Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: IHS Architecture.

Rozprawy doktorskie na temat „IHS Architecture”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „IHS Architecture”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Musial, Geoffray. "Architecture stratigraphique et modélisation sédimentaire 3-D des réservoirs à IHS (« Inclined heterolithic Stratification ») de la formation du McMurray, Canada." Paris 6, 2010. http://www.theses.fr/2010PA066314.

Pełny tekst źródła
Streszczenie:
Cette étude concerne les sables bitumineux Crétacé de l’Athabasca, au Canada. Du fait de la forte viscosité des hydrocarbures, il est important de caractériser les hétérogénéités internes de ces réservoirs. Ce travail se base sur la stratigraphie, la sédimentologie, la modélisation réservoir et les simulations de production dans les sables à IHS (“Inclined Heterolithic Stratification”) de la formation du McMurray. Les études centrées sur les faciès, les ichnofaciès et les palynofaciès soulignent quatre environnements de dépôts: (i) un environnement continental; (ii) un environnement fluvio-est
Style APA, Harvard, Vancouver, ISO itp.
2

Pelletier, Jonathan. "Faciès, architecture et dynamique d’un système margino-littoral tidal : exemple de la Formation du Dur At Talah (Eocène supérieur, Bassin de Syrte, Libye)." Thesis, Strasbourg, 2012. http://www.theses.fr/2012STRAH016/document.

Pełny tekst źródła
Streszczenie:
Ce manuscrit de thèse propose la première étude sédimentologique exhaustive de l’escarpement du Dur At Talah (150 km de long sur 120 m de hauteur). Ce dernier affleure dans la dépression d’Abu Tumayam, dans la partie méridionale du Bassin de Syrte (Libye). La Formation du Dur At Talah offre une séquence sédimentaire régressive (au 2nd ordre), allant de faciès marins peu profonds à des faciès fluviatiles, datée de l’Eocène supérieur. Les exceptionnelles conditions d'affleurement ont permis une analyse sédimentologique approfondie (lithofaciès, ichnofaciès, géométries et découpage séquentiel) co
Style APA, Harvard, Vancouver, ISO itp.
3

El, Moumouhi Sanaa. "Architecture hybride IMS/P2P autonomique." Paris 6, 2012. http://www.theses.fr/2012PA066703.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
4

Peterström, Dan. "IP Multimedia for Municipalities : The supporting architecture." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91496.

Pełny tekst źródła
Streszczenie:
Fiber deployment is becoming popular and is seen as a way to increase a community’s attractiveness to new inhabitants and companies. A new Open Access network is emerging, leading to a more horizontal network architecture. Combining this architecture with IMS enables developers to easily develop new and attractive services. To facilitate the development of new IMS services there needs to be an easy to use development environment and a reliable hardware/software platform upon which to deploy them. This thesis project will explore the design, development, and evaluation of new IMS applications t
Style APA, Harvard, Vancouver, ISO itp.
5

Mahamat, charfadine Salim. "Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets." Thesis, Reims, 2019. http://www.theses.fr/2019REIMS011/document.

Pełny tekst źródła
Streszczenie:
Avec l'évolution exponentielle de l'Internet des Objets (IoT), assurer la sécurité des réseaux est devenue un grand défi pour les administrateurs réseaux. La sécurité des réseaux est basée sur de multiples équipements indépendants tels que Firewall, IDS/IPS, NAC dont le rôle principal est de contrôler les informations échangées entre le réseau de l'entreprise et l'extérieur. Or, l'administration de ces équipements peut s'avérer très complexe et fastidieuse si elle est réalisée manuellement, équipement après équipement. L'introduction du concept de Software Defined Networking (SDN) depuis ces d
Style APA, Harvard, Vancouver, ISO itp.
6

Schünke, Susanne. "Entwicklung in den Chorformen englischer Kirchen vom 11. bis ins 13. Jahrhundert /." Köln : Copy-Star, 1987. http://catalogue.bnf.fr/ark:/12148/cb34925133b.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Vezinet, Jérémy. "Study of Future On-board GNSS/INS Hybridization Architectures." Phd thesis, Toulouse, INPT, 2014. http://oatao.univ-toulouse.fr/13835/1/vezinet.pdf.

Pełny tekst źródła
Streszczenie:
The quick development of air traffic has led to the improvement of approach and landing operations by using flexible flight paths and by decreasing the minima required to perform these operations. Most of the aircraft operations are supported by the GNSS augmented with GBAS, SBAS and ABAS. SBAS or GBAS allow supporting navigation operations down to precision approaches. However, these augmentations do require an expensive network of reference receivers and real-time broadcast to the airborne user. To overcome, the ABAS system integrates on-board information provided by an INS so as to enhance
Style APA, Harvard, Vancouver, ISO itp.
8

Sundaresan, Vijay. "Architectural Synthesis Techniques for Design of Correct and Secure ICs." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1217424117.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
9

Kim, Taekyu. "Ontology/Data Engineering Based Distributed Simulation Over Service Oriented Architecture For Network Behavior Analysis." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/193678.

Pełny tekst źródła
Streszczenie:
As network uses increase rapidly and high quality-of-service (QoS) is required, efficient network managing methods become important. Many previous studies and commercial tools of network management systems such as tcpdump, Ethereal, and other applications have weaknesses: limited size of files, command line execution, and large memory and huge computational power requirement. Researchers struggle to find fast and effective analyzing methods to save maintenance budgets and recover from systematic problems caused by the rapid increment of network traffic or intrusions. The main objective of this
Style APA, Harvard, Vancouver, ISO itp.
10

Daoud, Triki Khadija. "Ufa : une architecture ultra plate pour les réseaux mobiles du futur." Phd thesis, Institut National des Télécommunications, 2011. http://tel.archives-ouvertes.fr/tel-00665221.

Pełny tekst źródła
Streszczenie:
Les réseaux mobiles ont un modèle en couches, avec: (1) un réseau d'accès IP offrant une connectivité IP aux utilisateurs; (2) une couche de contrôle de service, l'IMS; (3) une couche d'interaction pour le contrôle des politiques réseau, le PCC. Ce modèle, centralisé et hiérarchique, serait à l'origine de problèmes de passage à l'échelle et de qualité de service en cas d'explosion du volume de trafic de données à transporter. Dans cette thèse, un nouveau modèle pour les réseaux mobiles du futur est proposé: Ultra Flat Architecture (UFA). UFA utilise l'IMS pour le contrôle de tout type d'applic
Style APA, Harvard, Vancouver, ISO itp.
11

Kessis, Mehdi. "Gestion intégrée et multi-échelle des systèmes répartis : Architecture et canevas intergiciel orientés composants." Grenoble, 2010. http://www.theses.fr/2010GRENM051.

Pełny tekst źródła
Streszczenie:
Les deux dernières décennies ont été marquées par un essor remarquable de l'informatique répartie (réseaux pair à pair, grilles de calcul, informatique pervasive, etc. ) et des services de télécommunication. Désormais, les nouvelles technologies de l'information et de télécommunication font parti intégrante du quotidien des entreprises et des particuliers. Malgré ces avancées technologiques, !es systèmes informatiques restent souvent vulnérable: menacés de pannes, de dysfonctionnements et d'utilisation anarchique ou intempestive des leurs ressources. De plus, !es systèmes informatiques devienn
Style APA, Harvard, Vancouver, ISO itp.
12

Chalamalasetty, Kalyani. "Architecture for IMS Security to Mobile:Focusing on Artificial Immune System and Mobile Agents Integration." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5795.

Pełny tekst źródła
Streszczenie:
The IP Multimedia Subsystem (IMS) is an open IP based service infrastructure that enables an easy deployment of new rich multimedia services mixing voice and data. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. As an emerging technology, the SIP standard will certainly be the target of Denial of Service (DoS) attacks and consequently IMS will also inherit this problem. The objective of proposed architecture for IMS is to cram the potential attacks and security threats to IP Multimedia Subsystem (IMS) and explore the security solutions developed by
Style APA, Harvard, Vancouver, ISO itp.
13

Kourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.

Pełny tekst źródła
Streszczenie:
Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vul­nerabilities in order to penetrate into the system internals and cause damage. Having a standard architecture/configuration supporting the needed services saves time and re­sources while it reduces security risks. A server architecture protected by a security policy can secure the integrity and quality of the overall services. This research
Style APA, Harvard, Vancouver, ISO itp.
14

Srivatsa, Mudhakar. "Security Architecture and Protocols for Overlay Network Services." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16284.

Pełny tekst źródła
Streszczenie:
Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a pro
Style APA, Harvard, Vancouver, ISO itp.
15

Chen, Hao, and Luyang Xu. "Software Architecture and Framework for Programmable Automation Controller: A Systematic Literature Review and A Case Study." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16820.

Pełny tekst źródła
Streszczenie:
Background. PAC controller is a strengthened version of PLC controller. Its function is very similar, but its essence and construction are different. PLC and PAC have many successful applications in the field of industrial automation control. There is a lot of literature about the software architecture of PLC control system. However, there is almost no relevant literature on software architecture based on PAC control system. A well-performing and stable automatic control system is indispensable to the design and development of suitable software architecture. The quality and pattern of software
Style APA, Harvard, Vancouver, ISO itp.
16

Wyman, Matthew Cody. "The SAP Link: A Controller Architecture for Secure Industrial Control Systems." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8815.

Pełny tekst źródła
Streszczenie:
Industrial Control Systems are essential to modern life. They are utilized in hundreds of processes including power distribution, water treatment, manufacturing, traffic management, and amusement park ride control. These systems are an essential part of modern life and if compromised, could result in significant economic loss, safety impacts, damage to the environment, and even loss of life. Unfortunately, many of these systems are not properly secured from a cyber attack. It is likely that a well-funded and motivated attack from a nation-state will successfully compromise an industrial contro
Style APA, Harvard, Vancouver, ISO itp.
17

Werapun, Warodom. "Architectures de réseaux pour la délivrance de services à domicile." Thesis, Toulouse, INPT, 2012. http://www.theses.fr/2012INPT0081/document.

Pełny tekst źródła
Streszczenie:
Avec l’omniprésence au quotidien du numérique et de l’informatique, de plus en plus d’utilisateurs souhaitent avoir accès à Internet et à leurs applications via n’importe quel périphérique, de n’importe où et n’importe quand. Les appareils domestiques intelligents se développant, les besoins d’échanger des données au domicile même se font de plus en plus sentir. C’est dans ce contexte, celui des services à domicile avec besoin d’interconnexion que se situe notre étude. Ce type de service est qualifié de Home Service (HS) alors que le réseau à domicile est nommé Home Network (HN). La problémati
Style APA, Harvard, Vancouver, ISO itp.
18

Jones, James R. "A Client-Server Architecture for Collection of Game-based Learning Data." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/51229.

Pełny tekst źródła
Streszczenie:
Advances in information technology are driving massive improvement to the education industry. The ubiquity of mobile devices has triggered a shift in the delivery of educational content. More lessons in a wide range of subjects are being disseminated by allowing students to access digital materials through mobile devices. One of the key materials is digital-based educational games. These games merge education with digital games to maximize engagement while somewhat obfuscating the learning process. The effectiveness is generally measured by assessments, either after or during gameplay, in the
Style APA, Harvard, Vancouver, ISO itp.
19

Adams, Alissa R. "French depictions of Napoleon I's resurrection (1821-1848)." Diss., University of Iowa, 2018. https://ir.uiowa.edu/etd/3236.

Pełny tekst źródła
Streszczenie:
Despite the inherently multivalent nature of images of Napoleon Bonaparte created during the middle of the nineteenth century, scholars often employ only one lens to interpret them: the political context of the age in which they were created. In doing so, they effectively separate these images from the wider art historical narrative. A second—and equally fraught—effect of this tendency is the perpetuation of dominant assumptions that the popularity of his image was due to his status as a “Great Man.” This dissertation examines a subset of mid-century Napoleonic imagery that demonstrates the fl
Style APA, Harvard, Vancouver, ISO itp.
20

Akhlaq, Monis. "Improved performance high speed network intrusion detection systems (NIDS) : a high speed NIDS architectures to address limitations of packet loss and low detection rate by adoption of dynamic cluster architecture and traffic anomaly filtration (IADF)." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5377.

Pełny tekst źródła
Streszczenie:
Intrusion Detection Systems (IDS) are considered as a vital component in network security architecture. The system allows the administrator to detect unauthorized use of, or attack upon a computer, network or telecommunication infrastructure. There is no second thought on the necessity of these systems however; their performance remains a critical question. This research has focussed on designing a high performance Network Intrusion Detection Systems (NIDS) model. The work begins with the evaluation of Snort, an open source NIDS considered as a de-facto IDS standard. The motive behind the eval
Style APA, Harvard, Vancouver, ISO itp.
21

Nag, Abhishek. "Understanding the genetic architecture of glaucoma and its endophenotypes." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/understanding-the-genetic-architecture-of-glaucoma-and-its-endophenotypes(2cd26bc9-2015-45eb-b7d5-6007d2d99207).html.

Pełny tekst źródła
Streszczenie:
Heritability estimates for glaucoma and its endophenotypes [intraocular pressure (IOP) and vertical cup-to-disc ratio (VCDR)] indicate that genetic factors determine a significant part of the susceptibility to glaucoma or variance of its endophenotypes. Identification and characterization of glaucoma susceptibility genes will therefore help strengthen our understanding and provide insights into novel mechanisms underlying glaucoma pathogenesis. The GWAS era saw a surge in the identification of susceptibility genes for glaucoma and its endophenotypes. As has been the experience with most other
Style APA, Harvard, Vancouver, ISO itp.
22

Nobôa, Francisco José Viudes. "Análise do mecanismo de segurança da arquitetura IMS." [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260053.

Pełny tekst źródła
Streszczenie:
Orientador: Yuzo Iano<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação<br>Made available in DSpace on 2018-08-20T16:13:03Z (GMT). No. of bitstreams: 1 Noboa_FranciscoJoseViudes_M.pdf: 2562716 bytes, checksum: 8090bd81ec54aaeab629033ee45a1ef0 (MD5) Previous issue date: 2012<br>Resumo: Considerando-se que para controlar e possibilitar a entrega de diversos conteúdos e serviços a qualquer tipo de acesso fazia-se necessário um núcleo bem definido e estruturado, surgiu o IMS (IP Multimedia Subsystem) com o propósito de prover a integr
Style APA, Harvard, Vancouver, ISO itp.
23

Cabral, Warren. "Architectural analysis and customised deployment of deceptive cowrie and conpot honeypots." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2021. https://ro.ecu.edu.au/theses/2468.

Pełny tekst źródła
Streszczenie:
Honeypots are progressively becoming a fundamental cybersecurity tool to detect, prevent, and record new threats and attack methodologies used by attackers to penetrate systems. A honeypot is a deceptive or fake computer system that presents itself as a real computer system with actual sensitive information. A range of open-source honeypots are available today, such as Cowrie and Conpot, which can be easily downloaded and deployed within minutes—with default settings. Cowrie is a medium-interaction secure shell (SSH) and Telnet honeypot intended to log brute force and shell interaction attacks
Style APA, Harvard, Vancouver, ISO itp.
24

Pantam, Sneha. "BOOK-HUNT! ANDROID MOBILE APPLICATION USING INDOOR POSITIONING TECHNOLOGY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/744.

Pełny tekst źródła
Streszczenie:
Indoor Positioning System (IPS) focuses on locating objects inside Buildings. Till date, GPS has helped us obtain accurate locations outdoors. These locations have helped us in many ways like navigating to a destination point, tracking people etc. Indoor Positioning System aims at navigating and tracking objects inside buildings. [1] IndoorAtlas is a technology that works on the theory of Indoor Positioning System. Book-Hunt is an Android mobile application which majorly makes use of IndoorAtlas therefore making use of the technique of indoor tracking. This Android mobile application is design
Style APA, Harvard, Vancouver, ISO itp.
25

Wlaszyn, Joanna. "Dimension (in)visible : réception technologique comme valeur ajoutée vers une architecture amplifiée." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1187.

Pełny tekst źródła
Streszczenie:
L'objet de cette recherche consiste à capturer et analyser les relations entre l'architecture et les technologies récentes sous l'angle de la perception. Loin de la subjectivité supposée, l‘analyse guidée par la notion d'expérience perceptive s'appuie à la fois sur des concepts esthétiques et phénoménologiques. Cette double réflexivité porte également sur une étude de cas conceptuels et « concrets » qui opèrent la vision de la spatialité architecturale dans des tensions spéculatives entre le monde « numérique » et physique. La problématique porte sur la réception de l'architecture comme valeur
Style APA, Harvard, Vancouver, ISO itp.
26

Tantayakul, Kuljaree. "Mobility Management in New Internet Architectures." Phd thesis, Toulouse, INPT, 2018. http://oatao.univ-toulouse.fr/23732/1/Tantayakul_Kuljaree.pdf.

Pełny tekst źródła
Streszczenie:
The software integration with new network architectures via Software-Defined Networking (SDN) axis appears to be a major evolution of networks. While this paradigm was primarily developed for easy network setup, its ability to integrate services has also to be considered. Thus, the mobility service for which solutions have been proposed in conventional architectures by defining standardized protocols should be rethought in terms of SDN service. Mobile devices might use or move in SDN network. In this thesis, we proposed a new mobility management approach which called "SDN-Mobility" and has sho
Style APA, Harvard, Vancouver, ISO itp.
27

Pagna, Disso Jules Ferdinand. "A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Pełny tekst źródła
Streszczenie:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention System
Style APA, Harvard, Vancouver, ISO itp.
28

Pagna, Disso Jules F. "A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Pełny tekst źródła
Streszczenie:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention
Style APA, Harvard, Vancouver, ISO itp.
29

Huang, Cuiting. "Service composition in converged service environment." Thesis, Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0009/document.

Pełny tekst źródła
Streszczenie:
L'objectif de cette thèse est de fournir des mécanismes améliorés pour déployer des services compétitifs par des manières rapides et rentables. Nous proposons un modèle de composition de service basé sur un environnement IMS/Web convergent. Ce modèle permet aux utilisateurs non professionnels de réutiliser les services existants pour créer de nouveaux services facilement. Pour améliorer la fonctionnalité de composition automatique, trois stratégies, y compris mise à jour passive, mise à jour active et mise à jour hybride sont proposées et analysées. Nous introduisons ensuite une plateforme cen
Style APA, Harvard, Vancouver, ISO itp.
30

Cargelius, Lovisa. "Mariagårdstäppan." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213418.

Pełny tekst źródła
Streszczenie:
Tillägget på Mariagårdstäppan ska bland annat rymma utbildningslokaler för en komvuxverksamhet, konferenslokaler och en restaurang. På tomten står idag en blåklassad palatsliknande byggnad anno 1875, Oscar den I:s minne. I och med Citybanans byggande har det lagds ned otroligt mycket tid, kompetens oh kapital för att rädda byggnaden från att kollapsa, så hur går man tillväga för att lyfta fram den befintliga byggnaden på bästa sätt? Området är präglat av byggnader från många olika historiska epoker, men det som utmärkte sig mest på platsen är de malmgårdar som uppförts runt Fatbursparken under
Style APA, Harvard, Vancouver, ISO itp.
31

Mani, Mehdi. "Stratégies d'overlay de service : d'une architecture centalisée vers le Pair-à-Pair." Paris 6, 2008. http://www.theses.fr/2008PA066188.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
32

Luu, Thanh Tra. "Etude et mise en oeuvre d'une signalisation IP universelle." Paris, ENST, 2006. http://www.theses.fr/2006ENST0046.

Pełny tekst źródła
Streszczenie:
Les futures générations d’Internet nécessitent un plan de contrôle puissant dans lequel la signalisation joue un rôle important en permettant l'échange d'information entre les entités du réseau. Cette thèse développe un protocole de signalisation IP générique, nommé GISP (Generic sIgnaling Service Protocol). Le protocole fournit les fonctionnalités communes qui sont exigées par la plupart des protocoles de signalisation IP incluant les services de gestion d’état, transport, et sécurité. GIPS implémente une approche soft-state pour gérer les sessions de signalisation établies dans les entités d
Style APA, Harvard, Vancouver, ISO itp.
33

Yeung, Adah. "Kunskapspalatsen : Vision." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213975.

Pełny tekst źródła
Streszczenie:
Kunskapspalatsen är en vuxenutbildning nära Fatubursparken i Stockholm. Projektets utgångspunkt var att ta inspiration från fiktiva koncepter för att styra projektet. Jag valde att utgå ifrån konceptet “tiden”, tagen från en berättelse som handlar om hur viktigt tiden är. Många associerar tiden med klockor eller med solens rörelse - något som de båda har gemensamt är att båda rör sig i cirklar. Då beslöt jag mig att jobba med en cirkulär rörelse i byggnaden. Slutprojektet blev en oval formade byggnad, men med raka väggar som går parallellt till omgivningens byggnader. Den rundade formen styr f
Style APA, Harvard, Vancouver, ISO itp.
34

Hao, Shilun. "IDS---Intelligent Dougong System: A Knowledge-based and Graphical Simulation of Construction Processes of China’s Song-style Dougong System." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1417702752.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Rodriguez, Bertha Helena. "Modèle SOA sémantique pour la multimodalité et son support pour la découverte et l'enregistrement de services d'assistance." Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0006/document.

Pełny tekst źródła
Streszczenie:
Les entrées et sorties unimodales dans les systèmes actuels ont atteint une maturité reconnue, avec les applications tactiles ou par les services distribués pour la géo-localisation ou la reconnaissance de la parole, du son ou l’'image. Cependant, l'intégration et l’instanciation de toutes ces modalités, manque d’une gestion intelligente du contexte d’acquisition et de restitution basée sur des notions fortement formalisées mais reflétant le sens commun. Ceci demande un comportement plus dynamique du système avec une approche plus adéquate pour gérer l'environnement de l'utilisateur. Cependant
Style APA, Harvard, Vancouver, ISO itp.
36

Atencio, Luis, Bruno Aybar, and Padilla Alfredo Barrientos. "Comparative analysis of cross-platform communication mechanisms." Association for Computing Machinery, 2018. http://hdl.handle.net/10757/624690.

Pełny tekst źródła
Streszczenie:
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.<br>The present research aims to compare the different technologies that allow real-time communication between Android and iOS devices. We conducted a measurement-driven experiment to test the performance of each technology under different scenarios. We determine their functionality according to the environment for which they have been developed, showing competent information about their capabilities based on the communication channel they use, and
Style APA, Harvard, Vancouver, ISO itp.
37

Onesti, Laura. "From F energy rating to Nearly ZEB: project of energy retrofit and architectural upgrade of a brick terraced house in Co. Dublin, Ireland." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016.

Znajdź pełny tekst źródła
Streszczenie:
Questo progetto è stato sviluppato durante un periodo di ricerca presso il Dipartimento di Ingegneria Civile del Trinity College e continuato presso l’Università di Bologna. Il progetto ha l’obiettivo di analizzare le soluzioni per l’ampliamento, la sostituzione degli impianti e l’ottimizzazione energetica di un tipico edificio residenziale Irlandese, una end of terrace in mattoni costruita negli anni ’20, collocata a Blackrock (Dublino). Diversi studi sostengono che lo stock abitativo irlandese è il peggiore del nord Europa per quanto riguarda la performance energetica. Questa tesi consta
Style APA, Harvard, Vancouver, ISO itp.
38

Gudimetla, Thakshak Mani Chandra Reddy. "ORGANIZE EVENTS MOBILE APPLICATION." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/772.

Pełny tekst źródła
Streszczenie:
In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to register for a new event and
Style APA, Harvard, Vancouver, ISO itp.
39

Mahdi, Mohamed. "Architectures réseaux pour le partage de contenus multimédias avec garantie de qualité de service." Phd thesis, Université Paul Sabatier - Toulouse III, 2011. http://tel.archives-ouvertes.fr/tel-00667635.

Pełny tekst źródła
Streszczenie:
Le succès des services de partage de contenus multimédias sur internet témoigne de l'intérêt des utilisateurs à partager leurs expériences personnelles à travers des fichiers multimédias (photo, vidéo, musique). Les solutions actuelles sont basées essentiellement sur des serveurs web et souffrent d'un manque de QoS, de sécurité et de confidentialité. Plusieurs travaux de recherche ont été menés pour proposer des architectures réseaux d'accès à distance pour de tels services. Ils sont soit trop complexes pour être utilisés par des services dédiés au grand public, soit inadaptés au contexte de p
Style APA, Harvard, Vancouver, ISO itp.
40

Arbault, Damien. "Globalized impacts International trade accounting in a hybrid LCI method." Thesis, KTH, Urban and Regional Studies, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-24863.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
41

COSTA, Wagner Elvio de Loiola. "SISTEMA DE DETECÇÃO DE INTRUSÃO EM REDES BASEADO EM SOA (NIDS-SOA) PARA SUPORTAR A INTEROPERABILIDADE ENTRE IDS S: APLICAÇÃO AO NIDIA." Universidade Federal do Maranhão, 2012. http://tedebc.ufma.br:8080/jspui/handle/tede/497.

Pełny tekst źródła
Streszczenie:
Made available in DSpace on 2016-08-17T14:53:23Z (GMT). No. of bitstreams: 1 Dissertacao Wagner Elvio.pdf: 4463476 bytes, checksum: 4fda2686652d403cd2641f98f3b51575 (MD5) Previous issue date: 2012-10-10<br>The antivirus system and firewall are protection systems designed to prevent malicious work in the network, thus constituting a barrier to invaders (e.g. vírus, worms e hackers). However, there is no guarantee a full protection to network and computers, invasions can occur by exploiting vulnerabilities, known, and allow running programs remotely, changing privileges within the system and
Style APA, Harvard, Vancouver, ISO itp.
42

Karachaliou, Ermioni. "The architectural and iconographic identity of Paliochora on Aegina : an introduction to its Late and Post Byzantine churches." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/the-architectural-and-iconographic-identity-of-paliochora-on-aegina-an-introduction-to-its-late-and-post-byzantine-churches(4d5fdfec-712e-4b7b-a875-b74404fba8cc).html.

Pełny tekst źródła
Streszczenie:
How can we approach the surviving evidence on Paliochora in order for it to become a site of cultural consciousness in a wider medieval context? Its architectural and iconographic identity is hidden in its thirty-four Late and Post Byzantine churches. This thesis constitutes the first complete interdisciplinary approach to this settlement accompanied by a detailed appendix in the second volume. The two parts of this study examine Paliochora through different perspectives which reveal different aspects of its character. Urban planning and individual architectural specificities are examined thro
Style APA, Harvard, Vancouver, ISO itp.
43

Andersson, Robin. "CAN-bus Multi-mixed IDS : A combinatory approach for intrusion detection in the controller area network of personal vehicles." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43450.

Pełny tekst źródła
Streszczenie:
With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. Instead, with sophisticated methods, we can focus on detecting and preventing attacks from being performed inside a system. The current state of the art of such methods, named intrusion detection systems (IDS), is divided into two main approaches. One approach makes its models ve
Style APA, Harvard, Vancouver, ISO itp.
44

Pint, Alexander Steven. "Building energy codes and their impact on greenhouse gas emissions in the United States." Kansas State University, 2015. http://hdl.handle.net/2097/20534.

Pełny tekst źródła
Streszczenie:
Master of Science<br>Architectural Engineering and Construction Science<br>Russell J. Murdock<br>The purpose of this study is to identify and explore relationships between the building industry, building energy usage, and how both the industry and the energy usage correspond to greenhouse gas (GHG) emissions in the United States. Building energy codes seek to reduce energy usage and, subsequently, GHG emissions. This study specifically seeks to determine the impact that most current U.S. building energy codes could have on national GHG emissions if widespread adoption and enforcement of those
Style APA, Harvard, Vancouver, ISO itp.
45

Stockselius, Johan. "Studiepark: Södermalm." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208870.

Pełny tekst źródła
Streszczenie:
Studiepark: Södermalm Rätten till utbildning är en av våra mest värdefulla och bör vara en självklarhet, oberoende av vilket skede i livet man befinner sig i. Statusen på vuxenutbildningar tenderar dock att vara låg i förhållande till andra utbildningsformer och de lokaler där undervisning sker är ofta eftersatta eller förpassade gamla kontorslokaler. Studiepark: Södermalm är ett förslag på en ny byggnad tillägnad vuxenutbildning med målsättning att bli en viktig symbol för vuxenutbildningen och att höja statusen på undervisningsformen. Studiepark: Södermalm är belägen i Fatbursparken på Söder
Style APA, Harvard, Vancouver, ISO itp.
46

Gottschling, Paul Thomas. "To submit is to relate : a study of architectural competitions within networks of practice." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/to-submit-is-to-relate-a-study-of-architectural-competitions-within-networks-of-practice(c3f8961d-94a8-4c91-91e2-935a6dcc4bf9).html.

Pełny tekst źródła
Streszczenie:
This is a study of architectural competitions as they engage with the design practices of architects within the UK and Europe. Since only one firm or one design emerges at the end, and the project programme exists prior to the submissions, there tends to be a gap between programme and practice, past and future, language and situation. It is the aim of this research to investigate what changes in our understanding of architectural practice when we acknowledge that architects work to linear programmes and submit deliverables within the set of relations that make up the competition. In conducting
Style APA, Harvard, Vancouver, ISO itp.
47

Liotsios, Kyriakos. "3D-Modeling and Energy Simulation of a Single Family House in Southern Greece." Thesis, KTH, Byggvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91394.

Pełny tekst źródła
Streszczenie:
Energy usage deriving from human activities is increasing day by day acting against the quality of the environment and the sustainable use of natural resources. The major impact of these actions is reflected on the quality of daily life. In order to face the challenge of preserving an acceptable balance between human needs and environmental status, the combination of proper design and energy simulation of buildings is the key towards smarter and more sustainable solutions. Solutions that covers a respectable percentage of the current domestic energy needs without further environmental foot pri
Style APA, Harvard, Vancouver, ISO itp.
48

Wulff, Tobias. "Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment." Thesis, University of Canterbury. Computer Science and Software Engineering, 2010. http://hdl.handle.net/10092/5120.

Pełny tekst źródła
Streszczenie:
Voice Over IP (VoIP) telephony is becoming widespread, and is often integrated into computer networks. Because of his, it is likely that malicious software will threaten VoIP systems the same way traditional computer systems have been attacked by viruses, worms, and other automated agents. While most users have become familiar with email spam and viruses in email attachments, spam and malicious traffic over telephony currently is a relatively unknown threat. VoIP networks are a challenge to secure against such malware as much of the network intelligence is focused on the edge devices and acces
Style APA, Harvard, Vancouver, ISO itp.
49

Gad, El Rab Mohammed. "Evaluation des systèmes de détection d'intrusion." Phd thesis, Université Paul Sabatier - Toulouse III, 2008. http://tel.archives-ouvertes.fr/tel-00366690.

Pełny tekst źródła
Streszczenie:
Cette thèse vise à contribuer à l'amélioration des méthodes d'évaluation des systèmes de détection d'intrusion (en anglais, Intrusion Detection Systems ou IDS). Ce travail est motivé par deux problèmes actuels : tout d'abord, l'augmentation du nombre et de la complexité des attaques que l'on observe aujourd'hui nécessite de faire évoluer les IDS pour leur permettre de les détecter. Deuxièmement, les IDS actuels génèrent de trop fréquentes fausses alertes, ce qui les rend inefficaces voir inutiles. Des moyens de test et d'évaluation sont nécessaires pour déterminer la qualité de détection des I
Style APA, Harvard, Vancouver, ISO itp.
50

Guerriero, Annie. "La représentation de la confiance dans l'activité collective Application à la coordination de l'activité de chantier de construction." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2009. http://tel.archives-ouvertes.fr/tel-00558823.

Pełny tekst źródła
Streszczenie:
Les spécificités du secteur de la construction engendrent un contexte de travail coopératif que nous pouvons qualifier d'incertain par nature. L'activité de chantier se caractérise par un mode de production in situ. Dès lors, nombreux sont les dysfonctionnements qui peuvent apparaître. Nous citerons, par exemple, les problèmes liés à la nature du sol, aux intempéries ou encore ceux qui sont propres aux interactions entre les intervenants (ex. fourniture en matériaux, interfaces entre les corps de métier...). Aussi, la coordination repose sur un mélange subtil entre interactions implicites et e
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!