise à appréhender l'aspect cognitif et la valeur esthétique de la réception technologique — notion nouvelle, introduite comme un outil opératoire permettant d'aborder les aspects sensibles, hybrides et variables de la production architecturale. L'originalité de cette recherche consiste donc à analyser les connexions instables qui caractérisent les processus actuels de transitions diverses dans le domaine de l'architecture. À ce titre, cette recherche propose d'ouvrir le champ de la discussion autour du « digital » selon les principes de la singularité architecturale dans la pluralité des réceptions possibles
The purpose of this research is to capture and analyze the relationships between architecture and recent technologies in terms of perception. Far from the supposed subjectivity, this analysis guided by the notion of perceptual experience, is based on both phenomenological and aesthetic concepts. This double reflexivity also relates to the conceptual and "concrete" case studies operating the architectural vision of spatiality in speculative tensions between the "digital" and the physical word. The problematic concerns the reception of architecture as a cultural value and intellectual production, coordinated by technological means that amplify it. In keeping with the assumption that today's architecture is far away to "serve" only as a response to formal, structural and functional questions, this research shows that architecture is increasingly approaching the artistic field in phase of permanent experimentations. By analyzing the factors of aestheticization of various concepts, case study seeks to understand the cognitive and the aesthetic value of the technological reception — new notion, introduced as an operational concept to approach the sensitive, hybrid and variables issues of architectural production. The originality of this research consist of analyzing the unstable connections that characterize the current processes of various transitions in the field of architecture. As such, this research proposes to open the scope of the discussion around the "digital" according to the principles of architectural singularity in the plurality of possible receptions
APA, Harvard, Vancouver, ISO, and other styles
26

Tantayakul, Kuljaree. "Mobility Management in New Internet Architectures." Phd thesis, Toulouse, INPT, 2018. http://oatao.univ-toulouse.fr/23732/1/Tantayakul_Kuljaree.pdf.

Full text
Abstract:
The software integration with new network architectures via Software-Defined Networking (SDN) axis appears to be a major evolution of networks. While this paradigm was primarily developed for easy network setup, its ability to integrate services has also to be considered. Thus, the mobility service for which solutions have been proposed in conventional architectures by defining standardized protocols should be rethought in terms of SDN service. Mobile devices might use or move in SDN network. In this thesis, we proposed a new mobility management approach which called "SDN-Mobility" and has shown that SDN can be implemented without IP mobility protocol for providing mobility like as Proxy Mobile IPv6 (PMIPv6) that is the solution adopted by 3GPP, with some performance gain. However, PMIPv6 and SDN-Mobility have some packets loss during Mobile Node (MN) handover. Thus, in this thesis, we proposed a new paradigm based on caching function to improve the quality of transfer during handover. Caching policy cooperates with SDN controller for automatic buffering of the data during the handover. We proposed two caching policies that are compared through a performance analysis regarding the quality of transfer for the user and for the operator. This thesis also presented that SDN-Mobility with caching policy can be applied easily for mobility management in heterogeneous network architectures able to integrate the future Internet based on the Information-Centric Networking (ICN).
APA, Harvard, Vancouver, ISO, and other styles
27

Pagna, Disso Jules Ferdinand. "A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Full text
Abstract:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention System (MIDaPS) that is designed here is made of two fundamental elements: a multistage attack engine that heavily depends on attack trees and a Denial of Service Engine. MIDaPS were tested and found to improve current intrusion detection and processing performances. After an intensive literature review, over 25 GB of data was collected on honeynets. This was then used to analyse the complexity of attacks in a series of experiments. Statistical and analytic methods were used to design the novel MIDaPS. Key findings indicate that an attack needs to be protected at 4 different levels. Hence, MIDaPS is built with 4 levels of protection. As, recent attack vectors use legitimate actions, MIDaPS uses a novel approach of attack trees to trace the attacker's actions. MIDaPS was tested and results suggest an improvement to current system performance by 84% whilst detecting DDOS attacks within 10 minutes.
APA, Harvard, Vancouver, ISO, and other styles
28

Pagna, Disso Jules F. "A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Full text
Abstract:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention System (MIDaPS) that is designed here is made of two fundamental elements: a multistage attack engine that heavily depends on attack trees and a Denial of Service Engine. MIDaPS were tested and found to improve current intrusion detection and processing performances. After an intensive literature review, over 25 GB of data was collected on honeynets. This was then used to analyse the complexity of attacks in a series of experiments. Statistical and analytic methods were used to design the novel MIDaPS. Key findings indicate that an attack needs to be protected at 4 different levels. Hence, MIDaPS is built with 4 levels of protection. As, recent attack vectors use legitimate actions, MIDaPS uses a novel approach of attack trees to trace the attacker¿s actions. MIDaPS was tested and results suggest an improvement to current system performance by 84% whilst detecting DDOS attacks within 10 minutes.
APA, Harvard, Vancouver, ISO, and other styles
29

Huang, Cuiting. "Service composition in converged service environment." Thesis, Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0009/document.

Full text
Abstract:
L'objectif de cette thèse est de fournir des mécanismes améliorés pour déployer des services compétitifs par des manières rapides et rentables. Nous proposons un modèle de composition de service basé sur un environnement IMS/Web convergent. Ce modèle permet aux utilisateurs non professionnels de réutiliser les services existants pour créer de nouveaux services facilement. Pour améliorer la fonctionnalité de composition automatique, trois stratégies, y compris mise à jour passive, mise à jour active et mise à jour hybride sont proposées et analysées. Nous introduisons ensuite une plateforme centralisée d'exposition de service pour une variété de services, y compris services de Télécom / Web / appareil / services générés par les utilisateurs. Cette plateforme vise à renforcer les caractéristiques de centrée-sur-utilisateur et convergence, et fournir l'accès unifié à différents services. Par la suite, deux modèles basés sur le P2P sont conçus pour compléter le modèle centralisé: i) Un modèle hiérarchique basé sur Chord pour garantir l'efficacité de la découverte de services. Il adopte le concept de publication et découverte de service abstrait pour permettre à la recherche de service ambiguë. ii) Un modèle de superposition-triplex et P2P basé, qui cible principalement des services offerts par les appareils. Dans ce modèle, nous utilisons des passerelles pour déléguer des appareils résidant en eux pour l'exposition globale de services, et utilisons une architecture basée sur une superposition triplex, qui comprend une couche P2P non structurée, une couche de réseau sémantique (SON), et une couche de dépendance de service, pour la partage de l'information de service et la découverte de services
The goal of this thesis is to provide enhanced mechanisms to deploy competitive services in a rapid and cost-effective manner. To achieve this goal, we first propose an automatic service composition model relying on an IMS/Web converged environment. This service composition model is intended to be one in which even non-professional users can easily reuse existing services to create new services. To further improve the automatic service composition feature, three strategies including passive update, active update and hybrid update are proposed and analyzed. We then propose a centralized service exposure framework for a variey of services, including Telecom / Web / Device / user-generated services. This framework aims at enhancing the user-centric and convergence features, and providing the unified access to diverse services.Subsequently, two P2P based service information sharing models are designed to complement the centralized service exposure model : i) A hierarchical P2P based model, which reuses Chord for guaranteeing the service discovery efficiency, meanwhile adopts the concept of abstract service publication and discovery for enabling the ambiguous services searching. ii) A triplex P2P overlay based model, which mainly targets the devices offered services. In this model, we use the gateways to delegate the devices residing in them for the global service exposure, and use a triplex overlay based architecture, which includes an underlying unstructured P2P layer, a Semantic Overlay Network (SON) based overlay and a service dependency overlay, for the service information sharing and discovery
APA, Harvard, Vancouver, ISO, and other styles
30

Cargelius, Lovisa. "Mariagårdstäppan." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213418.

Full text
Abstract:
Tillägget på Mariagårdstäppan ska bland annat rymma utbildningslokaler för en komvuxverksamhet, konferenslokaler och en restaurang. På tomten står idag en blåklassad palatsliknande byggnad anno 1875, Oscar den I:s minne. I och med Citybanans byggande har det lagds ned otroligt mycket tid, kompetens oh kapital för att rädda byggnaden från att kollapsa, så hur går man tillväga för att lyfta fram den befintliga byggnaden på bästa sätt? Området är präglat av byggnader från många olika historiska epoker, men det som utmärkte sig mest på platsen är de malmgårdar som uppförts runt Fatbursparken under 1700-talet, och som i många fall står kvar än idag. Ofta står det en större stenbyggnad, omgärdad av mindre trähus, som tillsammans bildar ett gårdsrum, en trädgård. Så med inspiration från malmgårdarna har jag försökt skapa ett arkitektoniskt scenario, som med hjälp av historien, på bästa sätt lyfter fram platsen.
The addition to Mariagårdstäppan will amongst other things house educational facilities for Komvux, conference venues and a restaurant. Currently the site is home to a "blue classed" palace-like building from 1875 built in memory of Oscar I. The Citybana project in the vicinity has directed considerable capital, time and effort to protect the building from collapsing. Therefore the question arises, how can we proceed while at the same time preserve this heritage building? The surrounding area is coloured by contrasting building styles from many different historical eras, and what stands out most are the Malmgårdar (Farmyards) erected around Fatbursparken during the 1700's. To this day many still stand. Typical for these yards is a stone building situated in the center of smaller wooden houses which together form a garden. Drawing inspiration from the Malmgårdar, I have tried to create an architectonic scene with historical roots, in hopes of lifting forth the best of this landmark
APA, Harvard, Vancouver, ISO, and other styles
31

Mani, Mehdi. "Stratégies d'overlay de service : d'une architecture centalisée vers le Pair-à-Pair." Paris 6, 2008. http://www.theses.fr/2008PA066188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Luu, Thanh Tra. "Etude et mise en oeuvre d'une signalisation IP universelle." Paris, ENST, 2006. http://www.theses.fr/2006ENST0046.

Full text
Abstract:
Les futures générations d’Internet nécessitent un plan de contrôle puissant dans lequel la signalisation joue un rôle important en permettant l'échange d'information entre les entités du réseau. Cette thèse développe un protocole de signalisation IP générique, nommé GISP (Generic sIgnaling Service Protocol). Le protocole fournit les fonctionnalités communes qui sont exigées par la plupart des protocoles de signalisation IP incluant les services de gestion d’état, transport, et sécurité. GIPS implémente une approche soft-state pour gérer les sessions de signalisation établies dans les entités de réseau. En particulier, un nouveau mécanisme de gestion d’état est proposé dont l’objectif est de réduire le trafic de signalization et l’utilisation de ressources CPU, répondant ainsi aux besoins de passage à l’échelle en terme du nombre de sessions établies. GISP fournit les services de transport de signalisation entre les entités de réseaux. Plusieurs services de transport ont été spécifiquement développés pour GISP tels que le regroupement de message, la fragmentation de message, la découverte de MTU, le transport partiellement fiable et le contrôle de congestion. Ces services sont conçus pour permettre à la signalisation générique d’être à la fois souple, robuste et efficace. Enfin, GISP offre les services de sécurité afin de protéger les réseaux contre les attaques. Une implémentation de GISP a été réalisée pour expérimenter les fonctionnalités de GISP et évaluer ses performances
The future generation of the Internet requires a powerful control plane wherein the signaling plays a key role in enabling information exchanges between the network elements to provide the existing and future network services. The thesis develops a generic IP signaling protocol, referred to as GISP, which provides common functionalities required by most IP signaling protocols including state management, transport and security services. The GISP implements a soft-state approach to manage the signaling states established within the network elements. In particular, a new soft-state management mechanism is proposed to significantly reduce the signaling traffic as well as the CPU resource consumption allowing the GISP to meet scalability in the number of signaling sessions. The GISP supports the signaling messages transport between the network elements. A variety of transport services have been specifically developed for GISP such as message bundling, message fragmentation, path MTU discovery, partially reliable transport and congestion control. These services have been designed to provide performance, flexibility and robustness for the generic signaling protocol. Finally, the GISP provides security services to protect the message transport as well as the network from vicious attacks. A GISP implementation has been realized in the context of the thesis to experience the GISP functionalities and evaluate its performance aspects
APA, Harvard, Vancouver, ISO, and other styles
33

Yeung, Adah. "Kunskapspalatsen : Vision." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213975.

Full text
Abstract:
Kunskapspalatsen är en vuxenutbildning nära Fatubursparken i Stockholm. Projektets utgångspunkt var att ta inspiration från fiktiva koncepter för att styra projektet. Jag valde att utgå ifrån konceptet “tiden”, tagen från en berättelse som handlar om hur viktigt tiden är. Många associerar tiden med klockor eller med solens rörelse - något som de båda har gemensamt är att båda rör sig i cirklar. Då beslöt jag mig att jobba med en cirkulär rörelse i byggnaden. Slutprojektet blev en oval formade byggnad, men med raka väggar som går parallellt till omgivningens byggnader. Den rundade formen styr flödet i byggnaden, men som samtidigt också passar till Fatbursparkens bågform. Det är enn form som matchar omgivningen och samtidigt ser unikt ut i jämförelse. Huvudentrén är placerad på den södra delen av tomten och ska fånga upp uppmärksamhet från folk som går förbi. Hierarkini byggnaden följer: offentliga ytor och de större basrummen finns på entréplanen; de andra övre planerna är dedikerad till studenter och lärare.
The Wisdom Palace is an adult education near the Fatubur Park in Stockholm. The project's starting point was to get inspiration from fictional concepts, that would control the project. I chose to work with the concept of "time", taken from a fictional story about how important time is. Many associate the time with clocks or with the movement of the sun - something that they both have in common is that both move in circles. I then decided that I wanted to work with a circular flow in the building. The finalized project was an oval shaped building, but with straight walls that run parallel to the surrounding buildings. The rounded shape controls the flow of the building, but it also fits with the Fatbur Park's arch shape. It's a form that matches the environment and at the same time , it looks unique in comparison. The main entrance is located on the southern part of the building and its purpose is to catch attention from bypassing people. The hierarchy in the building follows: public spaces and the larger base rooms are all on the entrance plan; The other upper plans are dedicated to students and teachers only.
APA, Harvard, Vancouver, ISO, and other styles
34

Hao, Shilun. "IDS---Intelligent Dougong System: A Knowledge-based and Graphical Simulation of Construction Processes of China’s Song-style Dougong System." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1417702752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Rodriguez, Bertha Helena. "Modèle SOA sémantique pour la multimodalité et son support pour la découverte et l'enregistrement de services d'assistance." Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0006/document.

Full text
Abstract:
Les entrées et sorties unimodales dans les systèmes actuels ont atteint une maturité reconnue, avec les applications tactiles ou par les services distribués pour la géo-localisation ou la reconnaissance de la parole, du son ou l’'image. Cependant, l'intégration et l’instanciation de toutes ces modalités, manque d’une gestion intelligente du contexte d’acquisition et de restitution basée sur des notions fortement formalisées mais reflétant le sens commun. Ceci demande un comportement plus dynamique du système avec une approche plus adéquate pour gérer l'environnement de l'utilisateur. Cependant,la technologie nécessaire pour atteindre un tel objectif n’est pas encore disponible de façon standardisée, tant au niveau des descriptions fonctionnelles des services unimodaux que de leur description sémantique. Ceci est aussi le cas pour les architectures multimodales, où la composante sémantique est produite par chaque projet sans un accord commun pour assurer l’interoperabilité et est souvent limitée au traitement des entrées et sorties ou aux processus de fusion/fission strictement nécessaires au projet.Pour combler cette lacune, nous proposons une approche sémantique orientée services pour une architecture multimodale générique qui vise à améliorer la description et la découverte des composants de modalité pour les services d'assistance: l'architecture SOA2m. Cette architecture se veut entièrement focalisée sur la multimodalité et enrichie avec des technologies sémantiques car nous croyons que cette orientation permettra d'enrichir le comportement autonome des applications multimodales, avoir une perception robuste des échanges, et contrôler l'intégration sémantique
Unimodal inputs and outputs in current systems have become very mature with touch applications or distributed services for geo-localization or speech, audio and image recognition. However, the integration and instantiation of all these modalities, lack of an intelligent management of the acquisition and restitution context, based on highly formalized notions reflecting common sense. This requires a more dynamic behavior of the system with a more appropriate approach to manage the user environment.However, the technology required to achieve such a goal is not yet available in a standardized manner, both in terms of the functional description of unimodal services and in terms of their semantic description. This is also the case for multimodal architectures, where the semantic management is produced by each project without a common agreement in the field to ensure inter-operability, and it is often limited to the processing of inputs and outputs or fusion / fission mechanisms. To fill this gap, we propose a semantic service-oriented generic architecture for multimodal systems. This proposal aims to improve the description and the discovery of modality components for assistance services: this is the architecture SOA2m. This architecture is fully focused on multimodality and it is enriched with semantic technologies because we believe that this approach will enhance the autonomous behavior of multimodal applications, provide a robust perception of the user-system exchanges, and help in the control of the semantic integration of the human-computer interaction.As a result, the challenge of discovery is addressed using the tools provided by the field of the semantic web services
APA, Harvard, Vancouver, ISO, and other styles
36

Atencio, Luis, Bruno Aybar, and Padilla Alfredo Barrientos. "Comparative analysis of cross-platform communication mechanisms." Association for Computing Machinery, 2018. http://hdl.handle.net/10757/624690.

Full text
Abstract:
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.
The present research aims to compare the different technologies that allow real-time communication between Android and iOS devices. We conducted a measurement-driven experiment to test the performance of each technology under different scenarios. We determine their functionality according to the environment for which they have been developed, showing competent information about their capabilities based on the communication channel they use, and their performance measured in milliseconds. The final results allow mobile application developers to determine which technologies suits them the best, based on the specific context of their projects.
Revisión por pares
APA, Harvard, Vancouver, ISO, and other styles
37

Onesti, Laura. "From F energy rating to Nearly ZEB: project of energy retrofit and architectural upgrade of a brick terraced house in Co. Dublin, Ireland." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016.

Find full text
Abstract:
Questo progetto è stato sviluppato durante un periodo di ricerca presso il Dipartimento di Ingegneria Civile del Trinity College e continuato presso l’Università di Bologna. Il progetto ha l’obiettivo di analizzare le soluzioni per l’ampliamento, la sostituzione degli impianti e l’ottimizzazione energetica di un tipico edificio residenziale Irlandese, una end of terrace in mattoni costruita negli anni ’20, collocata a Blackrock (Dublino). Diversi studi sostengono che lo stock abitativo irlandese è il peggiore del nord Europa per quanto riguarda la performance energetica. Questa tesi consta di una prima parte di studio del contesto e delle tecniche costruttive tradizionali irlandesi; è presente un capitolo di approfondimento sulle leggi riguardanti le costruzioni e gli incentivi forniti dal governo irlandese per interventi di retrofit energetico. Il terzo capitolo è un’analisi dell'esistente, con disegni del rilievo geometrico, immagini dell’edificio originale, termogrammi e dati riguardanti l’attuale performance energetica. Vengono poi mostrate diverse ipotesi di progetto e, una volta determinata la disposizione degli spazi interni, vengono considerate due soluzioni simili, ma costruite con pacchetti costruttivi diversi. Nel Progetto A l’involucro dell’addizione ha una struttura in muratura, nel Progetto B la struttura è in X-lam. Le performance energetiche delle due proposte vengono confrontate tramite una simulazione attuata grazie all'utilizzo del software dinamico IES-VE. Viene valutata l’applicazione di energie rinnovabili, quali l’energia solare e eolica e l’apporto che queste possono dare al bilancio energetico. Infine viene fatta un’analisi dei costi, valutando possibili suddivisioni dei lavori e ipotizzando un piano di ritorno dell’investimento, anche in combinazione con l’applicazione di energie rinnovabili. Alla fine del progetto si trova una valutazione quantitativa dei miglioramenti dell’edificio e un’analisi critica dei limiti del progetto.
APA, Harvard, Vancouver, ISO, and other styles
38

Gudimetla, Thakshak Mani Chandra Reddy. "ORGANIZE EVENTS MOBILE APPLICATION." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/772.

Full text
Abstract:
In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to register for a new event and re-entering the details at the event. This project designs a system that eliminates these redundancies and improves event management.
APA, Harvard, Vancouver, ISO, and other styles
39

Mahdi, Mohamed. "Architectures réseaux pour le partage de contenus multimédias avec garantie de qualité de service." Phd thesis, Université Paul Sabatier - Toulouse III, 2011. http://tel.archives-ouvertes.fr/tel-00667635.

Full text
Abstract:
Le succès des services de partage de contenus multimédias sur internet témoigne de l'intérêt des utilisateurs à partager leurs expériences personnelles à travers des fichiers multimédias (photo, vidéo, musique). Les solutions actuelles sont basées essentiellement sur des serveurs web et souffrent d'un manque de QoS, de sécurité et de confidentialité. Plusieurs travaux de recherche ont été menés pour proposer des architectures réseaux d'accès à distance pour de tels services. Ils sont soit trop complexes pour être utilisés par des services dédiés au grand public, soit inadaptés au contexte de partage de contenus. Dans cette thèse nous présentons un système de mise en relation réseau entre équipements distants pour permettre l'échange de contenus multimédias, ceci en garantissant à la fois la sécurité, la confidentialité et la qualité de service. Étant donné que ces contenus sont gourmands en ressources réseaux, le système proposera une garantie de QoS de bout en bout pour les sessions établies. Il offrira également une sécurisation de la mise en relation et des échanges. Nous avons défini une architecture générique de notre système. Ensuite, nous avons proposé deux déclinaisons techniques, leur conception et leur implémentation, une première utilisant le Framework IMS (IP Multimédia Subsystem) et une deuxième adaptée au déploiement sur internet. Le système conçu constitue la brique réseau du service de partage de contenus à distance étudié dans le cadre du projet européen Feel@Home ("Full Extended Experience of living at Home").
APA, Harvard, Vancouver, ISO, and other styles
40

Arbault, Damien. "Globalized impacts International trade accounting in a hybrid LCI method." Thesis, KTH, Urban and Regional Studies, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-24863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

COSTA, Wagner Elvio de Loiola. "SISTEMA DE DETECÇÃO DE INTRUSÃO EM REDES BASEADO EM SOA (NIDS-SOA) PARA SUPORTAR A INTEROPERABILIDADE ENTRE IDS S: APLICAÇÃO AO NIDIA." Universidade Federal do Maranhão, 2012. http://tedebc.ufma.br:8080/jspui/handle/tede/497.

Full text
Abstract:
Made available in DSpace on 2016-08-17T14:53:23Z (GMT). No. of bitstreams: 1 Dissertacao Wagner Elvio.pdf: 4463476 bytes, checksum: 4fda2686652d403cd2641f98f3b51575 (MD5) Previous issue date: 2012-10-10
The antivirus system and firewall are protection systems designed to prevent malicious work in the network, thus constituting a barrier to invaders (e.g. vírus, worms e hackers). However, there is no guarantee a full protection to network and computers, invasions can occur by exploiting vulnerabilities, known, and allow running programs remotely, changing privileges within the system and the dissemination of important information. In this case, Intrusion Detection System IDS (Intrusion Detection System) allows the detection of intrusions and subsequent notification to the network administrator or, in conjunction with the firewall blocks the port used in the invasion or the IP address of the attacker. An important factor for the intrusion detection is the quality of subscriber base. However IDS systems are isolated systems and the interoperability among different vendors IDS is complex and difficult to implement. Existing IDS systems in the literature, including the IDS NIDIA (Instrusion-Detection System Network Intrusion Detection System based on Intelligent Agents) are isolated systems, are not easily reused. Generally, they communicate using different protocols and are designed with different programming paradigms. In this work it is proposed an architecture based on the philosophy SOA (Service Oriented Architecture) to support interoperability between IDS systems. The IDS-NIDIA will be adapted and extended according to the SOA philosophy, containing layers of web services in order to provide a static service composition between the layers of the application and reuse of information with other IDS s.
Os sistemas antivírus e firewall são sistemas de proteção que visam impedir a execução de ações maléficas na rede, constituindo, portanto, uma barreira aos invasores (e.g.vírus, worms e hackers). Entretanto, não há como garantir uma proteção total da rede e dos computadores, podendo ocorrer invasões através da exploração de vulnerabilidades, já conhecidas, que permitem a execução de programas remotamente, a alteração de privilégios dentro do sistema e a divulgação de informações importantes. Neste caso, o Sistema de Detecção de Intrusão-IDS(Intrusion Detection System) permite a detecção de intrusões e a consequente notificação ao administrador da rede ou, em conjunto com o firewall, bloqueia a porta utilizada na invasão ou o endereço IP do atacante. Um fator importante para a detecção de intrusões é a qualidade da base de assinaturas. Entretanto os sistemas IDS são sistemas isolados e a interoperabilidade entre IDS de fornecedores diferentes é complexa e de difícil implementação. Os sistemas IDS existentes na literatura, incluindo o IDS-NIDIA (Instrusion Detection System- Network Intrusion Detection System based on Intelligent Agents), são sistemas isolados, não são facilmente reutilizados. Geralmente, estes se comunicam utilizando diferentes protocolos e são criados com paradigmas de programação diferentes. É proposta uma arquitetura baseado na filosofia SOA (Service Oriented Architecture ) para suportar a interoperabilidade entre sistemas IDS. O sistema IDS-NIDIA será adaptado e estendido de acordo com esta filosofia SOA, contendo camadas de serviços web com o propósito de oferecer uma composição de serviço estática entre as camadas de aplicação e o reuso de informações com outros IDS s.
APA, Harvard, Vancouver, ISO, and other styles
42

Karachaliou, Ermioni. "The architectural and iconographic identity of Paliochora on Aegina : an introduction to its Late and Post Byzantine churches." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/the-architectural-and-iconographic-identity-of-paliochora-on-aegina-an-introduction-to-its-late-and-post-byzantine-churches(4d5fdfec-712e-4b7b-a875-b74404fba8cc).html.

Full text
Abstract:
How can we approach the surviving evidence on Paliochora in order for it to become a site of cultural consciousness in a wider medieval context? Its architectural and iconographic identity is hidden in its thirty-four Late and Post Byzantine churches. This thesis constitutes the first complete interdisciplinary approach to this settlement accompanied by a detailed appendix in the second volume. The two parts of this study examine Paliochora through different perspectives which reveal different aspects of its character. Urban planning and individual architectural specificities are examined through the prism of four construction periods associated with political and economic factors. Structural variety and multiplicity raises questions concerning religious functions. The iconography, on the other hand, relies on the general Late Byzantine canons and influences, but demonstrates provincial tendencies and promotes a distinct style of fresco painting. Furthermore, the possible interference of the continuous Western presence creates new aspects for conceptual discussion in both fields. Consequently the three parameters of this comparative approach are underlined, either on an architectural or iconographic level: • Between the different examples in Paliochora • Within the vast array of Greek and Mediterranean ecclesiastical examples • In contrast to Western practices and models. Throughout the text problems of archaeological evidence and archival information are raised. However, this first effort to place and contextualise Paliochora on the map of existing late medieval cities of the Mediterranean is a call for further research in multiple disciplines. It is a survey which will be used as the basic material for any future actions related both to academic knowledge and restoration processes.
APA, Harvard, Vancouver, ISO, and other styles
43

Andersson, Robin. "CAN-bus Multi-mixed IDS : A combinatory approach for intrusion detection in the controller area network of personal vehicles." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43450.

Full text
Abstract:
With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. Instead, with sophisticated methods, we can focus on detecting and preventing attacks from being performed inside a system. The current state of the art of such methods, named intrusion detection systems (IDS), is divided into two main approaches. One approach makes its models very confident of detecting malicious activity, however only on activities that has been previously learned by this model. The second approach is very good at constructing models for detecting any type of malicious activity, even if never studied by the model before, but with less confidence. In this thesis, a new approach is suggested with a redesigned architecture for an intrusion detection system called Multi-mixed IDS. Where we take a middle ground between the two standardized approaches, trying to find a combination of both sides strengths and eliminating its weaknesses. This thesis aims to deliver a proof of concept for a new approach in the current state of the art in the CAN-bus security research field. This thesis also brings up some background knowledge about CAN and intrusion detection systems, discussing their strengths and weaknesses in further detail. Additionally, a brief overview from a handpick of research contributions from the field are discussed. Further, a simple architecture is suggested, three individual detection models are trained and combined to be tested against a CAN-bus dataset. Finally, the results are examined and evaluated. The results from the suggested approach shows somewhat poor results compared to other suggested algorithms within the field. However, it also shows some good potential, if better decision methods between the individual algorithms that constructs the model can be found.
APA, Harvard, Vancouver, ISO, and other styles
44

Pint, Alexander Steven. "Building energy codes and their impact on greenhouse gas emissions in the United States." Kansas State University, 2015. http://hdl.handle.net/2097/20534.

Full text
Abstract:
Master of Science
Architectural Engineering and Construction Science
Russell J. Murdock
The purpose of this study is to identify and explore relationships between the building industry, building energy usage, and how both the industry and the energy usage correspond to greenhouse gas (GHG) emissions in the United States. Building energy codes seek to reduce energy usage and, subsequently, GHG emissions. This study specifically seeks to determine the impact that most current U.S. building energy codes could have on national GHG emissions if widespread adoption and enforcement of those codes were a reality. The report initially presents necessary background information about GHG emissions is first discussed. This establishes the current state of global GHG emissions, the position of the U.S. within the global scale, and what portion of the contribution can be attributed to the building industry. The report also describes the current issues and benefits of building energy codes. An overview of building energy codes evaluation is included, with explanation of the energy analysis used to determine the effectiveness of new building energy codes. In order to determine how to improve the building energy code system, an analysis of ANSI/ASHRAE/IES Standard 90.1-2013 (equivalent to 2015 IECC, the most recent standard available) is conducted to reveal unrealized GHG emission reductions that are expected with adoption and compliance to the newest code. Standard 90.1-2013 is analyzed due to the national popularity of the code relative to other building energy codes. This analysis includes compilation of energy usage intensity, square footage, and current code adoption data throughout the United States. Results showed that the excess GHG emission savings from enhanced adoption and compliance was not significant on a national scale. However, in terms of GHG emissions currently saved by building energy codes, the extra savings becomes more significant, proving that increased adoption and compliance is a worthwhile pursuit. Recommendations are then made for how to increase adoption and compliance. This information will give policymakers improved understanding of the current state of the industry when crafting laws regarding GHG emissions and building energy codes. Furthermore, findings from this study could benefit specific states that are attempting to lower GHG emissions.
APA, Harvard, Vancouver, ISO, and other styles
45

Stockselius, Johan. "Studiepark: Södermalm." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208870.

Full text
Abstract:
Studiepark: Södermalm Rätten till utbildning är en av våra mest värdefulla och bör vara en självklarhet, oberoende av vilket skede i livet man befinner sig i. Statusen på vuxenutbildningar tenderar dock att vara låg i förhållande till andra utbildningsformer och de lokaler där undervisning sker är ofta eftersatta eller förpassade gamla kontorslokaler. Studiepark: Södermalm är ett förslag på en ny byggnad tillägnad vuxenutbildning med målsättning att bli en viktig symbol för vuxenutbildningen och att höja statusen på undervisningsformen. Studiepark: Södermalm är belägen i Fatbursparken på Södermalm i Stockholm där den tillsammans med Oscar I:s minne utgör en del i ett nytt kunskapscentrum. Här hålls dags- och kvällskurser såväl som seminarier i de många lektions- och föreläsningssalarna av varierande storlek. En öppenhet präglar byggnaden, och de rymliga kommunikationsytorna fyller även  funktionen som självstudiesalar för universitets- och högskolestudenter i staden. Att ta en offentlig yta i anspråk medför ett stort ansvar. Med ambition att ge något tillbaka till de människor som redan vistas på platsen, görs de lägre våningarna offentliga med tillgång till bland annat utställningshall, teaterverksamhet, resturang, studievägledning, konferenssalar, grupprum, datorsal och projektionssal. Delar av byggnaden kan anpassas till mässhall vid eventuella evenemang. Öppna och tillgängliga studiesalar försäkrar att byggnaden är kontinuerligt aktiv och skapar liv och rörelse på platsen.
Study Park: Södermalm The right to education is one of our most valuable and should be seen as such regardless of a person’s age. However, the status of adult education in Sweden tends to be lower than that of other forms of education. Venues where the teaching takes place are often outdated and ill-fitted for their purpose. Study Park: Södermalm is a proposal for a new study building dedicated to adult education with the aim of becoming an important symbol for adult education and raising the status of the study form. Study Park: Södermalm is located in Fatbursparken in Södermalm, Stockholm, where it together with the building Oscar I:s Minne forms a new knowledge centre. Courses and seminars will be held both daytime and evenings in the Study Park's many lecture halls of varying sizes. An openness characterizes the building and the spacious communication areas also fill the function of self-study rooms for university and college students in the city. Placing oneself in a public area entails a major responsibility. With the ambition to give something back to the people already on the site, the lower floors are made public with access to an exhibition hall, theatre activities, a restaurant, study guidance, conference rooms, group rooms, computer rooms and a projection room. Parts of the building can be adapted to expo halls at major events. Open and available study rooms ensure that the building is continuously active and bring life and movement on the site.
APA, Harvard, Vancouver, ISO, and other styles
46

Gottschling, Paul Thomas. "To submit is to relate : a study of architectural competitions within networks of practice." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/to-submit-is-to-relate-a-study-of-architectural-competitions-within-networks-of-practice(c3f8961d-94a8-4c91-91e2-935a6dcc4bf9).html.

Full text
Abstract:
This is a study of architectural competitions as they engage with the design practices of architects within the UK and Europe. Since only one firm or one design emerges at the end, and the project programme exists prior to the submissions, there tends to be a gap between programme and practice, past and future, language and situation. It is the aim of this research to investigate what changes in our understanding of architectural practice when we acknowledge that architects work to linear programmes and submit deliverables within the set of relations that make up the competition. In conducting this research I address a gap in the social scientific understanding of architectural practice. While ethnographies of architectural studios have described the way design emerges through an interplay of humans and nonhumans, formats or structures like the competition have not yet become analytical categories in the ethnographic literature. To bridge what seems like a gap between the immaterial world of the competition and the material world of the studio, I draw from actor-network theory to view the competition as a set of relations that include objects and practices. Considering the technology of the competition, I follow five different strands of research. I identify the matters of concern that architects talk about when they talk about competitions; examine the documents involved in administering a competition; follow an atelier at an architectural school where students participate regularly in competitions; observe the Office of Metropolitan Architecture prepare a concept design; and visit an exhibition of submissions. Here I describe the ways in which competitions come together within the practice of architects. This study makes three contributions. First, the study adds to our understanding of architecture as a set of relations, rather than a stable identity. The second contribution has to do with language and practice, demonstrating that ‘big’ categories like ‘building’ nevertheless act within collectives of architects, clients, contractors and so on. A final implication is for methods. Since certain categories exist between sites, organising the activity of actors in different offices across what might be hundreds of miles, ethnographic fieldwork on architecture can become fragmented and multi-sited. The implications of the architectural competition for an ethnographic understanding of architectural practice, then, are to see more and ‘bigger’ collectives within the lives of architects.
APA, Harvard, Vancouver, ISO, and other styles
47

Liotsios, Kyriakos. "3D-Modeling and Energy Simulation of a Single Family House in Southern Greece." Thesis, KTH, Byggvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91394.

Full text
Abstract:
Energy usage deriving from human activities is increasing day by day acting against the quality of the environment and the sustainable use of natural resources. The major impact of these actions is reflected on the quality of daily life. In order to face the challenge of preserving an acceptable balance between human needs and environmental status, the combination of proper design and energy simulation of buildings is the key towards smarter and more sustainable solutions. Solutions that covers a respectable percentage of the current domestic energy needs without further environmental foot printing. In the scope of this project, an existing single-family house in Southern Greece (Heraklion, Crete) is modeled using Revit ® Architecture software and then is simulated with IES® VE (plug-in) in order to give the level of energy intensity. The energy model used is fully harmonized with the new rules set by the "National Regulation for Energy Performance of Buildings - (K.En.A.K)" as it was put in force from October 2010 and onwards, and fully complies with the European Standards (EN ISO) published for the various tasks of building`s thermal performance. The structure and contents presented in this report are in full compliance with the technical directives [31, 32, 33] published by the Technical Chamber of Greece, in favour of the complex task of "Energy Certification of Buildings". The most significant capabilities of sophisticated software tools, like Revit® Architecture, IES® VE, Polysun® and PVsyst®, in favour of sustainable building design and simulation are shown throughout the whole report. Moreover, their valuable contribution is highly acknowledged by the engineers encountered with the task of studying the energy performance of existing or newly constructed buildings in Greece and issuing, the mandatory by law, "Energy Performance Certificates".
APA, Harvard, Vancouver, ISO, and other styles
48

Wulff, Tobias. "Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment." Thesis, University of Canterbury. Computer Science and Software Engineering, 2010. http://hdl.handle.net/10092/5120.

Full text
Abstract:
Voice Over IP (VoIP) telephony is becoming widespread, and is often integrated into computer networks. Because of his, it is likely that malicious software will threaten VoIP systems the same way traditional computer systems have been attacked by viruses, worms, and other automated agents. While most users have become familiar with email spam and viruses in email attachments, spam and malicious traffic over telephony currently is a relatively unknown threat. VoIP networks are a challenge to secure against such malware as much of the network intelligence is focused on the edge devices and access environment. A novel security architecture is being developed which improves the security of a large VoIP network with many inexperienced users, such as non-IT office workers or telecommunication service customers. The new architecture establishes interaction between the VoIP backend and the end users, thus providing information about ongoing and unknown attacks to all users. An evaluation of the effectiveness and performance of different implementations of this architecture is done using virtual machines and network simulation software to emulate vulnerable clients and servers through providing apparent attack vectors.
APA, Harvard, Vancouver, ISO, and other styles
49

Gad, El Rab Mohammed. "Evaluation des systèmes de détection d'intrusion." Phd thesis, Université Paul Sabatier - Toulouse III, 2008. http://tel.archives-ouvertes.fr/tel-00366690.

Full text
Abstract:
Cette thèse vise à contribuer à l'amélioration des méthodes d'évaluation des systèmes de détection d'intrusion (en anglais, Intrusion Detection Systems ou IDS). Ce travail est motivé par deux problèmes actuels : tout d'abord, l'augmentation du nombre et de la complexité des attaques que l'on observe aujourd'hui nécessite de faire évoluer les IDS pour leur permettre de les détecter. Deuxièmement, les IDS actuels génèrent de trop fréquentes fausses alertes, ce qui les rend inefficaces voir inutiles. Des moyens de test et d'évaluation sont nécessaires pour déterminer la qualité de détection des IDS et de leurs algorithmes de détection. Malheureusement, il n'existe pas actuellement de méthode d'évaluation satisfaisante. En effet, les méthodes employées jusqu'ici présentent trois défauts majeurs : 1) une absence de méthodologie rigoureuse, 2) l'utilisation de données de test non représentatives, et 3) l'utilisation de métriques incorrectes. Partant de ce constat, nous proposons une démarche rigoureuse couvrant l'ensemble de l'évaluation des IDS. Premièrement, nous proposons une méthodologie d'évaluation qui permet d'organiser l'ensemble du processus d'évaluation. Deuxièmement, afin d'obtenir des données de test représentatives, nous avons défini une classification des types d'attaques en fonction des moyens de détection utilisés par les IDS. Cela permet non seulement de choisir les attaques à inclure dans les données de test mais aussi d'analyser les résultats de l'évaluation selon les types d'attaques plutôt que sur chaque attaque individuellement. Troisièmement, nous avons analysé un grand nombre d'attaques réelles et de " maliciels " connus, tels que les virus et les vers. Grâce à cette analyse, nous avons pu construire un modèle générique de processus d'attaques qui met en évidence la dynamique des activités d'attaque. Ce modèle permet de générer un nombre important de scénarios d'attaques à la fois réalistes et variés. Les méthodes proposées ont été expérimentées su r deux systèmes de détection d'intrusion très différents, pour montrer la généralité de notre démarche. Les résultats montrent que l'approche proposée permet de surmonter les deux défauts principaux des évaluations existantes, à savoir l'absence de méthodologie et l'utilisation de données non représentatives. Elle permet en particulier de mieux gérer le processus d'évaluation et de choisir les cas de test pertinents pour les types d'IDS et les objectifs de l'évaluation, tout en couvrant une large partie de l'espace d'attaques.
APA, Harvard, Vancouver, ISO, and other styles
50

Guerriero, Annie. "La représentation de la confiance dans l'activité collective Application à la coordination de l'activité de chantier de construction." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2009. http://tel.archives-ouvertes.fr/tel-00558823.

Full text
Abstract:
Les spécificités du secteur de la construction engendrent un contexte de travail coopératif que nous pouvons qualifier d'incertain par nature. L'activité de chantier se caractérise par un mode de production in situ. Dès lors, nombreux sont les dysfonctionnements qui peuvent apparaître. Nous citerons, par exemple, les problèmes liés à la nature du sol, aux intempéries ou encore ceux qui sont propres aux interactions entre les intervenants (ex. fourniture en matériaux, interfaces entre les corps de métier...). Aussi, la coordination repose sur un mélange subtil entre interactions implicites et explicites, où l'organisation prend de multiples configurations (hiérarchique, adhocratique ou transversale), et où la qualité du processus collectif repose sur l'autonomie et le sens des responsabilités de chacun des intervenants. Nous faisons l'hypothèse qu'un tel contexte est largement fondé sur la notion de confiance, car celle-ci a la capacité de réduire la perception du risque et de permettre l'action dans un environnement marqué par de nombreuses incertitudes. En conséquence, nous suggérons un rapprochement entre les outils d'assistance à la coordination et la notion de confiance, et nous proposons une nouvelle approche du pilotage de l'activité collective à partir de la représentation de la confiance. Ce travail de doctorat se structure autour de la notion de «confiance dans le bon déroulement de l'activité». Nous suggérons que celle-ci est dépendante de chacune des dimensions de l'activité collective : sa progression, les acteurs chargés de son exécution, les ouvrages en résultant (et leur difficulté de mise en œuvre), ainsi que les documents nécessaires à sa réalisation. Aussi, notre méthode consiste d'abord en l'identification des divers critères de confiance, consolidés par une étude de terrain. Puis, nous établissons un modèle mathématique destiné à évaluer cette confiance à partir des informations issues d'un contexte de coopération. Sur base de ces éléments, s'en suit la proposition d'un prototype dénommé Bat'iTrust, reposant sur une architecture logicielle multi-vues et orientée services. Pour l'utilisateur, la navigation au sein de ce prototype est guidée par un tableau de bord centré sur le concept de confiance. Enfin, la validation de cette proposition repose sur des enquêtes et une phase d'expérimentation qui nous ont permis de confronter nos résultats à des sujets expérimentaux représentatifs du domaine.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography