To see the other types of publications on this topic, follow the link: NFF.

Dissertations / Theses on the topic 'NFF'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'NFF.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Bolinder, Richard. "Atmospheric Radiation Effects Study on Avionics : An Analysis of NFF Errors." Thesis, Linköpings universitet, Programvara och system, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-96726.

Full text
Abstract:
No fault found (NFF) errors, i.e. errors which origin has not been established, irregularly occur in electronic devices. The actual cause of such errors varies but one, possibly more prominent, source for these soft errors is atmospheric radiation. The overarching aim of this thesis is to demonstrate: 1) the importance of keeping the atmospheric radiation environment in mind when designing robust airborne systems, 2) how to take this environment into consideration when applying mitigation techniques which may drastically reduce the risk of SEEs (Single Event Effects) which can cause NFF errors. To achieve these goals, Part 1 of this thesis describes how cosmic rays affect electronics (i.e. what kind of errors may be induced), which types of devices are susceptible to radiation, and why this subject is of extra importance for airborne systems. In addition, soft error mitigation techniques, which may be applied at different design levels to reduce the soft error rate (SER) or the impact of soft errors, are also presented. The aim is further corroborated by Part 2. Five subsystems of a modern aircraft are studied and real examples of failures potentially induced by atmospheric radiation are presented. For each of the five systems, all errors that have been reported for these (in the past few years) have been studied, and the number of errors found to be potentially induced by cosmic radiation has been listed and compared to number of expected soft errors based on calculations and previous experimental tests.
APA, Harvard, Vancouver, ISO, and other styles
2

Zadnik, Elizabeth, and n/a. "In disunity, weakness." University of Canberra. Management, 1990. http://erl.canberra.edu.au./public/adt-AUC20061112.112712.

Full text
Abstract:
The National Farmers Federation (NFF) is a peak producer organisation. Its executive has purported to represent all Australian farmers with a unified voice. This thesis argues that primary producers are too heterogeneous a group ever to have developed much solidarity in articulation of or action for the furtherance of common interests and that this fact is reflected in the NFF. Heterogeneity results from farm size, product specialisation, level of technology adopted, geographical location and special needs. Successive farm organisations and the National Party (and predecessors) have attempted to encompass these differences since the 1890s. Producer differences either have led to secession or to unification when political and economic circumstances have warranted it. This diversity has prevented farm groups becoming united. The lack of unity at first prevented all farmers joining in one organisation, and when they did, they kept on splitting up. The charisma of Ian McLachlan allowed farmers to get together, but the diversity meant that the getting together benefited some not only without the others, but sometimes at the expense of others. This thesis explores the heterogeneity of the agricultural sector within the political and economic context of Australian agriculture and discusses its consequences, in the constant re-forming of farm organisations and the institutional framework of the NFF in the context of politicisation of agricultural interest groups. This thesis concludes that producer differences in terms of size and product specialisation determine how effectively they are represented. Corporate farmers have fared much better than family and family-plus farmers, who would probably be better represented by a small business organisation, with which they have more in common, rather than a farming organisation.
APA, Harvard, Vancouver, ISO, and other styles
3

Halpin, Darren Richard, of Western Sydney Hawkesbury University, Faculty of Environmental Management and Agriculture, and School of Agriculture and Rural Development. "Authenticity and the representative paradox: the political representation of Australian farmers through the NFF family of interest groups." THESIS_FEMA_ARD_Halpin_D.xml, 1999. http://handle.uws.edu.au:8081/1959.7/22.

Full text
Abstract:
This thesis examines the political representation of Australian farmers. The NFF family of interest groups is charged with the political representation of farmers in Australia.Given that their state affiliates are the only organisations that farmers can directly join, this study takes the case of the New South Wales Farmers' Association (NSWFA) as its major reference point. A paradox is immediately confronted. On one hand, both the state and commentators refer to the NFF family as an exemplar of a successful modern interest group. However, on the other, the NFF family is being confronted with escalating levels of disillusionment and criticism from its own constituency.Two points of interest are highlighted. Firstly, it is suggested that theoretical frameworks, which assist commentators and researchers to come to the conclusion that the NFF family is 'successful', are not constructed in such a fashion as to throw sufficient light on the paradoxical nature of an existing situation. Secondly, this paradox suggests that the NFF itself must be able to disassociate the contingent relationship between its internal levels of support and external levels of access and influence. These two focal points are explored in this thesis, and the framework used by researchers to understand the actions of Australian farm interest groups are scrutinised. Discussing 'authentic' political representation assists considering the major theme of the 'representative paradox'. It is argued that this paradox is best understood by locating it within a search by farmers for authentic political representation - both through the NFF family and apart from it.
Doctor of Philosophy (PhD)
APA, Harvard, Vancouver, ISO, and other styles
4

Halpin, Darren Richard. "Authenticity and the representative paradox : the political representation of Australian farmers through the NFF family of interest groups /." View thesis View thesis, 1999. http://library.uws.edu.au/adt-NUWS/public/adt-NUWS20030527.163228/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Liu, Yanhan. "mm Wave Near Field Spot Focus Technique in Free Space Dielectric Properties Evaluation Method." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-298023.

Full text
Abstract:
Radomes were invented to protect sensitive antenna systems from the disturbing environment. Estimation of their permittivity is a vital step for their design. This project studies the free- space method to measure the permittivity of radome materials. The free space method has the advantages of non-contacting and free-of-reshaping, which are suitable for sheet-shape samples. In this method, the sample is placed between two antennas, and the permitivity of the material is determined based on the S-parameters between the two antennas. To avoid the influence of energy diffraction at the edges of samples, a near field focus(NFF) antenna is used. NFF antennas have their focal point in the near field. Consequently, the energy diffraction at the edges is reduced if the sample is placed at the focal point of the NFF antenna. The measurement results are processed with the genetic algorithm. This method starts from a group of assumption values of permittivity. An optimal value is obtained after multiple iterations. Compared with the results from a cavity resonant method provided in the datasheet of the materials, the free space setup in this thesis measurement provides an average 2.80% error in permittivity, and an average 34.14% error in loss tangent. Therefore, the genetic algorithm is suitable for this free space setup. The error of this thesis measurement is affected by several factors, such as thickness value error and inaccurate operation.
Radom används för att skydda känsliga antennsystem från omgivningen. Det är viktigt att estimera permittiviteten av radom innan de designas. Med korrekt permittivitet kan radomets inverkan på systemet räknas ut. I det här projektet används en fri-rymdsmetod för att mäta permittivitet. Fri-rymdsmetoden har fördelarna av att vara kontaktfri och icke-invasiv, vilket gör den lämplig för permittivitetmätning av materialskivor. Med den här metoden placeras en materialskiva mellan två antenner. Permittiviteten kan beräknas från S-parametrarna mellan antennerna. För att undvika diffraktion från kanten av materialskivan används närfältsfokuserade (NFF) antenner i fri-rymdsmetoden. NFF antenner har en fokalpunkt i närfältet. Kantdiffraktionen minskas om materialskivan placeras i fokalpunkten av NFF antennen. Mätningarna efterbehandlas med en genetisk algoritm (GA). Denna metod gissar värden på permittiviteten. Ett optimalt värde räknas fram iterativt. Jämfört med specificerad permittivitet från tillverkaren skiljer sig fri-rymdsmätningarna i denna avhandling i medeltal 2.8% i realdelen för den relativa permittiviteten och 34.14% i förlusttangent. Felet i mätningen påverkas av flera faktorer, som fel i mätningen av materialskivans tjocklek och fel i mätuppställningen.
APA, Harvard, Vancouver, ISO, and other styles
6

Bartels, Myriam. "Untersuchung molekularer Mechanismen der NF-kB/NRF- [NF-Kappa-B-NRF-] (NF-kB-reprimierender-Faktor)-Interaktion [(NF-Kappa-B-reprimierender-Faktor)-Interaktion] und ihre Rolle bei der Transkriptionsregulation." [S.l.] : [s.n.], 2006. http://deposit.ddb.de/cgi-bin/dokserv?idn=983762392.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Harward, Gregory Brent. "Suitability of the NIST Shop Data Model as a Neutral File Format for Simulation." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd899.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Gennaro, Giuseppa. "Caractérisation de nifF une flavodoxine nif-spécifique chez la bactérie photosynthetique Rhodobacter capsulatus." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape2/PQDD_0018/NQ53281.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Simsa, Ruth. "Repression of the Spanish Protest Movement - Mechanisms and Consequences." De Gruyter, 2017. http://dx.doi.org/10.1515/npf-2017-0022.

Full text
Abstract:
Based on longitudinal qualitative research, the paper analyses manifestations and mechanisms of the repression of activists of the Spanish protest movement 15M, and effects of this repression perceived by activists. To contextualize this, the background of the movement, its goals, and its achievements are described. The movement started in 2011, protesting the social crisis, the consequences of austerity policies, and corruption. It had viable effects on the framing of the current situation, in political attitudes and also, indirectly, on the political system. The Spanish government has responded to movement activities with repression and with new laws that interviewees characterize as a further restriction of the civil right to demonstrate and protest. Findings indicate that the combination of overt and covert repression have effects far beyond the manifest acts of the repression itself.
APA, Harvard, Vancouver, ISO, and other styles
10

Meyer, Michael. "Forfeiting Democracy: The Case of Hungary." De Gruyter, 2016. http://dx.doi.org/10.1515/npf-2016-0018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Ivanova, Ekaterina, and Michaela Neumayr. "The Multi-Functionality of Professional and Business Associations in a Transitional Context: Empirical Evidence from Russia." De Gruyter, 2017. http://dx.doi.org/10.1515/npf-2016-0011.

Full text
Abstract:
In the literature it is generally assumed that activities of voluntary membership based associations operating in stable institutional environments are multi-faceted, contributing simultaneously to societal, economic and political spheres. This article, drawing on the concept of functions of non-profit organizations investigates, whether the multi-functional character of associations holds true in the context of transitional Russia. The paper examines the relative importance of the advocacy, community building and service delivery functions, fulfilled by different types of associations. The original empirical data from exploratory interviews with 15 leading experts on associational activities was triangulated by a confirmatory survey of 215 associations across Russia. The results confirm that the absolute majority of the examined associations are multifunctional. Advocacy is considered to be the most important function for all types of associations. The findings suggest that business associations and intermediary unions are more active in policy advocacy directed toward the government, while liberal professional societies are more engaged in public advocacy addressing society at large. This study highlights importance of domestic associations for countries in transition as an institutional infrastructure of organized civil society, democratic development and market economy.
APA, Harvard, Vancouver, ISO, and other styles
12

Stiti, Oussama. "Étude de l'Urbanisation des Accès Virtuels et Stratégie de Métamorphose de Réseaux." Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066632/document.

Full text
Abstract:
La virtualisation, originalement introduite dans les réseaux pour en réduire les coûts de maintenance et de déploiement, a connu une explosion fulgurante remodelant le paysage des réseaux informatiques et télécoms. La virtualisation permet la mutualisation des ressources physiques pour instancier des machines virtuelles complétement isolées mais puisant leurs ressources du même matériel physique. Plus récemment le NFV (Network Functions Virtualisation) est apparu, et a permis de virtualiser des classes entières de fonctions de nœud de réseau dans des blocs qui peuvent se connecter pour créer des services de communication. Cette thèse s’inscrit dans ce contexte pour virtualiser les nœuds des réseaux d’accès, à savoir les points d’accès Wi-Fi. Le Wi-Fi est devenu la technologie de tous les enjeux pour les opérateurs mobile. Cette technologie leur permet notamment d’y délester une partie du trafic de données clients via des hotspots. Le problème qui se pose dans un tel mécanisme est que les normes Wi-Fi existantes ainsi que les logiciels de gestion de connexion d’un appareil mobile n’ont pas été développés dans l’optique du hotspot. A cet effet, la norme Hotspot2.0 a été créée, pour rendre l’expérience Wi-Fi similaire à celle du cellulaire en termes d’itinérance, de transparence et de sécurité. Nous avons dans nos travaux, appliqué le concept de NFV en virtualisant ces points d’accès Wi-Fi de nouvelle génération. La problématique face à laquelle nous avons été confrontés est la forte sécurité imposée par de tels dispositifs exigeants notamment l’enregistrement et l’installation de certificats de sécurité clients dans les lieux publics. Dans notre thèse nous proposons une architecture innovante permettant le rapatriement de ces éléments de sécurité à travers des bornes NFC. Ces mêmes bornes, dans une volonté d’urbanisation des points d’accès, permettront aux utilisateurs de créer leurs propres points d’accès Wi-Fi virtuels à la volée. Enfin, le dernier aspect de cette thèse touche à la problématique de gérance des entités virtualisées changeant les schémas de communication des réseaux traditionnels. Dans ce contexte, SDN (Software Defined Network) a émergé dans les datacenters pour redéfinir la façon de penser les réseaux plus en adéquation avec le contexte virtualisé. Cette thèse reprend le SDN pour l’appliquer en périphérie de réseaux sur les points d’accès Wi-Fi virtuels que nous avons créés. Plus qu’un nouveau paradigme de communications réseaux, nous verrons que l’introduction des concepts NFV/SDN aux réseaux Wi-Fi permettra dans un avenir proche de rendre les réseaux Wi-Fi plus souples, plus ouverts et plus évolutifs
Virtualization was originally introduced in networks to reduce maintenance and deployment costs. It has experienced tremendous growth and reshaped the landscape of IT and ITC networks. Virtualization permits the sharing of physical resources for instantiating isolated virtual machines despite the fact that it is drawing its resources from the same physical hardware. More recently NFV (Network Functions Virtualization) appeared, it allows to virtualize entire classes of network functions node in blocks that can connect to create communication services. In this thesis we virtualize the access network nodes, namely Wi-Fi access points. The Wi-Fi became one of the hot-topic technology for mobile operators, it allows them to offload some of the customers’ data traffic via hotspots. The problem that arises in such a mechanism is the existing wireless standards, and mobile devices connection management software have not been developed for this purpose. The Hotspot2.0 standard was created to overcome this limitation, by making the Wi-Fi experience similar to the cellular in terms of roaming, transparency and security. We have in our work, applied the concept of NFV by virtualizing these brand new Wi-Fi access points. One of the problems that we faced is the high security required by such standard, including the provisioning of client credentials in public areas. In our thesis we propose an innovative architecture for the repatriation of these credentials through NFC terminals. These same terminals will be used for access points’ urbanization by allowing users to create their own Wi-Fi virtual access point on the fly. The last aspect of this thesis is related to the management of virtualized entities changing communication patterns of legacy networks. In this context, SDN (Software Defined Network) emerged in data centers to redefine the way we think about networks, and is designed for virtualized environments. In this thesis we brought SDN to the edge of the network in our Wi-Fi virtual access points. More than a new paradigm of networks communications, we will see that NFV/SDN in Wi-Fi networks will in the near future make Wi-Fi networks more flexible, open and scalable
APA, Harvard, Vancouver, ISO, and other styles
13

Ruppert, Guilherme Cesar Soares. "NFS Guard : uma solução de segurança para o protocolo NFS." [s.n.], 2006. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276483.

Full text
Abstract:
Orientador: Paulo Licio de Geus
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-06T04:50:10Z (GMT). No. of bitstreams: 1 Ruppert_GuilhermeCesarSoares_M.pdf: 908627 bytes, checksum: 2eb5cfc8a9692f72179b7c1cd2596b39 (MD5) Previous issue date: 2006
Resumo: Os sistemas de arquivos distribuídos são um componente importante em praticamente todas as redes coorporativas, acadêmicas e até mesmo domésticas. Neste cenário, o NFS (Network File System) é um dos sistemas de maior importância, não só pela importância histórica em ter sido um dos pioneiros, mas por ser largamente utilizado em todo o mundo. Porém, o NFS foi projetado com recursos insuficientes de segurança. A versão 3 do NFS, que é a versão utilizada atualmente em ambientes de produção, apresenta um nível de segurança praticamente nulo. Mais recentemente, foi elaborada a especificação da versão 4 do protocolo que corrige adequadamente os problemas de segurança. Contudo, o protocolo apresenta um grau de complexidade extremamente elevado e, devido a isso, poucos estão dispostos a enfrentar sua implementação. Atualmente, existem apenas algumas implementações preliminares deste protocolo e as mesmas não se encontram completas e estáveis. Logo, a migração para o NFSv4 a curto prazo é inviável. Neste trabalho foi realizado um amplo estudo dos diversos aspectos envolvidos com a segurança de sistemas de arquivos distribuídos, em especial o NFS. Foram levantadas as deficiências do NFS e foram analisados diversos trabalhos envolvendo segurança no compartilhamento de arquivos. Este trabalho resultou no projeto e implementação do NFS Guard, uma ferramenta para agregar segurança ao NFS versão 3 de forma simples e totalmente compatível com as redes NFS já instaladas. O NFS Guard utiliza clientes e servidores NFS padrão e não requer recompilação de nenhum software já instalado, podendo ser utilizado inclusive em sistemas de código fechado. Para isso foi desenvolvida uma técnica de Kerberização utilizando interceptação de pacotes, que também pode ser utilizada para agregar segurança a outros serviços além do NFS
Abstract: Distributed File Systems are an important component in practicalIy every corporate, academic or even home network. In this scenario, NFS (Network File System) is one of the most important of these systems, not only due to its historical importance for being one of the pioneers, but also for being largely used alI over the world. However, NFS was designed with insufficient security features. NFS version 3, which is the version currently being used in production environments, presents an almost nulI security leveI. More recently, the version 4 of the protocol was designed,among other thigs, to tackle the security issues. Nevertheless, this protocol presents an extremely high leveI of complexity, and consequently, a few want to face its implementation. At the moment, a few preliminary implementations are available, but usualIy incomplete and unstable. Hence, the migration to NFSv4 in a short term is not feasible. In this work we accomplished a wide study of many aspects involved with distributed file system security, specialIy with regards to NFS. NFS's shortcoming were identified e many works involving security in file sharing were analyzed. This work resulted in the design and implementation of NFS Guard, a tool to add security do NFS version 3 in a simple way and totalIy compatible with instalIed NFS networks. NFS Guard uses standard NFS client and server and does not require recompilation of any installed software, so it can be used with closed source systems. To accomplish that, a Kerberization technique was developed using packet interception, which can also be used to add security to other services besides NFS
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
14

Hedlund, Robin, and Peter Johansson. "Tidsloggning via NFC." Thesis, Högskolan i Halmstad, Akademin för ekonomi, teknik och naturvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30582.

Full text
Abstract:
Denna rapport beskriver utvecklandet av ett tidsrapporteringssystem som tillämpar Near-Field-Communication[NFC]-tekniken. Systemet är i första hand avsett för ett företag där systemet i sig är framtaget med moderna tekniker och utvecklades med syn på expandering och vidareutveckling. En webbapplikation har utvecklats som består utav en server, databas och webbsida. Servern kan ta emot förfrågningar för att hantera information som finns lagrad i databasen. Webbsidan kan hantera och se över tidsrapporter i ett användargränssnitt som kan nås med hjälp utav en webbläsare. Systemet innehåller en station som använder sig utav en NFC-läsare för att läsa av information ifrån externa NFC-enheter. Informationen som läses av skickas vidare, via Wi-Fi, till servern för att antingen registrera en ny station eller skapa en tidsloggning. En mobil applikation har utvecklats till mobiltelefoner som använder sig utav operativsystemet Android och har inbyggt NFC-stöd. En mobiltelefon som stödjer dessa kriterier kan svepas över en station för att utföra en tidsloggning. Mobiltelefonen kan själv utföra skapa, modifiera, ta bort och hämta tidsloggningar. GPS är integrerat för navigering och för att koppla ihop position med en tidsloggning.
This report describes the development of a time reporting system that applies the Near-Field Communication [NFC] technology. The system is primarily intended for a company where the system itself is designed with modern techniques and was developed with the vision of expansion and further development. A web application has been developed that consists of a server, database, and a web page. The server can receive requests to manage the information stored in the database. The web page can manage and review the time logs in a user interface that can be accessed with a browser. The system includes a station that uses a NFC-reader to read information from the external NFC devices. The information is then forwarded, with the help of Wi-Fi, to the server to either register a new station or create a time log. It also has a mobile application developed for mobile phones that use Android as operating system and has built-in NFC support. A mobile phone that supports these criteria may be swept over a station to perform a time log. The mobile phone can carry out create, modify, delete, and view time logs. GPS is integrated for navigation and to connect a position with a time log.
APA, Harvard, Vancouver, ISO, and other styles
15

Sopi, Jeton. "NFC Door Lock." Thesis, Högskolan i Halmstad, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-30306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Brégnard, Christelle. "Etude des mécanismes viraux et cellulaires qui régulent l’infection par le Virus de l’Immunodéficience Humaine de type 1." Thesis, Paris 5, 2012. http://www.theses.fr/2012PA05T025.

Full text
Abstract:
L’infection des cellules cibles par le Virus de l’Immunodéficience Humaine de type 1(VIH-1) suit une succession d’étapes finement régulées par de nombreux facteurs cellulaires et viraux. Mon travail de thèse a consisté à étudier certains aspects de cette régulation, en particulier la protéine virale Nef et son impact sur l’infectivité des virus, mais aussi la susceptibilité des cellules cibles à l’infection. Tout d’abord, nous nous sommes intéressés aux mécanismes selon lesquels Nef augmente l’infectivité virale. Pour cela, nous avons identifié les différences entre le protéome des virus sauvages et des virus dépourvus du gène nef (Δnef) grâce à deux méthodes protéomiques, laDIGE et l’iTRAQ. Nous avons pu mettre en évidence que les protéines Ezrine et EHD4 sont impliquées dans des processus qui rendent les virus sauvages plus infectieux que les virusΔnef. L’augmentation de l’infectivité virale par Nef dépend des glycoprotéines d’enveloppes avec lesquelles les particules virales sont pseudotypées. Dans le but d’identifier les bases moléculaires de ce mécanisme, nous avons généré des constructions chimériques entre des glycoprotéines d’enveloppes qui permettent (enveloppes permissives) ou ne permettent pas(enveloppes non permissives) au phénotype Nef de se manifester. Cette approche a permis démontrer que le domaine cytoplasmique de la protéine d’enveloppe est un des déterminants qui dictent l’acquisition du phénotype Nef. Mon travail s’est aussi axé sur le mécanisme de co-infection cellulaire par le VIH-1.Après co-incubation des cellules avec des virus VIH rapporteur GFP et DsRed, nos résultats ont montré que les événements de co-infection sont plus fréquents qu’attendus dans le cas d’une infection stochastique. Nous montrons que ce biais qui semble favoriser la co-infection et qui suggère l’hétérogénéité de la population cible en terme de susceptibilité à l’infection par le VIH-1 provient en fait d’une sous-estimation des fréquences de cellules infectées en raison d’un phénomène de latence post-intégrative. Ainsi, mes études ont permis de mieux comprendre les mécanismes permettant à Nef d’augmenter l’infectivité des particules virales ouvrant de nouvelles perspectives à ce sujet, de même qu’elles ont permis de mettre en évidence que la co-infection était bien un processus aléatoire mais qui permettait de révéler des cellules arborant un provirus silencieux
Pas de résumé en anglais
APA, Harvard, Vancouver, ISO, and other styles
17

Stanley, Mark. "Booze, Boomtowns, and Burning Crosses: The Turbulent Governorship of Pat M. Neff of Texas, 1921-1925." Thesis, University of North Texas, 2005. https://digital.library.unt.edu/ark:/67531/metadc4834/.

Full text
Abstract:
Pat M. Neff served as governor of Texas from 1921 to 1925, a period marked by political conflict between rural conservatives and urban progressives. Neff, a progressive, found himself in the middle of this conflict. Neff supported prohibition, declared martial law in the oil boomtown of Mexia, and faced the rise of the Ku Klux Klan as a political force in Texas. Though often associated with the Klan, Neff did not approve of the organization and worked against it whenever possible. During the Railroad Shopmen's Strike of 1922, Neff stalled the federal government in its demand he send troops to Denison just long enough to win re-nomination. William Jennings Bryan mentioned Neff as a possible candidate for the presidency in 1924, but he pursued a back-door strategy that alienated his political base among Texas Democrats.
APA, Harvard, Vancouver, ISO, and other styles
18

Sällberg, Kristian. "A Data Model Driven Approach to Managing Network Functions Virtualization : Aiding Network Operators in Provisioning and Configuring Network Functions." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-171233.

Full text
Abstract:
This master’s thesis explains why certain network services are difficult to provision and configure using IT automation and cloud orchestration software. An improvement is proposed and motivated. This proposed improvement enables network operators to define a set of data models describing how to provision and interconnect a set of Virtual Network Functions (VNFs) (and possibly existing physical network functions) to form networks. Moreover, the proposed solution enables network operators to change the configuration at runtime. The work can be seen as a step towards self managing and auto scaling networks. The proposed approach is compared to a well known cloud management system (OpenStack) in order to evaluate if the proposed approach decreases the amount of time needed for network operators to design network topologies and services containing VNFs. Data is collected through observations of network operators, interviews, and experiment. Analysis of this data shows that the proposed approach can decrease the amount of time required for network operators to design network topologies and services. This applies if the network operators are already acquainted with the data modeling language YANG. The amount of time required to provision VNFs so that they respond to connections can also be decreased using the proposed approach. The proposed approach does not offer as much functionality as OpenStack, as it is limited to VNF scenarios.
Denna masteruppsats förklarar varför vissa nätverkstjänster är svåra att skapa och konfigurera med IT-automationsverktyg och mjukvara för molnorkestrering.  En förbättring föreslås och motiveras. Den föreslagna förbättringen tillåter nätverksoperatörer att definiera en mängd datamodeller, för att beskriva hur Virtuella Nätverksfunktioner (VNF:er) skall instantieras och kopplas ihop till nätverkstjänster. Dessutom tillåter lösningen nätverksoperatörer att ändra konfiguration under tiden nätverken hanterar trafik.  Arbetet kan ses som ett steg mot självhanterande och automatiskt skalande nätverk. Den föreslagna lösningen jämförs med ett välkänt molnorkestreringsverktyg (OpenStack) för att utvärdera om den föreslagna lösningen sänker mängden tid som nätverksoperatörer behöver för att designa nätverkstopologier och tjänster som innehåller VNF:er. Data samlas in genom observationer av nätverksoperatörer, intervjuer, och experiment. Analys av datan visar att den föreslagna lösningen kan minska tiden som behövs för att designa nätverkstopologier och tjänster. Fallen där detta är applicerbart, är när VNF:er närvarar i nätverk. Dessa är enklare att skapa, konfigurera, och ändra under tiden de exekverar, med den föreslagna metoden. Detta kräver också att nätverksoperatören är bekant med datamodelleringsspråket YANG. Tiden det tar att provisionera VNF:er, tills dess att de svarar till anslutningar, kan sänkas med hjälp av den föreslagna metoden. Den förslagna metoden erbjuder väsentligt begränsad funktionalitet jämfört med OpenStack, den fokuserar på att hantera VNF:er.
APA, Harvard, Vancouver, ISO, and other styles
19

Landh, Evelina. "Musik + NPF = Sant : Musiklärares arbete med elever med neuropsykiatriska funktionsnedsättningar (NPF)." Thesis, Kungl. Musikhögskolan, Institutionen för musik, pedagogik och samhälle, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kmh:diva-3886.

Full text
Abstract:
Studien syftar till att bidra med ökad förståelse om musiklärares arbete med elever med NPF (neuropsykiatrisk funktionsnedsättning) i den ordinarie undervisningen. Jag har sökt finna både musiklärares arbetssätt och uppfattningar kring elever med NPF. Studien utgår från ett relationellt perspektiv. Jag har genomfört fyra kvalitativa intervjuer med musiklärare som arbetar på grundskolan samt en som jobbar på ett särgymnasium. Resultatet visade på en mängd arbetssätt och uppfattningar så som vikten av: anpassningar i miljön, struktur, samarbete med andra lärare, följa elevernas intresse och fysiska hjälpmedel. Resultatet visade också på vikten av att göra anpassningar som kommer alla till gagn. I slutsatsen tar jag bland annat upp att genom ordnad miljö, struktur, fysiska hjälpmedel, samverkan, flexibilitet, och adekvata lokaler och gruppstorlekar går det att möta elever med NPF på ett framgångsrikt sätt i musik i den ordinarie undervisningen.
This thesis aims to contribute to an increased understanding of music teachers' work with students with special needs, such as ADHD and autism, (called NPF) in the ordinary school in Sweden. I have tried to find both music teachers' working methods and their perceptions about students with NPF. The study is based on a relational perspective. I have done four qualitative interviews with music teachers who work in the primary school and one teacher that works in a special high school. The results showed a variety of working methods and perceptions, such as the importance of: adjustments and changes in the environment, structure, collaboration with other teachers, following students' interests and physical tools. The results also showed the importance of making adjustments that benefit every student. In the conclusion I mention that through an orderly environment, structure, physical tools, collaboration, flexibility, and adequate premises and group sizes, it is possible to meet all students needs successfully in music in the regular school.
APA, Harvard, Vancouver, ISO, and other styles
20

Tsaknakis, Dimitrios, and Gustaf Lindqvist. "En Survey av NFC och NFC-Protokoll med Fokus på Säkerhetsaspekterna." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26708.

Full text
Abstract:
Near Field Communication (NFC) is a short range wireless communication technology that enables data exchange between devices. NFC is used in many different areas, from subway tickets to authentication systems. This paper presents possible security threats to Near Field Communication and documented attacks that have been used to target various NFC protocols. Weaknesses in different NFC protocols will be presented and suggestions on how to counter certain weaknesses will be discussed. This survey will be valuable for companies interested in protecting their data when using or planning to use NFC systems.
APA, Harvard, Vancouver, ISO, and other styles
21

Durkin, Bailey. "THE IMPORTANCE OF THE NFL COMBINE IN DETERMINING DRAFT POSITION AND FUTURE PERFORMANCE." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/theses/2726.

Full text
Abstract:
Every year the National Football League (NFL) holds a draft where teams that have the worst records in the previous season are given the first opportunity to acquire the most talented players from colleges all over the nation, in a reverse-order pick system. The team’s ability to correctly identify and select players from this pool is essential in determining the effectiveness of the draft. The goal then of the draft would be to increase the competitiveness of the league and increase the chances that a team with a bad record the previous year will have a better one in the following season. The NFL Combine is an event held before the draft where prospective athletes showcase their skills in a few areas to increase their chances of being drafted. Most players drafted are offered a four-year contract where they can choose to sign again with the same team or another after the contract is up. This paper uses data from the players’ collegiate performances and performance in the NFL Scouting Combine to determine what affects a NFL team executive in their decision making process on draft order.
APA, Harvard, Vancouver, ISO, and other styles
22

Boumenot, Christopher M. "The performance of a Linux NFS implementation." Link to electronic thesis, 2002. http://www.wpi.edu/Pubs/ETD/Available/etd-0523102-121726/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Domah, Darshan. "The NERV Methodology: Non-Functional Requirements Elicitation, Reasoning, and Validation in Agile Processes." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/137.

Full text
Abstract:
Agile software development has become very popular around the world in recent years, with methods such as Scrum and Extreme Programming (XP). Literature suggests that functionality is the primary focus in Agile processes while non-functional requirements (NFR) are either ignored or ill-defined. However, for software to be of good quality both functional requirements (FR) and NFR need to be taken into consideration; lack of attention to NFR has been documented to be the cause of failure for many software projects. Hence special attention needs to be focused on NFR in Agile software development. By its very nature Agile processes require frequent changes but these changes are often not well documented. This is especially true of NFR in Agile processes. While functional requirements are carefully identified, NFR are often not properly elicited. Once NFR are identified they become the basis for reasoning and facilitation of design and development decisions. NFR also need to be validated through proper testing to ensure their quality attributes have been met in the final software product. This dissertation aimed at developing a methodology for addressing NFR in Agile processes. As such, the "NERV Methodology: Non-Functional Requirements Elicitation, Reasoning, and Validation in Agile Processes" was proposed. Several artifacts were created as part of this methodology and included: the NFR Elicitation Taxonomy, the NFR Reasoning Taxonomy, the NFR Quantification Taxonomy, and the Non-Functional Requirements User Story Companion (NFRusCOM) Card. Additionally the NERV Agility Index (NAI) was developed using the Agile Manifesto and its twelve principles. The NERV Methodology was validated using the 26 requirements of the European Union (EU) eProcurement Online System. Additionally the results obtained by the NORMAP Methodology in previous research, were used as baseline. Results show that the NERV Methodology was successful in identifying NFR, for 55 out of 57 requirements sentences that contained implicit NFR, compared to 50 for the baseline. This represented a 96.49% success rate compared to 87.71% for the baseline; an improvement of 8.78%. Furthermore the NERV Methodology was successful in eliciting 82 out of 88 NFR compared to 75 for the baseline. The elicitation success rate was 93.18% compared to 85.24% for the baseline; an improvement of 7.94%. Agility was validated using the same data set as above. Two experiments investigated project durations measured in 2-week sprint iterations, commonly used in Scrum. Results show that the first experiment, using the "FR and NFR Simultaneous Scheme" completed all FR and NFR scope in 24 sprints. The second experiment, using the "FR First Then NFR Scheme" consumed 26 sprints. The first agile scheduling scheme delivered all scope two sprints earlier than the second scheme; representing a saving of almost one month. Validation results showed that the NERV Methodology and its artifacts can potentially be beneficial for software development organizations for eliciting, reasoning about, and validating NFR in Agile processes.
APA, Harvard, Vancouver, ISO, and other styles
24

Moreira, Da Silva Sara. "Caractérisation de NEF-sp : une exoribonucléase 3'→ 5' spécifique du testicule." Thesis, Université Grenoble Alpes (ComUE), 2017. http://www.theses.fr/2017GREAV042/document.

Full text
Abstract:
Caractérisation de NEF-sp: une exoribonucléase 3'→ 5' spécifique du testicule. Les études biochimiques et génétiques ont révélé que de nombreuses protéines jouent un rôle important dans la voie des ARNpi (ARN interagissant avec Piwi). Néanmoins, certaines caractéristiques mécanistes ne sont pas encore complètement comprises. D’autre part, certaines protéines impliquées dans la voie des ARNpi pourraient ne pas encore être caractérisées. Lorsque ce projet a commencé, le traitement 3’ des ARNpi n'avait pas été complètement identifié. Par contre la directionnalité 3’ à 5’ avait été observée avec une dépendance au Mg2+. Toutefois, la protéine responsable du raccourcissement des ARNpi à leur longueur mature n'était toujours pas connue.NEF-sp devrait être une exo nucléase d'ARN avec une directionnalité de 3' à 5'. Sa prédiction de domaine a révélé que cela se compose d'un domaine de nucléase N-terminal et de deux motifs de reconnaissance d'ARN (RRM). NEF-sp est également prévue comme une nucléase spécifique aux testicules, mais son rôle biologique n'a pas été caractérisé auparavant. Ce projet s'est concentré sur une hypothèse initiale selon laquelle NEF-sp pourrait potentiellement agir comme une nucléase impliquée dans la voie des ARNpi.Globalement, nous avons démontré que NEF-sp humaine est une exoribonucléase avec une directionnalité 3'→ 5'qui est active sur les substrats de l'ARN simple brin. Cette protéine est exprimée exclusivement dans les testicules des souris. En plus, NEF-sp pourrait fonctionner dans le compartiment nucléaire. Notre analyse de la souris Nef-sp mutante n'a révélé aucun phénotype évident. Nous avons observé que les homozygotes des deux sexes sont viables et présentent une fertilité normale. De plus, NEF-sp ne semble pas jouer un rôle dans la voie des ARNpi. Il est possible que le recadrage du/des substrat(s) inconnu(s) ne soit pas important pour la viabilité et fertilité en raison de la compensation potentielle par d'autres nucléases. Néanmoins, notre étude fournit une caractérisation biochimique et génétique de l'exoribonucléase NEF-sp des mammifères
Genetic and biochemical studies have identified more than twenty different proteins involved in the piRNA pathway. However, some mechanistic features are still not fully understood. When this project started, piRNAs 3' end trimming was not completely characterized. Trimming was observed before in BmN4 cells and an Mg2+-dependent 3′ to 5′ exonuclease was implicated in this process. However, the protein responsible for shortening piRNAs to their mature length was still not known.NEF-sp is predicted to be an RNA exonuclease with 3′ to 5′ directionality. This protein is composed by three domains: a nuclease domain at N-terminal and two RNA binding motifs at C-terminal. NEF-sp is also predicted to be a testis-specific nuclease, however its biological role was not previously characterized. This project was based on the hypothesis that NEF-sp could potentially act as a nuclease involved in the piRNA maturation.We examined the biochemical properties of the uncharacterized mammalian nuclease family member NEF-sp. We show that Nef-sp transcripts are detected exclusively in mouse testes. We demonstrate that hNEF-sp is a 3ʹ→5ʹ exoribonuclease that is active on ssRNA substrates and likely functions in the nucleolar compartment. Our own analysis of the Nef-sp mouse knock-out mutant revealed no obvious phenotype. We observed that homozygous animals of both sexes are viability and display normal fertility. NEF-sp does not seem to play a role in piRNA pathway. It is possible that precise trimming of the unknown substrate(s) may not be important for viability/fertility due to potential complementation by other nucleases. Nevertheless, our study provides a biochemical and genetic characterization of the mammalian NEF-sp exoribonuclease
APA, Harvard, Vancouver, ISO, and other styles
25

Pereira, Marcelo Neiva. "Lettuce seedling production (Lactuca sativa L.) in floating hydroponic system." Universidade Federal do CearÃ, 2004. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=9218.

Full text
Abstract:
Conselho Nacional de Desenvolvimento CientÃfico e TecnolÃgico
Although it had been early developed aiming to search on the plants mineral nutrition, the hydroponic gained more importance between the growers due to possibility a better nutritional control that confers greater plant quality and minor incidence of pests. Some hydroponic systems have been considered for the lettuce grown, between them NFT (Nutrient Film Technique) and Floating System. This last one consists of the use of great amounts of nutrient solution in tanks where the plants are floating on plates with its roots flooded. This system has been showing promising for hot climates where the high temperatures can to limit the growing in other systems as the NFT. Therefore, a trial was carried out to evaluate the floating system in its diverse characteristics as stability of the electrical conductivity and pH, availability of dissolved oxygen to the plants and temperature of the nutrient solution. Also was evaluated, through the total fresh weight and root length, the cultivars VerÃnica and Vera, which are spread out between the growers that use hydroponic systems, in regards to its adaptability to the floating system. Each one of the cultivars were submitted at two levels of electrical conductivity (1,5mS/cm and 2,5 mS/cm) and two levels of artificial aeration (20min/h and 60min/h) in split-split-plot design. The study showed that the cultivar Vera was significantly better than VerÃnica concerning to the total fresh weight and root length. It did not have significant difference between the studied levels of electrical conductivity and artificial aeration in the development of the plants. It could still be observed that the system revealed sufficiently steady in regards to the evaluated parameters.
Embora tenha sido desenvolvida primeiramente com o objetivo de pesquisar sobre a nutriÃÃo mineral das plantas, a hidroponia ganhou bastante importÃncia entre os produtores devido à possibilidade do controle nutricional mais estreito que confere maior qualidade Ãs plantas e menor incidÃncia de problemas fitossanitÃrios. VÃrios sistemas hidropÃnicos tÃm sido propostos para o cultivo de alface, entre eles o NFT (Nutrient Film Technique) e o sistema de leito flutuante (Floating System). Este Ãltimo consiste da utilizaÃÃo de grandes quantidades de soluÃÃo nutritiva dispostas em tanques onde as plantas ficam flutuando sobre placas de material leve com suas raÃzes imersas. Este sistema tem se mostrado promissor para climas quentes onde as altas temperaturas podem ser limitantes ao cultivo em outros sistemas como o NFT. Diante do exposto foi realizado trabalho no sentido de avaliar o sistema de leito flutuante em suas diversas caracterÃstica como estabilidade da condutividade elÃtrica e pH, disponibilidade de oxigÃnio dissolvido Ãs plantas e temperatura da soluÃÃo nutritiva. TambÃm foram avaliadas, atravÃs da matÃria fresca total e comprimento radicular, os cultivares VerÃnica e Vera, os quais sÃo os mais difundidos entre os produtores que utilizam o sistema hidropÃnico, quanto à sua adaptabilidade ao sistema de leito flutuante. Para isso cada cultivar foi submetido a dois nÃveis de condutividade elÃtrica (1,5mS/cm e 2,5 mS/cm) e dois nÃveis de aeraÃÃo artificial (20min/h e 60min/h) utilizando o delineamento em parcelas subsubdivididas. O estudo mostrou que o cultivar Vera foi significativamente superior ao VerÃnica em relaÃÃo à matÃria fresca total e comprimento radicular. NÃo houve diferenÃa significativa entre os nÃveis de condutividade elÃtrica e aeraÃÃo artificial estudados no desenvolvimento das plantas. PÃde-se observar ainda que o sistema mostrou-se bastante estÃvel em relaÃÃo Ãs variÃveis avaliadas.
APA, Harvard, Vancouver, ISO, and other styles
26

Kriaučiūnas, Martynas. "Organizacijos informacinės sistemos reikalavimų formulavimas panaudojant vizija grindžiamą metodinį karkasą." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090908_202937-28002.

Full text
Abstract:
Šiame magistro baigiamajame darbe yra nagrinėjama, kaip ir kokiu mastu, struktūrinant reikalavimus pagal J.A.Zachmano karkasą ir panaudojant Toronto grupės pasiūlytą nefunkcinių reikalavimų dekomponavimo metodiką (NFR), galima bent iš dalies formalizuoti reikalavimų nuleidimą iš verslo lygmens į programų sistemos lygmenį. Darbo teorinėje darbo dalyje, remiantis atliktos mokslinės literatūros analizės rezultatais, pasiūlyta kaip pritaikyti Toronto metodiką reikalavimams nuleisti iš verslo į programų sistemos lygmenį Zachmano tipo karkasuose. Darbo eksperimentinėje dalyje šie pasiūlymai patikrinti praktiškai, atliekant konkrečios sistemos reikalavimų nuleidimą iš verslo į programų sistemos lygmenį. Tyrimo rezultatai parodė, kad NFR metodika tinkama ne visų reikalavimų nuleidimui žemyn, nes joje yra per silpnos dinamikos modeliavimo priemonės.
The aim of the master thesis is to investigate possibilities to use the NFR (non-functional requirements) approach proposed by Toronto group to perform the flowdown of requirements from business to software level in the methodical requirements engineering frameworks that organize requirements in a way similar to the J.A. Zachman’s Enterprise Architecture. Using results of the library research, the theoretical part of the thesis proposes a methodology how to apply NRF approach to perform flow down of the higher level requirements to lower ones in cases when requirements are organized according to principles proposed by J.A. Zachman. The experimental part of the thesis is devoted to the validation of the proposed approach using a simplified banking system example. The main conclusion of the thesis is that the NFR approach is applicable only to some part of requirements because the modelling means provided by this approach are not sufficient to model the system dynamic.
APA, Harvard, Vancouver, ISO, and other styles
27

Eriksson, Daniel, and Fredrik Färg. "Säker identifiering via NFC." Thesis, Tekniska Högskolan, Högskolan i Jönköping, JTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-20972.

Full text
Abstract:
Near Field Communication (NFC) växer i popularitet och byggs in i allt fler mobiltelefoner. Den här rapporten beskriver hur man på ett säkert sätt identifierar en godkänd användare via NFC. NFC saknar helt skydd för det data som överförs via RF. Den i rapporten beskrivna identifieringsprocessen skyddar den överförda identiteten mot kopiering och säkerställer att avlyssning av kommunikationen mellan NFC enheterna inte gör det möjligt för en obehörig att imitera en behörig användare och därmed själv bli identifierad som behörig. Syftet med arbetet är att:  Undersöka om en NFC-enhet kan användas som nyckel för att starta en bil. Följande fråga kommer att besvaras i denna rapport:  Hur implementeras en säker överföring av en identitet via NFC? Som metod användes aktionsforskning vilket innebär att man efter teoretiska studier kommer fram till en eller flera möjliga lösningar på det problem ska lösas. Därefter genomförs praktiska experiment för att bekräfta eller avfärda lösningen eller för att jämföra olika lösningars för- och nackdelar. Slutligen dokumenteras resultaten. För att hitta möjliga lösningar till problemet studerades först hur kryptering och hashning fungerar och hur de kunde användas i den specifika tillämpningen. Även metoden med synkroniserade listor utvärderades. Det viktiga spörsmålet, att göra avlyssning och kopiering av kommunikationen verkningslös, löstes genom att säkerställa att varje meddelande som överför identiteten var unikt. Efter en teoretisk jämförelse av de olika metoderna valdes hashning av en saltad identitet ut att implementeras och testas. För att kunna genomföra de praktiska testerna utvecklades ett kretskort baserad på NFC-controllern PN532 med tillhörande programvara. Detta gjordes i två steg där vi först utvecklade protokollhanteringen i en 8-bitars enchipsdator och därefter anpassades koden till en mer avancerad Linuxdator. Protokollimplementeringen genomfördes med hjälp av tidigare examensarbete "Dataöverföring mellan en mobiltelefon och en NFC-läsare" av Linda Karlsson [1]. I det avslutande kapitlet diskuteras hur den i rapporten beskrivna lösningen kan utvecklas vidare genom att med hjälp av digitala certifikat distribuera rättigheter till NFC enheter. En fallstudie beskriver en tillämpning inom affärsområdet biluthyrning.
APA, Harvard, Vancouver, ISO, and other styles
28

Pham, Thi Van Anh. "Security of NFC applications." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-124368.

Full text
Abstract:
Near Field Communication (NFC) refers to a communication technology that enables an effortless connection and data transfers between two devices by putting them in a close proximity. Besides contactless payment and ticketing applications, which were the original key drivers of this technology, a large number of novel use cases can benefit from this rapidly developing technology, as has been illustrated in various NFC-enabled application proposals and pilot trials. Typical NFC-enabled systems combine NFC tags, NFC-enabled mobile phones, and online servers. This thesis explores the trust relationships, security requirements, and security protocol design in these complex systems. We study how to apply the security features of different types of NFC tags to secure NFC applications. We first examine potential weaknesses and problems in some novel use cases where NFC can be employed. Thereafter, we analyze the requirements and propose our system design to secure each use case. In addition, we developed proof-of-concept implementations for two of our proposed protocols: an NFCenabled security-guard monitoring system and an NFC-enabled restaurant menu. For the former use case, we also formally verified our proposed security protocol.  Our analysis shows that among the discussed tags, the NFC tags based on secure memory cards have the least capability and flexibility. Their built-in three-pass mutual authentication can be used to prove the freshness of the event when the tag is tapped. The programmable contactless smart cards are more flexible because they can be programmed to implement new security protocols. In addition, they are able to keep track of a sequence number and can be used in systems that do not require application-specific software on the mobile phone. The sequence number enforces the order of events, thus providing a certain level of replay prevention. The most powerful type of tag is the emulated card since it provides a clock, greater computational capacity, and possibly its own Internet connection, naturally at higher cost of deployment.
Near Field Communication (NFC) hänvisar till en kommunikationsteknik som möjliggör en enkel anslutning och dataöverföring mellan två enheter genom att sätta dem i en närhet. Förutom kontaktlös betalning och biljetthantering ansökningar, vilket var den ursprungliga viktiga drivkrafter för denna teknik, kan ett stort antal nya användningsfall dra nytta av denna snabbt växande teknik, som har visats i olika NFC-aktiverade program förslag och pilotförsök. Typiska NFC-applikationer kombinerar NFC-taggar, NFC-kompatibla mobiltelefoner och online-servrar. Denna avhandling utforskar förtroenderelationer, säkerhetskrav och säkerhetsprotokoll utformning i dessa komplexa system. Vi studerar hur man kan tillämpa de säkerhetsfunktioner för olika typer av NFC-taggar för att säkra NFC-applikationer. Vi undersöker först potentiella svagheter och problem i vissa nya användningsfall där NFC kan användas.  Därefter analyserar vi de krav och föreslå vårt system design för att säkra varje användningsfall. Dessutom utvecklade vi proof-of-concept implementationer för två av våra föreslagna protokoll: en NFC-aktiverad säkerhet-guard övervakningssystem och en NFC-aktiverad restaurang meny. Dessutom, för fd bruk fallet, kontrollerade vi formellt vår föreslagna säkerhetsprotokoll. Vår analys visar att bland de diskuterade taggar, NFC taggar som baseras på säkra minneskort har minst kapacitet och dlexibilitet. Deras inbyggda trepass ömsesidig autentisering kan användas för att bevisa färskhet av händelsen när taggen tappas. De programmerbara beröringsfria smarta kort är mer flexibla eftersom de kan programmeras för att genomföra nya säkerhetsprotokoll.  Dessutom kan de hålla reda på ett löpnummer och kan användas i system som inte kräver ansökan-specik mjukvara på mobiltelefonen. Sekvensnumret framtvingar ordning av händelser, vilket ger en viss nivå av replay förebyggande. Den mest kraftfulla typen av taggen är den emulerade kortet eftersom det ger en klocka, större beräkningskapacitet, och möjligen sin egen Internet-anslutning, naturligtvis till högre kostnad för utplacering.
APA, Harvard, Vancouver, ISO, and other styles
29

Al-Ashraf, Samir Daniel, and Arban Sefedini. "Prototyper för NFC implementeringar." Thesis, Malmö högskola, Teknik och samhälle, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20545.

Full text
Abstract:
Near Field Communication (NFC) är en trådlös kommunikationsteknik för korta avstånd, vanligast med cirka 10 cm vilket medför en säkrare förbindelse. NFC är en relativt ung teknologi som är billig att implementera samt användarvänlig. NFC är lämpad främst för mobiltelefoner där en bred implementering av applikationer är möjlig. Tekniken medför snabbare och enklare utbyte av information genom att ställa enheter sida vid sida. I dagsläget används tekniken mest i Asien. I Europa har ingen stor satsning påbörjats än, men den är på väg. I framtiden förväntas det att NFC kommer att finnas i de flesta mobiltelefoner.Denna uppsats behandlar praktisk implementering av en ”verktygslåda” med NFC teknologi. Målet är att skapa en ”verktygslåda” med olika komponenter. ”verktygslådan” är tänkt att användas som grundskelett för implementering av NFC applikationer och för experiment med de olika komponenterna. Hårdvarukomponenterna består av mobiltelefon, tagg, RFID läsarmodul och mikroprocessor. Programvarukomponenterna består av ett antal kodexempel.Vårt arbete har resulterat i tre prototyper som tillsammans utgör ”verktygslådan”. I prototyperna sker kommunikation mellan en kombination av komponenter i ”verktygslådan”: mobiltelefon och tagg, läsare och tagg samt läsare och mobiltelefon.
Near Field Communication (NFC) is a contactless short distance (approximately 10 centimeters) communication technology, which conveys a more secure connection. NFC is a relatively young technology which is cheap to implement, and user-friendly. NFC is directed to mainly cellphones, where opportunities for implementation of applications are wide. The technology conveys a faster and easier exchange of information, by putting units side by side. At present, the technology is used mostly in Asia. In Europe, no major effort has begun yet, but is expected to. NFC is expected to exist in a majority of cellphones, in the future.This essay treats practical implementation of a “toolbox” with the NFC technology. The goal was to make a “toolbox” with different components. The “toolbox” is intended as a base for implementing NFC applications and for experimenting with the different components. The hardware components are: cellphone, a tag, a RFID module and a microprocessor. The program components consist of a number of code examples.Our work has resulted in three prototypes which together constitute a “toolbox”. The prototypes communicate between any combinations of the components in the “toolbox”: cellphone with tag, reader with tag and reader with cellphone.
APA, Harvard, Vancouver, ISO, and other styles
30

Li, Yimeng. "Self-Tuning NFC Circuits." Thesis, Mittuniversitetet, Avdelningen för elektronikkonstruktion, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-32550.

Full text
Abstract:
Contactless automatic identification procedures which are called RFID systems (Radio-frequency Identification) have become very popular in recent years for transferring power and data. With the development of RFID technology, the demand of easy transmitting of short data packages has made NFC (Near-field Communication) technology wildly used especially in mobile applications. The communication between a mobile and a tag is achieved through a magnetic field generated by the mobile’s NFC interface. In order to get a maximal power transmission, the tag circuit is designed to operate at the resonance frequency of 13.56 MHz, which is equal to the operation frequency of the mobile’s NFC interface. As mutual inductances provided by different kinds of mobiles exist divergence, optimal power transfer cannot be reached every time. This thesis focuses on the optimization of power transfer during the communications between tags and mobiles with uncertain NFC coils. By incorporating a self-tuning parallel variable capacitance compensation circuitry the resonance frequency of an NFC tag circuit can be self-tuned to 13.56 MHz to ensure an optimal power transmission. This thesis presents both theoretical and experimental analysis of this improved self-tuning NFC circuitry in detail and demonstrates that by digitally tuning a parallel capacitor circuit, the energy transferred to an NFC tag can be optimized when facing different kinds of NFC-enabled mobile phones.
APA, Harvard, Vancouver, ISO, and other styles
31

Nordström, Daniel, and David Nyqvist. "Near Field Communication : En studie av säkerhetsaspekternas påverkan för mobila betalningar." Thesis, Uppsala universitet, Institutionen för informatik och media, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-179609.

Full text
Abstract:
Near Field Communication (NFC) är en teknik som möjliggjort utvecklingen av vardagliga betalningar med hjälp av mobiltelefonen. I Sverige är betalningar med NFC-tekniken i mobiltelefoner fortfarande i introduktionsfasen. För att denna teknik ska ha möjlighet att fungera som ett komplement till redan befintliga betallösningar, granskas därför möjligheten för NFC-teknik som betallösningsmetod med inriktning på säkerhetsaspekter. Syftet med uppsatsen är att granska säkerhetsaspekter för NFC-teknik som mobil betallösningsmetod samt analysera dessa aspekter för att få djupare kunskap för NFC-teknologins möjligheter. Kunskapen har erhållits genom en litteraturstudie samt kompletterande av en intervju för att få bredd i informationsbehandlingen. Resultatet av studien visar att NFC-teknologin som betallösningsmetod kan påverkas av ett antal säkerhetsaspekter. För att NFC-tekniken skall nå en bredd i marknaden måste flertalet aktörer samarbeta för en standardisering i användandet av tekniken.
Near Field Communication (NFC) is a technology that enables the development of payments using the mobile phone. In Sweden, payments with NFC technology in mobile phones are still in the introductory phase. To ensure that the proposed technology can be utilized as a complement to existing payment options, one must consider the safety aspects of said construct. In this thesis we will review the technology with a focus on safety aspects. The purpose of this thesis is to review the security aspects of NFC technology for mobile payment and analyze these aspects in order to gain deeper knowledge of NFC technology opportunities. The knowledge has been obtained through a literature review, complemented by an interview to get a wide knowledge about the information. The results of the study show that NFC technology as a payment option can be affected by a number of safety issues. To ensure a viable market share, operators utilizing NFC technology must cooperate to standardize the implementation.
APA, Harvard, Vancouver, ISO, and other styles
32

Branken, David Jacobus. "Membrane facilitated separation of NF3 and CF4 / David Jacobus Branken." Thesis, North-West University, 2013. http://hdl.handle.net/10394/9497.

Full text
Abstract:
Nitrogen trifluoride (NF3) is frequently used as a source of fluorine in the electronics device manufacturing industry as a dry etchant during plasma assisted etching of silicon wafers, or during the plasma cleaning of chemical vapor deposition chambers. As a result of the electrochemical synthesis procedures in which carbon anodes are used in a fluorine-rich environment, NF3 product streams are frequently contaminated with ppm-amounts of carbon tetrafluoride (CF4). The electronics manufacturing industry, however, requires NF3 of exceptional purity, i.e. so-called VLSI-grade (very large scale integration) NF3, with CF4 concentrations of 20 ppm and below. Due to the close chemical and physical similarities of the two compounds, the removal of CF4 from NF3 has proven to be rather difficult, and current NF3 purification technologies are relatively inefficient. Although membrane gas separation has proven to be competitive in terms of operating costs and energy efficiency, its use for the purification of NF3 seems to have remained unexplored to date. In this study, the use of high free volume glassy perfluoropolymers of Teflon AF2400, Teflon AF1600, and Hyflon AD60 was therefore investigated. To be able to measure the pure and mixed gas permeabilities and selectivities of the solution-cast membranes towards NF3 and CF4, a custom built experimental setup was used, in which a newly developed gas chromatographic (GC) analysis method was implemented. Using divinylbenzene-styrene co-polymer stationary phases in the form of Super Q, a reliable quantification of mixtures of NF3 and CF4 were achieved without requiring additional fluorocarbon liquid stationary phases, as is commonly used in NF3 production environments. Furthermore, by implementing a dual-channel configuration it was possible to quantify a wide range of NF3 and CF4 concentrations. Using the newly developed technique, NF3 and CF4 concentrations of ca. 1 mol% and upwards could be quantified using a Thermal Conductivity Detector (TCD) on one channel, and NF3 and CF4 concentrations of between ca. 40 vppm and 4000 vppm could be measured using a Pulsed Discharge Helium Ionisation Detector (PDHID) on the second channel of the GC method. The glassy perfluoropolymer membranes of Teflon AF2400, Teflon AF1600, and Hyflon AD60 were prepared by a solution casting method, and it was found that annealing at sufficiently high temperatures (170 – 200 °C) ensured optimum permeability selectivity. In contrast, thermal analysis of the solution-cast Hyflon AD60 membranes that were heated to only 95 °C confirmed that the polymer matrix was significantly swollen due to a residual amount of the casting solvent. Consequently, considerably reduced selectivity and increased permeability of both NF3 and CF4 were observed for such solvent-swollen Hyflon AD60 membranes in comparison with the non-swollen membranes that were annealed at 170 °C. Nonetheless, the measured He/N2 permeability and permeability selectivity of all the membranes studied compared favourably with literature values, and selectively permeated NF3 rather than CF4 wherein the pure and mixed gas permeability selectivity displayed a clear dependence on the fractional free volume (FFV) of the polymer matrices. Thus, in accordance with the decreasing FFV of the perfluoropolymers in the order Teflon AF2400 > Teflon AF1600 > Hyflon AD60, the NF3 permeability decreased from 227 Barrer for Teflon AF2400, to 29 Barrer for Teflon AF1600, to 1.9 Barrer for Hyflon AD60. In contrast, the NF3/CF4 selectivity, α(NF3/CF4), increased inversely from 4.5 for Teflon AF2400, to 6.0 for Teflon AF1600, to the highest selectivity of 12 which was obtained using Hyflon AD60. To elucidate the mechanism of separation, the transport properties of NF3 and CF4 in Teflon AF2400 and Teflon AF1600 w.r.t. diffusion and solubility were studied using Molecular Dynamics (MD), Grand Canonical Monte Carlo (GCMC), and statistical thermodynamic techniques. The results indicated that NF3/CF4 diffusion selectivity (DNF3/DCF4) was favoured by the lower free volume of Teflon AF1600, whereas poor correlation was achieved between the GCMC calculated sorption isotherms of CF4 and the experimentally determined isotherms as reported in the literature. Consequently, the non-equilibrium lattice fluid (NELF) model, which more accurately described the sorption isotherms of CF4, was used to evaluate the solubility selectivity. It was found that by adjusting the NELF model interaction parameter, Ψ, favourable NF3/CF4 solubility selectivities (SNF3/SCF4) were predicted. Furthermore, by combining the solubility selectivity values with the diffusion selectivities calculated from the MD results, permeability selectivity predictions that correlated well with the experimentally determined values were obtained. Based on a semi-quantitative technological evaluation, it was concluded that although good NF3/CF4 mixed gas permeability selectivity was obtained with Hyflon AD60, further research into improving the NF3 solubility, and hence permeability will aid in the development of an efficient membrane gas separation process for the purification of NF3.
PhD (Chemistry),North-West University, Potchefstroom Campus, 2013.
APA, Harvard, Vancouver, ISO, and other styles
33

Blees, Chris. "Running Backs in the NFL Draft and NFL Combine: Can Performance be Predicted?" Scholarship @ Claremont, 2011. http://scholarship.claremont.edu/cmc_theses/127.

Full text
Abstract:
Berri and Simmons (2009) investigate the relationship between the NFL Combine and the NFL Draft. They find that a quarterback’s performance in the Combine can have a significant impact on that player’s draft position. However, they find that no known aspect of a quarterback before they are drafted is an indicator of success in the NFL. I examine if these relationships exist for the Running Back position. I find similar results to Berri and Simmons: that performance in the Combine does have an effect on that player’s draft position, but that no aspect of a running back’s pre-draft characteristics can be seen as a sign of future NFL success.
APA, Harvard, Vancouver, ISO, and other styles
34

Gallagher, Michael. "A Better Predictor of NFL Success: Collegiate Performance or the NFL Draft Combine?" Digital Commons @ East Tennessee State University, 2019. https://dc.etsu.edu/etd/3570.

Full text
Abstract:
NFL teams spend massive sums to ensure they are prepared for the future, but how should they determine whom that future includes? This study set out to find what predicts NFL success more accurately – collegiate in-game performance or the NFL Draft Combine. In the sample of 2007-2012 first-round picks, 191 athletes were measured in three NFL Draft Combine drills, two physical components, and a varying amount of ingame collegiate and NFL performance statistical categories, dependent on position. Secondarily, this work examined Power 5 and non-Power 5 players to determine if attending a more prolific program was predictive of NFL success. Findings included that 40-yard dash and vertical jump are predictive of offensive linemen and cornerback NFL success, that in-game collegiate statistics are most indicative of NFL success amongst defensive players, and that Power 5 prospects are no more prepared for NFL success than those coming from non-Power 5 schools.
APA, Harvard, Vancouver, ISO, and other styles
35

Barakat, Jean-Baptiste. "Croissance auto-catalysée de nanofils d'InP sur silicium par épitaxie par jets moléculaires en mode vapeur-liquide-solide : application aux interconnexions optiques sur puce." Thesis, Ecully, Ecole centrale de Lyon, 2015. http://www.theses.fr/2015ECDL0027/document.

Full text
Abstract:
L’intégration monolithique de matériaux semi-conducteurs III-V sur substrat de Silicium est essentielle pour le développement de la photonique sur Silicium. L’objectif est de réaliser une micro-source optique à base d’un réseau ordonné de Nanofils (NFs) III-V (InAsP/InP) placés sur un guide d’onde Si. De par leur aptitude à relaxer les contraintes, les NFs sont d’un grand intérêt. C’est dans ce contexte que s’est déroulée cette thèse axée sur la croissance autocatalysée de NFs InP sur Silicium par épitaxie directe. Nous avons ainsi montré que la croissance auto-catalysée de NFs InP denses et verticaux dépend directement de la nature de l’oxyde de surface du substrat Si. Une distribution monomodale ou bimodale de NFs ont été achevées en fonction des conditions de formation des gouttelettes d’indium ou des paramètres de croissance. Une pression critique et une température critique ont permis de délimiter des domaines favorables à la croissance. Les propriétés optiques intrinsèques des NFs ont été déterminées suffisantes pour l’objectif visé. Enfin, des résultats sur la simulation optique et la polarisation de la lumière émise dans les NFs et le guide d’onde ont permis d’établir un cahier des charges pour la croissance des NFs verticaux sur SOI pour que le couplage/partage de leurs modes optiques soit le plus efficace possible aux longueurs d’onde télécom
Monolithic integration of III-V semiconductors materials on Si substrate is essential for the Si photonic development. We aim at achieving an optical microsource based on a regular array of III-V (InAsP/InP) nanowires (NWs) standing on top a Si waveguide. Due to their ability to be fully relaxed, nanowires growth is of deep interest. This PhD thesis has been oriented towards such context especially among self-catalyzed InP NWs growth by epitaxy. Thus we have shown that highly dense and vertical self-catalyzed InP NWs accomplishment is related to Si substrate surface oxide. A monomodal or bimodal NWs distribution have been reached through a control of indium droplets formation or growth parameters. A critical pressure and a critical temperature have been found to delimit favorable growth regime. Intrinsic optical properties have been determined to be goal sufficient. Optical simulation modeling and characterization of the polarization light state in NWs and in the Si waveguide have led us to establish functional specifications to grow vertical NWs on SOI as way that their optical modes could be coupled efficiently at telecommunications wavelength
APA, Harvard, Vancouver, ISO, and other styles
36

Brigle, Kevin Eugene. "Studies on the structure and function of various nif and nif- associated gene products encoded within the Azotobacter vinelandii nif gene cluster." Diss., Virginia Polytechnic Institute and State University, 1989. http://hdl.handle.net/10919/54498.

Full text
Abstract:
The present study investigates the structural and functional roles of the metalloclusters present within the MoFe protein of nitrogenase from Azotobacter vinelandii. A gene replacement strategy was developed for oligonucleotide-directed mutagenesis of these proteins and the resulting biological and biochemical effects of these changes were examined. Identification of structurally important regions in the MoFe protein subunits and assignment of specific amino acid residues as potential metal cluster ligands were based upon several criteria: i. metallocluster extrusion requirements; spectroscopic properties of the MoFe protein; interspecies and intersubunit comparisons; iv. comparison of the MoFe protein subunit sequences to iron-molybdenum cofactor biosynthetic gene products. This mutagenesis strategy has permitted the construction of thirty-three mutant strains having specific amino acid substitutions within the MoFe protein subunits. Based on the diazotrophic growth characteristics and substrate reduction capabilities of these mutant strains, a model is presented in which potential metallocluster binding sites within the MoFe protein subunits are defined. In addition to analysis of the MoFe protein subunits, this site-directed mutagenesis and gene replacement strategy can be used to place specific mutations into any gene product encoded within the A. vinelandii nif gene cluster. Finally, nucleotide sequence analysis of the regions flanking the nifEN genes revealed the presence of three nif genes (nifT, nifY, and nifX) and four open reading frames (ORF1, ORF2, ORF3, and ORF4). Two of these genes, nifX and ORF3, were shown to be under nif control and synthesis of their products elevated in response to a demand for fixed nitrogen. Mutant strains with deletions in ORF3 appeared to accumulate an excess amount of MoFe protein when compared to wild type. The ORF3 gene product has been overproduced in E. coli. This provides an important step toward characterizing the protein and elucidating the molecular basis for its control of nifDK gene expression.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
37

Edbor, Mikael. "Swedish vs. Japanese Mobile Technology : A study on the technologies and services which can be transferred between the two markets." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-47319.

Full text
Abstract:
This report investigates what services and technologies currently sepatare the Swedish and the Japaneese phone markets, and what they can learn from each other. The purpose of the report is to find if there are any sevices or technologies that can be transferred between the two markets. The research was done by both literature study and interviews with people and companies who work in both markets, or who condutcs their own research on the subject brought up in this report. The interviews were conducted using questionnaire with a few core questions and then extended by questions fitting the person's own area of expertise. A few services such as micro payments via near field communications (NFC) technology, were found to be eligible candidates for introduction to the Swedish market.
Den här rapporten undersöker vilka tjänster och teknologier som för tillfället skiljer den svenska och den japanska moblmarknaden åt, och vad dessa marknader kan lära av varandra. Syftet med rapporten är att finna ifall det finns några tjänster eller teknologier som kan överföras mellan marknaderna. Undersökningen gjordes både genom litteraturstudie och intervjuer med personer och företag som jobbar i de två marknaderna, eller utför egen forskning inom området som tas upp i den här rapporten. Intervjuerna utfördes genom  att följa ett frågeformulär där ett par kärnfrågor användes och som sedan bygdes på med frågor som passade den intervjuades expertis. Några tjänster, så som betalning via Near Field Communications tekniken (NFC), anses vara passande kandidater för att importeras till den svenska marknaden.
APA, Harvard, Vancouver, ISO, and other styles
38

Selander, Jonas. "RFID-teknikens sårbarheter i kort med beröringsfri funktion." Thesis, Högskolan i Gävle, Avdelningen för elektronik, matematik och naturvetenskap, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-27546.

Full text
Abstract:
Radio Frequency Identification (RFID) används i många områden idag. Det finns olika typer av sårbarhet och hot mot RFID-system där bland annat skimning av bankomatkort är ett hot. Skimning är bankomatkortsbedrägeri genom att stjäla känsliga kortuppgifter som senare kan användas i brottsligt syfte. På grund av hot för skimning, har olika RFID-skydd dykt upp på marknaden, så kallade skimningsskydd som är designade att placeras i plånboken för att skydda korten mot avläsning. I examensarbetet har olika skimningsskydd testats, där resultatet blev att de var skillnad mellan dem. Det dyrare skyddet skyddade flera kort samtidigt medan det billigare alternativet endast kunde skydda ett kort samtidigt. Efter resultatet var slutsatsen att skimningsskydden inte var tillräckligt effektiva för att skydda alla korten i en plånbok. För att ge bästa skydd bör placeras längst ut på varje sida i plånboken. Många telefoner har en inbyggd RFID-standard vid namn Near Field Communication (NFC), som gör det möjligt att scanna beröringsfria bankomatkort med inbyggd RFID-krets. I det här examensarbetet har olika beröringsfria kort lästs av med hjälp av en telefon med inbyggd NFC-teknik med härför avsedda applikationer. Både kortnummer och utgångsdatum gick att läsa av, dock inte CVC-koden. Slutsats efter detta experiment var att det är svårt att skimma en annan persons kort med hjälp av en telefon med inbyggd NFC-teknik. Telefonen måste vara i direktkontakt med kortet för att kunna läsas av, däremot kan en RFID-läsare med lång räckvidd skimma från längre avstånd. Två olika RFID-läsare har testats, där den ena läsaren hade en inbyggd antenn men till den andra läsaren har en extern antenn designats och kopplats in. Syftet var att mäta läsavståndet mellan tagg och RFID-läsare. Läsavståndet varierade på grund av antennens egenskaper.
APA, Harvard, Vancouver, ISO, and other styles
39

Liutkus, Antoine. "Processus gaussiens pour la séparation de sources et le codage informé." Phd thesis, Télécom ParisTech, 2012. http://pastel.archives-ouvertes.fr/pastel-00790841.

Full text
Abstract:
La séparation de sources est la tâche qui consiste à récupérer plusieurs signaux dont on observe un ou plusieurs mélanges. Ce problème est particulièrement difficile et de manière à rendre la séparation possible, toute information supplémentaire connue sur les sources ou le mélange doit pouvoir être prise en compte. Dans cette thèse, je propose un formalisme général permettant d'inclure de telles connaissances dans les problèmes de séparation, où une source est modélisée comme la réalisation d'un processus gaussien. L'approche a de nombreux intérêts : elle généralise une grande partie des méthodes actuelles, elle permet la prise en compte de nombreux a priori et les paramètres du modèle peuvent être estimés efficacement. Ce cadre théorique est appliqué à la séparation informée de sources audio, où la séparation est assistée d'une information annexe calculée en amont de la séparation, lors d'une phase préliminaire où à la fois le mélange et les sources sont disponibles. Pour peu que cette information puisse se coder efficacement, cela rend possible des applications comme le karaoké ou la manipulation des différents instruments au sein d'un mix à un coût en débit bien plus faible que celui requis par la transmission séparée des sources. Ce problème de la séparation informée s'apparente fortement à un problème de codage multicanal. Cette analogie permet de placer la séparation informée dans un cadre théorique plus global où elle devient un problème de codage particulier et bénéficie à ce titre des résultats classiques de la théorie du codage, qui permettent d'optimiser efficacement les performances.
APA, Harvard, Vancouver, ISO, and other styles
40

Zeng, Guoqian. "Analysis of NGF-dependent cell cycle defects in an NGF-nonresponsive TrkA receptor mutant." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq30835.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Olivieri, Steven. "An Investigation of Security in Near Field Communication Systems." Digital WPI, 2015. https://digitalcommons.wpi.edu/etd-dissertations/46.

Full text
Abstract:
Increasingly, goods and services are purchased over the Internet without any form of physical currency. This practice, often called e-commerce, offers sellers and buyers a convenient way to trade globally as no physical currency must change hands and buyers from anywhere in the world can browse online store fronts from around the globe. Nevertheless, many transactions still require a physical presence. For these sorts of transactions, a new technology called Near Field Communication has emerged to provide buyers with some of the conveniences of e-commerce while still allowing them to purchase goods locally. Near Field Communication (NFC), an evolution of Radio-Frequency Identification (RFID), allows one electronic device to transmit short messages to another nearby device. A buyer can store his or her payment information on a tag and a cashier can retrieve that information with an appropriate reader. Advanced devices can store payment information for multiple credit and debit cards as well as gift cards and other credentials. By consolidating all of these payment forms into a single device, the buyer has fewer objects to carry with her. Further, proper implementation of such a device can offer increased security over plastic cards in the form of advanced encryption. Using a testing platform consisting of commercial, off-the-shelf components, this dissertation investigates the security of the NFC physical-layer protocols as well as the primary NFC security protocol, NFC-SEC. In addition, it analyzes a situation in which the NFC protocols appear to break, potentially compromising sensitive data. Finally, this dissertation provides a proof of security for the NFC-SEC-1 variation of NFC-SEC.
APA, Harvard, Vancouver, ISO, and other styles
42

Lee, Justin. "Evaluating NFL Player Performance and Draft Efficiency: Where is the Best Value in the NFL Draft?" Scholarship @ Claremont, 2018. http://scholarship.claremont.edu/cmc_theses/1740.

Full text
Abstract:
This paper uses empirical analysis to value of each section of the NFL Draft relative to the others in order to establish which NFL draft picks are undervalued. We crafted a new performance metric that uses the size of a given draftee’s second contract relative to his peers to evaluate his performance over the course of his previous contract. Using two OLS regressions, we predict the level of performance, given by our metric score, for each section of the draft. We then use the residuals from these regressions to investigate which sections of the draft are undervalued. The results show that mid-3rd round picks and late 5th round picks are the best value per dollar in the draft.
APA, Harvard, Vancouver, ISO, and other styles
43

Jansson, Dan. "Telematik - en del i NBF? :." Thesis, Försvarshögskolan, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1766.

Full text
Abstract:
Samhällsutvecklingen går från industrisamhälle till informationssamhälle och Försvarsmakten (FM) går fråninvasionsförsvar till insatsförsvar. Tidigare var det mer regel än undantag att civil teknologi hade sitt ursprung imilitär teknologi, t.ex. Internet. Idag är det precis tvärtom med marknadskrafterna som driver utvecklingen avt.ex. IT i ett högt tempo. Väpnade styrkor strävar efter att ta till vara på denna utveckling inom kommunikationoch informationsteknologi, i syfte att ha förmåga att möta framtida hot. Den militära utvecklingen inom dettaområde benämns Revolution in Military Affairs (RMA). Den svenska FM:s motsvarighet benämnsnätverksbaserat försvar (NBF) och är en tillämpning av tankegångarna kring konceptet RMA. Omfattandeforskning pågår inom IT generellt och telematiken är inte undantagen.Det amerikanska dokumentet Joint Vision 2010 FOCUSED LOGISTICS menar att teknologiutvecklingkommer att spela en avgörande roll för logistikledning, och att förbättringar av bl.a. built in test (BIT) ochtelemaintenance kommer att höja den tekniska personalens effektivitet. Telemaintenance är en delmängd avbegreppet telematik och består av: Fordonstjänster innehållande diagnostik för övervakning avfordonssystemet, larm för påkallning om allvarliga fel håller på att uppstå samt ”Vehicle Control” förfjärrstyrning av fordons funktioner. Underhållstjänster innehållande driftsinformation om t.ex. antaldriftstimmar, bränsleförbrukning, vibration, etc. Tjänsterna undersöks i denna uppsats med bakgrund avteknisk tjänst, vars syfte är att understödja krigsförbandens förmåga att lösa sina uppgifter. Teknisk tjänstbidrar till teknisk och taktisk tillgänglighet genom att säkerställa att ett tillräckligt antal materielsystem kanverka med erforderlig effekt.Uppsatsen tydliggör förväntningar på ett telemaintenance-system hos svensk trupp insatta i internationellaoperationer, närmare bestämt vilket behov av telemaintenance som 1993 förelåg vid den första bataljonen(BA01) som sattes in i Bosnien ingående i UNPROFOR.
As our industrial society has become more information based, ournational defense requirements have changed focus from an invasion defenceto an operations defence. For many years, new information technologiessuch as the internet were first developed for military use. Today the oppositeis true. Market forces are now driving the development of new technologiessuch as IT, at a fast pace. Armed forces must strive to make use of thesedevelopments within the areas of communication and informationtechnology, to better prepare for future threats. The military development inthis sector in called a “Revolution in Military Affairs” (RMA). The SwedishArmed Forces equivalency is called a “network-based defense” (NBF) andmakes use of the RMA concept. Extensive research is underway within ITin general and telematics is not an exception.The American document, “Joint Vision 2010 FOCUSED LOGISTICS”claims that the development of technology will play a decisive part inlogistics management, and that improvement in among other things, BITand telemaintenance will raise the effectiveness of technical servicepersonnel. Telemaintenance is one part within the concept of telematics andconsists of:Vehicle service consisting of diagnostic surveillance of vehicle systems,alarms for indication of serious faults, and Vehicle Control for remotecontrolling of vehicle functions.Maintenance service consisting of operational information such as thenumber of hours in operation, fuel consumption, vibration etc.Telemaintenance is investigated in this thesis with a background ofSwedish Army maintenance concept, which purpose is to support militaryfield units in their ability to solve their tasks. The maintenance conceptoffers greater technical and tactical availability by keeping optimal numbersof material systems operational.This thesis describes the expectations of a telemaintenence system of aSwedish troop in international operation, or more precisely, thetelemaintenence needs that were evident in 1993 at the first battalion(BA01) in Bosnia as part of UNPROFOR.
Avdelning: ALB - Slutet Mag 3 C-upps.Hylla: Upps. ChP 01-03
APA, Harvard, Vancouver, ISO, and other styles
44

Pfanstiel, Jörn, Christine Keller, Alexandra Funke, Tristan Heinig, and Thomas Schlegel. "Mobile Reisebegleitung mit NFC-Unterstützung." Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2012. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-101011.

Full text
Abstract:
Die zunehmende Nutzung [1] persönlicher mobiler Geräte durch immer mehr Fahrgäste des öffentlichen Personenverkehrs (ÖPV) begünstigt die Entwicklung neuer Applikationen, die den allgegenwärtigen Zugriff auf domänenspezifische Inhalte und Echtzeitdaten über variable Schnittstellen und Informationskanäle realisieren. Near Field Communication (NFC) gilt in diesem Zusammenhang als eine vielversprechende Technologie, die neben kontaktloser Datenübertragung auch Bezahlvorgänge direkt über das mobile Endgerät ermöglicht. Mit Blick auf die unterschiedlichen Einsatzmöglichkeiten von NFC in der mobilen Reisebegleitung wird in diesem Beitrag eine ikonografische Klassifikation für die visualisierte Analyse von Anwendungsszenarien vorgestellt, welche zur Planung ubiquitärer Applikationen im ÖPV eingesetzt werden kann.
APA, Harvard, Vancouver, ISO, and other styles
45

Pedersen, Ryan. "Life Planning for NFL Players." Scholarship @ Claremont, 2011. http://scholarship.claremont.edu/cmc_theses/173.

Full text
Abstract:
With players in the National Football League (NFL) making what seems to be the most money out of any entry-level position, it might come as a shock to many people to hear that so many players end up in financial distress afterwards. Sports Illustrated has put this number at 78% of players filing for bankruptcy or are in serious financial trouble within only two years of leaving the league (Torre). The problems that the players run into are their short careers, which average 3 ½ years, their poor financial decisions and their very optimistic approach to life. The 3 ½ years means that they should approach their employment as more of a lottery winning than a long term career. With so much income, the players might want to take out large mortgages and could be in trouble. They would believe that they would be the exception and not the rule for this because they are constantly succeeding as well. The players should set up a budget to fix this. They should defer the maximum amount of compensation possible and invest most of the rest. The athletes should have enough still to have a comfortable few years in the NFL. The football players should also be smart and get a college degree while they can for free.
APA, Harvard, Vancouver, ISO, and other styles
46

Simard, Marie-Chantal. "Nef pathogenesis in transgenic mice." Thesis, McGill University, 2006. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=103182.

Full text
Abstract:
In order to study the functions of SIV Nef in vivo, in a small animal model, transgenic (Tg) mice expressing the SIVmac239 nef gene, under the control of the human CD4 gene promoter (CD4C) were generated. The transgene was found to be expressed in the same cells targeted by the virus, in vivo. These CD4C/SHIV-nef SIV Tg mice develop a severe AIDS-like disease, including premature death, failure to thrive/weight loss, wasting, thymic atrophy, exhibit an especially low number of peripheral CD8+ T cells as well as low number of peripheral CD4+ T cells, diarrhea, splenomegaly, kidney (interstitial nephritis, segmental glomerulosclerosis), lung (lymphocytic interstitial pneumonitis) and heart disease. In addition, these Tg mice fail to mount a class-switched antibody response after immunization with ovalbumin, produce anti-DNA autoantibodies and some of them develop P. Carinii lung infection. These CD4C/SHIV-nefSIV Tg mice develop an AIDS-like disease very similar to that of CD4C/HIV Tg mice, except that the kidney and cardiac diseases were more severe, and that a thymic developmental defect was observed. Heart enlargement was very severe in CD4C/SIV Tg mice during early breeding on the C3H background. Histopathological lesions in the heart of these mice were also multifocal and were similar to those found in CD4C/HIV Tg mice. Data from echocardiography analysis are not yet available for these Tg mice. The low number of peripheral CD8+ and CD4 + T cells likely reflects a thymic defect and may be similar to the DiGeorge-like "thymic defect" immunophenotype described in a subgroup of HIV-1 infected children. Ontogeny studies show that the Tg mice were born with a smaller thymus and that this phenotype is not progressive in nature. As young as embryonic day 17, the thymic absolute cell numbers are lower in the Tg mice when compared to their non-Tg controls and there is a defect in thymocyte maturation in the transition between DN3 and DN4, with a failure to generate normal numbers of DP cells. Fetal liver transplantation studies have ruled out a significant impairment of the thymic epithelium and have suggested that this defect is likely a direct consequence of abnormal T cell progenitors in the thymus.
Therefore, it appears that SIV Nef alone expressed in mice, in appropriate cell types and at sufficient levels, can elicit many of the phenotypes of simian and human AIDS. These Tg mice should be instrumental in studying the pathogenesis of SIV Nef-induced phenotypes.
APA, Harvard, Vancouver, ISO, and other styles
47

Sveistrup, Peter. "NFA-grillen : Solenergidrevet automatisert pølsegrill." Thesis, Norwegian University of Science and Technology, Department of Engineering Cybernetics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10960.

Full text
Abstract:
Norsk Forening for Automatisering endret i 2009 sin visjon til ?Gjøre automatiseringtil et hovedtema i det offentlige rom.? Formålet med NFA-grillener å fremme visjonen om å gjøre automatisering til et hovedtema i det offentligerom. Det skal foregå ved å lage en automatisert pølsegrill som skaldoneres til TV-aksjonen.Oppgaven ledet frem til et ferdig produkt med dertilhørende valg av delsystemog teknologier. For å forsikre et best mulig resultat ble det utført enlitteraturstudie i forkant av det praktiske arbeidet.Arbeidet er utført ved hjelp av to ?underleverandører?, Arbeidsgruppe 6 iEksperter i Team-landsbyen ?Byggelandsbyen? og verkstedet ved Institutt forteknisk kybernetikk. Eksperter i Team-gruppa leverte reflektoren til grillenog verkstedet bidro med maskineringen av selve grillen.Det ble innhentet ekspertise fra Forskningssenteret for Miljøvennlig Energifor solcelleteknologi, ved Institutt for energiteknikk for produksjon av spesialtilpassetsolcellepanel til å produsere strøm til å drive aktuatorer og elektronikk.Som solfølgingsmetode ble det valgt å bruke GPS for å innhente posisjonsogtidsdata. Disse ble deretter brukt i en algoritme, SOLPOS utviklet avNREL, til å beregne solvektoren. For å vite grillens orientering ble et tilkompensertkompass med innebygget aksellerometer benyttet. Referansedata fraSOLPOS-algoritmen og måledata fra kompasset ble deretter benyttet i enreguleringsprosedyre som ved hjelp av to aktuatorer retter grillen mot sola.Det resulterende produktet fungerte etter formålet og oppnådde en nøyaktighetpå 0,8 grader som er innefor kravet som ble satt til én grad.
APA, Harvard, Vancouver, ISO, and other styles
48

Matsson, David. "Mechanical performance of NCF composites /." Luleå, 2005. http://epubl.ltu.se/1402-1544/2005/49/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Ströbl, Sabine. "ProNGF/NGF in humanen Granulosazellen." Diss., Ludwig-Maximilians-Universität München, 2014. http://nbn-resolving.de/urn:nbn:de:bvb:19-178520.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Komulainen, O. (Onni). "Ikääntyneille virikkeitä tarjoava NFC-sovellus." Master's thesis, University of Oulu, 2013. http://urn.fi/URN:NBN:fi:oulu-201304241202.

Full text
Abstract:
Tämän diplomityön tarkoituksena oli tutkia NFC-teknologian soveltuvuutta iäkkäille käyttäjille tarkoitettuihin sovelluksiin. Diplomityössä perehdyttiin vanhainkodissa käytettävään viriketoimintaan, vanhuksille suunnattujen digitaalisten sovellusten esteettömyysvaatimuksiin ja NFC-sovelluksiin. Osana diplomityötä toteutettiin ikääntyneille älyllistä viriketoimintaa tarjoava NFC-sovellus. Fyysinen käyttöliittymä toteutettiin NFC-lukijan sisältävällä matkapuhelimella ja korteilla, joihin NFC-tunnisteet oli liitetty. Sovelluksessa pyrittiin huomioimaan kohderyhmälle suunnattu esteettömyys ja kiinnostavuus. Tutkimus toteutettiin kokeellisena käytettävyystestauksena vanhainkodissa. Käytettävyyden arviointi tapahtui havainnoimalla käytettävyystestaukseen osallistuneita vanhuksia. Käyttäjäkokemusta arvioitiin haastattelemalla vanhuksia. Vanhainkodin hoitajille tehtiin kyselylomake, jolla pyrittiin selvittämään testatun sovelluksen sopivuutta vanhainkodin viriketoiminnassa. Työssä toteutettu sovellus onnistui tavoitteissaan. Se palautti muistoja henkilöistä ja tapahtumista testaukseen osallistuneiden vanhusten mieleen. Toisaalta se toimi myös muistia ja kognitiivisia kykyjä haastavana pelinä. Käytettävyystestaus osoitti, että ikääntyneet oppivat helposti hallitsemaan NFC- tunnisteiden koskettamiseen perustuvan sovelluksen käyttöliittymän ja että sen avulla on mahdollista toteuttaa vanhuksia kiinnostavia sovelluksia
The purpose of this thesis was to research the suitability of NFC-technology in applications intended for elderly users. This study discusses stimulating activity in Finnish residential homes, digital application accessibility requirements for elderly users and NFC-applications. The study utilized NFC applications as a possible method for effecting intellectual stimulus in elderly users. The physical interface was realized with a mobile phone equipped with an NFC reader and with cards fitted with NFC tags. The application’s adapted accessibility and attractiveness with respect to elderly users was taken into account during the application design phase. The research was carried out via empirical usability testing at a residential house. Evaluation of usability was done by observing elderly users during testing. User experience was evaluated by interview. A questionnaire concerning the suitability of the tested application as a stimulating activity was made for nurses. The implemented application fulfilled its objectives. It provoked memories of past events and persons in the users that took part in the testing. Secondly it also functioned as a game requiring memory and cognitive skills. This study shows that aged user can easily learn to handle user interfaces that are based on touching NFC tags and with NFC technology it is possible to implement applications attractive to elderly
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography