Dissertations / Theses on the topic 'Reuse and protocol exchange'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Reuse and protocol exchange.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Djaffardjy, Marine. "Pipelines d'Analyse Bioinformatiques : solutions offertes par les Systèmes de Workflows, Cadre de représentation et Étude de la Réutilisation." Electronic Thesis or Diss., université Paris-Saclay, 2023. http://www.theses.fr/2023UPASG059.
Full textBioinformatics is a multidisciplinary field that combines biology, computer science, and statistics, aiming to gain a better understanding of living mechanisms. It relies primarily on the analysis of biological data. Major technological improvements, especially sequencing technologies, gave rise to an exponential increase of data, laying out new challenges in data analysis and management.In order to analyze this data, bioinformaticians use pipelines, which chain computational tools and processes. However, the reproducibility crisis in scientific research highlights the necessity of making analyses reproducible and reusable by others.Scientific workflow systems have emerged as a solution to make pipelines more structured, understandable, and reproducible. Workflows describe procedures with multiple coordinated steps involving tasks and their data dependencies. These systems assist bioinformaticians in designing and executing workflows, facilitating their sharing and reuse. In bioinformatics, the most popular workflow systems are Galaxy, Snakemake, and Nextflow.However, the reuse of workflows faces challenges, including the heterogeneity of workflow systems, limited accessibility to workflows, and the need for public workflow databases. Additionally, indexing and developing workflow search engines are necessary to facilitate workflow discovery and reuse.In this study, we developed an analysis method for workflow specifications to extract several representative characteristics from a dataset of workflows. The goal was to propose a standardized representation framework independent of the specification language. Additionally, we selected a set of workflow characteristics and indexed them into a relational database and a structured semantic format. Finally, we established an approach to detect similarity between workflows and between processors, enabling us to observe the reuse practices adopted by workflow developers
Soltwisch, Rene Alexander. "The Inter-Domain Key Exchange Protocol." Doctoral thesis, [S.l.] : [s.n.], 2006. http://hdl.handle.net/11858/00-1735-0000-0006-B403-2.
Full textNilsson, Kim. "Reactive Networking using Dynamic Link Exchange Protocol." Thesis, KTH, Kommunikationsnät, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-154832.
Full textChandramohan, Vijay. "Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol." [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000128.
Full textSardana, Divya. "Control-channel Reuse-based Multi-channel MAC Protocol for Ad Hoc Networks." University of Cincinnati / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1249856000.
Full textPage, Shannon Charles. "Testing Protocol Development for a Proton Exchange Membrane Fuel Cell." Thesis, University of Canterbury. Department of Mechanical Engineering, 2007. http://hdl.handle.net/10092/3519.
Full textNinet, Tristan. "Formal verification of the Internet Key Exchange (IKEv2) security protocol." Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S002.
Full textIn this thesis, we analyze the IKEv2 protocol specification using three formal verification tools: Spin, ProVerif and Tamarin. To perform the analysis with Spin, we extend and improve an existing modeling method with a simpler adversary model and a model for common cryptographic primitives and Lowe's authentication properties. As a result we show that the reflection attack, an attack found by a previous analysis, is actually not applicable. Moreover, our analysis using ProVerif and Tamarin provides new results regarding non-injective agreement and injective agreement guaranties of IKEv2 in the unbounded model. We then show that the penultimate authentication flaw, a vulnerability that was considered harmless by previous analyses, actually allows for a new type of Denial-of-Service attack, which works against IKEv2: the Deviation Attack. The Deviation Attack is harder to detect than existing DoS attacks, but is also harder to perform. To concretely demonstrate the attack, we successfully implement it against a popular open-source implementation of IKEv2. Finally, we study the use of existing DoS countermeasures and existing configuration options to defeat the attack, but we only find mitigations or incomplete workarounds. We therefore tackle the problem at a higher level: we propose two possible inexpensive modifications of the protocol, and formally prove that they both prevent the attack
Thomson, Derek Stewart. "The development of packaged, reusable building services components : a pilot study in the UK national health service." Thesis, Heriot-Watt University, 2000. http://hdl.handle.net/10399/1165.
Full textBuck, Randall Jay. "WiFu Transport: A User-level Protocol Framework." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/2959.
Full textGustavsson, C. C. Magnus. "Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.
Full textSMTP, the current protocol for sending electronic mail (e-mail) over the Internet, has for many years suffered from several problems and limitations. When it was designed, well over twenty years ago, the requirements for e-mail were very different from those of today. A message was a text message in English, and both user and machine were explicitly named in the address. The protocol was not designed to transfer other types of messages, and no mechanism was included to verify the identity of the sender.
In order to solve these shortcomings, a new e-mail protocol needs to be defined. This report specifies a basis for what such a protocol may look like. The protocol has been designed to be easy to modify and expand, as well as to benefit from more recent ideas and technology. Binary message content is transferred without conversion, sender addresses are verified, and the address format is flexible. Along with the specification of the protocol, a sample implementation has been provided.
Chawla, Nitin. "Registration and authentication protocol for OCEAN (Open Computation Exchange and Auctioning Network) /." [Gainesville, Fla.] : University of Florida, 2002. http://purl.fcla.edu/fcla/etd/UFE1001125.
Full textMyadam, Nishkal Gupta, and Bhavith Patnam. "Design and Implementation of Key Exchange Mechanisms for Software Artifacts using Ocean Protocol." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20665.
Full textDahlén, Marcus. "Security Architecture and Technologies for the Electronic Document Exchange with SOAP as Communication Protocol." Thesis, Linköping University, Department of Electrical Engineering, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2835.
Full textIn many industries the tracking and tracing of products within the supply chain is required by law. Companies in the metal working industry exchange so-called material test reports, which specify the product’s properties, the customer’s requirements, and serve as an assurance between the supplier and the customer. Internet technologies have changed the way companies exchange information and conduct business. In the metal working industry companies can implement an intermediary platform and make the exchange of material test reports more efficient. Furthermore, a client application that allows the company to export test reports from their information system directly to the intermediary can significantly decrease the processing costs. This inter-organizational collaboration can render an increase in productivity for customers and suppliers.
The main goal of the thesis is to analyze how companies in a supply chain can exchange documents with an intermediary over the protocol SOAP as well as support companies by showing a structured procedure for how to achieve security in a system using SOAP. SOAP is a platform independent XML-based communication protocol. The Extensible Markup Language (XML) is of major importance in e-business applications, because of its platform, language, and vendor independent way of describing data. As a universal data format, it enables the seamless connection of business systems.
SOAP does not provide any security and is usually implemented over HTTP, which allows it to pass through firewalls. Companies are only prepared to join an inter-organizational collaboration if IT-security is guaranteed. In the exchange of material test reports, security has two objectives. The first is to replace the handwritten signature in the paper-based document exchange. The second is to guarantee security for the material test reports as well as for the information intermediary.
SOAP’s extensibility model allows organizations to develop new extensions, which build upon the protocol and provide functions which aren’t specified. Specifications for attachments as well as for security should be implemented in the electronic document exchange. To design a secure system, each security concept, such as confidentiality, authentication and integrity, can be analyzed in its context and the appropriate standard can thereafter be implemented.
Alotaibi, Abdullah S. "Design and evaluate a fair exchange protocol based on online trusted third party (TTP)." Thesis, De Montfort University, 2012. http://hdl.handle.net/2086/7879.
Full textGeary, Aaron C. "Analysis of a man-in-the-middle attack on the Diffie-Hellman key exchange protocol." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep%5FGeary.pdf.
Full textThesis Advisor(s): Stanica, Pantelimon ; Kanevsky, Valery. "September 2009." Description based on title screen as viewed on November 6, 2009 Author(s) subject terms: Cryptography, Diffie-Hellman, Man-in-the-Middle Attack. Includes bibliographical references (p. 55-56). Also available in print.
Watkins, E. James. "Foulant adsorption onto ion exchange membranes." Diss., Georgia Institute of Technology, 1999. http://hdl.handle.net/1853/7062.
Full textvan, Leeuwen Daniel, and Leonel Taku Ayuk. "Security testing of the Zigbee communication protocol in consumer grade IoT devices." Thesis, Högskolan i Halmstad, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40189.
Full textStefik, Christopher J. "Effect of protocol mouthguard on VO₂ max in female hockey players using the skating treadmill." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79136.
Full textLampinen, Björn. "Protocol optimization of the filter exchange imaging (FEXI) sequence and implications on group sizes : a test-retest study." Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-196327.
Full textAlston, Katherine Yvette. "A heuristic on the rearrangeability of shuffle-exchange networks." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2521.
Full textR, V. Saraswathy. "Zero-Knowledge Proof for Knowledge of RLWE (Ring-Learning with Errors) Secret Keys." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1521192556946491.
Full textWang, Hao-Hsien. "Desired Features and Design Methodologies of Secure Authenticated Key Exchange Protocols in the Public-Key Infrastructure Setting." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/1087.
Full textAndreasson, Samuel, and Jesper Palmér. "OPC UA Field eXchange Prototyping : Enabling decentralized communication using Publish/Subscribe." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-45029.
Full textOpen Platform Communication Unified Architechure, eller OPC UA, är ett av de världsledande kommunikationsprotokoll som är specialiserat i att förena kommunikation i produktionssystem. 2018 startade OPC Foundation, ett industriellt konsortium, ett initiativ vid namn OPC UA Field eXchange med målet att utvekcla det nuvarande protokollet så att det kan användas till kommunikation på låg nivå, exempelvis mellan sensorer och ställdon. Denna rapport utforskar ifall det är möjligt att utveckla protokollet och integrera det i HMS Networks modul AnyBus CompactCom 40. Problemformluleringen baseras på framtida behov hos fabriker relaterat till automatisering. För att konkurrera framöver behöver fabriker anpassa sig till utvecklingen inom automatisering. OPC UA FX fokuserar på decentralierad kommunikation mellan enheter som fältanordning, maskin och moln samtidigt för att belastningen ska delas upp över hela systemet. Samtidigt som enheter i industiella nätverket fritt ska kunna överföra data mellan varandra oberoende vilken tillverkare som skapat enheten. Syftet med arbetet är att, baserat på Open62541, utveckla PubSub teknologi med metoder som möjlighetsgör att två eller fler instanser av en FX applikation ska kunna transportera data genom att prenumerera på och publicera data samtidigt. När mjukvaran fungerar är tanken att integrera mjukvaran på en AnyBus CompactCom 40 modul för att bevisa att implementationen är möjlig i ett praktiskt sammanhang. Open62541 används för att inkludera nödvändiga OPC UA bibliotek, funktionalitet och datatyper. Protokollet utvecklas i C i en VisualStudio miljö och integreras med hjälp av Eclipse. Resultatet i form av mjukvara var en kopplings intriktat data utbyte, baserad på OPC UA information modell, där en eller två instanser av ett program kan publicera och prenumerera på data samtidigt. HMS Networks kan använda resultatet i arbetet att implementera OPC UA FX i deras produkter. Sammanfattningsvis är Open62541 ett mycket användbart verktyg för utvekcling av OPC UA protokol. Dessvärre lyckades inte integrationen av mjukvaran i CompactCom modulen helt och hållet, men det som åstadkommits i arbetet kan i hög grad användas för fortsatt utveckling av OPC UA FX i HMS Networks produkter.
KUNDA, SAKETH RAM. "Methods to Reuse CAD Data in Tessellated Models for Efficient Visual Configurations : An Investigation for Tacton Systems AB." Thesis, KTH, Skolan för industriell teknik och management (ITM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-281748.
Full textDataförluster har alltid varit en följd av att dela 3D-modeller mellan olika CAD-system. I forskning har nya metoder utvecklats och implementerats för att minimera dataförlusten i CAD och andra program, som t.ex. visuella 3D-grafikapplikationer (3DS Max, Blender etc.). Denna rapport är resultatet av en studie kring CAD-dataförluster när man överför modeller mellan ett CAD-program och ett visualiseringsprogram. Studien har utförts vid Tacton Systems AB, som tillhandahåller produktkonfigureringslösningar både i CAD-program och i visuella miljöer och därför har studien haft fokus på att återanvända eller återskapa CAD-data i visualiseringsprogramvaror. Forskningsfrågorna är inriktade på att hitta orsaker till dataförlusterna och möjliga lösningar för företaget. Eftersom detta är ett högspecialiserat ämne krävde arbetet insatser från olika perspektiv och kunskapsinhämtning från människor också utanför företaget, vilket visar på betydelsen av öppen innovation i teknikorienterade företag. Tio olika idéer togs fram och utvecklades till koncept för att lösa problemet med dataförluster. Alla koncept har analyserats och utvärderats för att bedöma deras funktionalitet och genomförbarhet, för att implementera dem inom företagets arbetsflöde. Utvärderingarna resulterade i sex olika koncept som skulle kunna lösa problemet. Dessa koncept har diskuterats och verifierats med olika personer inom och utanför företaget. Resultatet visar styrkor och svagheter i vart och ett av dessa koncept och ger tydliga rekommendationer till företaget om nästa steg.
Dowling, Benjamin James. "Provable security of internet protocols." Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Full textLluch-Ariet, Magí. "Contributions to efficient and secure exchange of networked clinical data : the MOSAIC system." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/388037.
Full textAguilar, Rodriguez Adriana. "Building networks in the Climate Change Convention : co-ordination failure in the establishment of Clean Development Mechanism (CDM) in Mexico." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/building-networks-in-the-climate-change-convention--coordination-failure-in-the-establishment-of-clean-development-mechanism-cdm-in-mexico(02f1f20b-914a-4ca0-8ce0-0423ab3e6100).html.
Full textShoaib, Naveed. "A Portable and Improved Implementation of the Diffie-Hellman Protocol for Wireless Sensor Networks." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1253597142.
Full textPfeffer, Katharina. "Formal Verification of a LTE Security Protocol for Dual-Connectivity : An Evaluation of Automatic Model Checking Tools." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-148047.
Full textSäkerhetsprotokoll används i många typer av applikationer för att säkerställa säkerhet och integritet för kommunikation. För att uppnå detta mål behövs en behövs mekanismer som tillhandahåller pålitlig och systematisk verifiering av protokollen. Därför har det visats stort akademiskt intresse för forskning inom formell verifiering av säkerhetsprotokoll de senaste två decennierna. Sådana metoder formaliserar protokollsemantiken, vilket lägger grunden till automatiserad verifiering med modellverifieringsverktyg. Än så la¨nge har det inte varit stort focus på praktiska tilla¨mpningar, som t.ex. hur väl metoderna fungerar för de problem som dyker upp under en standardiseringsprocess. I detta examensarbete konstrueras en formell modell för ett säkerhetsprotokoll som etablerar en säkerhetsassociation mellan en terminal och två Long-Term Evolution (LTE) basstationer i ett delsystem kallat Dual Connectivity. Detta delsystem standardiseras för närvarande i 3GPP. Den formella modellen verifieras sedan med bästa tillgängliga verktyg för automatiserad modellverifiering (Scyther och Tamarin Prover). För att åstadkomma detta har den formella modellen implementerats i inmatningsspråken för de två verktygen. Slutligen ha de två verktygen evaluerats. Huvudslutsatsen är att inget av de två verktygen tillräckligt väl kan modellera de koncept där maskinstödd verifiering som mest behövs. Skälen till detta är Scythers begränsade syntax, och Tamarins begränsade prestanda och möjlighet att terminera för komplexa protokollmodeller. Trots detta är formella metoder andvändbara i standardiseringsprocessen eftersom de tvingar fram väldigt noggrann granskning av protokollens fundamentala delar. Därför kan formella metoder bidra till att förbättra strukturen på protokollkonstruktionsprocessen om det kombineras med nuvarande metoder.
Pitchai, Karthik Raja. "An executable meta-model for safety oriented software and systems development processes within the avionics domain in compliance with RTCA DO 178 B." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-19296.
Full textRozsnyó, Tomáš. "Modular Multiple Liquidity Source Price Streams Aggregator." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2012. http://www.nusl.cz/ntk/nusl-236492.
Full textGreene, Owen J., and P. Batchelor. "Information Exchange and Transparency: Key Elements of an International Action Programme on Small Arms." Thesis, British American Security Information Council (BASIC), International Alert and Saferworld, 2001. http://hdl.handle.net/10454/4267.
Full textEfforts to combat and prevent illicit trafficking in, and proliferation and misuse of, small arms and light weapons (SALW) are hampered by lack of relevant information-exchange and transparency. International information exchange and transparency arrangements are key elements of each of the main elements of the international action programme on SALW to be launched at the UN 2001 Conference. There is great scope to develop information management and distribution arrangements to disseminate and exchange of relevant information on SALW without seriously compromising national security, necessary commercial secrecy, or law enforcement. Indeed, national security, commerce, crime prevention and law enforcement are generally enhanced by appropriate transparency and information exchange
Dhavala, Kishore. "Essays on Emissions Trading Markets." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/733.
Full textHussain, Dostdar, and Muhammad Ismail. "Requirement Engineering : A comparision between Traditional requirement elicitation techniqes with user story." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-70174.
Full textOlejník, Tomáš. "Zpracování obchodních dat finančního trhu." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-412828.
Full textBehnam, Bobby. "Modélisation d'échange d'informations de composants électroniques virtuels." Grenoble INPG, 1998. http://www.theses.fr/1998INPG0126.
Full textWen, Wen. "Energy Efficient Secure Key Management Schemes for WSNs and IoT." Thesis, Université d'Ottawa / University of Ottawa, 2016. http://hdl.handle.net/10393/35257.
Full textValle, Edson Cordeiro do. "Minimização do uso de água e efluentes com considerações econômicas e operacionais via programação matemática." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2005. http://hdl.handle.net/10183/8170.
Full textWater is an important raw material in the chemical, petrochemical, and food industry, being used in several stages of a process. Based on the economic importance of the water and the environmental impact through its employment in the industry, its rational consume has been receiving special attention. In the past decades, several methodologies have been proposed for the minimization of industrial water consume and wastewater emissions based on concepts of mass integration such as reuse, recycle, and regeneration of process streams. The methodologies proposed in the literature for the mass integration can be classified in two main groups: the first uses the themodynamic-heuristic-evolutive approach while the second uses mathematical programming and optimization. Both methodologies show difficulties to deal with the case of multiple pollutants: on the first one it is necessary to make some assumptions to solve this problem while the second, limitations relative to optimization methods are present. Another problem is the operational limitations due to streams recycle and reuse, that integrated processes can present. The present study, through the use of mathematical programming tools, based on the synthesis problem proposed by Fontana (2002), proposes methods to reduce the problem complexity and also for the synthesis of mass integration networks regarding economical and operational aspects. Initially it was proposed the elimination of the integer variables from the optimization problem, changing the problem from mixed-integer nonlinear programming (MINLP) to nonlinear programming (NLP). In the following, a methodology for the reduction of the problems complexity, based on the equality constraints, was applied to reduce the number of decision variables. The proposed formulations showed good results, reducing the computational time comparing to the MINLP problem. Based on the proposed methodologies for the reduction of the problem complexity described above, it was implemented a feasible initial guess generator based on random numbers. It was also proposed three formulations for the network synthesis with economic and operational considerations, solving the synthesis problem in two levels: an external level for the evaluation of economical criteria and an internal level where the operational index is obtained. Two out of the three implementations presented networks with better operational results comparing with problems only with economical aspects. These results were evaluated by dynamic simulations with linearized models and it was observed an increase in the systems robustness (reduction of the control action over the manipulated variables) when the system was subjected to positive disturbances in the pollutants loads and set-points changes.
Uematsu, Akira Arice de Moura Galvão. "Algoritmos de negociação com dados de alta frequência." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/45/45133/tde-28042012-114138/.
Full textIn our work we analyzed data from BM&F Bovespa, the stock exchange in São Paulo. The dataset refers to the month January 2011 and is related to BOVESPA index (IND), mini BOVESPA index (WIN) and the exchange tax (DOL). These, are high frequency data representing various aspects of the dynamic of negotiations. The array of values includes the dates/times of trades, prices, volumes offered for trade and others trades characteristics. The first stage of the thesis was to extract information to the analysis from an archive in FIX protocol, it was developed a program in R with this aim. Afterwards, we studied the character of temporal dependence in the data, testing Markov properties of a fixed and variable memory length. The results of this application show a great variability in the character of dependence, which requires further analysis. We believe that our work is of great importance in future academic studies. In particular, the specific character of the FIX protocol used by Bovespa. This was an obstacle in a number of academic studies, which was, obviously, undesirable since Bovespa is one of the largest trading markets in the modern financial world.
Cunha, Rafael de Souza. "Protocolo de Negociação Baseado em Aprendizagem-Q para Bolsa de Valores." Universidade Federal do Maranhão, 2013. http://tedebc.ufma.br:8080/jspui/handle/tede/501.
Full textCoordenação de Aperfeiçoamento de Pessoal de Nível Superior
In this work, we applied the technology of Multi-Agent Systems (MAS) in the capital market, i.e., the stock market, specifically in Bolsa de Mercadorias e Futuros de São Paulo (BM&FBovespa). The research focused mainly on negotiation protocols and learning of investors agents. Within the Stock Exchange competitive field, the development of an agent that could learn to negotiate, could become differential for investors who wish to increase their profits. The decision-making based on historical data is motivation for further research in the same direction, however, we sought a different approach with regard to the representation of the states of q-learning algorithm. The reinforcement learning, in particular q-learning, has been shown to be effective in environments with various historical data and seeking reward decisions with positive results. That way it is possible to apply in the purchase and sale of shares, an algorithm that rewards the profit and punishes the loss. Moreover, to achieve their goals agents need to negotiate according to specific protocols of stock exchange. Therefore, endeavor was also the specifications of the rules of negotiation between agents that allow the purchase and sale of shares. Through the exchange of messages between agents, it is possible to determine how the trading will occur and facilitate communication between them, because it sets a standard of how it will happen. Therefore, in view of the specification of negotiation protocols based on q-learning, this research has been the modeling of intelligent agents and models of learning and negotiation required for decision making entities involved.
Neste trabalho, aplicou-se a tecnologia de Sistemas MultiAgente (SMA) no mercado de capitais, isto é, na Bolsa de Valores, especificamente na Bolsa de Mercadorias e Futuros de São Paulo (BM&FBovespa). A pesquisa concentrou-se principalmente nos protocolos de negociação envolvidos e na aprendizagem dos agentes investidores. Dentro do cenário competitivo da Bolsa de Valores, o desenvolvimento de um agente que aprendesse a negociar poderia se tornar diferencial para os investidores que desejam obter lucros cada vez maiores. A tomada de decisão baseada em dados históricos é motivação para outras pesquisas no mesmo sentido, no entanto, buscou-se uma abordagem diferenciada no que diz respeito à representação dos estados do algoritmo de aprendizagem-q. A aprendizagem por reforço, em especial a aprendizagem-q, tem demonstrado ser eficiente em ambientes com vários dados históricos e que procuram recompensar decisões com resultados positivos. Dessa forma é possível aplicar na compra e venda de ações, um algoritmo que premia o lucro e pune o prejuízo. Além disso, para conseguir alcançar seus objetivos os agentes precisam negociar de acordo com os protocolos específicos da bolsa de valores. Sendo assim, procurou-se também as especificações das regras de negociação entre os agentes que permitirão a compra e venda de títulos da bolsa. Através da troca de mensagens entre os agentes, é possível determinar como a negociação ocorrerá e facilitará comunicação entre os mesmos, pois fica padronizada a forma como isso acontecerá. Logo, tendo em vista as especificações dos protocolos de negociação baseados em aprendizagem-q, tem-se nesta pesquisa a modelagem dos agentes inteligentes e os modelos de aprendizagem e negociação necessários para a tomada de decisão das entidades envolvidas.
Zekri, Dorsaf. "Agrégation et extraction des connaissances dans les réseaux inter-véhicules." Thesis, Evry, Institut national des télécommunications, 2013. http://www.theses.fr/2013TELE0001/document.
Full textThe works in this thesis focus on data management in inter-vehicular networks (VANETs). These networks consist of a set of moving objects that communicate with wireless networks IEEE 802.11, Bluetooth, or Ultra Wide Band (UWB). With such communication mechanisms, a vehicle may receive information from its close neighbors or other more remote, thanks to multi-jump techniques that operate in this case intermediate objects as relays. A lot of information can be exchanged in the context of « VANETs », especially to alert drivers when an event occurs (accident, emergency braking, vehicle leaving a parking place and want to inform others, etc.). In their move vehicles are then « contaminated » by the information provided by others. In this work, we use the data substantially different from the existing work. These are, in fact, use the data exchanged to produce alerts drivers. Once these data are used, they become obsolete and are destroyed. In this work, we seek to generate dynamically from data collected by vehicles in their path, a summary (or aggregate) which provides information to drivers, including when no communicating vehicle is nearby. To do this, we first propose a spatio-temporal aggregation structure enabling a vehicle to summarize all the observed events. Next, we define a protocol for exchanging summaries between vehicles without the mediation of an infrastructure, allowing a vehicle to improve its local knowledge base by exchange with its neighbors. Finally, we define our operating strategies of the summary to assist the driver in making decision. We validated all of our proposals using the «VESPA» simulator by extending it to take into account the concept of summaries. Simulation results show that our approach can effectively help drivers make good decisions without the need to use a centralized infrastructure
Kuppusamy, Lakshmi Devi. "Modelling client puzzles and denial-of-service resistant protocols." Thesis, Queensland University of Technology, 2012. https://eprints.qut.edu.au/61032/1/Lakshmi_Kuppusamy_Thesis.pdf.
Full textFoo, Ernest. "Strategies for designing efficient electronic payment schemes." Thesis, Queensland University of Technology, 2000.
Find full textKrontiris, Alexandros. "Evaluation of Certificate Enrollment over Application Layer Security." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-236033.
Full textDetta examensarbete analyserar säkerhetsprotokoll av typen ApplicationLayer för certifikatregistrering och hantering. EDHOC, Ephemeral Diffie-Hellman Over COSE, har implementerats, analyserats och utvärderats. EDHOC är ett nyligen utvecklat Application Layer-protokoll som är utformat för att tillhandahålla autentiserings- och nyckelfunktionsfunktioner med kompakta meddelandestorlekar och minimala rundturstider, inriktat på IoT-begränsade enheter. Huvudområdet för examensarbetet är att studera säkerhet, prestanda och skalbarhet (i fallande ordning av betydelse) hos EDHOC jämfört med andra föreslagna Application Layer-säkerhetsprotokoll som utför certifikatsskrivning.
"Channel reuse multiple access protocol for bidirectional bus networks." Massachusetts Institute of Technology, Laboratory for Information and Decision Systems], 1992. http://hdl.handle.net/1721.1/3254.
Full textCaption title.
Includes bibliographical references (leaf 5).
Supported by the Defense Advanced Research Projects Agency. N00014-84-K-0357 Supported by the National Science Foundation. NSF-ECS-7919880 Supported by the Army Research Office. ARO-DAAL03-86-K-0171
Chen, Huai-Hsien. "Implementation of Internet Key Exchange Protocol." 2004. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0001-2507200423262600.
Full textChen, Huai-Hsien, and 陳懷先. "Implementation of Internet Key Exchange Protocol." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/61507602852405847722.
Full text國立臺灣大學
電機工程學研究所
92
When the Internet has grown in the past ten years, more and more people communicate with their friends over the Internet. But Internet does not provide privacy; this means that a perpetrator may observe confidential data when the data traverses the Internet. A perpetrator may also modify data traversed the Internet, and we loss data integrity. Things can be worse; a perpetrator may pretend you to send data to others. Thus, some security mechanisms must be used to prevent the above situation from happening IP Security (IPSec) is a network-layer protocol. By implementing security mechanism as the IP level, one can ensure secure communication not only for applications that have security mechanisms but also for many security-ignorant applications. IPSec combines a lot of security technologies, including IPSec header which defines the information to be added to an IP packet and IKE which negotiates the security association between two entities. In this thesis, we describe implementation of IKEv2 protocol which can be used to performing mutual authentication and establishing and maintaining security association.
HSU, LIN-CHIH, and 許令芷. "Password authentication and key exchange protocol." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/59451420718306413483.
Full text佛光大學
資訊學系
96
Internet provides various services enabling the convenience of human life. However, it accompanies a variety of information security attacks. Before having access to the computer resources in remote site, it is one of the important issues in network security considerations to have a mutual authentication of the communicating entities. We proposed a new method of password authentication and key exchange protocol with smart card in this paper. The proposed scheme has the following characteristics: (1) it is not required for the server to store any authentication data for users; (2) users can freely choose their own passwords; (3) it provides mutual authentication; (4) the communicating parties can exchange one common session key; (5) it enables the control of expiration; (6) the computation complexities of the login phase is lower than those of the previously proposed schemes.
Lee, Wei-Cheng, and 李威成. "A Fair Exchange Protocol for Internet Auction." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/94696804468461683616.
Full text輔仁大學
資訊管理學系
94
With the popularity of internet and the rise of electronic commerce, internet auctions have become one of the most popular shopping ways. But, there are so many cheating events in internet auctions, which will cause the consumers to doubt of the feasibility of online shopping and obstruct the development of internet auctions. Facing the increasing cheating problems of internet auctions, some major auction websites guarantee their customers against all lost and bring out some policies. However, these policies have some deficiencies, so it is necessary to design a fair transaction way for the environment of internet auctions. Because the cheating problems in the internet auction are getting worse, there is still no standard protocol to solve these problems. This study proposes a fair exchange protocol for internet auctions, which can let the buyer and seller deal with the transaction in a fair way. This protocol is based on the verifiable and recoverable encryption of DSA signature posed by Nenadic, et al. (2005) and the technique of electronic cash posed by Song and Korba (2004) to design a fair exchange protocol. This protocol can: (1) assure the fairness of transaction result, (2) protect the privacy of transaction message, (3) produce non-repudiation evidence to prove the participation of buyer and seller, (4) allow the buyer to verify the goods that are correct, and (5) reduce auction websites’ involving extent during the transaction process. This study using the cryptography method to ensure the transaction security between buyers and sellers, and expects to solve the problem and promote the security of internet auctions.
Li, Wen-Hui, and 李文輝. "An Efficient Three-Party Key Exchange Protocol." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/59665431311256984116.
Full text朝陽科技大學
資訊工程系碩士班
97
The introduction of the Internet era also means the dawn of mass threats of e-virus and hackers. Thus, the most appealing element of three-party communication would be the minimizing need of the session key in each user. All recent studies about the three party communications have been concentrating on the safety reliance of public key cryptosystem on the authentication server between each two parties. Yet, this method is prone to forgery identity and password guessing attacks. Therefore, some claimed that the bypassing of public key exchange protocol on authentication server would be necessary to prevent the abovementioned safety issue. I.e. the users can obtain and exchange the session key from a trusted third party. During the session, the authentic server approves the users’ identities and passwords, and generates a temporary session key for each participant, and which session key would be highly secure against all sorts of modern-day attacks effectively and efficiently. In this paper, we design an efficient three party session key exchange authentication protocol that is based on pre-registered identity and password on one authentication server. During the session, the public key would be encrypted with the identity of another participant, thereby reassuring its counterpart’s identity and prevent the session from unknown party’s potential threats. In such a calculation for the temporary session keys which are sent separately to each participant, passwords are removed. For the reasons not only to reduce the required calculation capacity, but also to keep the security of the protocol, namely the dictionary guessing attacks. Thus, in comparisons to others’ protocols, our protocol not only does reduce the required calculation capacity, but also safeguard the communications in today’s Internet environment.