Dissertations / Theses on the topic 'Protools'

To see the other types of publications on this topic, follow the link: Protools.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Protools.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gullová, Soňa. "Společenská etiketa, obchodní a diplomatický protokol." Doctoral thesis, Vysoká škola ekonomická v Praze, 2005. http://www.nusl.cz/ntk/nusl-77056.

Full text
Abstract:
The goal of this Thesis is to uncover, characterize, analyze, describe and define selected contemporary rules of etiquette, international business and diplomatic protocol in international business and diplomatic practice and point out the greatest deficiencies witnessed in practice. The research subject of this Thesis is, thus, the formal aspect of international business and diplomatic cooperation. Its output consists of recommendation on how to correctly apply these rules in practice. I would also like my paper to significantly contribute to the general knowledge of this fascinating and commonly useful knowledge. The structure of the Thesis as it was drawn up in context of its goals consists of three main chapters, introduction and conclusion. The first part of the Thesis deals with Social Etiquette. This part is not conceived as general rules of social intercourse. Instead, it concentrates mainly on the elaboration of contemporary general rules of social intercourse and etiquette to in the context of business and entrepreneurial activities, i.e. Business Protocol. The Thesis would also like to provide answers to the following questions: What is the current standard of social intercourse in the Czech Republic? What are the contemporary rules of social intercourse in the Czech Republic and how do they differ from the etiquette abroad? Can we claim that these rules are being observed? What leads our managers, businessman, diplomats etc. to observing these rules? In my Thesis I strive to evaluate contemporary rules applicable to social, business and diplomatic events as well as in written communication and to draw attention the lack of their knowledge. Another partial goal of the Thesis consists of using carried out analyses, evaluations, inquiries via questionnaires and comparative analyses to point out the differences in the rules of social intercourse, conduct and negotiation in different territories. The working hypothesis of this part of the paper is to indicate on the basis of the above mentioned allegations the relationship between the behaviour and conduct of managers of different provenience and the fact that they have different cultural background. Culture is learned not inherited. It is derived from the social environment not from genes and it must be clearly distinguished from human character and the character of individual people. Significant attention is, therefore, paid to the study of international customs and conventions, especially those of the countries which the representatives of Czech firms, enterprises and institutions most come into contact with. The presented Thesis does not have the ambition to come up with a definitive cookbook as to how to conduct oneself in a given situation within a given territory; it merely strives to point out the pitfalls, misunderstandings and blunders in conduct and barriers in communication and in business or any other professional negotiations. Unlike legal acts the rules of Etiquette are not binding. Laws apply to all and the state prosecutes their infringement. Unlike laws, the rules of Etiquette are not enforceable. Their only form of enforcement is the social pressure which the society effectuates on the individual. Thus, the standards of social conduct only apply to those willing to abide by them. The presented paper is an aggregate of the rules and its author's views. Another author's standpoint may differ. The second part of the Thesis concentrates on the sphere of Diplomatic Protocol in international business and diplomatic practice. The presented paper aims at describing the existing system of Foreign Service and diplomatic activities, presenting the diplomatic representations, consulates, missions and other representatives abroad, their functioning as well as their immunities and privileges. Diplomatic Protocol concerns the formal, not the material, content of international relations. Formal rules of social conduct in intercourse with diplomatic representatives of other countries, the etiquette and the ceremonies applied to the intercourse with these representatives form an integral part of the Diplomatic Protocol. In the initial part I define the very term Diplomatic Protocol and I strive to specify is subject. Successively I address individual respective parts of Diplomatic Protocol and diplomatic practice, such as the methods of establishing diplomatic relationships, the roles of diplomatic missions, ranks of diplomatic representatives and their immunities and privileges, the procedure related to the conferment of agrément and the termination of activity of the head of a diplomatic mission, official visits of foreign guests, organisation of international conferences, diplomatic correspondence, consular activities etc. In the course of its elaboration the presented Thesis should also offer answers to the following questions: What is the current international form, role and significance of the Diplomatic Protocol? What leads states to observing signed conventions? Which diplomatic immunities and privileges are at the moment among the most abused or violated? For the accomplishment of the goals set out in this Thesis I shall strive to outline the scale of theoretic approaches and based on the effective layout and international practice express my own conclusions. Among others, the paper also aims at promoting the development of skills of the current diplomat and acquainting them with the norms of diplomatic correspondence. The aforementioned part of the Thesis also sets out another rather easily attained objective: due to the inexistence of comprehensive publications on this topic to become a handbook and reference manual not only for the young adepts of this profession but for all who for some reason take interest in Diplomacy. It was an ambition of the author to assemble and explain terms, which those interested in the practical aspects of Foreign Service, may be confronted with. The paper reflects current diplomatic practice and takes into account Czech circumstances. The author is endeavouring to mediate the information and knowledge she gained through years of practice at representative offices abroad gained during her practical experience at the Ministry of Foreign Affairs and through more than 20 years of practice in academic research and instruction of this area.
APA, Harvard, Vancouver, ISO, and other styles
2

Jelinski, Olaf [Verfasser]. "Diplomatisches Protokoll versus Corporate Protocol : Das internationale diplomatische Protokoll im Vergleich zum Protokoll in Unternehmen. Eine Analyse des Protokolls als politische Institution / Olaf Jelinski." Frankfurt a.M. : Peter Lang GmbH, Internationaler Verlag der Wissenschaften, 2017. http://d-nb.info/114209703X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /." College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.

Full text
Abstract:
Thesis (M.S.) -- University of Maryland, College Park, 2006.
Thesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
4

Ondráček, David. "Databáze specifikací bezpečnostních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235438.

Full text
Abstract:
Original protocols, which were created during early development of computer networks, no longer provide sufficient security. This is the reason why new protocols are developed and implemented. The important component of this process is formal verification, which is used to analyze the developed protocols and check whether a successful attack is possible or not. This thesis presents selected security protocols and tools for their formal verification. Further, the selected protocols are specified in LySa calculus and results of their analysis using LySatool are presented and discussed.
APA, Harvard, Vancouver, ISO, and other styles
5

Albuquerque, Edison de Queiroz. "Um protocolo multicast bi-direcional para educação a distancia." [s.n.], 2005. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260530.

Full text
Abstract:
Orientador: Hugo Enrique Hernandez Figueroa
Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-05T07:05:01Z (GMT). No. of bitstreams: 1 Albuquerque_EdisondeQueiroz_D.pdf: 2450262 bytes, checksum: 1142d9b235574921d845ac5246fbe250 (MD5) Previous issue date: 2005
Resumo: Este trabalho está baseado em uma experiência real, vivida no dia-a-dia do nosso trabalho na Empresa Brasileira de Telecomunicações S.A, EMBRATEL, quando da busca de ferramentas capazes de viabilizar o permanente treinamento dos Consultores Técnicos da empresa, localizados em diferentes partes do nosso país, em face da escassez de recursos financeiros e de tempo. Para tanto, iniciamos com uma retrospectiva histórica da Educação a Distância no mundo, seu presente e suas tendências visíveis. Depois, apresentamos uma descrição dos protocolos multicasting existentes, seguido de nossa proposta. Apresentamos, também, uma simulação usando o Simulador ns-2 de maneira a comprovar o correto funcionamento do protocolo proposto e avaliar seu desempenho. O núcleo desta tese é a proposta de um novo protocolo multicasting, elemento essencial para a otimização da rede de suporte, um imperativo para a eficiência de seu funcionamento e, principalmente, da diminuição de seu custo, tendo em vista a situação ideal de se transmitir voz e vídeo para garantir que uma aula a distância será o mais próximo possível de uma aula presencial, conforme aponta o resultado de pesquisas referenciadas no presente texto, uma vez que vídeo é uma aplicação que demanda grande largura de banda
Abstract: This work is based on a real life situation, experienced in our daily work at Empresa Brasileira de Telecomunicações S.A, EMBRATEL, when pursuing tools that would allow the continuous training of its staff of Technical Consultants. The Technical Consultants were spread all over Brasil, a country of continental dimensions. Time and cost were obstac1es to achieve the above mentioned training. This thesis starts providing a short account of the historical milestones on Distance Learning. We added considerations on the state-of-the-art and scenarios of future developments, which were drawn taking into account social and economical policies. Routing and existing multicasting protocols are described and compared with the bidirectional multicast protocol proposed in this thesis. The main purpose of this thesis is the proposal of a new Multicasting Protocol, to support a new concept on which a teacher can be a student on a different subject by taking into account that we aim a Distance Learning environment inside a corporation. The ns-2 Simulator is used to simulate the perfect operation of the proposed protocol and evaluate its performance. The use of video is mandatory in order to achieve a maximum efficiency at c1ass. The rapid switching of video transmission from the teacher to a remote student that asks a question (so that all other students spread around the country can also see who is asking) and back to the teacher is mandatory and is what motivated the development of this new Multicast Protocol
Doutorado
Telecomunicações e Telemática
Doutor em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
6

Halfar, Patrik. "Zabezpečený transportní protokol monitorovacích systémů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237155.

Full text
Abstract:
This paper deals with NetFlow protocol and analysis of its properties. There is focused on confidentiality and reliability of the data's transfer. All of the solution observe requirements for lower resources of devices, and impossibility of changes in the exporter except defined parameters.
APA, Harvard, Vancouver, ISO, and other styles
7

Gerault, David. "Security analysis of contactless communication protocols." Thesis, Université Clermont Auvergne‎ (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bareš, Jan. "Návrh protokolu hardwarového akcelerátoru náročných výpočtů nad více jádry." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376928.

Full text
Abstract:
This work deals with design of communication protocol for data transmission between control computer and computing cores implemented on FPGA chips. The purpose of the communication is speeding the performance demanding software algorithms of non-stream data processing by their hardware computation on accelerating system. The work defines a terminology used for protocol design and analyses current solutions of given issue. After that the work designs structure of the accelerating system and communication protocol. In the main part the work describes the implementation of the protocol in VHDL language and the simulation of implemented modules. At the end of the work the aplication of designed solution is presented along with possible extension of this work.
APA, Harvard, Vancouver, ISO, and other styles
9

Debant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.

Full text
Abstract:
L’essor des nouvelles technologies, et en particulier la Communication en Champ Proche (NFC), a permis l’apparition de nouvelles applications. Á ce titre, nous pouvons mentionner le paiement sans contact, les clefs mains libres ou encore les carte d’abonnement dans les transports en commun. Afin de sécuriser l’ensemble de ces applications, des protocoles de sécurité, appelés protocoles délimiteurs de distance on été développés. Ces protocoles ont pour objectif d’assurer la proximité physique des appareils mis en jeu afin protocole cryptographique, protocole de paiement de limiter le risque d’attaque. Dans ce manuscrit, nous présentons diverses approches permettant une analyse formelle de ces protocoles. Dans ce but, nous proposons un modèle symbolique permettant une modélisation précise du temps ainsi que des positions dans l’espace de chaque participant. Nous proposons ensuite deux approches : la première développant une nouvelle procédure de vérification, la seconde permettant la ré-utilisation d’outils existants tels que Proverif. Tout au long de ce manuscrit, nous porterons une attention parti- culières aux protocoles de paiement sans contact
The rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing... Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure the physical proximity of the de- vices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this manuscript, we present several techniques that allow for an automatic verification of such protocols. To this aim, we first present a symbolic model which faithfully models time and locations. Then we develop two approaches : either ba- sed on a new verification procedure, or leveraging existing tools like Proverif. Along this manuscript, we pay a particular attention to apply our results to contactless payment protocols
APA, Harvard, Vancouver, ISO, and other styles
10

Maria, Fábio Rogério Tôrres. "Frequência dos diferentes protocolos de extrações nos tratamentos ortodônticos conduzidos na Faculdade de Odontologia de Bauru FOB-USP, nos últimos 35 anos." Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/25/25134/tde-02062011-143725/.

Full text
Abstract:
O presente estudo objetivou realizar um levantamento retrospectivo de todos os planejamentos ortodônticos realizados pelo Departamento de Ortodontia (FOB USP) desde 1973, para que pudessem ser avaliados os protocolos de tratamento escolhidos à época, principalmente quanto à decisão de extrações e suas freqüências. A amostra constitui-se inicialmente de 3745 documentações ortodônticas arquivadas pelo Departamento de Ortodontia, das quais 332 documentações foram descartadas seguindo alguns fatores de exclusão, tais como casos transferidos, desistências e informações e exames incompletos. A amostra total de 3413 pacientes foi avaliada de acordo com o protocolo de tratamento escolhido, classificados como: Protocolo 0 (Sem extrações); Protocolo 1 (Extrações de 4 primeiros pré-molares); Protocolo 2 (2 primeiros pré-molares superiores e 2 segundos inferiores); Protocolo 3 (2 pré-molares superiores); Protocolo 4 (4 segundos pré-molares); Protocolo 6 (Incisivos e caninos); Protocolo 7 (Primeiros e segundos molares); Protocolo 8 (extrações atípicas); Protocolo 9 (grupo de agenesias e perdas precoces). Estes protocolos aferidos, foram então divididos em 7 grupos, definidos como 7 intervalos cronológicos a cada 5 anos: Intervalo 1 (1973-1977); Intervalo 2 (1978-1982); Intervalo 3 (1983-1987); Intervalo 4 (1988-1992); Intervalo 5 (1993-1997); Intervalo 6 (1998-2002); Intervalo 7 (2003-2007). Estes intervalos foram então comparados entre si para que as freqüências dos protocolos pudessem definir possíveis tendências predominantes a cada época testada. Os resultados demonstraram diferenças estatisticamente significantes para 7 dos 10 protocolos avaliados entre os intervalos considerados, evidenciando uma grande diferença de freqüência dos principais protocolos de tratamento ao longo destes 35 anos avaliados. Portanto conclui-se que a escolha pelos protocolos de tratamento sofreram influências de filosofias e dogmas vigentes durante os intervalos avaliados.
The purpose of this retrospective study was to evaluate all orthodontic treatment plannings conducted at the Orthodontic Department at Bauru Dental School, University of São Paulo, since 1973, in order to investigate extraction and nonextraction frequency protocols selected at each considered period. The sample comprised initially 3745 records of treated patients, that according to exclusion criteria, reduced the final sample to 3413 documentations. This total sample was evaluated according to the protocol choice, being divided into 10 groups: Protocol 0 (nonextraction group); Protocol 1 (4-first premolar extractions); Protocol 2 (2-maxillary first and 2-mandibular second premolar extractions); Protocol 3 (2-maxillary premolar extractions); Protocol 4 (4-second premolar extractions); Protocol 5 (asymmetric premolar extractions); Protocol 6 (incisor and canine extractions); Protocol 7 (first and second molar extractions); Protocol 8 (atypical extractions) and Protocol 9 (agenesis and previously missing teeth group). These 3413 obtained protocols were divided into seven 5-year intervals: Interval 1 (1973-1977); Interval 2 (1978-1982); Interval 3 (1983-1987); Interval 4 (1988-1992); Interval 5 (1993-1997); Interval 6 (1998-2002); Interval 7 (2003-2007). The frequency of each protocol was compared among the 7 intervals, using the Proportion Test, in order to identify some predominant trends at each tested period. The results showed that 7 frequency protocols were significantly different among the 7 considered intervals, evidencing that the protocols choice was influenced by some dominant philosophies or dogmas during the evaluated periods.
APA, Harvard, Vancouver, ISO, and other styles
11

Iyengar, Janardhan R. "End-to-end concurrent multipath transfer using transport layer multihoming." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.67 Mb., p. 123, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220807.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Lukovicsová, Nicola. "The history of diplomatic protocol with the emphasis on French influence on diplomatic protocol and new cultural influences on today´s diplomatic protocol." Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193888.

Full text
Abstract:
The Master's Thesis on "The History of Diplomatic Protocol with the Emphasis on French Influence on Diplomatic Protocol and New Cultural Influences on Today's Diplomatic Protocol" aims at introducing the topic of History of Diplomatic protocol and is further elaborating on the topic in terms of various influences on Diplomacy and Diplomatic protocol. The purpose was to show that the evolution of the practices, protocols and etiquette is a gradual process of change. Nowadays we live in the world strongly influenced by the European tradition that mainly comes from France. However, the changing world and process of globalization makes it easier for people to interact, share their values and spread their ideas.
APA, Harvard, Vancouver, ISO, and other styles
13

Tibor, Sakal. "Metoda za povezivanje mernog sistema i računarapomoću konverzije podataka iz I2S u TCP/IP protokol." Phd thesis, Univerzitet u Novom Sadu, Tehnički fakultet Mihajlo Pupin u Zrenjaninu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=103839&source=NDLTD&language=en.

Full text
Abstract:
Ova doktorska disertacija predstavlja istraživački rad sproveden sa ciljem da reši problem koji se odnosi na realizaciju povezivanja laboratorijskog, medicinskog mernog uređaja sa personalnim računarom. Rezultat istraživačkog rada je opšta metoda koja obezbeđuje efikasnu konverziju podataka I2S protokola u TCP/IP protokol.
This doctoral thesis presents the research work carried out in order to solve a practical problem, the realization of a connection between a medical measuring device and a personal computer. The result of the research is a general method that provides efficient data conversion from the I2S protocol to the TCP/IP protocol.
APA, Harvard, Vancouver, ISO, and other styles
14

Pimenta, Diogo da Silva. "O efeito do protocolo preventivo dos músculos isquiotibiais “L-Protocol”+“C-Protocol” em jovens futebolistas." Bachelor's thesis, [s.n.], 2018. http://hdl.handle.net/10284/6749.

Full text
Abstract:
Projeto de Graduação apresentado à Universidade Fernando Pessoa como parte dos requisitos para obtenção do grau de Licenciado em Fisioterapia
Introdução: as lesões musculares dos isquiotibiais são comuns em futebolistas, por este facto existem diversos protocolos de reabilitação e/ou de prevenção. Objetivo: analisar o efeito da realização do L-Protocol+C-Protocol em jovens futebolistas no ganho de flexibilidade, equilíbrio dinâmico e força muscular. Metodologia: a amostra foi constituída por 38 futebolistas, 19 do escalão júnior e 19 do escalão juvenil, divididos em dois grupos, em que um dos grupos realizou o L-Protocol+C-Protocol. Os parâmetros avaliados foram a flexibilidade quantificada através do banco Wells, o equilíbrio dinâmico pelo Star Execursion Balance Test (SBET) e a força pelas diferentes formas do Hop test. Resultados: a realização do L-Protocol+C-Protocol não alterou a força, favoreceu o equilíbrio dinâmico na maioria das distâncias no escalão juvenil, e melhorou a flexibilidade nos futebolistas juniores. Conclusão: o L-Protocol+C-Protocol pode ser benéfico no desempenho dos futebolistas, e um modo de prevenção de lesões dos isquiotibiais.
Background: the muscular hamstring injuries are common in soccer players, so there are several rehabilitation and/or prevention protocols. Objectives: to analyze the effect of L-Protocol+C-Protocol on young soccer players in gain flexibility, dynamic balance and muscular strength. Methodology: The sample was constituted of 38 soccer players, 19 junior players and 19 juvenile players, divided into two groups, in which one group performed the L-Protocol+C-Protocol. The parameters evaluated were the flexibility quantified by the Wells bank, the dynamic balance by the Star Execursion Balance Test (SBET) and the strength by the different forms of the Hop test. Results: The realization L-Protocol+C-Protocol did not change strength, benefited dynamic balance at most distances in juvenile, and improved flexibility in junior soccer players. Conclusion: L-Protocol+C-Protocol may be beneficial in footballers performance, and a way to prevention hamstring injuries.
N/A
APA, Harvard, Vancouver, ISO, and other styles
15

Costa, Daniel Gouveia. "Uma arquitetura baseada em SCTP e SIP para suporte a aplica??es VoIP m?veis e a especifica??o formal do seu m?dulo de controle." Universidade Federal do Rio Grande do Norte, 2006. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15461.

Full text
Abstract:
Made available in DSpace on 2014-12-17T14:56:09Z (GMT). No. of bitstreams: 1 DanielGC.pdf: 538651 bytes, checksum: 34bfc134a2af9166b846b044a2968b16 (MD5) Previous issue date: 2006-05-25
New versions of SCTP protocol allow the implementation of handover procedures in the transport layer, as well as the supply of a partially reliable communication service. A communication architecture is proposed herein, integrating SCTP with the session initiation protocol, SIP, besides additional protocols. This architecture is intended to handle voice applications over IP networks with mobility requirements. User localization procedures are specified in the application layer as well, using SIP, as an alternative mean to the mechanisms used by traditional protocols, that support mobility in the network layer. The SDL formal specification language is used to specify the operation of a control module, which coordinates the operation of the system component protocols. This formal specification is intended to prevent ambiguities and inconsistencies in the definition of this module, assisting in the correct implementation of the elements of this architecture
Novas vers?es do protocolo SCTP permitem sua utiliza??o para implementa??o de mecanismos de handover em n?vel de transporte, bem como o fornecimento de um servi?o de transmiss?o de dados parcialmente confi?vel. Integrando o SCTP com o protocolo de inicia??o de sess?es, SIP, al?m de utilizar adicionalmente servi?os de outros protocolos auxiliares, uma arquitetura de comunica??o p?de ser proposta, a fim de atender ?s aplica??es de voz sobre IP com requisitos de mobilidade. S?o especificados ainda os procedimentos de localiza??o de usu?rio em n?vel de aplica??o, utilizando o protocolo SIP, como alternativa aos mecanismos empregados por protocolos tradicionais que suportam mobilidade na camada de rede. A linguagem de especifica??o formal SDL ? utilizada para especificar o funcionamento de um M?dulo de Controle, relacionado ? opera??o coordenada dos protocolos que comp?e a arquitetura. Pretende-se assim evitar ambig?idades e inconsist?ncias na defini??o desse m?dulo, o que pode auxiliar em implementa??es corretas de elementos dessa arquitetura
APA, Harvard, Vancouver, ISO, and other styles
16

Šafář, Jan. "Návrh zero-knowledge protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237255.

Full text
Abstract:
Thesis introduces automated methods of protocol design and their usability for zero knowledge protocol design or protocols, where ZK protocols are used as subprotocols. Especially composition method is described more in depth. Thesis shows also a sample implementation of this method.
APA, Harvard, Vancouver, ISO, and other styles
17

Sadrin, Stéphane. "Evaluation du bénéfice chez l'homme des probiotiques dans la prise en charge du syndrome de l'intestin irritable : méthodologie de l'essai contrôlé randomisé et allégations nutritionnelles et de santé." Thesis, Toulon, 2017. http://www.theses.fr/2017TOUL0007/document.

Full text
Abstract:
Une allégation de santé dans l’UE nécessite des preuves cliniques de l’efficacité et de la sécuritéd’une supplémentation nutrititionnelle. Les probiotiques, en particulier les bactéries lactiques,rentrent dans ce cadre règlementaire dans lequel l’EFSA indique que les preuves obtenues chez despatients avec des troubles fonctionnels intestinaux sont transposables chez une population de sujetssains. Le protocole LAPIBSS est un essai clinique de haute qualité méthodologique évaluantl’efficacité de 2 souches de Lactobacillus acidophilus à diminuer la sévérité des symptômes dusyndrome de l’intestin irritable. Les résultats confirment la sécurité d’emploi des souches utiliséesmais ne montrent pas une diminution significative des symptômes comparée au placebo après 8semaines. L’effet global du traitement est statistiquement significatif sur le score de flatulence. Uneffet placebo et l’hétérogénéité importante de la sévérité des symptômes à l’inclusion pourraientexpliquer nos résultats. Une meilleure compréhension des effets physiologiques des probiotiqueschez l’homme pourrait améliorer le rationnel de leur utilisation en recherche clinique
A health claim across the EU requires clinical evidence about the efficacy and safety of a nutritionalsupplementation. Probiotics, especially lactic acid bacteria, fall within this regulatory framework inwhich EFSA indicates that the evidence from patients with functional gastrointestinal disorder aretransferable in a population of healthy subjects. The LAPIBSS protocol is a high-quality clinicaltrial assessing the efficacy of 2 strains of Lactobacillus acidophilus to reduce the irritable bowelsyndrome symptoms severity. Results confirm the safety of strains used but do not show asignificant decrease of symptoms compared with placebo after 8 weeks. The overall treatment effectis statistically significant on the flatus score. A placebo effect and the considerable heterogeneity ofsymptoms severity at baseline would explain our results. A better understanding of physiologicaleffects of probiotics in human would be needed to upgrade the rationale for their use in clinicalresearch
APA, Harvard, Vancouver, ISO, and other styles
18

Froldi, Carlos Augusto 1979. "Uma variação do protocolo DCCP para redes de alta velocidade." [s.n.], 2011. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275723.

Full text
Abstract:
Orientador: Nelson Luis Saldanha da Fonseca
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-19T17:25:04Z (GMT). No. of bitstreams: 1 Froldi_CarlosAugusto_M.pdf: 543951 bytes, checksum: e4f64a2921c88fd1461445bd39a04278 (MD5) Previous issue date: 2011
Resumo: Os protocolos da camada de transporte na Internet, TCP e UDP, não oferecem serviços para transmissão eficiente de fluxos multimídia, porém, este último é adotado com maior freqüência por essas aplicações. Uma proposta de um novo protocolo da camada de transporte, chamado DCCP, foi elaborada para atender a demanda das aplicações multimídia e substituir o protocolo UDP. A presente dissertação propõe uma variante deste protocolo, chamada Fast DCCP, para operar de maneira eficiente em redes de alta velocidade. A nova variante foi avaliada através de experimentos de simulação, utilizando o NS-2 e experimentos de medição, utilizando o sistema operacional Linux
Abstract: The Internet transport layer protocols, TCP and UDP, do not provide efficient transport service for multimedia streams. UDP is usually used for these applications, due to its low overhead. A new transport layer protocol, called DCCP, was proposed to meet the demand of multimedia applications, aiming at replacing the UDP protocol. This dissertation will propose a variant for this protocol, called Fast DCCP, for operating efficiently on high-speed networks. It was evaluated by simulation using the NS-2 network simulator and measurements of the FAST DCCP protocol operation in the Linux operating system
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
APA, Harvard, Vancouver, ISO, and other styles
19

Kou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example." Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.

Full text
Abstract:
This thesis addresses the problem of conformance testing of communication protocol implementations. Test sequence generation techniques for finite state machines (FSM) have been developed to solve the problem of high costs of an exhaustive test. These techniques also guarantee a complete coverage of an implementation in terms of state transitions and output functions, and therefore provide a sound test of the implementation under test. In this thesis, we have modified and applied three test sequence generation techniques on the class 0 transport protocol. A local tester and executable test sequences for the ISO class 0 transport protocol have been developed on a portable protocol tester to demonstrate the practicality of the test methods and test methodologies. The local test is achieved by an upper tester residing on top of the implementation under test (IUT) and a lower tester residing at the bottom of the IUT. Tests are designed based on the state diagram of an IUT. Some methodologies of parameter variations have also been used to test primitive parameters of the implementation. Some problems encountered during the implementation of the testers and how they are resolved are also discussed in the thesis.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
20

Muhammad, Shahabuddin. "EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3086.

Full text
Abstract:
Running critical applications, such as e-commerce, in a distributed environment requires assurance of the identities of the participants communicating with each other. Providing such assurance in a distributed environment is a difficult task. The goal of a security protocol is to overcome the vulnerabilities of a distributed environment by providing a secure way to disseminate critical information into the network. However, designing a security protocol is itself an error-prone process. In addition to employing an authentication protocol, one also needs to make sure that the protocol successfully achieves its authentication goals. The Distributed Temporal Protocol Logic (DTPL) provides a language for formalizing both local and global properties of distributed communicating processes. The DTPL can be effectively applied to security protocol analysis as a model checker. Although, a model checker can determine flaws in a security protocol, it can not provide proof of the security properties of a protocol. In this research, we extend the DTPL language and construct a set of axioms by transforming the unified framework of SVO logic into DTPL. This results into a deductive style proof-based framework for the verification of authentication protocols. The proposed framework represents authentication protocols and concisely proves their security properties. We formalize various features essential for achieving authentication, such as message freshness, key association, and source association in our framework. Since analyzing security protocols greatly depends upon associating a received message to its source, we separately analyze the source association axioms, translate them into our framework, and extend the idea for public-key protocols. Developing a proof-based framework in temporal logic gives us another verification tool in addition to the existing model checker. A security property of a protocol can either be verified using our approach, or a design flaw can be identified using the model checker. In this way, we can analyze a security protocol from both perspectives while benefiting from the representation of distributed temporal protocol logic. A challenge-response strategy provides a higher level of abstraction for authentication protocols. Here, we also develop a set of formulae using the challenge-response strategy to analyze a protocol at an abstract level. This abstraction has been adapted from the authentication tests of the graph-theoretic approach of strand space method. First, we represent a protocol in logic and then use the challenge-response strategy to develop authentication tests. These tests help us find the possibility of attacks on authentication protocols by investigating the originator of its received messages. Identifying the unintended originator of a received message indicates the existence of possible flaws in a protocol. We have applied our strategy on several well-known protocols and have successfully identified the attacks.
Ph.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
APA, Harvard, Vancouver, ISO, and other styles
21

Prathaban, Mahendiran. "Contributions to the performance study of interplanetary networks." Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00538532.

Full text
Abstract:
L'acquisition de connaissances sur l'espace fascine les humains depuis l'antiquité. Depuis quelques décennies, il y a augmentation significative des programmes spatiaux concernant Mars, des missions d'exploration lunaire et des projets d'exploration spatiale de plus en plus complexes, impliquant plusieurs nœuds de communication: satellites, robots (Rovers, Landers) ou "aerorobots" (ie capteurs atmosphériques). Dans ce cadre, des efforts ont été faits par les organismes de normalisation pour l'espace comme le Comité consultatif pour les systèmes de données spatiales (CCSDS) et le Delay Tolérant Networking groupe de travail au sein del' Internet Research Task Force (IRTF) pour élaborer une architecture de protocoles efficace pour des missions spatiales. Dans cette thèse, nous avons analysé quelques unes de ces propositions : (les piles de protocole CCSDS, et DTN) pour leurs performances sur la surface de Mars (une sous-section de Interplanetary Network) et obtenu les paramètres qui affectent les performances du système, comme la mémoire tampon, les limitations de puissance. Également exploré divers problèmes de réseau de routage, Transport & couches de l'application de la pile de protocole, qui doit être abordée. Pour qui s'étendent, dans cette thèse nous avons proposé un nouvel algorithme de routage prenant en compte les ressources disponibles, qui prend en considération les limitations des ressources du réseau pour le routage et transmet les décisions permettant une politique efficace de gestion des tampons. Comme il existe différentes piles de protocoles d'interopérabilité proposées par l'agence spatiale, dans nos travaux, nous avons développé un framework de QoS qui est joint à chaque application, et peut sélectionner la pile de protocoles sous-jacents adéquate, selon les exigences de qualité de service des applications, qui sont les mieux adaptés pour améliorer les performances globales de ce réseau. Comme l'analyse révèle que les performances du protocole de remise de fichiers CCSDS lequel est le plus couramment utilisé le protocole d'application dans la mission spatiale. Pour améliorer les performances du protocole, nous avons proposé un algorithme dynamique du timer qui fixe la valeur du time-out en fonction de l'état du réseau pour tous les timers du protocole, afin de réduire les retransmissions inutiles de données d'UFC, accroissant ainsi les performances de débit.
APA, Harvard, Vancouver, ISO, and other styles
22

Horan, Stephen, and Giriprassad Deivasigamani. "USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.

Full text
Abstract:
International Telemetering Conference Proceedings / October 18-21, 2004 / Town & Country Resort, San Diego, California
The design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
APA, Harvard, Vancouver, ISO, and other styles
23

Guedj, Michaël. "BSP algorithms for LTL & CTL model checking of security protocols." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1081.

Full text
Abstract:
Dans un monde fortement dépendant de la communication de données distribuées, la conception d’infrastructures sécurisées est une tâche cruciale. Les systèmes et réseaux distribués prennent de plus en plus d’importance, car la plupart des services et des possibilités qui caractérisent la société moderne sont basés sur ces technologies.La communication entre les agents sur les réseaux a donc suscité un grand intérêt pour la recherche. Afin de fournir des moyens de communication efficaces et fiables, de plus en plus de protocoles de communication sont inventés, et pour la plupart d’entre eux, la sécurité est un objectif important
In a world strongly dependent on distributed data communication, the design of secure infrastructures is a crucial task. Distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal
APA, Harvard, Vancouver, ISO, and other styles
24

Shah, Munam Ali. "A novel MAC protocol for cognitive radio networks." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/301090.

Full text
Abstract:
The scarcity of bandwidth in the radio spectrum has become more vital since the demand for wireless applications has increased. Most of the spectrum bands have been allocated although many studies have shown that these bands are significantly underutilized most of the time. The problem of unavailability of spectrum bands and the inefficiency in their utilization have been smartly addressed by the cognitive radio (CR) technology which is an opportunistic network that senses the environment, observes the network changes, and then uses knowledge gained from the prior interaction with the network to make intelligent decisions by dynamically adapting transmission characteristics. In this thesis, recent research and survey about the advances in theory and applications of cognitive radio technology has been reviewed. The thesis starts with the essential background on cognitive radio techniques and systems and discusses those characteristics of CR technology, such as standards, applications and challenges that all can help make software radio more personal. It then presents advanced level material by extensively reviewing the work done so far in the area of cognitive radio networks and more specifically in medium access control (MAC) protocol of CR. The list of references will be useful to both researchers and practitioners in this area. Also, it can be adopted as a graduate-level textbook for an advanced course on wireless communication networks. The development of new technologies such as Wi-Fi, cellular phones, Bluetooth, TV broadcasts and satellite has created immense demand for radio spectrum which is a limited natural resource ranging from 30KHz to 300GHz. For every wireless application, some portion of the radio spectrum needs to be purchased, and the Federal Communication Commission (FCC) allocates the spectrum for some fee for such services. This static allocation of the radio spectrum has led to various problems such as saturation in some bands, scarcity, and lack of radio resources to new wireless applications. Most of the frequencies in the radio spectrum have been allocated although many studies have shown that the allocated bands are not being used efficiently. The CR technology is one of the effective solutions to the shortage of spectrum and the inefficiency of its utilization. In this thesis, a detailed investigation on issues related to the protocol design for cognitive radio networks with particular emphasis on the MAC layer is presented. A novel Dynamic and Decentralized and Hybrid MAC (DDH-MAC) protocol that lies between the CR MAC protocol families of globally available common control channel (GCCC) and local control channel (non-GCCC). First, a multi-access channel MAC protocol, which integrates the best features of both GCCC and non-GCCC, is proposed. Second, an enhancement to the protocol is proposed by enabling it to access more than one control channel at the same time. The cognitive users/secondary users (SUs) always have access to one control channel and they can identify and exploit the vacant channels by dynamically switching across the different control channels. Third, rapid and efficient exchange of CR control information has been proposed to reduce delays due to the opportunistic nature of CR. We have calculated the pre-transmission time for CR and investigate how this time can have a significant effect on nodes holding a delay sensitive data. Fourth, an analytical model, including a Markov chain model, has been proposed. This analytical model will rigorously analyse the performance of our proposed DDH-MAC protocol in terms of aggregate throughput, access delay, and spectrum opportunities in both the saturated and non-saturated networks. Fifth, we develop a simulation model for the DDH-MAC protocol using OPNET Modeler and investigate its performance for queuing delays, bit error rates, backoff slots and throughput. It could be observed from both the numerical and simulation results that when compared with existing CR MAC protocols our proposed MAC protocol can significantly improve the spectrum utilization efficiency of wireless networks. Finally, we optimize the performance of our proposed MAC protocol by incorporating multi-level security and making it energy efficient.
APA, Harvard, Vancouver, ISO, and other styles
25

Barros, Gavilanes Juan Gabriel. "Réseaux de capteurs pour applications de suivi médical." Phd thesis, Toulouse, INPT, 2013. http://oatao.univ-toulouse.fr/10664/1/barros.pdf.

Full text
Abstract:
Le maintien des personnes à domicile est une perspective sérieusement envisagée dans le contexte actuel de vieillissement de la population. Selon les statistiques, près d'un habitant sur trois aurait plus de 60 ans en 2050, contre un sur cinq en 2005. Cependant, les solutions actuelles de téléassistance (bouton alarme sur un collier par exemple) ont montré leurs limites. La thèse consiste à étudier des applications du futur permettant de fournir à une personne maintenue à domicile ou à l’hôpital une meilleure solution alternative fondée sur les réseaux de capteurs, capable de mesurer certains de ses paramètres physiologiques et de transmettre des données importantes aux infirmières ou médecins. Ces applications doivent s’adapter aux besoins médicaux et avoir un coût économique faible. Nous nous sommes focalisés sur des solutions de type réseaux de capteurs qui ont un coût de développement et de mise en œuvre faibles. Ce type de réseaux de capteurs offre de nouveaux services tels que la surveillance médicale et l'amélioration de la sécurité par la propagation d'alertes d'urgence. Cependant, la forte mobilité et le changement rapide de la topologie du réseau présentent un verrou scientifique et social. En outre, l'interférence de différents capteurs augmente la difficulté d'implantation de ce genre de réseaux IEEE 802.15.4. Depuis ces dernières années, plusieurs solutions ont été étudiées, comme nous le verrons dans cette thèse. Nous nous intéressons à la fiabilité de transmission dans cette thèse, car un réseau de capteurs est très limité par la capacité de calcul, de stockage et de transfert. Nous nous interrogeons dans un premier temps sur la meilleure méthode pour la livraison des données. Nous avons sélectionné les protocoles unicast et multicast issus du domaine MANET dans le but de comparer leurs avantages et inconvénients dans le contexte des applications de surveillance médicale. Nous nous sommes intéressés aux mécanismes de mise en place et au renforcement de la route dans chacun des protocoles. Les résultats de cette première étude montrent que les protocoles multicast s’adaptent mieux aux applications, car ils permettent de réduire le nombre de paquets transmis dans le réseau. Même si certains protocoles pourraient amener une meilleure performance (en ce qui concerne le débit utile) que d’autres, aucun protocole ne satisfait une application réelle. Nous travaillons sur l’exploitation d'un réseau hétérogène en distinguant les nœuds forts et les nœuds faibles. Dans ce cadre, nous avons proposé une nouvelle approche, HMR, qui permet de mieux assurer la performance du réseau par rapport aux solutions existantes. Une dernière problématique à étudier dans cette thèse est l’agrégation de données, car les données à transmettre dans le réseau sont souvent périodiquement générées avec des tailles très restreintes (quelques octets, par exemple). Nos études montrent que l’agrégation de données est une bonne solution. Cette thèse a donné lieu à deux publications en conférences internationales avec comité de lecture.
APA, Harvard, Vancouver, ISO, and other styles
26

Matúška, Peter. "Metody návrhu platebních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236980.

Full text
Abstract:
This paper analyses some existing approaches in security and payment protocol design. It describes protocol design using simple BAN logic and using derivation system. Special attention is paid to composition method, which is based on the design of complicated protocols from small parts called primitives and it is demonstrated on design of purchase procedure of SET protocol. This method was automated and implemented in C++ language, which allows designer to generate set of candidate protocols according to his needs and this set can be further used for next phase of protocol design process.
APA, Harvard, Vancouver, ISO, and other styles
27

Dowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.

Full text
Abstract:
Secure communications over the Internet are typically established by first running an authenticated key exchange protocol, which computes a secret key between two users, which is then utilised in an encryption protocol. In this work we examine novel security properties of the most prominent communications protocols, including the Transport Layer Security and Secure Shell protocols. We introduce new security frameworks for analysing security properties of protocols involving negotiation, multiple ciphersuites, long-term key reuse, and time synchronisation. Our results have increased confidence in the security of real-world protocols, and our analyses of next-generation protocols have informed their development by standardisation bodies.
APA, Harvard, Vancouver, ISO, and other styles
28

Tachecí, Petra. "Globální environmentální smlouvy a jejich efektivita." Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-10936.

Full text
Abstract:
This diploma thesis deals with global environmental agreements and their effectiveness. Its aim is to disclose the causes of success of some agreements and, on the contrary, the motives of failure of other agreements. In the theoretical part, the specialities of the environmental problems are illustrated, followed by the introduction to the international environmental law and agreements. In the practical part, two well-known international agreements concerned with atmosphere are compared. They deal with similar problem, but they achieved very different results. The objective of step-by-step comparison of diverse aspects of both agreements is to discover what factors caused the great success of the Montreal Protocol in protecting the ozone layer and why the similarly conceived Kyoto Protocol failed in the combat against climate change. Last chapter concludes this comparison and defines key characteristics which are essential for the effectiveness of the global environmental agreements.
APA, Harvard, Vancouver, ISO, and other styles
29

Caires, Milena Constantino. "Avaliação e implementação de propostas de melhoria para o protocolo IRIS baseadas em tecnologias de web semântica." Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-08012008-092006/.

Full text
Abstract:
O objetivo desta dissertação é avaliar se as tecnologias de Web Semântica podem contribuir para o desenvolvimento do protocolo Internet Registry Information Service Protocol (IRIS). IRIS é um novo protocolo para o serviço de informação sobre registros da Internet. Ele ainda encontra-se em fase de desenvolvimento por um grupo de trabalho do Internet Engineering Task Force (IETF). O objetivo do grupo de trabalho é desenvolver e padronizar um novo protocolo para substituir o protocolo Whois. Whois é o protocolo padrão utilizado atualmente para serviços de informação sobre registros da Internet, por exemplo nomes de domínios, endereços Internet Protocol (IP), sistemas autônomos, dentre outros. A principal motivação para o desenvolvimento do novo protocolo foi a crescente preocupação com a segurança dos dados armazenados na base de dados Whois pois o protocolo Whois não provê nenhum mecanismo de segurança. Outro motivo foi a ausência de suporte a base de dados distribuída porque o protocolo Whois foi desenvolvido para uma base de dados centralizada e, consequentemente, não atende aos requisitos padrões para protocolos da Internet. Até agora, o grupo de trabalho abordou e solucionou dois dos principais problemas do protocolo Whois: (1) segurança e (2) suporte à base de dados distribuída. Entretanto, o desenvolvimento de um novo padrão envolve um grande investimento da comunidade, em particular com respeito a políticas baseadas em consenso. Além disso, existe uma grande barreira a ser vencida para a adoção do novo protocolo: a adoção pelos usuários. O novo protocolo deve ter longevidade sem necessidade de atualização ou substituição por outro protocolo. Para atingir esse objetivo, é preciso não apenas satisfazer necessidades imediatas, como segurança, mas prever necessidades futuras. Este estudo envolveu as seguintes atividades de pesquisa: (1) análise comparativa dos atuais protocolos de busca de informação sobre registros da Internet, (2) o estudo aprofundado do protocolo IRIS e (3) a avaliação de novas tecnologias que pudessem ser incorporadas ao novo protocolo, em particular tecnologias de Web Semântica. Os resultados deste estudo demonstraram que as tecnologias de Web Semântica garantiriam a flexibilidade e extensibilidade necessárias para que o protocolo possa se adaptar às necessidades atuais e futuras. Para validar os resultados teóricos do estudo foi implementado um protótipo baseado na especificação do protocolo IRIS utilizando tecnologias de Web semântica. Dois tipos de experimentos foram conduzidos: (1) experimentos comparando os desempenhos do protótipo e do cliente Whois e (2) avaliação de desempenho do protótipo baseada em testes de carga. Finalmente, a implementação do protótipo e subsequentes experimentos serviram como prova de conceito de que as tecnologias de Web Semântica podem contribuir para o sucesso do protocolo IRIS.
The aim of this thesis is to evaluate whether Semantic Web technologies can contribute to Internet Registry Information Service Protocol (IRIS) protocol development. IRIS is a new protocol for providing an information service for Internet resources. It is currently still under development by an Internet Engineering Task Force (IETF) working group. The objective of the working group is to develop and standardize a new protocol to replace the Whois protocol. Whois is the standard protocol used today by information services for Internet resources, i.e. domain names, Internet Protocol (IP) addresses, autonomous systems, amongst others. The motivation to develop a new protocol was based on increasing concerns regarding the security of data stored in the Whois database as the Whois protocol does not provide any security mechanism. Another motivation was the absence of support for distributed databases as the Whois protocol was developed for a centralized database, hence it no longer meets the standard requirements for Internet protocols. So far, the working group has tackled and solved two main issues concerning the Whois protocol: (1) security and (2) support for distributed databases. However, the development of a new standard demands a great investment from the community, in particular with respect to consensus-based policies. Additionally, there is one major barrier against adopting the new protocol: the users adoption. The new protocol must have longevity without being updated or replaced by another protocol. To reach this goal, it is necessary to meet not only the current requirements, such as security issues, but to cater also for future requirements. This thesis is concerned with the following research activities: (1) comparative analysis of the current protocols used to provide information services on Internet resources, (2) the IRIS protocol analysis and (3) the evaluation of new technologies that could be incorporated in the new protocol, in particular Semantic technologies. The results demonstrate that Semantic Web technologies could provide the necessary flexibility and extensibility to meet the current and future requirements of IRIS. To validate the theoretical results a prototype based on the IRIS specification was implemented using Semantic Web technologies. Two types of experiments were conducted: (1) experiments comparing the Whois and the prototype performance and (2) performance evaluation of the prototype based on load tests. Finally, the prototype implementation and subsequent experiment results serve as a proof-of-concept that Semantic Web technologies could contribute towards the IRIS protocol success.
APA, Harvard, Vancouver, ISO, and other styles
30

Maciel, Luciana França Smith. "Expressão dos receptores endometriais de estrógeno e progesterona em éguas acíclicas após administração de progesterona." Botucatu, 2017. http://hdl.handle.net/11449/151275.

Full text
Abstract:
Orientador: Cezinande de Meira
Resumo: Progesterone (P4) is frequently used after the administration of estradiol, to prepare seasonal non-cyclic mares as embryo recipients, however previous studies have reported gestation of seasonal non-cyclic mares treated only with P4. The objective of the present study was to evaluate the gene and protein expression of estrogen receptor alpha (ERα), estrogen beta (ERβ) and progesterone (PR) in the endometrium of seasonal non-cyclic mares treated with long acting progesterone (LAP4). Eight mares were used during the seasonal anoestrus phase, uterine biopsies were performed immediately before and five days after administration of 1,5 g of LA P4. Blood samples were taken daily for the determination of plasma P4 concentration. The protein expression of the receptors was evaluated by the immunohistochemistry and the immunostaining area percentage was determined by the ImageJ software. Transcripts abundance for ERα (ESR1), ERβ (ESR2) and PR (PGR) were determined by RT-qPCR. ERα showed higher protein expression (p <0.05) after administration of P4LA, but there was no change in mRNA abundance encoding this gene (p> 0,05). Tendency to lower protein expression was observed (p=0,07) and gene expression inhibition (p <0,05) for ERβ, PR did not changes (p>0,05). The plasma concentration of P4 presented a higher concentration 24 hours after the application of LA P4 (D1), with subsequent decline in these values (p<0,05). The 1.5 g dose of LA P4 reached the minimum concentrations of P4 requi... (Resumo completo, clicar acesso eletrônico abaixo)
Mestre
APA, Harvard, Vancouver, ISO, and other styles
31

Carvalho, Yuri Jorge Sampaio. "Modelo de métrica multidimensional para a melhoria do roteamento em redes AD HOC móveis." reponame:Repositório Institucional da UnB, 2013. http://repositorio.unb.br/handle/10482/23419.

Full text
Abstract:
Dissertação (mestrado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Elétrica, 2013.
Submitted by Fernanda Percia França (fernandafranca@bce.unb.br) on 2016-06-08T16:31:40Z No. of bitstreams: 1 2013_YuriJorgeSampaioCarvalho.pdf: 2518181 bytes, checksum: 5f52f6b0ae48a575dd295220dd882bdd (MD5)
Approved for entry into archive by Patrícia Nunes da Silva(patricia@bce.unb.br) on 2017-04-30T14:45:09Z (GMT) No. of bitstreams: 1 2013_YuriJorgeSampaioCarvalho.pdf: 2518181 bytes, checksum: 5f52f6b0ae48a575dd295220dd882bdd (MD5)
Made available in DSpace on 2017-04-30T14:45:09Z (GMT). No. of bitstreams: 1 2013_YuriJorgeSampaioCarvalho.pdf: 2518181 bytes, checksum: 5f52f6b0ae48a575dd295220dd882bdd (MD5)
Este trabalho visa a propor uma métrica multidimensional que tem como propósito causar um melhor desempenho no roteamento de redes ad hoc móveis, na presença de nós egoístas e nós em modo sleep, e com mobilidade. A melhora de desempenho diz respeito, principalmente, ao incremento da taxa de entrega de pacotes com sucesso. Para alcançar um melhor desempenho, foram observados e analisados os resultados prévios alcançados por outras métricas, o que resultou na descoberta de padrões e comportamentos, de modo a embasar à elaboração de uma nova métrica capaz de suprir as lacunas e imprecisões daquelas métricas existentes anteriormente. A validação do trabalho foi feita por método de simulação, tendo o protocolo DSR sido modificado para implantar a métrica proposta e operar considerando tal métrica. Como resultado das simulações, constatou-se que métrica proposta por este trabalho teve, em alguns pontos, uma taxa de entrega de pacotes com sucesso 30% superior àquela encontrada para a métrica original do próprio protocolo DSR (DynamicSourceRouting) e cerca de 15% superior àquela encontrada para uma métrica proposta em trabalho precedente (Serique; Sousa, 2011).
This work aims to propose a multidimensional metric that aims to improve routing performance in mobile ad hoc networks in the presence of selfish nodes, nodes in sleep mode. In order to reach a better performance in the delivery rate of packets successfully, we observed the results achieved by other metrics in simulations, which resulted in the discovery of patterns and behaviors that led to the development of a metric that supplied the gaps and inaccuracies of those metrics. This work´s validation was performed using a simulation method, with the DSR (Dynamic Source Routing) protocol which was modified so as to implement and to operate with our proposed metric. The simulations results show that the metric proposed in this work presents, at some points, a successfully delivery rate of packets 30% higher than the original metric of the DSR protocol and about 15% higher than that of the metric proposed in a previous work by (Serique; Sousa, 2011).
APA, Harvard, Vancouver, ISO, and other styles
32

Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols." Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Levillain, Olivier. "Une étude de l’écosystème TLS." Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0014/document.

Full text
Abstract:
SSL/TLS, un protocole de sécurité datant de 1995, est devenu aujourd'hui une brique essentielle pour la sécurité des communications, depuis les sites de commerce en ligne ou les réseaux sociaux jusqu'aux réseaux privés virtuels (VPN), en passant par la protection des protocoles de messagerie électronique, et de nombreux autres protocoles. Ces dernières années, SSL/TLS a été l'objet de toutes les attentions, menant à la découverte de nombreuses failles de sécurité et à des améliorations du protocole. Dans cette thèse, nous commençons par explorer l'écosystème SSL/TLS sur Internet en énumérant les serveurs HTTPS sur l'espace IPv4; nous proposons pour cela des méthodologies de collecte et d'analyse permettant d'obtenir des résultats reproductibles et comparables entre différentes campagnes de mesure. Au-delà de ces observations, nous nous sommes intéressés en détail à deux aspects essentiels de la sécurité TLS: comment parer les attaques sur le Record Protocol, et comment implémenter des parsers sûrs et efficaces. Finalement, en se basant sur les nombreuses failles d'implémentation qui ont affecté presque toutes les piles TLS ces dernières années, nous tirons quelques enseignements concernant les difficultés liées à l'écriture d'une bibliothèque TLS de confiance
SSL/TLS, a 20-year old security protocol, has become a major component securing network communications, from HTTPS e-commerce and social network sites to Virtual Private Networks, from e-mail protocols to virtually every possible protocol. In the recent years, SSL/TLS has received a lot of attentions, leading to the discovery of many security vulnerabilities, and to protocol improvements. In this thesis, we first explore the SSL/TLS ecosystem at large using IPv4 HTTPS scans, while proposing collection and analysis methodologies to obtain reproducible and comparable results across different measurement campaigns. Beyond these observations, we focused on two key aspects of TLS security: how to mitigate Record Protocol attacks, and how to write safe and efficient parsers. Finally, building on the numerous implementation flaws in almost all TLS stacks in the last years, we propose some thoughts about the challenges in writing a secure TLS library
APA, Harvard, Vancouver, ISO, and other styles
34

Gustavsson, C. C. Magnus. "Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.

Full text
Abstract:

SMTP, the current protocol for sending electronic mail (e-mail) over the Internet, has for many years suffered from several problems and limitations. When it was designed, well over twenty years ago, the requirements for e-mail were very different from those of today. A message was a text message in English, and both user and machine were explicitly named in the address. The protocol was not designed to transfer other types of messages, and no mechanism was included to verify the identity of the sender.

In order to solve these shortcomings, a new e-mail protocol needs to be defined. This report specifies a basis for what such a protocol may look like. The protocol has been designed to be easy to modify and expand, as well as to benefit from more recent ideas and technology. Binary message content is transferred without conversion, sender addresses are verified, and the address format is flexible. Along with the specification of the protocol, a sample implementation has been provided.

APA, Harvard, Vancouver, ISO, and other styles
35

Jelinski, Olaf [Verfasser]. "Das internationale diplomatische Protokoll im Vergleich zum Protokoll in Unternehmen. Eine Analyse des Protokolls als politische Institution / Olaf Jelinski." Greifswald : Universitätsbibliothek Greifswald, 2015. http://d-nb.info/107812583X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Lu, Jing. "Semi-automatic protocol implementation using an Estelle-C compiler, LAPB and RTS protocols as examples." Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29419.

Full text
Abstract:
Formal Description Techniques allow for the use of automated tools during the specification and development of communication protocols. Estelle is a standardized formal description technique developed by ISO to remove ambiguities in the specification of communication protocols and services. The UBC Estelle-C compiler automates the implementation of protocols by producing an executable C implementation directly from its Estelle specification. In this thesis, we investigate the automated protocol implementation methodology using the Estelle-C compiler. First, we describe the improvements made to the compiler to support the latest version of Estelle. Then, we present and discuss the semiautomated implementations of the LAPB protocol in the CCITT X.25 Recommendation and the RTS protocol in the CCITT X.400 MHS series using this compiler. Finally, we compare the automatic and manual protocol implementations of LAPB and RTS protocols in terms of functional coverage, development time, code size, and performance measure. The results strongly indicate the overall advantages of automatic protocol implementation method over the manual approach.
Science, Faculty of
Computer Science, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
37

Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Yu, Shui, and mikewood@deakin edu au. "Anycast services and its applications." Deakin University. School of Information Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.112407.

Full text
Abstract:
Anycast in next generation Internet Protocol is a hot topic in the research of computer networks. It has promising potentials and also many challenges, such as architecture, routing, Quality-of-Service, anycast in ad hoc networks, application-layer anycast, etc. In this thesis, we tackle some important topics among them. The thesis at first presents an introduction about anycast, followed by the related work. Then, as our major contributions, a number of challenging issues are addressed in the following chapters. We tackled the anycast routing problem by proposing a requirement based probing algorithm at application layer for anycast routing. Compared with the existing periodical based probing routing algorithm, the proposed routing algorithm improves the performance in terms of delay. We addressed the reliable service problem by the design of a twin server model for the anycast servers, providing a transparent and reliable service for all anycast queries. We addressed the load balance problem of anycast servers by proposing new job deviation strategies, to provide a similar Quality-of-Service to all clients of anycast servers. We applied the mesh routing methodology in the anycast routing in ad hoc networking environment, which provides a reliable routing service and uses much less network resources. We combined the anycast protocol and the multicast protocol to provide a bidirectional service, and applied the service to Web-based database applications, achieving a better query efficiency and data synchronization. Finally, we proposed a new Internet based service, minicast, as the combination of the anycast and multicast protocols. Such a service has potential applications in information retrieval, parallel computing, cache queries, etc. We show that the minicast service consumes less network resources while providing the same services. The last chapter of the thesis presents the conclusions and discusses the future work.
APA, Harvard, Vancouver, ISO, and other styles
39

Yang, Ying. "Routing protocols for wireless sensor networks: A survey." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19700.

Full text
Abstract:
Wireless sensor networks(WSNs) are different to traditional networks and are highly dependent on applications, thus traditional routing protocols cannot be applied efficiently to the networks. As the variability of both the application and the network architecture, the majority of the attention, therefore, has been given to the routing protocols. This work surveys and evaluates state-of-the-art routing protocols based on many factors including energy efficiency, delay andcomplexity, and presents several classifications for the various approaches pursued. Additionally, more attention is paid to several routing protocols and their advantages and disadvantages and, indeed, this work implements two of selected protocols, LEACH and THVRG, on the OPNET, and compares them in many aspects based on a large amount of experimental data. The survey also provides a valuable framework for comparing new and existing routing protocols. According to the evaluation for the performance of the routing protocols, this thesis provides assistance in relation to further improving the performance in relation to routing protocols. Finally, future research strategies and trends in relation to routing technology in wireless sensor networks are also provided.
APA, Harvard, Vancouver, ISO, and other styles
40

Cavalcanti, Alexandre Biasi. "Estudo randomizado, aberto, para avaliação da eficácia e segurança de dois protocolos para infusão de insulina endovenosa e um protocolo de administração de insulina subcutânea, em pacientes gravemente enfermos." Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/5/5137/tde-19112008-161404/.

Full text
Abstract:
Introdução: Controle glicêmico estrito tem sido recomendado para pacientes gravemente enfermos. Entretanto, sua implementação pode ser difícil devido à sobrecarga da equipe de enfermagem, controle inadequado da glicemia e aumento do risco de hipoglicemia. Objetivos: Avaliar a eficácia e segurança de três protocolos de administração de insulina para controle glicêmico em pacientes clínicos admitidos em unidades de terapia intensiva (UTI). Métodos: Foram incluídos pacientes clínicos admitidos em UTI com ao menos uma glicemia maior ou igual a 150mg/dl e pelo menos uma das seguintes características: estar sob ventilação mecânica; politraumatismo; grande queimadura; apresentar ao menos 3 critérios de síndrome da resposta inflamatória sistêmica. Esses indivíduos foram alocados aleatoriamente para um dos seguintes tratamentos: protocolo A insulina regular endovenosa contínua (IREVC) visando manter glicemias entre 100mg/dL e 130mg/dL, com ajustes guiados por software para microcomputador ou handheld device; protocolo B - IREVC visando manter glicemias entre 80mg/dl e 110mg/dl; protocolo C insulina intermitente subcutânea, a partir de glicemias maiores do que 150mg/dl. Para cada paciente as medidas repetidas de glicemia foram sumarizadas como mediana. A avaliação de eficácia foi realizada comparando-se as médias de medianas de glicemia entre os grupos. A segurança foi avaliada comparando-se a incidência de hipoglicemia (40 mg/dl) entre os grupos. Resultados: Foram incluídos 167 pacientes. As médias e desvios-padrão calculados a partir das medianas de glicose foram de 125,0±17,7 mg/dl, 127,1±32,2mg/dl e 158,5±49,6 mg/dl para os pacientes alocados para os protocolos A, B e C, respectivamente (P<0,001 para comparação entre grupos A, B e C; P=0,34 para comparação entre grupo A e B). A incidência de hipoglicemia foi de 12 casos (21,4%) no protocolo A, 24 casos (41,4%) no protocolo B e 2 casos (3,8%) no grupo C (P<0,001 para comparação entre protocolos A, B e C; P=0,02 para comparação A versus B). Não houve diferenças de mortalidade ou quanto a outros desfechos clínicos entre os protocolos; exceto diferenças marginais na quantidade de dias sob noradrenalina (protocolo CIntroduction: Strict glycemic control has been recommended for critically ill patients. However, its implementation may face difficulties with increased nursing workload, inadequate blood glucose control and higher risk of hypoglycemia. Objectives: To evaluate the efficacy and safety of three insulin protocols in medical ICU patients (MICU). Methods: MICU patients with at least one blood glucose of at least 150 mg/dL and one or more of the following characteristics were included: mechanical ventilation; at least three criteria for systemic inflammatory response syndrome; admitted because of trauma or burn. Patients were randomized to one of the following treatments: protocol A - continuous insulin infusion with adjustments guided by handheld device or desktop software targeting blood glucose levels between 100mg/dL-130mg/dL; protocol B continuous insulin aiming blood glucose levels between 80mg/dl-110mg/dl; protocol C conventional treatment intermittent subcutaneous administration of insulin if blood glucose levels exceeded 150mg/dL. Efficacy was measured by the mean of patients median blood glucose and safety was measured by the incidence of hypoglycemia (40 mg/dL). Results: 167 patients were included. Mean and standard deviation of patients median blood glucose was 125.0±17.7 mg/dl, 127.1±32.2mg/dl and 158.5±49.6 mg/dl for protocols A, B and C, respectively (P<0.001 for all protocol comparison; P=0.34 for protocol A versus B). 12 patients (21,4%) evolved with at least one episode of hypoglycemia in protocol A, 24 (41.4%) in protocol B, and 2(3.8%) in protocol C (P<0.001 for all protocol comparison; P=0.02 for protocol A versus B). There were no differences regarding mortality or other clinical outcome, except for a marginal difference on the number of days on norepinephrine (C < A < B). Conclusions: A computer guided insulin infusion protocol protocol A causes less episodes of hypoglycemia than and is as efficacious as the standard strict glycemic control protocol protocol B for controlling glucose at normal non-fasting levels (80 mg/dL 140mg/dL) in MICU patients. Hypoglycemia was rare under protocol C, however blood glucose levels were higher than protocol A or B
APA, Harvard, Vancouver, ISO, and other styles
41

Truneček, Petr. "Kryptografické protokoly v praxi." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218171.

Full text
Abstract:
The purpose of this work was first to describe the requirements for cryptographic protocols. Furthermore, the classification of these protocols should have been made with specific examples given. The aim of the next part of the work was to describe the methods which are suitable for description and modeling of cryptographic protocols. This work also addressed the analysis of cryptographic protocols by appropriate analytical means. The CSP method for modeling of the cryptographic protocols was applied in the practical part. The Yahalom protocol was selected as a protocol suitable for modeling. Two analysis was made. The first analysis concerned the standard version of the Yahalom protocol, which was tested to the requirements of cryptographic properties of the secrecy and authenticity. The second analysis was based on the possibility of disclosure of the key, including counterexamples and traces given by FDR. The first analysis did not reveal any weakening, in terms of two cryptographic properties. To demonstrate the possibility of FDR, Yahalom protocol was modified in order to cause the situation when the disclosure of keys appears. FDR then finds the exact procedure that an intruder must make to get the possession of the key.
APA, Harvard, Vancouver, ISO, and other styles
42

Li, Kang. "Modeling the bandwidth sharing behavior of congestion controlled flows /." Full text open access at:, 2002. http://content.ohsu.edu/u?/etd,632.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Zamrzla, Martin. "Průmyslový stavový indikátor." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218908.

Full text
Abstract:
This thesis deals with study of materials needed for proposing and implementation of the industry state indicator. In the theoretical part there are describe all used components including calculations. Then there is a description of the communication interface used on the indicator. The theoretical part is then followed by a description of MODBUS protocol. The practical part is divided into a few sections. First one decribes the implementation itself together with the idicator activation. Second one describes the programme equipment of microcotroller. The conclusion is about description of the application testing.
APA, Harvard, Vancouver, ISO, and other styles
44

Hlavatý, Josef. "Návrh laboratorní úlohy zaměřené na protokol AODV." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377001.

Full text
Abstract:
This diploma thesis focuses on the MANET Network (Mobile Ad-Hoc Network). There are theoretically elaborated basic information, the characteristics of the MANET network and great emphasis is placed on routing in these networks. In the next chapter the diploma thesis focuses on the Ad Hoc Demand Distance Vector (AODV) routing protocol. It features the characteristics of this protocol and the principle of communication and routing in MANET networks. Hereinafter, the individual reports of the AODV protocol are described in detail. In the third chapter, the thesis introduces the NS-3 simulation environment (network Simulator - 3) and then deals with the design of the MANET network in NS-3 using the AODV routing protocol. The practical part of the diploma thesis is the MANET network simulation and testing with the AODV routing protocol. Laboratory task is built from these simulations and the results of the testing.
APA, Harvard, Vancouver, ISO, and other styles
45

Machálka, Lukáš. "Implementace komunikačního protokolu CAN 2.0 v jednočipových mikroprocesorech." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217247.

Full text
Abstract:
This diploma thesis deals with the implementation of the CAN 2.0 communication protocol in single-chip microprocessors. In the first part communication protocols currently used in automotive application and their properties are described, with impact on communication protocol CAN 2.0. The second part is dedicated to the description of communication protocol CAN 2.0 particular features. The principle of data transmission, principle of bus arbitration and also the structure of individual frames, which can occur on it are mentioned. The final part relates with the task to compare FIFO architecture to MailBox architecture. On the basis of measurement the comparison of these architectures in typical applications was performed. Because of setting these results the prototyping board was designed. This board was utilized to design the net conception.
APA, Harvard, Vancouver, ISO, and other styles
46

El, Sawda Samer. "Contribution à l'amélioration de la sécurité pour le protocole SIP (Session Initiation Protocol)." Paris 6, 2011. http://www.theses.fr/2011PA066019.

Full text
Abstract:
SIP est un protocole de signalisation de la couche application pour créer, modifier et terminer des sessions, pour les appels téléphoniques sur Internet et la diffusion et les conférences multimédia. Nous proposons dans cette thèse l’extension « SIP SIGN » permettant de signer quelques champs d’entête pour fournir un service de non-répudiation et une authentification de bout-en-bout tout en utilisant le protocole TLS ou DTLS. Nous proposons aussi «SIP SecLite » comme une solution complète, simple, efficace et rapide pour sécuriser les communications SIP en fournissant les propriétés de sécurité exigées par SIP. Notre solution permet de réaliser la sécurité de bout en bout d’un réseau SIP tout en assurant la confidentialité et l'intégrité des messages SIP, la non-répudiation de la communication, l’anonymat par rapport aux serveurs intermédiaires et la protection d’identité et des données privées des utilisateurs finaux.
APA, Harvard, Vancouver, ISO, and other styles
47

AMORIM, Rodrigo Diego Melo. "HTR Heterogeneous Routing Protocol, um protocolo de roteamento para redes ad hoc heterogêneas." Universidade Federal de Pernambuco, 2011. https://repositorio.ufpe.br/handle/123456789/2458.

Full text
Abstract:
Made available in DSpace on 2014-06-12T15:58:24Z (GMT). No. of bitstreams: 2 arquivo4095_1.pdf: 1892388 bytes, checksum: 36bca1d45a0d20795951c6d7db402746 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2011
Faculdade de Amparo à Ciência e Tecnologia do Estado de Pernambuco
A popularidade de dispositivos móveis como meio de comunicação tem crescido nos últimos anos devido à facilidade de uso, custo e as mais variadas tecnologias. O aumento no número dessas opções como WiFi, Bluetooth ou até mesmo rede de telefonia móvel permitem uma maior conectividade desses dispositivos móveis na rede. Determinadas tarefas, como compartilhamento de stream de vídeo, implicam diferentes requisitos, o que pode requerer diferentes tecnologias de rede. Nos cenários de emergência, que incluem operações militares, força-tarefa para desastres e grupos de busca e resgate, onde se pressupõe a ausência de infraestrutura, o uso de redes sem fio e a permanente conectividade podem ser requisitos essenciais para realização de algumas tarefas. Para tanto o uso de um protocolo de roteamento que seja adequado a esse ambiente é de fundamental importância. Este trabalho faz um estudo comparativo de um novo protocolo de roteamento para redes heterogêneas ad hoc, chamado Heterogeneous Routing Protocol ou simplesmente HTR, focado em cenários de emergência, com um dos protocolos de roteamento para redes ad hoc mais usado, o OLSR. A fim de fazer uma análise robusta e escalável, o protocolo HTR foi implementado no simulador NS-3 e comparado ao OLSR através de métricas como taxa de entrega, atraso, pacotes perdidos, entre outros
APA, Harvard, Vancouver, ISO, and other styles
48

Mikuš, Peter. "Nástroje a interaktivní prostředí pro simulaci komunikace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237205.

Full text
Abstract:
Communication between devices should be based on predefined rules. These rules are called communication protocols. In this master thesis I am concerned with communication protocols, specially security protocols. Their design demand specialized tools, that will provide interactive simulations and security testing. I have described each of these tools in detail and mentioned about their properties, their pros and cons. In available tools I have implemented security protocols. The result is set of demonstration tasks that are usable in network courses at FIT VUT
APA, Harvard, Vancouver, ISO, and other styles
49

Wu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Nemani, Srinivasa Sankar Carlisle W. Homer. "Investigation of EtherYatri's compatibility with IPV6." Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/NEMANI_SRINIVASA_48.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography