Tesis sobre el tema "DC Security"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 27 mejores tesis para su investigación sobre el tema "DC Security".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Eriksson, Robert. "Security-centered Coordinated Control in AC/DC Transmission Systems". Licentiate thesis, Stockholm : Royal Institute of Technology, 2008. http://kth.diva-portal.org/smash/record.jsf?searchId=4&pid=diva2:101.
Texto completoStevens, Phillip W. "Considering security in Florida's transportation project development process". [Tampa, Fla] : University of South Florida, 2006. http://purl.fcla.edu/usf/dc/et/SFE0001508.
Texto completoRegister, David Lain Brian. "Programming homeland security citizen preparedness and the threat of terrorism /". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3922.
Texto completoFernandopulle, Nilkamal Alden Robert T. H. Findlay Raymond D. Tang Chi-keung. "Improved dynamic security assessment for AC/DC power systems using transient energy functions". *McMaster only, 2005.
Buscar texto completoMohanty, Pranab. "Learning from biometric distances : performance and security related issues in face recognition systems". [Tampa, Fla.] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0002298.
Texto completoSchuessler, Joseph H. Windsor John C. "General deterrence theory assessing information systems security effectiveness in large versus small businesses /". [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9829.
Texto completoYoung, Randall Frederick Windsor John C. "Defining the information security posture an empirical examination of structure, integration and managerial effectiveness /". [Denton, Tex.] : University of North Texas, 2008. http://digital.library.unt.edu/permalink/meta-dc-9006.
Texto completoPati, Nishikanta Guturu Parthasarathy. "Occlusion tolerant object recognition methods for video surveillance and tracking of moving civilian vehicles". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-5133.
Texto completoMeyer, Aric Tobolowsky Peggy M. "FISA and warrantless wire-tapping does FISA conform to fourth amendment standards? /". [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/permalink/meta-dc-9838.
Texto completoHuang, Jian Li Hao. "FPGA implementations of elliptic curve cryptography and Tate pairing over binary field". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3963.
Texto completoBruursema, Kari. "How individual values and trait boredom interface with job characteristics and job boredom in their effects on counterproductive work behavior". [Tampa, Fla.] : University of South Florida, 2007. http://purl.fcla.edu/usf/dc/et/SFE0001996.
Texto completoZhang, Zhiguo. "Protecting 802.11-Based Wireless Networks From SCTS and JACK Attacks". ScholarWorks@UNO, 2008. http://scholarworks.uno.edu/td/862.
Texto completoHammelman, Colleen. "Connecting for survival: Understanding the spatial implications of migrant women's food insecurity coping strategies in Medellin, Colombia, and Washington, DC". Diss., Temple University Libraries, 2016. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/370967.
Texto completoPh.D.
Women worldwide carry out strategies to support themselves and their families that rely on connecting to physical resources, especially food, and to important social ties. This dissertation provides a nuanced understanding of the spatial implications of this connectivity as made visible through mobility and social networks in two cities. Everyday experiences of food security can be bolstered by access to greater mobility (e.g., access to a taxi/bus to go to the central market), which can be provided through social networks (e.g., sharing a ride with a family member or neighbor). At the same time, a lack of mobility may inhibit a person’s access to food (e.g., an inability to move beyond one’s neighborhood due to risk of violence), and is especially true when this need for mobility interferes with other social network obligations (e.g., needing to care for children). This mixed-methods research uses sketch mapping during in-depth interviews with 72 migrant women coping with food insecurity in Medellín, Colombia, and Washington, DC, USA. Based on this data, I use relational poverty’s emphasis on social relations to explain that food insecurity results from global political economic systems, especially a capitalist, corporate food regime (chapter 3). However, in moving beyond structural explanations, this dissertation also illustrates everyday survival strategies – such as relying on informal social networks – that act as resistance to these processes (chapter 4), are both social and mobile – for example, traveling with members of social networks to access emergency food providers (chapter 5), and are impacted locally by urban planning policies reflecting global norms (chapter 6). In doing so, this dissertation argues that food insecure individuals are powerful agents carrying out creative coping strategies that are constrained by political economic structures. Building on theoretical foundations from critical food studies, urban geography and feminist geography, this research contributes to these literatures through theorizing structure and agency dynamics evident in food insecurity, particularly from the perspective of those coping with food insecurity. It is important to attend to their complex, lived experience in order to better understand if strategies for alleviating food insecurity are appropriate. Additionally, focusing on different contexts of food insecurity allows illustrating how cities are similarly and differently integrated into globalized processes influencing experiences of poverty and governance in both the global north and south. It also contributes a more nuanced understanding of the food insecurity experiences of low-income women migrating into urban environments, enabling more effective scholarship as well as improved policy making and service provision by governments, relief agencies, and community organizations. For example, this dissertation provides critiques of policy approaches that singularly focus on increasing opportunities for consumption (chapters 3 and 5) and nutrition education programs emphasizing the ‘right’ kinds of consumption (chapters 4 and 5). These policy approaches ignore the structural causes of food insecurity (chapter 3) and the nutritional knowledge of food insecure migrants (chapter 4). Instead, I argue for policies and programs to be created with a better understanding of the lived experience of those they seek to support. This includes valuing their critiques of political economic systems (chapter 4), supporting their non-economic survival strategies – such as exchange in informal networks (chapters 4 and 5) and growing food (chapter 6), and increasing flexibility to accommodate ‘non-traditional’ mobility and (informal) work situations.
Temple University--Theses
Bakhos, Gianni. "Gestion de la sécurité du réseau électrique AC & DC : évaluation et amélioration". Electronic Thesis or Diss., Université Grenoble Alpes, 2024. http://www.theses.fr/2024GRALT014.
Texto completoToday, the integration of renewable energies poses problems of congestion and uncertainty on the electricity network, given the intermittency and unpredictability of this type of energy. What's more, for reasons of profitability and efficiency, the power generated from renewables is transmitted in the form of High Voltage Direct Current (HVDC). A new concept has therefore emerged, that of merging HVDC interconnections into an existing meshed network, which will bring greater flexibility to the operation of the overall system. The result is a hybrid electricity transmission system with significant mutual interactions between the existing AC system and the integrated DC system. While the stability problems of the AC network have now been identified, those of the hybrid system still need to be studied, since the integration of rapidly controllable power converters could modify the behaviour of the entire system. As a result, this thesis project seeks to establish an innovative study encompassing the entire AC/DC hybrid system. This will focus on a security assessment that takes into account operational constraints and the ability of the system to reach a new equilibrium. In addition, this thesis will address the stabilisation challenges of the overall hybrid system. To this end, the assignments will consist of a preliminary study of the state of the art: what is the physical nature of the instability problems of the AC system? What types and ranges of disturbances should be considered for stability assessment? Finally, what modelling and control of the HVDC system? All of this will enable the development of an inclusive security assessment tool that takes into account different system control methods. An analysis will also be carried out to understand the influence of the parameters and control methods adopted. This will help us to implement a systematic means of control to improve network security and optimise power distribution across a Multi-Terminal DC network
Aguiar, Emílio Júnior Ribeiro. "Early retirement reductions covered by a DC pension plan : case study analysis for Portugal". Master's thesis, Instituto Superior de Economia e Gestão, 2020. http://hdl.handle.net/10400.5/21065.
Texto completoEm Portugal, o envelhecimento da população desafia a sustentabilidade financeira do sistema de Segurança Social. Ao longo dos anos, muitas emendas legislativas foram introduzidas no sistema de Previdência Social com o objetivo de torná-lo auto-sustentável, todavia existe uma dificuldade para entregá-lo sem restringir os benefícios de aposentadoria devido a evolução demográfica. Inevitavelmente, isso leva a impactos negativos nas pensões de aposentadoria por idade. As administrações anteriores combinaram essas reformas com medidas que reforçam o estabelecimento de esquemas privados de fundos de pensões, dando-lhe um papel mais preponderante, de forma a diversificar as fontes de renda de aposentadoria. No contexto de aumento da responsabilidade individual pela adequação da renda de aposentadoria. Esta dissertação analisa a pensão de velhice com especial enfoque nas reformas antecipadas, dada a forte penalização que existe. Além disso, verifica-se a possibilidade de um plano de contribuição definida para mitigar totalmente essas reduções. Portanto, são descritos os dois sistemas, o público e o complementar.
In Portugal, population ageing is challenging the financial sustainability of the Social Security system. Throughout the years many legislative amendments have been introduced in the Social Security system, with the goal to make it self-sustainable, but it is struggling to deliver it without restricting old-age benefits due to the increase of the elderly population. Inevitably, this leads to negative impacts in the old-age retirement pensions. Past administrations have combined these reforms with measures to reinforce the establishment of the funded private pension sector, giving it a more prominent role, so as to diversify the sources of retirement income. In the context of increasing the individual responsibility for the adequacy of retirement income. This paper analyses the old-age benefits with special focus in the early retirement option, given the heavy penalties inherent to this option. Also, examines the possibility of fund a DC pension plan to fully mitigate those penalties.
info:eu-repo/semantics/publishedVersion
Salehi, Pour Mehr Vahid. "Development and Verification of Control and Protection Strategies in Hybrid AC/DC Power Systems for Smart Grid Applications". FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/804.
Texto completoNguyen, Phuong Anh. "La programmation DC et DCA pour la sécurité de la couche physique des réseaux sans fil". Electronic Thesis or Diss., Université de Lorraine, 2020. http://www.theses.fr/2020LORR0023.
Texto completoPhysical layer security is to enable confidential data transmission through wireless networks in the presence of illegitimate users, without basing on higher-layer encryption. The essence of physical layer security is to maximize the secrecy rate, that is the maxi- mum rate of information without intercepted by the eavesdroppers. Besides, the design of physical layer security considers the transmit power minimization. These two objectives conflict with each other. Consequently, the research on physical layer security designs often focuses on the two main classes of optimization problems: maximizing secrecy rate under the transmit power constraint and minimizing power consumption while guaranteeing the secrecy rate constraint. These problems are nonconvex, thus, hard to solve. In this thesis, we focus on developing optimization approaches to solve these two optimization problem classes. Our methods are based on DC (Difference of Convex functions) programming and DCA (DC Algorithm) which well-known as one of the most powerful approaches in optimization. In the first part, we consider three classes of secrecy rate maximization problems (chapters 2, 3, 4). In particular, chapter 2 studies the secure information transmission in a multiple-input single-output (MISO) relay system by using joint beamforming and artificial noise strategy under the deterministic uncertainty channel models of all links. Without using a relay, chapter 3 addresses the problem of transfer wireless information and power simultaneously in MISO secure system where scenarios of perfect channel state information and deterministic uncertainty channel models are concerned. Transmit beamforming without artificial noise and that with artificial noise are investigated. Under the assumption of statistical channel state information to eavesdroppers, chapter 4 studies the probability constrained secrecy rate maximization problem in multiuser MISO simultaneous wireless information and power transfer (SWIPT) system. The unified approach based on DC programming and DCA is proposed to solve three classes of optimization problems. The optimization problem in chapter 2 is recast as two general DC programs. The general DCA schemes are proposed to solve these two DC programs. In chapter 3, we consider four optimization problems in accordance with four scenarios. Exploiting the special structures of these original optimization problems, we transform it into four general DC programs for which the corresponding general DCA based algorithms are developed. In chapter 4, we first transform the considered problem into a tractable form. We then develop an alternating scheme to solve the transformed problem. Two general DC programs are proposed in each step of the alternating scheme. For solving these DC programs, we study a variant of general DCA, namely, DCA−ρ scheme. The convergence of alternating general DCA−ρ scheme is proven. The second part studies the transmit power optimization problem under the probability constraints of secrecy rate and harvested energy in a MISO SWIPT system (chapter 5). We reformulate the original problem as three general DC programs for which the corresponding general DCA-based algorithms are investigated. Numerical results demonstrate the efficiency of the proposed algorithms
Brunai, Adam. "Anonymita v P2P sítích". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-412912.
Texto completoMott, W. E. Albarran Alan B. "Political agenda-setting in cable news as a possible technique for securing an audience niche". [Denton, Tex.] : University of North Texas, 2007. http://digital.library.unt.edu/permalink/meta-dc-3935.
Texto completoLin, Yi Chi y 林以琦. "Redundant DC-DC Converter Device Research –Based on the Entry Level Network Security Appliance". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/b749fe.
Texto completo國立宜蘭大學
多媒體網路通訊數位學習碩士在職專班
105
Maintaining leading position in the networking appliance requires not only the best technology and production capabilities but also technological innovation and strategies, realizing the market position of the entry level networking security application is essential, Being aware of market position of its own product can avoid the low cost competition caused by other Taiwan ODM competitors, moving forward to innovation is the right path and essential. Previous product, entry level network security appliance, adopted one 250W ATX power supply to be the main power source that is not capable to have another backup power supply. It also has limitations from physical size and cost as well that can’t use redundant power supply, once the PSU (Power Supply) is malfunction; high maintenance fee is caused by disassembling the system to replace new PSU (Power Supply). The research is to find the opportunity to prevent the disadvantages of the previous product by public procurement tender. It can bring redundant DC-DC converter device to entry level network security appliance and makes it become cost effective and modularized.
Yeh, Chun-Teng y 葉駿騰. "Probabilistic Security Analysis of DC Zonal Shipboard Power Systems". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/06509823647759982036.
Texto completo國立高雄海洋科技大學
輪機工程研究所
95
In contrast with traditional AC radial distribution systems, significant giants can be realized in terms of supply quality, weight, manning, and cost from a shipboard DC zonal electric distribution system (DC ZEDS). The DC ZEDS is predicted on having starboard and port DC buses feeding electrical zones delineated by watertight bulkhead compartments. The main bus DC voltage is stepped down within the zone and then converted to three-phase AC and lower voltage DC by power converters. Security assessment of the shipboard DC ZEDS under different fault conditions is important for real-time secure operation of the system. This thesis aims for security analysis of the shipboard DC ZEDS by probabilistic methodologies. The power converter operation and power generation and load variations are handled by AC/DC load flow and probabilistic load flow techniques to compute possible AC/DC load flow solution distributions, including bus voltages, phase angles, network flows, and power converter operation parameters. Stochastic contingency analysis of the system is also performed to compute the probability of the occurrence of the system insecurity and determine the critical contingency.
Godboley, Sangharatna. "Driving Concolic Testing to achieve higher MC/DC through source code transformations". Thesis, 2017. http://ethesis.nitrkl.ac.in/9419/1/2017_PhD_SGodboley_514CS1005_Driving.pdf.
Texto completoYang, Wen-Hau y 楊文豪. "An Enhanced Security Buck DC-DC Converter with True Random Number Based Pseudo Hysteresis Controller for Internet-of-Everything Devices". Thesis, 2017. http://ndltd.ncl.edu.tw/handle/c637ay.
Texto completo國立交通大學
電機工程學系
106
As far as Internet-of-Everything (IoE) devices are concerned, strong hardware security and low electromagnetic interference (EMI) are design requirements for power management to guarantee personal data protection. Conventional linear feedback shift register (LFSR) based loop randomization technique has the ability to avoid the power side channel attacks (PSCA), but the power injection attack (PIA) results in limited random number (RN) due to the predictability and reproducibility of the LFSR, and thus cause the loop randomization cracked and vulnerable to the PSCA. Besides, the PIA not only narrows the LFSR based random switching frequency but also reduces the triangular modulation frequency to around 1/N times of the switching frequency. Consequently, the EMI noise floor fails to meet the specification of EN 55032 Class B. Other techniques offer counter-measures to improve resistance against malicious attacks but result in either greatly increased power consumption or large hardware overhead. In this thesis, the true random number (TRN) based pseudo hysteresis controller (PHC) and the enhanced security randomizer (ESR) are proposed to avoid both PSCA and PIA simultaneously and reduce EMI without degrading performance. The ESR is capable of generating input-supply-independent RN correctly under PSCA and PIA. The TRN based PHC converts the RN to the hysteresis window that constitutes a true random modulated switching frequency, thereby ensuring suitable spread spectrum and low EMI. Besides, fast transient response is maintained due to inherent hysteresis control. Experimental results show peak EMI noise is reduced from 89.72dBμV to 54.32dBμV and meets the specification of EN 55032 Class B even under the PIA interference up to 1V. Furthermore, transient performance achieves 7.3μs recovery time and 53mV drop of output voltage in case of 0.2A-to-0.8A load step at the switching frequency around 1MHz and peak efficiency is 92.4%.
"Monitoring for Reliable and Secure Power Management Integrated Circuits via Built-In Self-Test". Master's thesis, 2019. http://hdl.handle.net/2286/R.I.54959.
Texto completoDissertation/Thesis
Masters Thesis Electrical Engineering 2019
Jones, DK. "Power system dynamic security assessment with high penetration of wind generation in presence of a line commutated converter DC link". Thesis, 2014. https://eprints.utas.edu.au/22421/1/Whole-Jones-thesis.pdf.
Texto completoYesuratnam, G. "Development Of Algorithms For Security Oriented Power System Operation". Thesis, 2007. https://etd.iisc.ac.in/handle/2005/573.
Texto completoYesuratnam, G. "Development Of Algorithms For Security Oriented Power System Operation". Thesis, 2007. http://hdl.handle.net/2005/573.
Texto completo