Dissertations / Theses on the topic 'Interaction protocol'

To see the other types of publications on this topic, follow the link: Interaction protocol.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Interaction protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Cantero, Gustavo Adolfo Agudelo. "Methodological assessment of the Critical Thermal Maximum (CTmax) of anuran larvae: interaction among the experimental heating rates, ontogeny and body mass." Universidade de São Paulo, 2016. http://www.teses.usp.br/teses/disponiveis/41/41135/tde-21022017-095612/.

Full text
Abstract:
Thermal limits for ectothermic animals displays a picture of the range of body temperatures that is tolerable by individuals before their locomotory capacity is impaired. However, thermal limits are not fixed and specific traits, but labile ones subjected to plastic adjustments and evolutionary change, and also are influenced by intrinsic and extrinsic factors of organisms, as well as by methodological factors inherent to experimental protocols. Even more, the influences of these factors on thermal limits have been commonly addressed independently in different taxa, and the extent by which multiple factors interact and affect thermal limits within taxa is poorly understood. Thus, the main aim of this work was to conduct a methodological assessment of the Critical Thermal Maximum (CTmax) by studying the influences of different experimental heating rates (ΔT’s), ontogeny, body mass, and the interaction among these factors on this trait. This matter was addressed on larvae of Physalaemus nattereri and Hypsiboas pardalis, two anuran species from the São Paulo State, southeastern Brazil, that differ in their phylogenetic background, ecological and life-history characteristics and inhabit environments with different thermal regimes. First, ΔT’s did affect averages and variances of CTmax in a species-specific manner. In addition, it was found a ΔT-dependent decreasing in CTmax at the end of metamorphosis in tadpoles of P. nattereri, because only the metamorphosing tadpoles exposed to the acute ΔT were more sensitive to high temperature than premetamorphic tadpoles. Finally, body mass and ΔT’s interacted on the CTmax of both species along our experimental design. In P. nattereri, body mass affected CTmax through physiology at the slow ΔT’s, whereas in H. pardalis body mass affected CTmax at the acute ΔT through a methodological artifact driven by higher thermal inertia in the group of large tadpoles. This study revealed that ΔT’s, ontogeny and body mass interact on the CTmax of our studied species, and these interactive effects could not have been elucidated by the independent study of each factor. It also highlights the importance of integrating the factors that influence thermal limits of ectothermic animals, especially in the context of climate change
Os limites térmicos para animais ectotérmicos mostram uma imagem do intervalo de temperaturas corporais que é tolerável pelos indivíduos antes de sua capacidade locomotora ser prejudicada. Porém, os limites térmicos não são características fixas e específicas, mas traços lábeis sujeitos tanto a ajustes plásticos quanto a mudanças evolutivas, e são influenciados por fatores intrínsecos e extrínsecos dos organismos, e também por fatores metodológicos associados aos protocolos experimentais. Ainda mais, as influências desses fatores sobre os limites térmicos têm sido comumente abordadas de forma independente em diferentes espécies, e o grau pelo qual múltiplos fatores interagem e afetam os limites térmicos dentro das espécies é pouco compreendido. Assim, o principal objetivo deste trabalho foi conduzir uma avaliação metodológica da Temperatura Crítica Máxima (CTmax) estudando as influências de diferentes taxas de aquecimento experimental (ΔT’s), ontogenia, massa corpórea e a interação entre esses fatores sobre esta característica fisiológica. Este assunto foi abordado em larvas de Physalaemus nattereri e Hypsiboas pardalis, dois espécies de anfíbios anuros encontrados no Estado de São Paulo, sudeste do Brasil, que diferem em sua origem filogenética, características ecológicas e de história de vida, e também habitam ambientes com diferentes regimes térmicos. Primeiro, foi encontrado que as ΔT’s afetaram tanto os valores médios quanto as variâncias da CTmax em ambas as espécies de maneira específica. Além disso, achou-se uma diminuição em CTmax no final da metamorfose que foi dependente da ΔT em larvas de P. nattereri, dado que nessa espécie só os girinos em metamorfose que foram expostos à ΔT aguda foram mais sensíveis às altas temperaturas do que os girinos premetamórficos. Finalmente, a massa corpórea e as ΔT’s interagiram sobre a CTmax em ambas as espécies ao longo do desenho experimental. Em P. nattereri, o efeito da massa corpórea sobre a CTmax foi fisiológico nas ΔT’s lentas, enquanto que em H. pardalis o efeito da massa corpórea na ΔT aguda foi devido a um artefato metodológico causado por maior inércia térmica no grupo de girinos maiores. Este estudo revelou que as ΔT’s, a ontogenia e a massa corpórea interagem sobre a CTmax das espécies estudadas, e estes efeitos interativos não poderiam ter sido elucidados pelo estudo independente de cada fator. Também é salientada a importância de integrar os fatores que influenciam os limites térmicos dos animais ectotérmicos, especialmente no contexto das mudanças climáticas
APA, Harvard, Vancouver, ISO, and other styles
2

Chunangad, Narayanaswamy Ganesh. "On the Interaction of High-Performance Network Protocol Stacks with Multicore Architectures." Thesis, Virginia Tech, 2008. http://hdl.handle.net/10919/32113.

Full text
Abstract:
Multicore architectures have been one of the primary driving forces in the recent rapid growth in high-end computing systems, contributing to its growing scales and capabilities. With significant enhancements in high-speed networking technologies and protocol stacks which support these high-end systems, a growing need to understand the interaction between them closely is realized. Since these two components have been designed mostly independently, there tend to have often serious and surprising interactions that result in heavy asymmetry in the effective capability of the different cores, thereby degrading the performance for various applications. Similarly, depending on the communication pattern of the application and the layout of processes across nodes, these interactions could potentially introduce network scalability issues, which is also an important concern for system designers.

In this thesis, we analyze these asymmetric interactions and propose and design a novel systems level management framework called SIMMer (Systems Interaction Mapping Manager) that automatically monitors these interactions and dynamically manages the mapping of processes on processor cores to transparently maximize application performance. Performance analysis of SIMMer shows that it can improve the communication performance of applications by more than twofold and the overall application performance by 18%. We further analyze the impact of contention in network and processor resources and relate it to the communication pattern of the application. Insights learnt from these analyses can lead to efficient runtime configurations for scientific applications on multicore architectures.
Master of Science

APA, Harvard, Vancouver, ISO, and other styles
3

Cornwell, Jeffrey M. "The Interaction of Sire Fertility and Timing of AI in a Synchronization Protocol." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/42357.

Full text
Abstract:
The objectives of this study were to determine if fixed-timed artificial insemination (FTAI) at two different times, 0 or 24 h after GnRH administration, in a Presynch-Ovsynch protocol influenced the pregnancy rate (PR) when average and high fertility sires were used. Additionally, a second experiment was conducted to determine the effectiveness of CIDR inserts to allow for resynchronization of estrus in cows that did not conceive or maintain the conceptus at FTAI. Lactating Holstein cows (n = 1,457) from two well-managed dairy herds located in the piedmont region of North Carolina were utilized for 12 mo. First artificial insemination (AI) PR differed for fertility group and was 24.1 and 29.2% for average and high fertility group, respectively. Timing of AI did not influence first AI PR and there was no interaction of fertility group and timing of AI. Cows that received a CIDR insert were detected more frequently in estrus during a 4 d period, d 21 to 24, than control cows, 92.5 and 62.0%, respectively. However, the CIDR insert did not increase the detection of estrus compared to control cows over a normal estrus return interval of 7 d, 18 to 24 d after GnRH administration of a FTAI protocol, 28.8 and 34.2% respectively. In conclusion, the use of high fertility sires is a practical recommendation for improving first AI PR and CIDR inserts allowed more cows to be detected in estrus during a shorter interval, but did not increase the estrus detection rate during a normal estrus return interval.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
4

Li, Zheng, and n/a. "A pattern-based approach to the specification and validation of web services interactions." Swinburne University of Technology, 2007. http://adt.lib.swin.edu.au./public/adt-VSWT20070618.115228.

Full text
Abstract:
Web services are designed for composition and use by third parties through dynamic discovery. As such, the issue of interoperability between services is of great importance to ensure that the services can work together towards the overall application goals. In particular, the interaction protocols of a service need to be implemented and used properly so that the service composition can conduct itself in an orderly fashion. There have been significant research efforts in providing rich descriptions for Web services, which includes their behaviour properties. When describing the interaction process/protocols of a service, most of them adopt a procedural or programming style approach. We argue that this style of description for service interactions is not natural to publishing service behaviour properties from the viewpoint of facilitating third-party service composition and analysis. Especially when dealing with service with diverse behaviour, the limit of these procedural approaches become apparent. In this thesis, we introduce a lightweight, pattern/constraint-based declarative approach that better supports the specification and use of service interaction properties in the service description and composition process. This approach uses patterns to describe the interaction behaviour of a service as a set of constraints. As such, it supports the incremental description of a service's interaction behaviour from the service developer's perspective, and the easy understanding and analysis of the interaction properties from the service user's perspective. It has been incorporated into OWL-S for service developers to describe service interaction constraints. We also present a framework and the related tool support for monitoring and checking the conformance of the service's runtime interactions against its specified interaction properties, to test whether the service is used properly and whether the service fulfils its behavioural obligations. The tool involves interception of service interactions/messages, representation of interaction constraints using finite state automata and finite state machine, and conformance checking of service interactions against interaction constraints. As such, we provide a useful tool for validating the implementation and use of services regarding their interaction behaviour.
APA, Harvard, Vancouver, ISO, and other styles
5

Alfredsson, Stefan. "A Cross-Layer Perspective on Transport Protocol Performance in Wireless Networks." Doctoral thesis, Karlstads universitet, Avdelningen för datavetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-9572.

Full text
Abstract:
Communication by wireless technologies has seen a tremendous growth in the last decades. Mobile phone technology and wireless broadband solutions are rapidly replacing the last-hop wireline connectivity for telephones and Internet access.  Research has, however, shown that Internet traffic can experience a performance degradation over wireless compared to wired networks.  The inherent properties of radio communication lead to a higher degree of unreliability, compared to communication by wire or fiber.  This can result in an increased amount of transmission errors, packet loss, delay and delay variations, which in turn affect the performance of the main Internet transport protocols TCP and UDP.  This dissertation examines the cross-layer relationship between wireless transmission and the resulting performance on the transport layer. To this end, experimental evaluations of TCP and UDP over a wireless 4G downlink system proposal are performed.  The experiment results show, in a holistic scenario, that link-level adaptive modulation, channel prediction, fast persistent link retransmissions, and channel scheduling, enables the transport protocols TCP and UDP to perform well and utilize the wireless link efficiently.  Further, a novel approach is proposed where a modified TCP receiver can choose to accept packets that are corrupted by bit errors. Results from network emulation experiments indicate that by accepting and acknowledging even small amounts of corrupted data, a much higher throughput can be maintained compared to standard TCP.
APA, Harvard, Vancouver, ISO, and other styles
6

Bergwik, Emil. "Using the DIAL Protocol for Zero Configuration Connectivity in Cross-Platform Messaging." Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-107625.

Full text
Abstract:
Today's living room context offers more and more possibilities when it comes to when and how to interact with the television and media content offerings. Buzzwords such as "TV Everywhere" is something that both hardware manufacturers, content providers and television networks are pursuing to great lengths. At the core of such marketing schemes is the availability of platform-independent content consumption. In a Utopian setting, the end-user should never have to worry if he or she is currently using a smart TV, tablet, phone or computer to view a video or photos, play music or play games. Taking the concept even further, the devices should also be able to connect and communicate with each other seamlessly. Having for example a television set (first screen) controlled by a mobile phone (second screen) is commonly referred to as companion device interaction and is what this thesis has investigated. More specifically, a way of discovering and launching a first screen application from a second screen application using the zero configuration discovery protocol named DIAL has been implemented into a cross-platform messaging solution. A case study was conducted to gather data about the system and its context as well as what was needed of the framework in terms of architecture design, use cases and implementation details. A proof of concept application was developed for Android that used the proposed framework, showcasing the ease of use and functionality presented in integrating DIAL into such a solution. Since DIAL is so well-documented, easy to understand and is becoming one of the industry standards among consumer electronic manufacturers in terms of device discovery, I believe it should become a standard for so called zero configuration companion device interactivity.
APA, Harvard, Vancouver, ISO, and other styles
7

Tsietsi, Mosiuoa Jeremia. "A structural and functional specification of a SCIM for service interaction management and personalisation in the IMS." Thesis, Rhodes University, 2012. http://hdl.handle.net/10962/d1004864.

Full text
Abstract:
The Internet Protocol Multimedia Subsystem (IMS) is a component of the 3G mobile network that has been specified by standards development organisations such as the 3GPP (3rd Generation Partnership Project) and ETSI (European Telecommunication Standards Institute). IMS seeks to guarantee that the telecommunication network of the future provides subscribers with seamless access to services across disparate networks. In order to achieve this, it defines a service architecture that hosts application servers that provide subscribers with value added services. Typically, an application server bundles all the functionality it needs to execute the services it delivers, however this view is currently being challenged. It is now thought that services should be synthesised from simple building blocks called service capabilities. This decomposition would facilitate the re-use of service capabilities across multiple services and would support the creation of new services that could not have originally been conceived. The shift from monolithic services to those built from service capabilities poses a challenge to the current service model in IMS. To accommodate this, the 3GPP has defined an entity known as a service capability interaction manager (SCIM) that would be responsible for managing the interactions between service capabilities in order to realise complex services. Some of these interactions could potentially lead to undesirable results, which the SCIM must work to avoid. As an added requirement, it is believed that the network should allow policies to be applied to network services which the SCIM should be responsible for enforcing. At the time of writing, the functional and structural architecture of the SCIM has not yet been standardised. This thesis explores the current serv ice architecture of the IMS in detail. Proposals that address the structure and functions of the SCIM are carefully compared and contrasted. This investigation leads to the presentation of key aspects of the SCIM, and provides solutions that explain how it should interact with service capabilities, manage undesirable interactions and factor user and network operator policies into its execution model. A modified design of the IMS service layer that embeds the SCIM is subsequently presented and described. The design uses existing IMS protocols and requires no change in the behaviour of the standard IMS entities. In order to develop a testbed for experimental verification of the design, the identification of suitable software platforms was required. This thesis presents some of the most popular platforms currently used by developers such as the Open IMS Core and OpenSER, as well as an open source, Java-based, multimedia communication platform called Mobicents. As a precursor to the development of the SCIM, a converged multimedia service is presented that describes how a video streaming application that is leveraged by a web portal was implemented for an IMS testbed using Mobicents components. The Mobicents SIP Servlets container was subsequently used to model an initial prototype of the SCIM, using a mUlti-component telephony service to illustrate the proposed service execution model. The design focuses on SIP-based services only, but should also work for other types of IMS application servers as well.
APA, Harvard, Vancouver, ISO, and other styles
8

Blackler, Alethea Liane. "Intuitive interaction with complex artefacts." Queensland University of Technology, 2006. http://eprints.qut.edu.au/16219/.

Full text
Abstract:
This thesis examines the role of intuition in the way that people operate unfamiliar devices, and the importance of this for designers. Intuition is a type of cognitive processing that is often non-conscious and utilises stored experiential knowledge. Intuitive interaction involves the use of knowledge gained from other products and/or experiences. Therefore, products that people use intuitively are those with features they have encountered before. This position has been supported by two initial experimental studies, which revealed that prior exposure to products employing similar features helped participants to complete set tasks more quickly and intuitively, and that familiar features were intuitively used more often than unfamiliar ones. Participants who had a higher level of familiarity with similar technologies were able to use significantly more of the features intuitively the first time they encountered them, and were significantly quicker at doing the tasks. Those who were less familiar with relevant technologies required more assistance. A third experiment was designed to test four different interface designs on a remote control in order to establish which of two variables - a feature's appearance or its location - was more important in making a design intuitive to use. As with the previous experiments, the findings of Experiment 3 suggested that performance is affected by a person's level of familiarity with similar technologies. Appearance (shape, size and labelling of buttons) seems to be the variable that most affects time spent on a task and intuitive uses. This suggests that the cues that people store in memory about a product's features depend on how the features look, rather than where on the product they are placed. Three principles of intuitive interaction have been developed. A conceptual tool has also been devised to guide designers in their planning for intuitive interaction. Designers can work with these in order to make interfaces intuitive to use, and thus help users to adapt more easily to new products and product types.
APA, Harvard, Vancouver, ISO, and other styles
9

Goulart, Ana Elisa Pereira. "Signaling Architectures for the Interaction of the Session Initiation Protocol and Quality of Service for Internet Multimedia Applications." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/6932.

Full text
Abstract:
Interactive multimedia sessions combine requirements of traditional telephony services and Internet applications. This requires call setup, call signaling, negotiation, routing, security, and network resources. Seeking to facilitate the use of quality of service (QoS) mechanisms to users of such applications, this thesis presented new signaling architectures that addressed the interaction of the Session Initiation Protocol (SIP) as the session control signaling protocol and current resource management frameworks. The Differentiated Services (DiffServ) architecture is used as the primary example. The new architectures addressed the roles of SIP agents and proxy servers in subjects such as resource negotiation, call authorization, and end-to-end QoS in heterogeneous networks. First, an architecture based on the use of QoS-enhanced SIP proxies and a SIP-based interface between the application and network layers was developed, implemented in a testbed, and performance enhancements demonstrated. Further studying of the Internet Engineering Task Force (IETF) proposal for the integration of SIP and resource management led to the development of a new signaling scheme, Resource management Overlapped with Answering Delay (ROAD). It explores the SIP user agent interaction with the network in a way that takes advantage of parallel user answering delays and reservation delays. An experimental evaluation of the ROAD scheme showed its call setup delay savings and reduced signaling load. Then, on the interaction of SIP and call admission control, an inter-domain call authorization model that implements the concepts of proxies as gate controllers (QoS-enhanced SIP proxies-GC), and that provides call authorization status and adds more granularity to the authorization process is proposed. This model showed to be scalable in terms of the need to add more resources to compensate for the increasing service load on the servers. Finally, an example framework that applies the new signaling architectures to achieve end-to-end QoS in heterogeneous networks is presented.
APA, Harvard, Vancouver, ISO, and other styles
10

Svanberg, Christoffer, and Anton Westman. "Interaction Design - by the protocol : Combining user-centered design methods for finding user needs in a time-­‐constrained environment." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169594.

Full text
Abstract:
ABSTRACT Today there are lots of different health care computer systems in use. However, according to recent studies many of them lack necessary usability. Within Nordic pediatric cancer care, analogue treatment protocols on paper are currently used, as a complement to the digital medical records and prescription systems. In these protocols, doctors and nurses note information regarding the patient’s treatment. Comments and changes are noted in the margin, which sometimes leads to making the protocol messy and difficult to grasp. Since several people are involved in the handling of the treatment protocols it occasionally happens that the protocol disappears for periods of time. We had two aims with this project. The first was to examine and map requirements for a usable interactive treatment plan for acute lymphoblastic leukemia, ALL. The second was to investigate if our suggested combination of methods would be sufficient to acquire these requirements in a setting where the users, i.e. physicians, were time-­‐constrained.   Based on large variety of theories and methods from educational science and research in human computer interaction, we have conducted a qualitative study, iterating a combination of user-­‐centered design methods, with a revision of the requirements as well as the design following each iteration. The requirements analysis was performed in close collaboration with the doctors at the Astrid Lindgren Children's Hospital, Karolinska University Hospital, Stockholm, Sweden.   Our results indicate that by using a combination of methods from usability engineering and participatory design, a well-­‐defined list of requirements from the doctors could be identified which might be sufficient to develop an interactive prototype for a digital treatment protocol. In addition we found that our method enabled an exchange of knowledge between the designers and the users. In conclusion, these combined methods were suitable for enhancing the software designer’s understanding of the user needs in this time-­‐constrained environment.
APA, Harvard, Vancouver, ISO, and other styles
11

Israel, Emmanuel. "A Study to Investigate the Relationship Among Flow, Social Interaction and ICT Skills with Older Adults During Gameplay." Thesis, Université d'Ottawa / University of Ottawa, 2015. http://hdl.handle.net/10393/32594.

Full text
Abstract:
Although research shows the link between flow and social interaction, this study explores the role of ICT skills in order to experience flow and social interaction. I used constructivism theory as it explains how humans make meaning from personal experiences, social interaction and tools (e.g., language and computer). The theory of flow was applied because it stipulates that people experience flow when they are fully engaged in any activity (Nakamura & Csikszentmihalyi 2002). Four participants were recruited for this study. A pilot study with three stages was conducted to design a research protocol used in the main study. A pre and post-test was answered to determine the significance of ICT skills in relation to the experience of flow and social interaction during gameplay experience. I described the experiences of each participant using a case study approach and all the participants reported flow and social interaction in relation to their level ICT skills. I found that the participant with low ICT score required more social interaction to experience flow and participants with high ICT score required social interaction to maintain flow.
APA, Harvard, Vancouver, ISO, and other styles
12

Walters, Melissa Penaranda. "Establishing a Functional Analysis Protocol for Examining Behavioral Deficits using Social Withdrawal as an Exemplar." Scholar Commons, 2006. http://scholarcommons.usf.edu/etd/3807.

Full text
Abstract:
The purpose of this study was to establish a functional analysis protocol for examining behavioral deficits, using social withdrawal as an exemplar. A review of the Journal of Applied Behavior Analysis over the past 10 years found that although the current behavior analytic literature contains extensive studies that functionally analyze behavioral excesses, there is a limited amount of studies that analyze deficits. The rationale behind this study was the notion that although behavioral deficits are rarely studied, the fact that the participant is capable of the behavior yet fails to engage in it leads to the idea that certain events are functionally maintaining this failure. The method used involved examining two male students identified as socially withdrawn. The approach for functionally analyzing their behavior(s) was based on the conditions described in Iwata et al. (1982/1994). Specifically this study had the following conditions attention, demand/escape, and unstructured play, otherwise known as the control condition. The procedures of this study were predicated on the hypothesis that behavioral deficits respond to social contingencies in a manner similar to many behavioral excesses. Based on the findings of this study, the deficit collectively referred to as "social withdrawal" was responsive to such contingencies. Specifically, social withdrawal appeared to be maintained by adult attention for both participants.
APA, Harvard, Vancouver, ISO, and other styles
13

Osękowska, Ewa A. "Performance Evaluation of Wireless Mesh Networks Routing Protocols." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3712.

Full text
Abstract:
The tremendous growth in the development of wireless networking techniques attracts growing attention to this research area. The ease of development, low installation and maintenance costs and self healing abilities are some of the qualities that make the multi-hop wireless mesh network a promising solution for both - rural and urban environments. Examining the performance of such a network, depending on the external conditions and the applied routing protocol, is the main aim of this research. It is addressed in an empirical way, by performing repetitive multistage network simulations followed by a systematic analysis and a discussion. This research work resulted in the implementation of the experiment and analysis tools, a comprehensive assessment of the simulated routing protocols - DSDV, AODV, OLSR and HWMP, and numerous observations concerning the simulation tool. Among the major findings are: the suitability of protocols for wireless mesh networks, the comparison of rural and urban environments and the large impact of conditions such as propagation, density and scale of topology on the network performance. An unexpected but valuable outcome is the critical review of the ns network simulator.
Mobile number: +48 660144055
APA, Harvard, Vancouver, ISO, and other styles
14

Wanyonyi, David Wafula. "Mobile presentations with interactive chat for m-Learning." Thesis, University of the Western Cape, 2010. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5136_1319004472.

Full text
Abstract:
Using presentations in an m-Learning environment enables delivery of rich content to a mobile phone learner. This study investigated how to prepare and stream presentations from a desktop computer to a mobile phone in near-realtime. It also addressed communication between users using interactive text chat in the same environment. Our analysis of text/podcast-based m-Learning applications revealed limited interactivity and lack of diversity in content streamed. To address this, we developed a mobile-based application that uses a task-timer model to synchronize with a server every n units of time to enable near-realtime streaming of presentation slides between mobile and desktop users. The application included text-based instant messenger. Laboratory experiments investigated the use OpenOffice and PowerPoint presentations and techniques used to convert these presentations into mobile phone compatible formats. Experiments were carried out with smart mobile phones running on a third generation cellular network. We employed transaction-logging techniques in addition to automated image analysis techniques to observe and record data. Analysis of the results revealed using presentations enabled more rich content than text-based models such as short message service-based frameworks and podcasts. Although m-Learning is not yet widely adopted, applications such as the one developed in the study offer high hopes for m-Learning because of the use of rich content and interactivity between users.
APA, Harvard, Vancouver, ISO, and other styles
15

Andersson, Jonatan. "Assessment and Improvement of Initial Learnability in Complex Systems : A Qualitative Study to Promote Intuitive Software Development." Thesis, Linköpings universitet, Interaktiva och kognitiva system, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-131025.

Full text
Abstract:
This Master’s Thesis aimed to assess and propose improvements for initial learnability in Sectra AB’s Picture Archiving Communication System (PACS) by integrating usability engineering and agile software development. Assessing initial learnability and re-designing complex systems is difficult as they have a high skill cap and take longer time to learn in comparison to simpler ones. Further, companies that use agile methodologies often focus on completing small items which might hide the overarching vision of a product that can lead to usability problems. While there are several methods for assessing usability, no research has specifically focused on assessing initial learnability in complex systems. This study however investigates how this may be achieved by combining current methodologies for measuring learnability with usability engineering and agile software development. Initial learnability issues and needs were assessed after evaluating Sectra PACS using 5 participants and analysed using impact mapping as well as conducting a focus group within the organisation that owns the product.
APA, Harvard, Vancouver, ISO, and other styles
16

Nordmark, Peter. "Control Modes In High-Speed Navigation : verifying a new protocol to evaluate team performance in terms of control modes in a joint cognitive system." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96447.

Full text
Abstract:
This thesis presents a study in which an attempt to verify a new protocol for evaluating team performance in terms of control was made, and this on teams performing navigation in high speed in real life, natural contexts. A second objective was to identify key factors for achieving control during high-speed navigation. The study was built upon the theories of Cognitive Systems Engineering and Naturalistic Decision Making (NDM). The study also made a first attempt to expand the protocol with the theories of NDM. A pilot test in the form of a field study was conducted upon military crews driving and navigating the Combat Boat 90H off the coast of Gothenburg, Sweden. The results of the study indicated both teams being in, at lowest, the tactical control mode, and one team occasionally making the transition to the strategic control mode. There were some methodological issues with using the protocol in real life, natural contexts and these were examined. In general, the protocol was found to be applicable in this field. Key factors for achieving control during high-speed navigation could not be properly identified because of contextual problems, but one possible factor was that the use of Hollnagel’s TETO principle appeared to increase control.
I denna rapport presenteras en studie vari ett försök har gjorts att verifiera ett nytt protokoll som utvärderar gruppers prestationsförmåga i termer av kontroll. Protokollet testades på grupper som utförde navigation i hög fart under verkliga och naturliga kontexter med ett andra syfte att identifiera nyckelfaktorer för att uppnå kontroll under navigering i hög fart. Studien byggde på teorier om Cognitive Systems Engineering och Naturalistic Decision Making (NDM). Denna studie var också ett första försök i att expandera protokollet med teorier om NDM. En pilotstudie med protokollet i formen av en fältstudie utfördes på militärbesättningar som körde och navigerade Stridsbåt 90H utanför Göteborgs kust. Studiens resultat indikerade att båda grupperna befann sig som lägst i den taktiska kontrollnivån varav en grupp vid enstaka några tillfällen uppnådde den strategiska kontrollnivån. Det uppstod en del metodologiska problem med att använda protokollet i en verklig och naturlig miljö vilket utvärderades i rapporten. Generellt så gick protokollet att använda på grupper som utförde navigering i hög fart. Nyckelfaktorer för att uppnå kontroll i under navigering i hög fart kunde inte väl identifieras på grund av kontextuella problem, men en möjlig nyckelfaktor ar användandet av Hollnagels TETO-princip, vilket verkade leda till en ökad kontrollnivå.
APA, Harvard, Vancouver, ISO, and other styles
17

Kainda, Ronald. "Usability and security of human-interactive security protocols." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36.

Full text
Abstract:
We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifically, how digests of 4 or more digits can be compared between two or more sys- tems as conveniently as possible while ensuring that issues such as user complacency do not compromise security. We address the research question: given different association scenarios and modes of authentication in HISPs, how can we improve on existing, or design new, empirical channels that suit human and contextual needs to achieve acceptable effective security? We review the literature of HISPs, proposed empirical channels,and usability studies of HISPs; we follow by presenting the methodology of the research reported in this thesis. We then make a number of contributions discussing the effectiveness of empirical channels and address the design, analysis, and evaluation of these channels. In Chapter 4 we present a user study of pairwise device associations and discuss the factors affecting effective security of empirical channels in single-user scenarios. In Chapter 5 we present a user study of group device associations and discuss the factors affecting effective security of empirical channels in multi-user scenarios. In Chapter 7 we present a framework designed for researchers and system designers to reason about empirical channels in HISPs. The framework is grounded in experimental data, related research, and validated by experts. In Chapter 8 we present a methodology for analysing and evaluating the security and usability of HISPs. We validate the methodology by applying it in laboratory experiments of HISPs. Finally, in Chapter 6 we present a set of principles for designing secure and usable empirical channels. We demonstrate the effectiveness of these principles by proposing new empirical channels.
APA, Harvard, Vancouver, ISO, and other styles
18

Fernandez, Jonathan. "Favoriser un apprentissage actif : Effets des tests d’entraînement sur les processus cognitifs et métacognitifs." Thesis, Rennes 2, 2017. http://www.theses.fr/2017REN20047/document.

Full text
Abstract:
Il est aujourd’hui reconnu que la réussite des étudiants à l’université repose sur leurs capacités à autoréguler leur apprentissage, c’est-à-dire à 1) fixer des objectifs adaptés à la tâche, 2) déployer des stratégies d’apprentissage efficaces et 3) vérifier régulièrement si ces objectifs ont été atteints. Or, lorsqu’ils apprennent des documents complexes, ceux-ci ont tendance à traiter passivement l’information et à surestimer la qualité de leur apprentissage. Cette thèse vise à déterminer si le fait d’insérer des tests d’entraînement au sein d’un document multimédia amène les étudiants à traiter plus activement les informations. Pour ce faire, nous avons réalisé quatre expériences au cours desquelles des étudiants recevaient ou non des tests d’entraînement pendant qu’ils apprenaient un cours de neurosciences. Afin d’évaluer les effets des tests sur l’activité cognitive et métacognitive des participants, nous avons combiné un questionnaire d’estimation de l’apprentissage à un protocole de verbalisation. Nos résultats montrent que les participants qui bénéficient de tests estiment plus précisément la qualité de leur apprentissage et obtiennent de meilleures performances que les participants non testés. Par ailleurs, ces meilleures performances s’expliquent par un déploiement de stratégies d’apprentissage plus adaptées à l’exigence de la tâche. Enfin, ces effets bénéfiques disparaissent lorsque l’exigence des tests d’entraînement diffère de celles de l’évaluation finale. L’ensemble de nos résultats permet de mieux comprendre les mécanismes sous-tendant l’effet des tests sur l’apprentissage ainsi que d’identifier les conditions qui favorisent leur efficacité
It is generally accepted that students need to effectively self-regulate their learning to succeed in university, that is to 1) establish appropriate goals, 2) use effective learning strategies and 3) frequently monitor if their goals have been met. Unfortunately, when students learn complex document, they tend to process the information in a passive way and be overconfident regarding the quality of their learning. The purpose of this thesis is to study if inserting regular practice tests in a multimedia document can promote a more active learning. To pursue this thesis’ aim, four experiments were conducted whereby students were exposed to a neuroscience course and were provided with or not, different types of practice tests. We used a judgment of learning questionnaire and a think aloud protocol to assess the impact of practices tests on cognitive and metacognitive processes. Results showed that, compared with control groups, participants in the practice testing groups were significantly less overconfident in their ability to recall recently learned information and performed better on a post-test questionnaire. Furthermore, enhanced learning performance was explained by the use of more efficient learning strategies. However, when test requirement mismatched those of the final test, practice tests brought none of these beneficial effects and was therefore unhelpful for students learning. Overall, the studies’ results gave us a better insight into the psychological mechanism underlying the testing effect on learning and identify the conditions that favor it
APA, Harvard, Vancouver, ISO, and other styles
19

Alim, M. Abdul. "On the interaction of internet routing protocols." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Liu, Chunmei 1970. "Cross-layer protocol interactions in heterogeneous data networks." Thesis, Massachusetts Institute of Technology, 2005. http://hdl.handle.net/1721.1/28918.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Aeronautics and Astronautics, 2005.
Includes bibliographical references (p. 143-148).
(cont.) TCP timeout backoff and MAC layer retransmissions, are studied in detail. The results show that the system performance is a balance of idle slots and collisions at the MAC layer, and a tradeoff between packet loss probability and round trip time at the transport layer. Finally, we consider the optimal scheduling problem with window service constraints. Optimal policies that minimize the average response time of jobs are derived and the results show that both the job lengths and the window sizes are essential to the optimal policy.
Modern data networks are heterogeneous in that they often employ a variety of link technologies, such as wireline, optical, satellite and wireless links. As a result, Internet protocols, such as Transmission Control Protocol (TCP), that were designed for wireline networks, perform poorly when used over heterogeneous networks. This is particularly the case for satellite and wireless networks which are often characterized by high bandwidth-delay product and high link loss probability. This thesis examines the performance of TCP in the context of heterogeneous networks, particularly focusing on interactions between protocols across different layers of the protocol stack. First, we provide an analytical framework to study the interaction between TCP and link layer retransmission protocols (ARQ). The system is modelled as a Markov chain with reward functions, and detailed queueing models are developed for the link layer ARQ. The analysis shows that in most cases implementing ARQ can achieve significant improvement in system throughput. Moreover, by proper choice of protocols parameters, such as the packet size and the number of transmission attempts per packet, significant performance improvement can be obtained. We then investigate the interaction between TCP at the transport layer and ALOHA at the MAC layer. Two equations are derived to express the system performance in terms of various system and protocol parameters, which show that the maximum possible system throughput is 1/e. A sufficient and necessary condition to achieve this throughput is also presented, and the optimal MAC layer transmission probability at which the system achieves its highest throughput is given. Furthermore, the impact of other system and protocol parameters, such as
by Chunmei Liu.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
21

Pryce, Nathaniel Graham. "Component interaction in distributed systems." Thesis, Imperial College London, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.313411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Henriques, Eduardo Manuel Ferreira. "Plataforma interactiva para edifícios inteligentes com controlo preditivo." Master's thesis, Universidade de Évora, 2009. http://hdl.handle.net/10174/18589.

Full text
Abstract:
Esta dissertação desenvolve uma plataforma de controlo interactiva para edifícios inteligentes através de um sistema SCADA (Supervisory Control And Data Acquisition). Este sistema SCADA integra diferentes tipos de informações provenientes das várias tecnologias presentes em edifícios modernos (controlo da ventilação, temperatura, iluminação, etc.). A estratégia de controlo desenvolvida implementa um controlador em cascada hierárquica onde os "loops" interiores são executados pelos PLC's locais (Programmable Logic Controller), e o "loop" exterior é gerido pelo sistema SCADA centralizado, que interage com a rede local de PLC's. Nesta dissertação é implementado um controlador preditivo na plataforma SCADA centralizada. São apresentados testes efectuados para o controlo da temperatura e luminosidade de salas com uma grande área. O controlador preditivo desenvolvido tenta optimizar a satisfação dos utilizadores, com base nas preferências introduzidas em várias interfaces distribuídas, sujeito às restrições de minimização do desperdício de energia. De forma a executar o controlador preditivo na plataforma SCADA foi desenvolvido um canal de comunicação para permitir a comunicação entre a aplicação SCADA e a aplicação MATLAB, onde o controlador preditivo é executado. ABSTRACT: This dissertation develops an operational control platform for intelligent buildings using a SCADA system (Supervisory Control And Data Acquisition). This SCADA system integrates different types of information coming from the several technologies present in modem buildings (control of ventilation, temperature, illumination, etc.). The developed control strategy implements a hierarchical cascade controller where inner loops are performed by local PLCs (Programmable Logic Controller), and the outer loop is managed by the centralized SCADA system, which interacts with the entire local PLC network. ln this dissertation a Predictive Controller is implemented at the centralized SCADA platform. Tests applied to the control of temperature and luminosity in huge­area rooms are presented. The developed Predictive Controller tries to optimize the satisfaction of user explicit preferences coming from several distributed user-interfaces, subjected to the constraints of energy waste minimization. ln order to run the Predictive Controller at the SCADA platform a communication channel was developed to allow communication between the SCADA application and the MATLAB application where the Predictive Controller runs.
APA, Harvard, Vancouver, ISO, and other styles
23

Musaraj, Kreshnik. "Extraction automatique de protocoles de communication pour la composition de services Web." Thesis, Lyon 1, 2010. http://www.theses.fr/2010LYO10288/document.

Full text
Abstract:
La gestion des processus-métiers, des architectures orientées-services et leur rétro-ingénierie s’appuie fortement sur l’extraction des protocoles-métier des services Web et des modèles des processus-métiers à partir de fichiers de journaux. La fouille et l’extraction de ces modèles visent la (re)découverte du comportement d'un modèle mis en œuvre lors de son exécution en utilisant uniquement les traces d'activité, ne faisant usage d’aucune information a priori sur le modèle cible. Notre étude préliminaire montre que : (i) une minorité de données sur l'interaction sont enregistrées par le processus et les architectures de services, (ii) un nombre limité de méthodes d'extraction découvrent ce modèle sans connaître ni les instances positives du protocole, ni l'information pour les déduire, et (iii) les approches actuelles se basent sur des hypothèses restrictives que seule une fraction des services Web issus du monde réel satisfont. Rendre possible l'extraction de ces modèles d'interaction des journaux d'activité, en se basant sur des hypothèses réalistes nécessite: (i) des approches qui font abstraction du contexte de l'entreprise afin de permettre une utilisation élargie et générique, et (ii) des outils pour évaluer le résultat de la fouille à travers la mise en œuvre du cycle de vie des modèles découverts de services. En outre, puisque les journaux d'interaction sont souvent incomplets, comportent des erreurs et de l’information incertaine, alors les approches d'extraction proposées dans cette thèse doivent être capables de traiter ces imperfections correctement. Nous proposons un ensemble de modèles mathématiques qui englobent les différents aspects de la fouille des protocoles-métiers. Les approches d’extraction que nous présentons, issues de l'algèbre linéaire, nous permettent d'extraire le protocole-métier tout en fusionnant les étapes classiques de la fouille des processus-métiers. D'autre part, notre représentation du protocole basée sur des séries temporelles des variations de densité de flux permet de récupérer l'ordre temporel de l'exécution des événements et des messages dans un processus. En outre, nous proposons la définition des expirations propres pour identifier les transitions temporisées, et fournissons une méthode pour les extraire en dépit de leur propriété d'être invisible dans les journaux. Finalement, nous présentons un cadre multitâche visant à soutenir toutes les étapes du cycle de vie des workflow de processus et des protocoles, allant de la conception à l'optimisation. Les approches présentées dans ce manuscrit ont été implantées dans des outils de prototypage, et validées expérimentalement sur des ensembles de données et des modèles de processus et de services Web. Le protocole-métier découvert, peut ensuite être utilisé pour effectuer une multitude de tâches dans une organisation ou une entreprise
Business process management, service-oriented architectures and their reverse engineering heavily rely on the fundamental endeavor of mining business process models and Web service business protocols from log files. Model extraction and mining aim at the (re)discovery of the behavior of a running model implementation using solely its interaction and activity traces, and no a priori information on the target model. Our preliminary study shows that : (i) a minority of interaction data is recorded by process and service-aware architectures, (ii) a limited number of methods achieve model extraction without knowledge of either positive process and protocol instances or the information to infer them, and (iii) the existing approaches rely on restrictive assumptions that only a fraction of real-world Web services satisfy. Enabling the extraction of these interaction models from activity logs based on realistic hypothesis necessitates: (i) approaches that make abstraction of the business context in order to allow their extended and generic usage, and (ii) tools for assessing the mining result through implementation of the process and service life-cycle. Moreover, since interaction logs are often incomplete, uncertain and contain errors, then mining approaches proposed in this work need to be capable of handling these imperfections properly. We propose a set of mathematical models that encompass the different aspects of process and protocol mining. The extraction approaches that we present, issued from linear algebra, allow us to extract the business protocol while merging the classic process mining stages. On the other hand, our protocol representation based on time series of flow density variations makes it possible to recover the temporal order of execution of events and messages in the process. In addition, we propose the concept of proper timeouts to refer to timed transitions, and provide a method for extracting them despite their property of being invisible in logs. In the end, we present a multitask framework aimed at supporting all the steps of the process workflow and business protocol life-cycle from design to optimization.The approaches presented in this manuscript have been implemented in prototype tools, and experimentally validated on scalable datasets and real-world process and web service models.The discovered business protocols, can thus be used to perform a multitude of tasks in an organization or enterprise
APA, Harvard, Vancouver, ISO, and other styles
24

Stergiou, Christos. "A policy based framework for modelling agent interaction protocols." Thesis, University of Liverpool, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.415750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Parrein, Benoît. "Description multiple de l'information par transformation Mojette." Phd thesis, Université de Nantes, 2001. http://tel.archives-ouvertes.fr/tel-00300613.

Full text
Abstract:
La représentation scalable de l'information s'impose aujourd'hui pour supporter l'hétérogénéité d'un réseau interconnecté tel que l'Internet. Le codage de source adopte, pour ce faire, une approche multi-résolution pouvant délivrer progressivement à un utilisateur le contenu de sa requête. Cependant, en supposant au cours de la transmission une gestion de bout en bout des priorités ainsi établies, ces schémas restent sommairement adaptés aux environnements de pertes de paquets et de qualité de service non garantie.
Les codages à description multiple offrent une alternative à la transmission hiérarchisée de l'information en brisant la scalabilité de la source aux abords du canal. Dans cette thèse, nous proposons une méthode originale de description multiple qui réalise une protection différenciée de chaque niveau hiérarchique de la source en fonction des propriétés dynamiques du canal de transmission.
La transformation Mojette (transformation de Radon discrète exacte) est une transformation unitaire qui permet de partager un volume de données en un ensemble plus ou moins redondant de projections équivalentes. L'évolution de ce type d'opérateur initialement utilisé dans un espace continu pour la reconstruction tomographique étend le concept de support d'image à celui de mémoire tampon géométrique pour données multimédias. Ce codage à description multiple, généralisé à N canaux, autorise la reconstruction de la mémoire initiale de manière déterministe par des sous-ensembles de projections dont le nombre caractérise le niveau de protection. Ce schéma est particulièrement adapté au mode de transport par paquets sans contrôle d'intégrité extensible du canal de transmission. La hiérarchie de la source est dans ce cas communiquée sous forme transparente pour le canal via des descriptions banalisées.
L'évaluation du codage est effectuée en comparant les débits engendrés avec ceux d'un code MDS (Maximum Distance Separable) qui fournissent une solution optimale dans le nombre de symboles nécessaires au décodage. La relaxation des propriétés MDS dans un code (1+ε)MDS avec la transformation Mojette demande une légère augmentation de débit au profit d'une complexité réduite.
L'application sur des schémas de compression d'images valide concrètement l'adaptation possible des sources actuelles à un canal de type best-effort. L'utilisation dans un environnement distribué (micro-paiement, stockage distribué de données multimédia) illustre en outre un partage sécurisé de l'information.
En perspectives de ce travail, nous avons abordé l'intégration de cette méthode dans un protocole de transmission scalable multimédia et étudié une version probabiliste du système.
APA, Harvard, Vancouver, ISO, and other styles
26

Mzembe, S. A. T. "Helminth/protozoal interaction and the host response thereto." Thesis, University of Cambridge, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.383849.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

David, Diego Mira. "Protocolos de interação baseados em conhecimento: implementação da plataforma JamSession." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/45/45134/tde-14022013-152250/.

Full text
Abstract:
JamSession foi proposto como uma plataforma para mediar e coordenar, por meio de protocolos de interação baseados em conhecimento, recursos computacionais existentes com o objetivo de compor novos serviços e desenvolver aplicações inovadoras. Entre as principais características da plataforma estão sua base formal e declarativa para permitir análise e verificação formal dos protocolos, alta performance e foco na usabilidade. A plataforma pode ser utilizada, por exemplo, na construção de ambientes inteligentes e no aprimoramento dos serviços de governo eletrônico, onde o JamSession pode atuar mediando a interação entre sistemas oferecidos por órgãos públicos visando a ampliação dos serviços oferecidos. O objetivo deste trabalho é o desenvolvimento da plataforma JamSession e sua aplicação em problemas concretos de integração e coordenação. Entre as aplicações consideradas para validar a plataforma desenvolvida estão a integração de workflows interorganizacionais e a demonstração do uso da plataforma na construção de ambientes virtuais interativos.
JamSession was proposed as a platform to mediate and coordinate, by means of knowledge-based interaction protocols, existing computational resources in order to compose new services and develop innovative applications. Among the main features of the platform are its formal and declarative foundations to provide the means for formal analysis and verification of protocols, high performance and focus on usability. The platform can be used, for instance, to build intelligent environments and to improve e-government services, where JamSession may mediate the interaction between systems offered by public agencies aiming to expand the services provided. The aim of this work is the development of JamSession platform and its application in practical demanding integration and coordination. Among the applications considered to validate the developed platform are the integration of inter-organizational workflows and its use to build interactive virtual environments.
APA, Harvard, Vancouver, ISO, and other styles
28

Vogel, Jürgen. "Consistency algorithms and protocols for distributed interactive applications." [S.l. : s.n.], 2004. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB11312701.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Chen, Bangdao. "Using human interactive security protocols to secure payments." Thesis, University of Oxford, 2012. http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3.

Full text
Abstract:
We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our research by conducting extensive investigations into the payment industry. After interacting with different payment companies and banks, we present two case studies: online payment and mobile payment. We show how to adapt HISPs for payments by establishing the reverse authentication method. In order to properly and thoroughly evaluate different payment examples, we establish two attack models which cover the most commonly seen attacks against payments. We then present our own payment solutions which aim at solving the most urgent security threats revealed in our case studies. Demonstration implementations are also made to show our advantages. In the end we show how to extend the use of HISPs into other domains.
APA, Harvard, Vancouver, ISO, and other styles
30

Forsberg, Sean Michael. "NETWORK CHANNEL VISUALIZING SIMULATOR: A REAL-TIME, 3D, INTERACTIVE NETWORK SIMULATION PLATFORM." DigitalCommons@CalPoly, 2012. https://digitalcommons.calpoly.edu/theses/784.

Full text
Abstract:
With a focus of always being connected, it's become typical for laptops and mobile devices to include multiple wireless network devices. Though the additional network devices have created mobility and versatility of how a user is connected, it is common for only one to be active at any given time. While likely that new mesh protocols will help maximize connectivity and power consumption by utilizing lower-power multi-hop techniques, it is still difficult to visualize these protocols due to the complexity created by each node's simple choices. Further challenges are presented by the variety of network devices which share frequency ranges with different output power, sensitivities, and antenna radiation patterns. Due to the complexity of these configurations and environments, it becomes clear that reproducible simulations are required. While several network simulators have been thoroughly tested over their many years of use, they often lack realistic handling of key factors that affect wireless networks. A few examples include cross-channel interference, propagation delays, interference caused by nodes beyond communication range, channel switching delays, and non-uniform radiation patterns. Another key limitation of these past tools is their limited methods for clearly displaying characteristics of multi-channel communication. Furthermore, these past utilities lack the graphical and interactive functions which promote the discovery of edge cases through the use of human intuition and pattern recognition. Even with their other limitations, many of these simulators are also extendable with new components and simulation abilities. As a result, a large set of protocols and other useful discoveries have been developed. While the concepts are well tested and verified, a new challenge is found when moving code from prototype to production due to code portability problems. Due to the sophistication of these creations, even small changes in code during a protocols release can have dramatic effects on its functionality. Both to encourage quicker development cycles and maintain code validation, it would be advantageous to provide simulation interfaces which directly match that of production systems. To overcome the various challenges presented and encourage the use of innate human abilities, this paper presents a novel simulation framework, Network Channel Visualizing Simulator (NCVS), with a real-time, interactive, 3D environment with clear representation and simulation of multi-channel RF communication through multiple network device types.
APA, Harvard, Vancouver, ISO, and other styles
31

Blair, Christopher Douglas. "Multipoint communication protocols : a transport service for real-time group interaction." Thesis, University of Cambridge, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.359664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Dunn-Davies, Hywel. "A Diagrammatic Formalism for the Modular Representation of Agent Interaction Protocols." Thesis, Imperial College London, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.511872.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Canterbury, Michael G. "An automated approach to Distributed Interactive Simulation (DIS) protocol entity development." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA305699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Řezník, Jaroslav. "Sdílená tabule." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235957.

Full text
Abstract:
The aim of the "Shared Board" project is to design and implement an application that will allow a real-time collaboration on workgroup projects in a network environment. The communication can be accomplished using Instant Messaging or multimedia whiteboard with a possibility of drawing, attaching interactive objects and combined with voice and video communication. The term project part solves utilization of interactive whiteboards, design of communication protocol and grafical user interface. Implementation is solved as masters thesis part.
APA, Harvard, Vancouver, ISO, and other styles
35

Thurmer, Kate. "Worst case interactive communication among three parties." Thesis, Boston University, 2014. https://hdl.handle.net/2144/21263.

Full text
Abstract:
Thesis (M.Sc.Eng.) PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
This thesis extends existing work on worst-case two party interactive communication to three parties. PX, PY and PZ know random variables X, Y and Z, respectively, and all parties know the joint distribution, p(x; y; z). Using an agreed-upon protocol, the parties communicate over one or more error-free channels. The objective is for PZ to learn X and Y , and cost is measured in worst-case total information bits transmitted. In the two party case, where PZ must learn only X, interactive protocols (in which PZ may send bits) can reduce the cost to approximately the log of the cost when only PX may transmit (Orlitsky, 1990). In the three party case, PZ can learn X and Y separately, however this is not necessarily optimal. Can a three party protocol provide a cost savings over two separate two party protocols? We describe a joint protocol based on that of Naor et al. (Naor et al., 1993) for communicating X and Y in parallel and show that it can provide at most a constant factor savings. We also describe a sequential protocol in which PZ first learns Y and then uses this knowledge to reduce the cost of subsequently learning X. Although there are input distributions for which this type of protocol can provide more substantial savings, we show that for a large fraction of all input distributions, any three party protocol can provide at most a constant factor savings over two separate two party protocols. Finally, we increase the number of parties and show that for some input distributions multi-party interaction can yield a better than constant factor savings.
2031-01-01
APA, Harvard, Vancouver, ISO, and other styles
36

Cavalaris, James George 1975. "Optimizing the data transmission protocols for remote interactive microscopy." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/50424.

Full text
Abstract:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.
Includes bibliographical references (leaves 57-59).
by James George Cavalaris.
S.B.and M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
37

Lord, Simon. "The interactions of pesticides with free-living protozoa." Thesis, University of Bath, 1986. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.760558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Martin, Paul William. "Distributed opportunistic argumentation guided by autonomous agent interaction." Thesis, University of Edinburgh, 2011. http://hdl.handle.net/1842/4880.

Full text
Abstract:
Within a distributed system, autonomous agents may find it necessary to cooperate in order to achieve their objectives. Interaction protocols provide standard frameworks within which to conduct common classes of interaction, but they are only useful when the agents using them have a common interpretation of the constraints imposed by those protocols. In open systems, where there are no system-wide objectives and components are contributed from a variety of sources, this is difficult to ensure. An agent within a sufficiently complex environment will find it necessary to draw inferences from information sources of varying integrity and completeness. Given flawed or incomplete information, it may be necessary for an agent to resort to nonmonotonic reasoning in order to be able to make concrete decisions within limited windows of opportunity. This can be expected to create inconsistencies in the joint beliefs of agents which can only be repaired by dialogue between peers. To verify and repair all possible sources of inconsistency is impractical for any sizable body of inference however—any belief revision must therefore be subject to prioritisation. In this thesis, we introduce a mechanism by which agents can perform opportunistic argumentation during dialogue in order to perform distributed belief revision. An interaction portrayal uses the protocol for a given interaction to identify the logical constraints which must be resolved during the interaction as it unfolds. It then compares and reconciles the expectations of agents prior to the resolution of those constraints by generating and maintaining a system of arguments. The composition and scope of arguments is restricted in order to minimise the information exchange whilst still trying to ensure that all available admissible viewpoints are adequately represented immediately prior to any decision. This serves both to make interaction more robust (by allowing agents to make decisions based on the distributed wisdom of its peer group without being explicitly directed by a protocol) and to reconcile beliefs in a prioritised fashion (by focusing only on those beliefs which directly influence the outcome of an interaction as determined by its protocol).
APA, Harvard, Vancouver, ISO, and other styles
39

Sharma, Divya. "Interaction-Aware Actual Causation: A Building Block for Accountability in Security Protocols." Research Showcase @ CMU, 2015. http://repository.cmu.edu/dissertations/726.

Full text
Abstract:
Protocols involving multiple agents and their interactions are ubiquitous. Protocols for tasks such as authentication, electronic voting, and secure multi-party computation ensure desirable security properties if participating agents follow their prescribed programs. However, if some agents choose to deviate from their prescribed programs and a security property is violated, it is important to hold agents accountable, i.e. assign blame for their choices and actions, and to fix deficiencies in the protocol design. Prior work in accountability has focused primarily on detecting or punishing deviations. This dissertation proposes a novel interaction-aware approach to actual causation (i.e., the identification of particular agents’ choices to deviate, and interactions which caused a specific violation). We propose this approach as a useful building block for accountability in interacting multi-agent systems, including but not limited to security protocols. The definitions of actual cause in this dissertation are inspired by prior work on actual causation in philosophy, law, and computer science. However, prior frameworks do not account for the program dynamics that arise in protocol-based settings and do not naturally capture agent interactions and agents’ choices to deviate. Motivated by these applications and challenges, we make two main contributions. First, we propose a theory of actual causation with choice and interaction as key components. Specifically,we define in an interacting program model, what it means for a sequence of program expressions (modeling choices, actions and interactions) to be an actual cause of a violation. We demonstrate that our theory significantly advances the state-of-the-art in the research area of actual causation by combining process-oriented and counterfactual-based viewpoints in prior work. A careful treatment of interaction and choice enables us to cleanly deal with a known set of issues that plague extant theories, including expressing concise interaction models and over-permissive counterfactual-based definitions. Second, we demonstrate the value of this theory in the domain of security and privacy protocols, by proving that violations of a specific class of safety properties always have an actual cause. We also present a sound technique for establishing program actions as actual causes. Additionally, we provide a causal analysis of a representative protocol, designed to address weaknesses in the current public key certification infrastructure. Our theory clearly distinguishes between deviances and actual causes which is important from the standpoint of accountability
APA, Harvard, Vancouver, ISO, and other styles
40

Aguerreche, Laurent. "Partage d'interactions en environnements virtuels : de nouvelles techniques collaboratives basées sur un protocole de dialogue générique." Phd thesis, INSA de Rennes, 2010. http://tel.archives-ouvertes.fr/tel-00514269.

Full text
Abstract:
La réalité virtuelle permet à des utilisateurs de manipuler des objets virtuels depuis un même lieu ou des sites géographiques distants. Toutefois, un objet virtuel ne peut souvent être manipulé que par une seule personne à la fois. Dans cette thèse, nous définissons un protocole d'interaction décrivant le dialogue entre des outils d'interaction et des objets interactifs. Ce protocole basé messages gère les interactions locales ou distantes sur des objets interactifs en mono et multi-utilisateurs. Il inclut également une gestion des permissions pour les accès des outils d'interaction. Par ailleurs, le développement de ce protocole a permis de définir ce que sont des outils d'interaction et des objets interactifs. Cette caractérisation a donné lieu à une implémentation reposant sur un ensemble de composants logiciels réutilisables qui permettent notamment à un outil d'interaction de modifier la méthode de sélection et de modification d'objets interactifs, et à un objet interactif de modifier son comportement lorsqu'il est manipulé. De plus, cette caractérisation a permis de proposer des extensions du format COLLADA afin d'y incorporer une gestion d'interactions collaboratives. Une nouvelle technique d'interaction multi-utilisateurs est proposée. Elle déduit des mouvements selon 6 degrés de liberté à partir des positions (sans les orientations) de 3 mains virtuelles. Cette technique permet donc à deux ou trois utilisateurs de manipuler ensemble un objet virtuel. La possibilité d'un positionnement précis des mains virtuelles d'un utilisateur lui permet de mieux imiter la réalité. En effet, selon les positionnements des mains, le ressenti de l'utilisateur lors de la manipulation d'un objet, en particulier des objets encombrants, peut varier. Cette technique cherche donc à obtenir des placements des mains et des gestes réalistes chez l'utilisateur. Son implémentation a été réalisée au dessus du protocole d'interaction. Un nouveau concept d'interface tangible reconfigurable pour des interactions en mono ou multi-utilisateurs est également proposée. Cette interface constitue une solution pour la manipulation d'objets virtuels 3D en approximant leur forme. En effet, l'interface tangible reconfigurable, nommée RTD, propose un maillage physique reconfigurable constitué de points de manipulation à placer sur un objet virtuel, tels des points d'accroche. Ce maillage de points esquisse ainsi l'objet à manipuler. Deux sortes de RTD sont illustrées dans cette thèse. Une première sorte est de forme triangulaire. Elle est nommée RTD-3 et comporte donc trois points de manipulation. Les expérimentations effectuées montrent une nette préférence des utilisateurs envers l'usage de cette technique plutôt que celui des techniques classiques de la réalité virtuelle telles que la moyenne de mouvements et la séparation des degrés de liberté selon les utilisateurs. Une deuxième sorte de RTD comporte quatre points de manipulation et se trouve sous deux versions. Le RTD-4 plan place ses quatre points sur un plan et permet d'obtenir un quadrilatère. Le RTD-4 non-plan dispose en ses quatre points de manipulation d'articulations permettant d'obtenir un tétraèdre. Une forme 3D pour le RTD devrait conduire à une meilleure correspondance entre la forme du RTD et la forme de l'objet virtuel à manipuler.
APA, Harvard, Vancouver, ISO, and other styles
41

Wade, Richard John. "The design and simulation of a transport protocol for interactive network applications." Thesis, University of Leeds, 2000. http://etheses.whiterose.ac.uk/1290/.

Full text
Abstract:
The Internet is currently an IP datagram network, which uses the Transmission Control Protocol (TCP) for guaranteed data delivery. In addition to providing a reliable data transport layer, TCP aids the stability of a large scale internetwork through congestion detection and avoidance algorithms. Since TCP's inception in 1981, both the Internet and the applications which use it, have evolved. The result is a broad spectrum of data traffic, being transported by protocols which were developed twenty or more years previously. Increasingly, the traffic being carried over the Internet is part of an interactive client/server session, established between hosts on widely separated networks. The number of router hops between such hosts means that an aggressive transport protocol for application data may attempt to send data which exceeds the bottleneck capacity of a given network path. The result is packet loss which, for a guaranteed protocol, implies retransmission of data. Recent research has shown that currant implementations of TCP, based on the original TCP algorithms, are inappropriate for the transportation of modern Internet traffic. The thesis is concerned with the design, modelling, simulation and study, of an experimental transport protocol. We aim to address the issues face by current TCP implementations when transporting short, bursty, variable bit-rate, or bulk data in congested environments. In doing so, alternative methods of connection initialisation, flow control and congestion avoidance are implemented and simulated. Through simulation with bulk, variable bit-rate and live HTTP trace data, we show how our experimental protocol is able to deliver data with successful throughput comparable with currently implementations of TCP. Due to its modified startup and congestion avoidance algorithms, however, it does so with significantly reduced packet loss and overall packet transmissions.
APA, Harvard, Vancouver, ISO, and other styles
42

Faulkner, Edward A. 1980. "Interactions between TCP and link layer protocols on mobile satellite links." Thesis, Massachusetts Institute of Technology, 2004. http://hdl.handle.net/1721.1/33142.

Full text
Abstract:
Thesis (M. Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2004.
Includes bibliographical references (p. 69-73).
High speed satellite-based data networks are highly desirable for a variety of mobile applications. In order to inter-operate with existing networks, satellite-based systems must support TCP/IP traffic. However, TCP performs poorly on land-mobile satellite channels because of large propagation delays and frequent correlated packet loss. The use of a link layer ARQ protocol can improve TCP performance by insulating TCP from data. loss. However, the interactions between TCP and link layer protocols are not well understood. This thesis describes an emulation-based study of a mobile satellite link that explores the interactions between TCP and link layer ARQ.
y Edward A. Faulkner, IV.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
43

Adolfsson, Sofie. "’The Big Five of Teamwork’ i en flygtrafikledningsdomän : En observationsstudie på Arlanda ATCC." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-149824.

Full text
Abstract:
Idag är många branscher beroende av ett gediget teamwork. Det finns dock ett behov av objektiva mätsystem för teamwork och därför har detta projekt som syfte att skapa och testa ett observationsprotokoll utifrån den teoretiska modellen ’The Big Five of Teamwork’ framtagen av Salas, Sims & Burke (2005). Observationsprotokollet användes för att observera teamwork mellan två flygledare på Arlanda ATCC. Därefter fick flygledarna svara på en enkät för att bidra med subjektiva aspekter från modellen. Totalt genomfördes 15 stycken strukturerade observationer. Resultatet visade att det är möjligt att skatta teamwork på flygledare med hjälp av ett observationsprotokoll baserat på sex av åtta komponenter, där inte teamorientering och gemensam mental modell ingick. Komponenterna visade sig vara mer än bara ett observerbart beteende och enbart observationer frambringar inte en rättvis bild över komponenten. Resultatet visade också på att flygledarna själva upplever samtliga komponenter som en del av arbetet. Observationerna visade att samarbetet kunde se olika ut och skilja sig från team till team, och att flygledarna anpassar sig efter varandras behov.
Today, many industries are dependent on a solid teamwork. However, there is a need for objective measurement assessment for teamwork and therefore this project aims to create and test an observation protocol based on the theoretical model ’The Big Five of Teamwork’ compiled by Salas, Sims & Burke (2005). The observation protocol was used to observe teamwork between two air traffic controllers at Arlanda ATCC. After the observations the air traffic controllers answered a survey to receive subjective aspects from the model. A total of 15 structured observations were conducted. The results revealed that it’s possible to estimate teamwork on air traffic controllers using an observation protocol based on six of eight components, where team orientation and shared mental model were not included. The components appeared to be more than just an observable behavior, thus only observations does not give a fair picture of the component. The result also showed that air traffic controllers themselves perceive all components as a part of the work. The observations showed that the cooperation could look different and differ from team to team, and that air traffic controllers adapt to each other’s needs.
APA, Harvard, Vancouver, ISO, and other styles
44

Chesani, Federico <1975&gt. "Specification, execution and verification of interaction protocols: an approach based on computational logic." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2007. http://amsdottorato.unibo.it/392/.

Full text
Abstract:
Interaction protocols establish how different computational entities can interact with each other. The interaction can be finalized to the exchange of data, as in 'communication protocols', or can be oriented to achieve some result, as in 'application protocols'. Moreover, with the increasing complexity of modern distributed systems, protocols are used also to control such a complexity, and to ensure that the system as a whole evolves with certain features. However, the extensive use of protocols has raised some issues, from the language for specifying them to the several verification aspects. Computational Logic provides models, languages and tools that can be effectively adopted to address such issues: its declarative nature can be exploited for a protocol specification language, while its operational counterpart can be used to reason upon such specifications. In this thesis we propose a proof-theoretic framework, called SCIFF, together with its extensions. SCIFF is based on Abductive Logic Programming, and provides a formal specification language with a clear declarative semantics (based on abduction). The operational counterpart is given by a proof procedure, that allows to reason upon the specifications and to test the conformance of given interactions w.r.t. a defined protocol. Moreover, by suitably adapting the SCIFF Framework, we propose solutions for addressing (1) the protocol properties verification (g-SCIFF Framework), and (2) the a-priori conformance verification of peers w.r.t. the given protocol (AlLoWS Framework). We introduce also an agent based architecture, the SCIFF Agent Platform, where the same protocol specification can be used to program and to ease the implementation task of the interacting peers.
APA, Harvard, Vancouver, ISO, and other styles
45

Mardare, Cornelia. "Interactions of Mycobacterium bovis with protozoa and the occurrence of Mycobacterium bovis in environmental protozoa." Thesis, University of Surrey, 2010. http://epubs.surrey.ac.uk/844633/.

Full text
Abstract:
Bovine tuberculosis is in the UK a persistent disease, affecting cattle and badgers. The latter is suspected to be a reservoir for Mycobacterium bovis but the transmission between badgers and cattle remains unclear. Mycobacteria have been shown to survive ingestion by protozoa and some even multiplied inside amoebas. The aim of this study was to investigate some interactions of Acanthamoeba castellanii and Tetrahymena pyriformis with M bovis. Firstly, the long term survival of the bacilli in protozoa was monitored. Secondly, it was investigated whether bacilli internalized in protozoa cysts are protected from hypochlorous acid and desiccation. Thirdly, the identification of M bovis in environmental protozoa isolated from badger latrines was attempted. The long term incubation of M. bovis with A. castellanii showed that the amoebas had a negative effect on the survival of virulent M. bovis. M. bovis was not detectable after 6 months of coincubation but remained viable at high concentrations in the control experiments. This effect however, could not be seen in T. pyriformis. Cysts of A. castellanii did not protect M bovis from hypochlorous acid and desiccation. Results indicate that M. bovis was more susceptible to hypochlorous acid after the encystment in comparison with the controls. These findings suggest that A. castellanii contributes to the decrease of M. bovis and therefore, it can be suggested that protozoa might have a negative impact on the survival M. bovis in the environment. In one of the samples taken from Woodchester Park, acid fast rods could be identified. Acid fast microorganisms were also identified in trophozoites of protozoa. This indicates that trophozoites of enviromnental protozoa might be carrier of mycobacteria and possibly M. bovis. An infection with bacilli-containing trophozoites might therefore be a potential route of transmission between the enviromnent and animals.
APA, Harvard, Vancouver, ISO, and other styles
46

Moreno, Ana Maria Biotechnology &amp Biomolecular Sciences Faculty of Science UNSW. "Understanding bacteria-protozoa interactions: from grazing resistance mechanisms to carbon flow in bacteria-protozoa food webs." Publisher:University of New South Wales. Biotechnology & Biomolecular Sciences, 2008. http://handle.unsw.edu.au/1959.4/41446.

Full text
Abstract:
Bacteria-protozoa interactions are one of the oldest between prokaryotic and eukaryotic organisms. As such, their study offers a unique opportunity to understand the different relationships that have evolved between them, including pathogenesis, and how their interaction can affect some important processes, such as wastewater treatment. In the first part of the work described here, the grazing defence mechanisms employed by Pseudomonas aeruginosa against the surface grazer, Acanthamoeba castellanii, were investigated. P. aeruginosa cells from early logarithmic growth and stationary phase were found to use different defence strategies. The type-III secretion system (T3SS) was found to be responsible for cytotoxicity of early logarithmic growth cells against A. castellanii. Of the three exotoxins produced by P. aeruginosa PA99, the phospholipase ExoU was found to make the greatest contribution to bacterial toxicity against the amoebae. Interestingly, a PA99null mutant that does not produce any known exotoxins but synthesises a secretion apparatus, was also found to be toxic to the amoeba, suggesting that the T3SS was being used to translocate other unknown toxins. Quorum sensing regulated virulence factor production was found to be involved in the grazing defence response of stationary phase P. aeruginosa cells. A. castellanii was found to be most susceptible to hydrogen cyanide and elastase produced during late logarithmic and stationary phase. In the second part, a stable isotope probing method was developed to investigate carbon flow through bacteria-protozoa food webs in activated sludge. The method was subsequently used to track carbon from bicarbonate and acetate through bacteria-orotozoa food webs under ammonia oxidising and nitrate reducing conditions. It was found that the Peritrich ciliate Campanella umbellaria, dominated the acquisition of carbon from bacteria with access to CO2 under ammonia oxidising conditions. Thus it appears that some of these bacteria must live in the plankton, as C. umbellaria is a filter feeder. No specific protozoan groups were found to dominate carbon acquisition from bacteria with access to acetate, under nitrate reducing conditions, probably due to label dilution. Overall the results presented here showed how bacteria-protozoa interactions have shaped infectious processes in higher eukaryotes, and the dynamics of carbon flow in activated sludge.
APA, Harvard, Vancouver, ISO, and other styles
47

McCreadie, Christopher Andrew. "Widening stakeholder involvement : exploiting interactive 3D visualisation and protocol buffers in geo-computing." Thesis, Abertay University, 2014. https://rke.abertay.ac.uk/en/studentTheses/c26f344f-29d1-4eea-8879-b83862c63143.

Full text
Abstract:
Land use change has an impact on regional sustainability which can be assessed using social, economic and environmental indicators. Stakeholder engagement tools provide a platform that can demonstrate the possible future impacts land use change may have to better inform stakeholder groups of the impact of policy changes or plausible climatic variations. To date some engagement tools are difficult to use or understand and lack user interaction whilst other tools demonstrate model environments with a tightly coupled user interface, resulting in poor performance. The research and development described herein relates to the development and testing of a visualisation engine for rendering the output of an Agent Based Model (ABM) as a 3D Virtual Environment via a loosely-coupled data driven communications protocol called Protocol Buffers. The tool, named Rural Sustainability Visualisation Tool (R.S.V.T) is primarily aimed to enhance nonexpert knowledge and understanding of the effects of land use change, driven by farmer decision making, on the sustainability of a region. Communication protocols are evaluated and Protocol Buffers, a binarybased communications protocol is selected, based on speed of object serialization and data transfer, to pass message from the ABM to the 3D Virtual Environment. Early comparative testing of R.S.V.T and its 2D counterpart RepastS shows R.S.V.T and its loosely-coupled approach offers an increase in performance when rendering land use scenes. The flexibility of Protocol Buffer’s and MongoDB are also shown to have positive performance implications for storing and running of loosely-coupled model simulations. A 3D graphics Application Programming Interface (API), commonly used in the development of computer games technology is selected to develop the Virtual Environment. Multiple visualisation methods, designed to enhance stakeholder engagement and understanding, are developed and tested to determine their suitability in both user preference and information retrieval. The application of a prototype is demonstrated using a case study based in the Lunan catchment in Scotland, which has water quality and biodiversity issues due to intense agriculture. The region is modelled using three scenario storylines that broadly describe plausible futures. Business as Might Be Usual (BAMBU), Growth Applied Strategy (GRAS) and the Sustainable European Development Goal (SEDG) are the applied scenarios. The performance of the tool is assessed and it is found that R.S.V.T can run faster than its 2D equivalent when loosely coupled with a 3D Virtual Environment. The 3D Virtual Environment and its associated visualisation methods are assessed using non-expert stakeholder groups and it is shown that 3D ABM output is generally preferred to 2D ABM output. Insights are also gained into the most appropriate visualisation techniques for agricultural landscapes. Finally, the benefit of taking a loosely-coupled approach to the visualisation of model data is demonstrated through the performance of Protocol Buffers during testing, showing it is capable of transferring large amounts of model data to a bespoke visual front-end.
APA, Harvard, Vancouver, ISO, and other styles
48

Wang, Tsomg-Niang 1953. "A modular prolog representation of a TCP protocol finite state machine." Thesis, The University of Arizona, 1987. http://hdl.handle.net/10150/276580.

Full text
Abstract:
This paper describes a Protocol Finite State Machine (PFSM) for implementing communication protocols. Our objective is to develop and implement a general model for communication protocols based on the principles of finite state machines and make the design of transport entity more modular and easier to maintain and modify. We have designed an inference method and knowledge representation, based on semantic networks, for implementing this model. We have added interactive capability and automatic error detection to check for invalid external events and other types of errors in our model. PFSM consists of one or more knowledge bases depicting the state machine model for each communication protocol, an inference engine that uses the knowledge base(s), a working memory, a knowledge acquisition subsystem to gather the data required to build the knowledge base(s), a dialog subsystem to conduct an interactive conversation with the user(s), and an explanation subsystem to explain the inferencing mechanism. (Abstract shortened with permission of author.)
APA, Harvard, Vancouver, ISO, and other styles
49

Jarrar, Raed Ghannam. "Image-based rendering protocols for remote interactive walkthroughs on mobile devices." Thesis, University of Ottawa (Canada), 2009. http://hdl.handle.net/10393/28227.

Full text
Abstract:
The exploration of virtual environments in wireless mobile media devices has attracted the attention of researchers and developers mainly due to its potential applications in a variety of areas including entertainment, training, security, e-learning, etc. However, current technology of mobile devices lack the proper resources to handle complex and realistic 3D virtual environments. There has been a number of proposed ideas to solve this issue. The existing approaches use techniques that either employ limited user navigation modes or do not perform satisfactorily for interactive applications. In this thesis, we propose a new protocol that offers the user a richer navigation by pre-streaming the necessary imagery data to generate new views as the user wanders within the 3D environment. We introduce the idea of key partial panoramas, i.e., panorama segments that cover movements in any direction by simply strafing from an appropriate key partial panorama and streaming the amount of lost pixels. We have implemented our ideas and evaluated it against two well-known approaches. Experimental results show that our solution outperforms the selected approaches by minimizing the delay between image updates and by allowing a more complex navigation scheme than previous works.
APA, Harvard, Vancouver, ISO, and other styles
50

Zeswitz, Steven Randall. "NPSNET integration of distributed interactive simulation (DIS) protocol for communication architecture and information interchange /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA275061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography