Dissertations / Theses on the topic 'NFF'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'NFF.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bolinder, Richard. "Atmospheric Radiation Effects Study on Avionics : An Analysis of NFF Errors." Thesis, Linköpings universitet, Programvara och system, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96726.
Full textZadnik, Elizabeth, and n/a. "In disunity, weakness." University of Canberra. Management, 1990. http://erl.canberra.edu.au./public/adt-AUC20061112.112712.
Full textHalpin, Darren Richard, of Western Sydney Hawkesbury University, Faculty of Environmental Management and Agriculture, and School of Agriculture and Rural Development. "Authenticity and the representative paradox: the political representation of Australian farmers through the NFF family of interest groups." THESIS_FEMA_ARD_Halpin_D.xml, 1999. http://handle.uws.edu.au:8081/1959.7/22.
Full textDoctor of Philosophy (PhD)
Halpin, Darren Richard. "Authenticity and the representative paradox : the political representation of Australian farmers through the NFF family of interest groups /." View thesis View thesis, 1999. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030527.163228/index.html.
Full textLiu, Yanhan. "mm Wave Near Field Spot Focus Technique in Free Space Dielectric Properties Evaluation Method." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-298023.
Full textRadom används för att skydda känsliga antennsystem från omgivningen. Det är viktigt att estimera permittiviteten av radom innan de designas. Med korrekt permittivitet kan radomets inverkan på systemet räknas ut. I det här projektet används en fri-rymdsmetod för att mäta permittivitet. Fri-rymdsmetoden har fördelarna av att vara kontaktfri och icke-invasiv, vilket gör den lämplig för permittivitetmätning av materialskivor. Med den här metoden placeras en materialskiva mellan två antenner. Permittiviteten kan beräknas från S-parametrarna mellan antennerna. För att undvika diffraktion från kanten av materialskivan används närfältsfokuserade (NFF) antenner i fri-rymdsmetoden. NFF antenner har en fokalpunkt i närfältet. Kantdiffraktionen minskas om materialskivan placeras i fokalpunkten av NFF antennen. Mätningarna efterbehandlas med en genetisk algoritm (GA). Denna metod gissar värden på permittiviteten. Ett optimalt värde räknas fram iterativt. Jämfört med specificerad permittivitet från tillverkaren skiljer sig fri-rymdsmätningarna i denna avhandling i medeltal 2.8% i realdelen för den relativa permittiviteten och 34.14% i förlusttangent. Felet i mätningen påverkas av flera faktorer, som fel i mätningen av materialskivans tjocklek och fel i mätuppställningen.
Bartels, Myriam. "Untersuchung molekularer Mechanismen der NF-kB/NRF- [NF-Kappa-B-NRF-] (NF-kB-reprimierender-Faktor)-Interaktion [(NF-Kappa-B-reprimierender-Faktor)-Interaktion] und ihre Rolle bei der Transkriptionsregulation." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=983762392.
Full textHarward, Gregory Brent. "Suitability of the NIST Shop Data Model as a Neutral File Format for Simulation." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd899.pdf.
Full textGennaro, Giuseppa. "Caractérisation de nifF une flavodoxine nif-spécifique chez la bactérie photosynthetique Rhodobacter capsulatus." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape2/PQDD_0018/NQ53281.pdf.
Full textSimsa, Ruth. "Repression of the Spanish Protest Movement - Mechanisms and Consequences." De Gruyter, 2017. http://dx.doi.org/10.1515/npf-2017-0022.
Full textMeyer, Michael. "Forfeiting Democracy: The Case of Hungary." De Gruyter, 2016. http://dx.doi.org/10.1515/npf-2016-0018.
Full textIvanova, Ekaterina, and Michaela Neumayr. "The Multi-Functionality of Professional and Business Associations in a Transitional Context: Empirical Evidence from Russia." De Gruyter, 2017. http://dx.doi.org/10.1515/npf-2016-0011.
Full textStiti, Oussama. "Étude de l'Urbanisation des Accès Virtuels et Stratégie de Métamorphose de Réseaux." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066632/document.
Full textVirtualization was originally introduced in networks to reduce maintenance and deployment costs. It has experienced tremendous growth and reshaped the landscape of IT and ITC networks. Virtualization permits the sharing of physical resources for instantiating isolated virtual machines despite the fact that it is drawing its resources from the same physical hardware. More recently NFV (Network Functions Virtualization) appeared, it allows to virtualize entire classes of network functions node in blocks that can connect to create communication services. In this thesis we virtualize the access network nodes, namely Wi-Fi access points. The Wi-Fi became one of the hot-topic technology for mobile operators, it allows them to offload some of the customers’ data traffic via hotspots. The problem that arises in such a mechanism is the existing wireless standards, and mobile devices connection management software have not been developed for this purpose. The Hotspot2.0 standard was created to overcome this limitation, by making the Wi-Fi experience similar to the cellular in terms of roaming, transparency and security. We have in our work, applied the concept of NFV by virtualizing these brand new Wi-Fi access points. One of the problems that we faced is the high security required by such standard, including the provisioning of client credentials in public areas. In our thesis we propose an innovative architecture for the repatriation of these credentials through NFC terminals. These same terminals will be used for access points’ urbanization by allowing users to create their own Wi-Fi virtual access point on the fly. The last aspect of this thesis is related to the management of virtualized entities changing communication patterns of legacy networks. In this context, SDN (Software Defined Network) emerged in data centers to redefine the way we think about networks, and is designed for virtualized environments. In this thesis we brought SDN to the edge of the network in our Wi-Fi virtual access points. More than a new paradigm of networks communications, we will see that NFV/SDN in Wi-Fi networks will in the near future make Wi-Fi networks more flexible, open and scalable
Ruppert, Guilherme Cesar Soares. "NFS Guard : uma solução de segurança para o protocolo NFS." [s.n.], 2006. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276483.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-06T04:50:10Z (GMT). No. of bitstreams: 1 Ruppert_GuilhermeCesarSoares_M.pdf: 908627 bytes, checksum: 2eb5cfc8a9692f72179b7c1cd2596b39 (MD5) Previous issue date: 2006
Resumo: Os sistemas de arquivos distribuídos são um componente importante em praticamente todas as redes coorporativas, acadêmicas e até mesmo domésticas. Neste cenário, o NFS (Network File System) é um dos sistemas de maior importância, não só pela importância histórica em ter sido um dos pioneiros, mas por ser largamente utilizado em todo o mundo. Porém, o NFS foi projetado com recursos insuficientes de segurança. A versão 3 do NFS, que é a versão utilizada atualmente em ambientes de produção, apresenta um nível de segurança praticamente nulo. Mais recentemente, foi elaborada a especificação da versão 4 do protocolo que corrige adequadamente os problemas de segurança. Contudo, o protocolo apresenta um grau de complexidade extremamente elevado e, devido a isso, poucos estão dispostos a enfrentar sua implementação. Atualmente, existem apenas algumas implementações preliminares deste protocolo e as mesmas não se encontram completas e estáveis. Logo, a migração para o NFSv4 a curto prazo é inviável. Neste trabalho foi realizado um amplo estudo dos diversos aspectos envolvidos com a segurança de sistemas de arquivos distribuídos, em especial o NFS. Foram levantadas as deficiências do NFS e foram analisados diversos trabalhos envolvendo segurança no compartilhamento de arquivos. Este trabalho resultou no projeto e implementação do NFS Guard, uma ferramenta para agregar segurança ao NFS versão 3 de forma simples e totalmente compatível com as redes NFS já instaladas. O NFS Guard utiliza clientes e servidores NFS padrão e não requer recompilação de nenhum software já instalado, podendo ser utilizado inclusive em sistemas de código fechado. Para isso foi desenvolvida uma técnica de Kerberização utilizando interceptação de pacotes, que também pode ser utilizada para agregar segurança a outros serviços além do NFS
Abstract: Distributed File Systems are an important component in practicalIy every corporate, academic or even home network. In this scenario, NFS (Network File System) is one of the most important of these systems, not only due to its historical importance for being one of the pioneers, but also for being largely used alI over the world. However, NFS was designed with insufficient security features. NFS version 3, which is the version currently being used in production environments, presents an almost nulI security leveI. More recently, the version 4 of the protocol was designed,among other thigs, to tackle the security issues. Nevertheless, this protocol presents an extremely high leveI of complexity, and consequently, a few want to face its implementation. At the moment, a few preliminary implementations are available, but usualIy incomplete and unstable. Hence, the migration to NFSv4 in a short term is not feasible. In this work we accomplished a wide study of many aspects involved with distributed file system security, specialIy with regards to NFS. NFS's shortcoming were identified e many works involving security in file sharing were analyzed. This work resulted in the design and implementation of NFS Guard, a tool to add security do NFS version 3 in a simple way and totalIy compatible with instalIed NFS networks. NFS Guard uses standard NFS client and server and does not require recompilation of any installed software, so it can be used with closed source systems. To accomplish that, a Kerberization technique was developed using packet interception, which can also be used to add security to other services besides NFS
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
Hedlund, Robin, and Peter Johansson. "Tidsloggning via NFC." Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30582.
Full textThis report describes the development of a time reporting system that applies the Near-Field Communication [NFC] technology. The system is primarily intended for a company where the system itself is designed with modern techniques and was developed with the vision of expansion and further development. A web application has been developed that consists of a server, database, and a web page. The server can receive requests to manage the information stored in the database. The web page can manage and review the time logs in a user interface that can be accessed with a browser. The system includes a station that uses a NFC-reader to read information from the external NFC devices. The information is then forwarded, with the help of Wi-Fi, to the server to either register a new station or create a time log. It also has a mobile application developed for mobile phones that use Android as operating system and has built-in NFC support. A mobile phone that supports these criteria may be swept over a station to perform a time log. The mobile phone can carry out create, modify, delete, and view time logs. GPS is integrated for navigation and to connect a position with a time log.
Sopi, Jeton. "NFC Door Lock." Thesis, Högskolan i Halmstad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30306.
Full textBrégnard, Christelle. "Etude des mécanismes viraux et cellulaires qui régulent l’infection par le Virus de l’Immunodéficience Humaine de type 1." Thesis, Paris 5, 2012. http://www.theses.fr/2012PA05T025.
Full textPas de résumé en anglais
Stanley, Mark. "Booze, Boomtowns, and Burning Crosses: The Turbulent Governorship of Pat M. Neff of Texas, 1921-1925." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4834/.
Full textSällberg, Kristian. "A Data Model Driven Approach to Managing Network Functions Virtualization : Aiding Network Operators in Provisioning and Configuring Network Functions." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-171233.
Full textDenna masteruppsats förklarar varför vissa nätverkstjänster är svåra att skapa och konfigurera med IT-automationsverktyg och mjukvara för molnorkestrering. En förbättring föreslås och motiveras. Den föreslagna förbättringen tillåter nätverksoperatörer att definiera en mängd datamodeller, för att beskriva hur Virtuella Nätverksfunktioner (VNF:er) skall instantieras och kopplas ihop till nätverkstjänster. Dessutom tillåter lösningen nätverksoperatörer att ändra konfiguration under tiden nätverken hanterar trafik. Arbetet kan ses som ett steg mot självhanterande och automatiskt skalande nätverk. Den föreslagna lösningen jämförs med ett välkänt molnorkestreringsverktyg (OpenStack) för att utvärdera om den föreslagna lösningen sänker mängden tid som nätverksoperatörer behöver för att designa nätverkstopologier och tjänster som innehåller VNF:er. Data samlas in genom observationer av nätverksoperatörer, intervjuer, och experiment. Analys av datan visar att den föreslagna lösningen kan minska tiden som behövs för att designa nätverkstopologier och tjänster. Fallen där detta är applicerbart, är när VNF:er närvarar i nätverk. Dessa är enklare att skapa, konfigurera, och ändra under tiden de exekverar, med den föreslagna metoden. Detta kräver också att nätverksoperatören är bekant med datamodelleringsspråket YANG. Tiden det tar att provisionera VNF:er, tills dess att de svarar till anslutningar, kan sänkas med hjälp av den föreslagna metoden. Den förslagna metoden erbjuder väsentligt begränsad funktionalitet jämfört med OpenStack, den fokuserar på att hantera VNF:er.
Landh, Evelina. "Musik + NPF = Sant : Musiklärares arbete med elever med neuropsykiatriska funktionsnedsättningar (NPF)." Thesis, Kungl. Musikhögskolan, Institutionen för musik, pedagogik och samhälle, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kmh:diva-3886.
Full textThis thesis aims to contribute to an increased understanding of music teachers' work with students with special needs, such as ADHD and autism, (called NPF) in the ordinary school in Sweden. I have tried to find both music teachers' working methods and their perceptions about students with NPF. The study is based on a relational perspective. I have done four qualitative interviews with music teachers who work in the primary school and one teacher that works in a special high school. The results showed a variety of working methods and perceptions, such as the importance of: adjustments and changes in the environment, structure, collaboration with other teachers, following students' interests and physical tools. The results also showed the importance of making adjustments that benefit every student. In the conclusion I mention that through an orderly environment, structure, physical tools, collaboration, flexibility, and adequate premises and group sizes, it is possible to meet all students needs successfully in music in the regular school.
Tsaknakis, Dimitrios, and Gustaf Lindqvist. "En Survey av NFC och NFC-Protokoll med Fokus på Säkerhetsaspekterna." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26708.
Full textDurkin, Bailey. "THE IMPORTANCE OF THE NFL COMBINE IN DETERMINING DRAFT POSITION AND FUTURE PERFORMANCE." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2726.
Full textBoumenot, Christopher M. "The performance of a Linux NFS implementation." Link to electronic thesis, 2002. http://www.wpi.edu/Pubs/ETD/Available/etd-0523102-121726/.
Full textDomah, Darshan. "The NERV Methodology: Non-Functional Requirements Elicitation, Reasoning, and Validation in Agile Processes." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/137.
Full textMoreira, Da Silva Sara. "Caractérisation de NEF-sp : une exoribonucléase 3'→ 5' spécifique du testicule." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAV042/document.
Full textGenetic and biochemical studies have identified more than twenty different proteins involved in the piRNA pathway. However, some mechanistic features are still not fully understood. When this project started, piRNAs 3' end trimming was not completely characterized. Trimming was observed before in BmN4 cells and an Mg2+-dependent 3′ to 5′ exonuclease was implicated in this process. However, the protein responsible for shortening piRNAs to their mature length was still not known.NEF-sp is predicted to be an RNA exonuclease with 3′ to 5′ directionality. This protein is composed by three domains: a nuclease domain at N-terminal and two RNA binding motifs at C-terminal. NEF-sp is also predicted to be a testis-specific nuclease, however its biological role was not previously characterized. This project was based on the hypothesis that NEF-sp could potentially act as a nuclease involved in the piRNA maturation.We examined the biochemical properties of the uncharacterized mammalian nuclease family member NEF-sp. We show that Nef-sp transcripts are detected exclusively in mouse testes. We demonstrate that hNEF-sp is a 3ʹ→5ʹ exoribonuclease that is active on ssRNA substrates and likely functions in the nucleolar compartment. Our own analysis of the Nef-sp mouse knock-out mutant revealed no obvious phenotype. We observed that homozygous animals of both sexes are viability and display normal fertility. NEF-sp does not seem to play a role in piRNA pathway. It is possible that precise trimming of the unknown substrate(s) may not be important for viability/fertility due to potential complementation by other nucleases. Nevertheless, our study provides a biochemical and genetic characterization of the mammalian NEF-sp exoribonuclease
Pereira, Marcelo Neiva. "Lettuce seedling production (Lactuca sativa L.) in floating hydroponic system." Universidade Federal do CearÃ, 2004. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=9218.
Full textAlthough it had been early developed aiming to search on the plants mineral nutrition, the hydroponic gained more importance between the growers due to possibility a better nutritional control that confers greater plant quality and minor incidence of pests. Some hydroponic systems have been considered for the lettuce grown, between them NFT (Nutrient Film Technique) and Floating System. This last one consists of the use of great amounts of nutrient solution in tanks where the plants are floating on plates with its roots flooded. This system has been showing promising for hot climates where the high temperatures can to limit the growing in other systems as the NFT. Therefore, a trial was carried out to evaluate the floating system in its diverse characteristics as stability of the electrical conductivity and pH, availability of dissolved oxygen to the plants and temperature of the nutrient solution. Also was evaluated, through the total fresh weight and root length, the cultivars VerÃnica and Vera, which are spread out between the growers that use hydroponic systems, in regards to its adaptability to the floating system. Each one of the cultivars were submitted at two levels of electrical conductivity (1,5mS/cm and 2,5 mS/cm) and two levels of artificial aeration (20min/h and 60min/h) in split-split-plot design. The study showed that the cultivar Vera was significantly better than VerÃnica concerning to the total fresh weight and root length. It did not have significant difference between the studied levels of electrical conductivity and artificial aeration in the development of the plants. It could still be observed that the system revealed sufficiently steady in regards to the evaluated parameters.
Embora tenha sido desenvolvida primeiramente com o objetivo de pesquisar sobre a nutriÃÃo mineral das plantas, a hidroponia ganhou bastante importÃncia entre os produtores devido à possibilidade do controle nutricional mais estreito que confere maior qualidade Ãs plantas e menor incidÃncia de problemas fitossanitÃrios. VÃrios sistemas hidropÃnicos tÃm sido propostos para o cultivo de alface, entre eles o NFT (Nutrient Film Technique) e o sistema de leito flutuante (Floating System). Este Ãltimo consiste da utilizaÃÃo de grandes quantidades de soluÃÃo nutritiva dispostas em tanques onde as plantas ficam flutuando sobre placas de material leve com suas raÃzes imersas. Este sistema tem se mostrado promissor para climas quentes onde as altas temperaturas podem ser limitantes ao cultivo em outros sistemas como o NFT. Diante do exposto foi realizado trabalho no sentido de avaliar o sistema de leito flutuante em suas diversas caracterÃstica como estabilidade da condutividade elÃtrica e pH, disponibilidade de oxigÃnio dissolvido Ãs plantas e temperatura da soluÃÃo nutritiva. TambÃm foram avaliadas, atravÃs da matÃria fresca total e comprimento radicular, os cultivares VerÃnica e Vera, os quais sÃo os mais difundidos entre os produtores que utilizam o sistema hidropÃnico, quanto à sua adaptabilidade ao sistema de leito flutuante. Para isso cada cultivar foi submetido a dois nÃveis de condutividade elÃtrica (1,5mS/cm e 2,5 mS/cm) e dois nÃveis de aeraÃÃo artificial (20min/h e 60min/h) utilizando o delineamento em parcelas subsubdivididas. O estudo mostrou que o cultivar Vera foi significativamente superior ao VerÃnica em relaÃÃo à matÃria fresca total e comprimento radicular. NÃo houve diferenÃa significativa entre os nÃveis de condutividade elÃtrica e aeraÃÃo artificial estudados no desenvolvimento das plantas. PÃde-se observar ainda que o sistema mostrou-se bastante estÃvel em relaÃÃo Ãs variÃveis avaliadas.
Kriaučiūnas, Martynas. "Organizacijos informacinės sistemos reikalavimų formulavimas panaudojant vizija grindžiamą metodinį karkasą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090908_202937-28002.
Full textThe aim of the master thesis is to investigate possibilities to use the NFR (non-functional requirements) approach proposed by Toronto group to perform the flowdown of requirements from business to software level in the methodical requirements engineering frameworks that organize requirements in a way similar to the J.A. Zachman’s Enterprise Architecture. Using results of the library research, the theoretical part of the thesis proposes a methodology how to apply NRF approach to perform flow down of the higher level requirements to lower ones in cases when requirements are organized according to principles proposed by J.A. Zachman. The experimental part of the thesis is devoted to the validation of the proposed approach using a simplified banking system example. The main conclusion of the thesis is that the NFR approach is applicable only to some part of requirements because the modelling means provided by this approach are not sufficient to model the system dynamic.
Eriksson, Daniel, and Fredrik Färg. "Säker identifiering via NFC." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-20972.
Full textPham, Thi Van Anh. "Security of NFC applications." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-124368.
Full textNear Field Communication (NFC) hänvisar till en kommunikationsteknik som möjliggör en enkel anslutning och dataöverföring mellan två enheter genom att sätta dem i en närhet. Förutom kontaktlös betalning och biljetthantering ansökningar, vilket var den ursprungliga viktiga drivkrafter för denna teknik, kan ett stort antal nya användningsfall dra nytta av denna snabbt växande teknik, som har visats i olika NFC-aktiverade program förslag och pilotförsök. Typiska NFC-applikationer kombinerar NFC-taggar, NFC-kompatibla mobiltelefoner och online-servrar. Denna avhandling utforskar förtroenderelationer, säkerhetskrav och säkerhetsprotokoll utformning i dessa komplexa system. Vi studerar hur man kan tillämpa de säkerhetsfunktioner för olika typer av NFC-taggar för att säkra NFC-applikationer. Vi undersöker först potentiella svagheter och problem i vissa nya användningsfall där NFC kan användas. Därefter analyserar vi de krav och föreslå vårt system design för att säkra varje användningsfall. Dessutom utvecklade vi proof-of-concept implementationer för två av våra föreslagna protokoll: en NFC-aktiverad säkerhet-guard övervakningssystem och en NFC-aktiverad restaurang meny. Dessutom, för fd bruk fallet, kontrollerade vi formellt vår föreslagna säkerhetsprotokoll. Vår analys visar att bland de diskuterade taggar, NFC taggar som baseras på säkra minneskort har minst kapacitet och dlexibilitet. Deras inbyggda trepass ömsesidig autentisering kan användas för att bevisa färskhet av händelsen när taggen tappas. De programmerbara beröringsfria smarta kort är mer flexibla eftersom de kan programmeras för att genomföra nya säkerhetsprotokoll. Dessutom kan de hålla reda på ett löpnummer och kan användas i system som inte kräver ansökan-specik mjukvara på mobiltelefonen. Sekvensnumret framtvingar ordning av händelser, vilket ger en viss nivå av replay förebyggande. Den mest kraftfulla typen av taggen är den emulerade kortet eftersom det ger en klocka, större beräkningskapacitet, och möjligen sin egen Internet-anslutning, naturligtvis till högre kostnad för utplacering.
Al-Ashraf, Samir Daniel, and Arban Sefedini. "Prototyper för NFC implementeringar." Thesis, Malmö högskola, Teknik och samhälle, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20545.
Full textNear Field Communication (NFC) is a contactless short distance (approximately 10 centimeters) communication technology, which conveys a more secure connection. NFC is a relatively young technology which is cheap to implement, and user-friendly. NFC is directed to mainly cellphones, where opportunities for implementation of applications are wide. The technology conveys a faster and easier exchange of information, by putting units side by side. At present, the technology is used mostly in Asia. In Europe, no major effort has begun yet, but is expected to. NFC is expected to exist in a majority of cellphones, in the future.This essay treats practical implementation of a “toolbox” with the NFC technology. The goal was to make a “toolbox” with different components. The “toolbox” is intended as a base for implementing NFC applications and for experimenting with the different components. The hardware components are: cellphone, a tag, a RFID module and a microprocessor. The program components consist of a number of code examples.Our work has resulted in three prototypes which together constitute a “toolbox”. The prototypes communicate between any combinations of the components in the “toolbox”: cellphone with tag, reader with tag and reader with cellphone.
Li, Yimeng. "Self-Tuning NFC Circuits." Thesis, Mittuniversitetet, Avdelningen för elektronikkonstruktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-32550.
Full textNordström, Daniel, and David Nyqvist. "Near Field Communication : En studie av säkerhetsaspekternas påverkan för mobila betalningar." Thesis, Uppsala universitet, Institutionen för informatik och media, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-179609.
Full textNear Field Communication (NFC) is a technology that enables the development of payments using the mobile phone. In Sweden, payments with NFC technology in mobile phones are still in the introductory phase. To ensure that the proposed technology can be utilized as a complement to existing payment options, one must consider the safety aspects of said construct. In this thesis we will review the technology with a focus on safety aspects. The purpose of this thesis is to review the security aspects of NFC technology for mobile payment and analyze these aspects in order to gain deeper knowledge of NFC technology opportunities. The knowledge has been obtained through a literature review, complemented by an interview to get a wide knowledge about the information. The results of the study show that NFC technology as a payment option can be affected by a number of safety issues. To ensure a viable market share, operators utilizing NFC technology must cooperate to standardize the implementation.
Branken, David Jacobus. "Membrane facilitated separation of NF3 and CF4 / David Jacobus Branken." Thesis, North-West University, 2013. http://hdl.handle.net/10394/9497.
Full textPhD (Chemistry),North-West University, Potchefstroom Campus, 2013.
Blees, Chris. "Running Backs in the NFL Draft and NFL Combine: Can Performance be Predicted?" Scholarship @ Claremont, 2011. http://scholarship.claremont.edu/cmc_theses/127.
Full textGallagher, Michael. "A Better Predictor of NFL Success: Collegiate Performance or the NFL Draft Combine?" Digital Commons @ East Tennessee State University, 2019. https://dc.etsu.edu/etd/3570.
Full textBarakat, Jean-Baptiste. "Croissance auto-catalysée de nanofils d'InP sur silicium par épitaxie par jets moléculaires en mode vapeur-liquide-solide : application aux interconnexions optiques sur puce." Thesis, Ecully, Ecole centrale de Lyon, 2015. http://www.theses.fr/2015ECDL0027/document.
Full textMonolithic integration of III-V semiconductors materials on Si substrate is essential for the Si photonic development. We aim at achieving an optical microsource based on a regular array of III-V (InAsP/InP) nanowires (NWs) standing on top a Si waveguide. Due to their ability to be fully relaxed, nanowires growth is of deep interest. This PhD thesis has been oriented towards such context especially among self-catalyzed InP NWs growth by epitaxy. Thus we have shown that highly dense and vertical self-catalyzed InP NWs accomplishment is related to Si substrate surface oxide. A monomodal or bimodal NWs distribution have been reached through a control of indium droplets formation or growth parameters. A critical pressure and a critical temperature have been found to delimit favorable growth regime. Intrinsic optical properties have been determined to be goal sufficient. Optical simulation modeling and characterization of the polarization light state in NWs and in the Si waveguide have led us to establish functional specifications to grow vertical NWs on SOI as way that their optical modes could be coupled efficiently at telecommunications wavelength
Brigle, Kevin Eugene. "Studies on the structure and function of various nif and nif- associated gene products encoded within the Azotobacter vinelandii nif gene cluster." Diss., Virginia Polytechnic Institute and State University, 1989. http://hdl.handle.net/10919/54498.
Full textPh. D.
Edbor, Mikael. "Swedish vs. Japanese Mobile Technology : A study on the technologies and services which can be transferred between the two markets." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-47319.
Full textDen här rapporten undersöker vilka tjänster och teknologier som för tillfället skiljer den svenska och den japanska moblmarknaden åt, och vad dessa marknader kan lära av varandra. Syftet med rapporten är att finna ifall det finns några tjänster eller teknologier som kan överföras mellan marknaderna. Undersökningen gjordes både genom litteraturstudie och intervjuer med personer och företag som jobbar i de två marknaderna, eller utför egen forskning inom området som tas upp i den här rapporten. Intervjuerna utfördes genom att följa ett frågeformulär där ett par kärnfrågor användes och som sedan bygdes på med frågor som passade den intervjuades expertis. Några tjänster, så som betalning via Near Field Communications tekniken (NFC), anses vara passande kandidater för att importeras till den svenska marknaden.
Selander, Jonas. "RFID-teknikens sårbarheter i kort med beröringsfri funktion." Thesis, Högskolan i Gävle, Avdelningen för elektronik, matematik och naturvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-27546.
Full textLiutkus, Antoine. "Processus gaussiens pour la séparation de sources et le codage informé." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00790841.
Full textZeng, Guoqian. "Analysis of NGF-dependent cell cycle defects in an NGF-nonresponsive TrkA receptor mutant." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq30835.pdf.
Full textOlivieri, Steven. "An Investigation of Security in Near Field Communication Systems." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-dissertations/46.
Full textLee, Justin. "Evaluating NFL Player Performance and Draft Efficiency: Where is the Best Value in the NFL Draft?" Scholarship @ Claremont, 2018. http://scholarship.claremont.edu/cmc_theses/1740.
Full textJansson, Dan. "Telematik - en del i NBF? :." Thesis, Försvarshögskolan, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1766.
Full textAs our industrial society has become more information based, ournational defense requirements have changed focus from an invasion defenceto an operations defence. For many years, new information technologiessuch as the internet were first developed for military use. Today the oppositeis true. Market forces are now driving the development of new technologiessuch as IT, at a fast pace. Armed forces must strive to make use of thesedevelopments within the areas of communication and informationtechnology, to better prepare for future threats. The military development inthis sector in called a “Revolution in Military Affairs” (RMA). The SwedishArmed Forces equivalency is called a “network-based defense” (NBF) andmakes use of the RMA concept. Extensive research is underway within ITin general and telematics is not an exception.The American document, “Joint Vision 2010 FOCUSED LOGISTICS”claims that the development of technology will play a decisive part inlogistics management, and that improvement in among other things, BITand telemaintenance will raise the effectiveness of technical servicepersonnel. Telemaintenance is one part within the concept of telematics andconsists of:Vehicle service consisting of diagnostic surveillance of vehicle systems,alarms for indication of serious faults, and Vehicle Control for remotecontrolling of vehicle functions.Maintenance service consisting of operational information such as thenumber of hours in operation, fuel consumption, vibration etc.Telemaintenance is investigated in this thesis with a background ofSwedish Army maintenance concept, which purpose is to support militaryfield units in their ability to solve their tasks. The maintenance conceptoffers greater technical and tactical availability by keeping optimal numbersof material systems operational.This thesis describes the expectations of a telemaintenence system of aSwedish troop in international operation, or more precisely, thetelemaintenence needs that were evident in 1993 at the first battalion(BA01) in Bosnia as part of UNPROFOR.
Avdelning: ALB - Slutet Mag 3 C-upps.Hylla: Upps. ChP 01-03
Pfanstiel, Jörn, Christine Keller, Alexandra Funke, Tristan Heinig, and Thomas Schlegel. "Mobile Reisebegleitung mit NFC-Unterstützung." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-101011.
Full textPedersen, Ryan. "Life Planning for NFL Players." Scholarship @ Claremont, 2011. http://scholarship.claremont.edu/cmc_theses/173.
Full textSimard, Marie-Chantal. "Nef pathogenesis in transgenic mice." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=103182.
Full textTherefore, it appears that SIV Nef alone expressed in mice, in appropriate cell types and at sufficient levels, can elicit many of the phenotypes of simian and human AIDS. These Tg mice should be instrumental in studying the pathogenesis of SIV Nef-induced phenotypes.
Sveistrup, Peter. "NFA-grillen : Solenergidrevet automatisert pølsegrill." Thesis, Norwegian University of Science and Technology, Department of Engineering Cybernetics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10960.
Full textMatsson, David. "Mechanical performance of NCF composites /." Luleå, 2005. http://epubl.ltu.se/1402-1544/2005/49/.
Full textStröbl, Sabine. "ProNGF/NGF in humanen Granulosazellen." Diss., Ludwig-Maximilians-Universität München, 2014. http://nbn-resolving.de/urn:nbn:de:bvb:19-178520.
Full textKomulainen, O. (Onni). "Ikääntyneille virikkeitä tarjoava NFC-sovellus." Master's thesis, University of Oulu, 2013. http://urn.fi/URN:NBN:fi:oulu-201304241202.
Full textThe purpose of this thesis was to research the suitability of NFC-technology in applications intended for elderly users. This study discusses stimulating activity in Finnish residential homes, digital application accessibility requirements for elderly users and NFC-applications. The study utilized NFC applications as a possible method for effecting intellectual stimulus in elderly users. The physical interface was realized with a mobile phone equipped with an NFC reader and with cards fitted with NFC tags. The application’s adapted accessibility and attractiveness with respect to elderly users was taken into account during the application design phase. The research was carried out via empirical usability testing at a residential house. Evaluation of usability was done by observing elderly users during testing. User experience was evaluated by interview. A questionnaire concerning the suitability of the tested application as a stimulating activity was made for nurses. The implemented application fulfilled its objectives. It provoked memories of past events and persons in the users that took part in the testing. Secondly it also functioned as a game requiring memory and cognitive skills. This study shows that aged user can easily learn to handle user interfaces that are based on touching NFC tags and with NFC technology it is possible to implement applications attractive to elderly