Дисертації з теми "ARM protocol"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: ARM protocol.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 дисертацій для дослідження на тему "ARM protocol".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Jonsson, Fredrik. "Arm-P : Almost Reliable Multicast protocol." Thesis, Linköping University, Department of Computer and Information Science, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-14954.

Повний текст джерела
Анотація:

Distribution of information across IP based networks is today part of our everyday life. IP is the backbone of the Internet and most office networks. We use IP to access web pages, listen to radio, and to create computation clusters. All these examples use bandwidth, and bandwidth is a limited resource.

Many applications distribute the same information to multiple receivers, but in many cases the same information is sent to a single receiver at a time, thus multiple copies of the same information is sent, thus consuming bandwidth.

What if the information could be broadcasted to all the clients at the same time, similar to a television broadcast. TCP/IP provides some means to do that. For example UDP supports broadcasting; the problem faced when using UDP is that it’s not reliable. There is no guarantee that the information actually reaches the clients.

This Bachelor thesis in Computer Science aims to investigate the problems and solutions of how to achieve reliable distribution of fixed size data sets using a non reliable multicast communication channel, like UDP, in a LAN environment.

The thesis defines a protocol (Almost Reliable Multicast Protocol – Arm-P) that provides maximum scalability for delivery of versioned data sets that are designed to work in a LAN-environment. A proof-of-concept application is implemented for testing purposes.

Стилі APA, Harvard, Vancouver, ISO та ін.
2

Engstrand, Johan. "A 3D-printed Fat-IBC-enabled prosthetic arm : Communication protocol and data representation." Thesis, Uppsala universitet, Fasta tillståndets elektronik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-420051.

Повний текст джерела
Анотація:
The aim of this thesis is to optimize the design of the Fat-IBC-based communication of a novel neuroprosthetic system in which a brain-machine interface is used to control a prosthetic arm. Fat-based intra-body communication (Fat-IBC) uses the fat tissue inside the body of the bearer as a transmission medium for low-power microwaves. Future projects will use the communication system and investigate ways to control the prosthetic arm directly from the brain. The finished system was able to individually control all movable joints of multiple prosthesis prototypes using information that was received wirelessly through Fat-IBC. Simultaneous transmission in the other direction was possible, with the control data then being replaced by sensor readings from the prosthesis. All data packets were encoded with the COBS/R algorithm and the wireless communication was handled by Digi Xbee 3 radio modules using the IEEE 802.15.4 protocol at a frequency of 2.45 GHz. The Fat-IBC communication was evaluated with the help of so-called "phantoms" which emulated the conditions of the human body fat channel. During said testing, packet loss measurements were performed for various combinations of packet sizes and time intervals between packets. The packet loss measurements showed that the typical amount of transmitted data could be handled well by the fat channel test setup. Although the transmission system was found to be well-functioning in its current state, increasing the packet size to achieve a higher granularity of the movement was perceived to be viable considering the findings from the packet loss measurements.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Španihel, Pavol. "Zabezpečovací modul pro reklamní robot FEKT VUT v Brně." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2012. http://www.nusl.cz/ntk/nusl-219649.

Повний текст джерела
Анотація:
The aim of this work is to design a safety module for promotional robot FEEC BUT robot, which is based on evaluation kit RDK-IDM-SBC. The security module allows authorized persons control different parts of the robot (monitors, computers and subsystems included in the robot).
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Zemánek, Petr. "Modulární RGB LED displej s rozhraním Ethernet." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220700.

Повний текст джерела
Анотація:
This thesis deals with an electronic circuit and a PCB of a modular RGB LED display with the Ehernet interface. Firstly, author describes a RGB colour model, features of RGB LED displays, ways of control them. The next chapter contains a short description of the Ethernet interface, UDP and TCP protocols and a lwIP TCP/IP stack. The last theoretical chapter is an introduction to ARM Cortex-M3 and Cortex-M4 based microcontrollers. The next chaper is deals with a hardware design of the modular RGB LED display. The device is designed to be modular. Individual devices can be combosed together and create a larger display. Data from the Ethernet interface will be displayed on the RGB LED matrix, resolution of the matrix is 32 × 32 (1024 diodes). A refresh frequency is 100 Hz, a color depth is High color (16 bits) and a scanning 1/16 (two rows is driven at the same time). The next chapter describes the firmware for the RGB LED display, all its logical parts including a web page. Author also created the PC application, which sends pictures using UDP protocol to individual modules.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Krůpa, Tomáš. "Univerzální zavaděč pro mikrokontrolér Kinetis K60." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255480.

Повний текст джерела
Анотація:
The scope of this work was to design a bootloader for Kinetis K60, an ARM Cortex-M4 microcontroller. The bootloader should simplify the process of loading user applications to the flash memory of the microcontroller on the Minerva development kit. Based on a quick research of existing bootloader solutions, new bootloader was designed together with communication protocol that would suit the needs for transfer of both the file data and configuration information through all the supported communication interfaces - USB, SDHC, Ethernet and RS-232. On the PC side, development of bootloader’s application library and two supporting utilities with graphical and command line interfaces was made. The system can be used out of the box as well as it can be further extended in the future.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Pérez, María del Carmen Marín. "Benchmarking and applications of a computational photobiology tool for design of novel and highly fluorescent rhodopsin proteins." Doctoral thesis, Università di Siena, 2019. http://hdl.handle.net/11365/1070289.

Повний текст джерела
Анотація:
In recent years, world economy and technological advancement have been transformed by Genomics, which allows us to study, design and build biologically relevant molecules. Genomics is already deeply embedded in industries as diverse as pharmaceutical, food and agricultural, environmental and bio-tech in general. Fast and cheap tools for gene sequencing, protein expression and analysis are commonly used for high-throughput genomic-related studies. However, due to experimental difficulties and long time scales (e.g., protein crystallization), protein structure determination, and thus the fundamental structure function rationalization, cannot presently be performed at the same fast pace: a fact that is slowing down the discovery of proteins with new features, as well as ex novo design. These difficulties are particularly felt in the field of photobiology, where the crystal structure of Bovine rhodopsin (Rh, retina dim-light visual photo-receptor), still remains the only structure of a vertebrate photo-receptor sensor available for photobiological studies since the year 2000. Rhodopsins constitute a class of light-triggered proteins that can be found throughout the whole spectrum of living organisms, and represent the perfect blue-print for building light-activated bio-molecular machines. In principle, the problem of not having a sufficient number of rhodopsins molecular structures could be circumvented and overcome with the construction of accurate atomistic computer models of the set of studied photoreceptors, which would allow: (i) in silico fundamental structure-function characterization, (ii) thorough and detailed screening of mutant series, and even (iii) ex novo design. Nevertheless, such models should also be constructed using a fast, relatively cheap, reliable and standardized protocol, of known accuracy. In this thesis, we refine and test the Automatic Rhodopsin Modeling (ARM) computational protocol, which we demonstrate as being capable of helping to address the above issues. Such protocol has the primary target of generating congruous quantum mechanical/molecular mechanical (QM/MM) models of rhodopsins, with the aim of facilitating systematic rhodopsin-mutants studies. The cornerstone of this thesis is the validation of the ARM protocol as a successful attempt to provide a basis for the standardization and reproducibility of rhodopsin QM/MM models, aimed to study the behaviour of photoactive molecules. First, we validate the ARM protocol, which employs a CASPT2//CASSCF/AMBER scheme, for a benchmark set of rhodopsins from different biological kingdoms. We show that ARM is able to reproduce and predict absorption trends in rhodopsin protein sets, with blue-shifted values not much displaced (a few kcal/mol) from the observed data. Secondly, we present how to use this protocol towards a better design of novel mutations as applications for Optogenetics, an innovative biological tool aimed to visualize and control neuron signals through light. Two different microbial rhodopsins are studied: Krokinobacter eikastus rhodopsin 2 (KR2), a light-driven outward sodium pump, and Anabaena sensory rhodopsin (ASR), a light sensor. In both cases, the qualitative and quantitative information acquired from the ARM-obtained QM/MM models reveal nature (electrostatic or steric) and extent of the mutation-induced changes on the retinal configuration, which, in turn, are the cause of the shift in the absorption wavelength of the relative mutants. Finally, we explore the fluorescence of ASR mutants, particularly useful for the visualization of neuronal activity. The target of this work is to use QM/MM simulations to understand the opposite behaviour observed in two blue-shifted ASR mutants, where one presents a negligible fluorescence, while the other displays one order of magnitude enhanced fluorescence, with respect to the wild type protein. Our QM/MM models show that specific electrostatic and steric interactions control the character mixing of different electronic states, opening a path to the rational engineering of highly fluorescent rhodopsins. In conclusion, within the limits of its automation, the ARM protocol allows the study of ground and excited states of specific photoactive proteins: rhodopsins. This opens the way to an improved molecular-level understanding of rhodopsin photochemistry and photobiology. The results obtained highlight the importance of having a standardized, effective and automatic protocol, which renders this kind of studies more efficient and accessible, by drastically shortening the time required to produce accurate and congruous QM/MM models. For the above reasons the author of the present thesis believes that ARM stands as an important cogwheel in the virtuous cycle between experimental and theoretical work, aimed to prepare the photobiological tools for tomorrow’s needs.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Novotný, Jan. "Zpracování signálu UHF RFID čtečky." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221225.

Повний текст джерела
Анотація:
The master’s thesis is focused on the UHF RFID reader EXIN-1 signal processing. The first part describes the concept of the EXIN-1 front end, its basic testing and possible communication interfaces for reader control and for receiving and transmitting baseband signals. The second part of this work is aimed to a simple description of EPCglobal Class-1 Generation-2 UHF RFID Protocol, especially to used modulations and codings. In the last part, a block connection between the front end and an ARM Cortex-M4 microcontroller discovery board is designed. The microcontroller is used for generating of all required signals and also for receiving incoming signals and processing them for identification numbers of RFID cards (tags), which are in the reading range of the reader. A decoding algorithm is designed in MATLAB software and implemented to the selected microcontroller. Obtained identification data are displayed on an LCD display and also sent to a PC through a serial communication.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Sabt, Mohamed. "Outsmarting smartphones : trust based on provable security and hardware primitives in smartphones architectures." Thesis, Compiègne, 2016. http://www.theses.fr/2016COMP2320.

Повний текст джерела
Анотація:
Le paysage du monde des téléphones mobiles a changé avec l’introduction des ordiphones (de l’anglais smartphones). En effet, depuis leur avènement, les ordiphones sont devenus incontournables dans des différents aspects de la vie quotidienne. Cela a poussé de nombreux fournisseurs de services de rendre leurs services disponibles sur mobiles. Malgré cette croissante popularité, l’adoption des ordiphones pour des applications sensibles n’a toujours pas eu un grand succès. La raison derrière cela est que beaucoup d’utilisateurs, de plus en plus concernés par la sécurité de leurs appareils, ne font pas confiance à leur ordiphone pour manipuler leurs données sensibles. Cette thèse a pour objectif de renforcer la confiance des utilisateurs en leur mobile. Nous abordons ce problème de confiance en suivant deux approches complémentaires, à savoir la sécurité prouvée et la sécurité ancrée à des dispositifs matériels. Dans la première partie, notre objectif est de montrer les limitations des technologies actuellement utilisées dans les architectures des ordiphones. À cette fin, nous étudions deux systèmes largement déployés et dont la sécurité a reçu une attention particulière dès la conception : l’entrepôt de clés d’Android, qui est le composant protégeant les clés cryptographiques stockées sur les mobiles d’Android, et la famille des protocoles sécurisés SCP (de l’anglais Secure Channel Protocol) qui est définie par le consortium GlobalPlatform. Nos analyses se basent sur le paradigme de la sécurité prouvée. Bien qu’elle soit perçue comme un outil théorique voire abstrait, nous montrons que cet outil pourrait être utilisé afin de trouver des vulnérabilités dans des systèmes industriels. Cela atteste le rôle important que joue la sécurité prouvée pour la confiance en étant capable de formellement démontrer l’absence de failles de sécurité ou éventuellement de les identifier quand elles existent. Quant à la deuxième partie, elle est consacrée aux systèmes complexes qui ne peuvent pas être formellement vérifiés de manière efficace en termes de coût. Nous commençons par examiner l’approche à double environnement d’exécution. Ensuite, nous considérons le cas où cette approche est instanciée par des dispositifs matériels particuliers, à savoir le ARM TrustZone, afin de construire un environnement d’exécution de confiance (TEE de l’anglais Trusted Execution Environment). Enfin, nous explorons deux solutions palliant quelques limitations actuelles du TEE. Premièrement, nous concevons une nouvelle architecture du TEE qui en protège les données sensibles même quand son noyau sécurisé est compromis. Cela soulage les fournisseurs des services de la contrainte qui consiste à faire pleinement confiance aux fournisseurs du TEE. Deuxièmement, nous proposons une solution dans laquelle le TEE n’est pas uniquement utilisé pour protéger l’exécution des applications sensibles, mais aussi pour garantir à des grands composants logiciels (comme le noyau d’un système d’exploitation) des propriétés de sécurité plus complexes, à savoir l’auto-protection et l’auto-remédiation
The landscape of mobile devices has been changed with the introduction of smartphones. Sincetheir advent, smartphones have become almost vital in the modern world. This has spurred many service providers to propose access to their services via mobile applications. Despite such big success, the use of smartphones for sensitive applications has not become widely popular. The reason behind this is that users, being increasingly aware about security, do not trust their smartphones to protect sensitive applications from attackers. The goal of this thesis is to strengthen users trust in their devices. We cover this trust problem with two complementary approaches: provable security and hardware primitives. In the first part, our goal is to demonstrate the limits of the existing technologies in smartphones architectures. To this end, we analyze two widely deployed systems in which careful design was applied in order to enforce their security guarantee: the Android KeyStore, which is the component shielding users cryptographic keys in Android smartphones, and the family of Secure Channel Protocols (SCPs) defined by the GlobalPlatform consortium. Our study relies on the paradigm of provable security. Despite being perceived as rather theoretical and abstract, we show that this tool can be handily used for real-world systems to find security vulnerabilities. This shows the important role that can play provable security for trust by being able to formally prove the absence of security flaws or to identify them if they exist. The second part focuses on complex systems that cannot cost-effectively be formally verified. We begin by investigating the dual-execution-environment approach. Then, we consider the case when this approach is built upon some particular hardware primitives, namely the ARM TrustZone, to construct the so-called Trusted Execution Environment (TEE). Finally, we explore two solutions addressing some of the TEE limitations. First, we propose a new TEE architecture that protects its sensitive data even when the secure kernel gets compromised. This relieves service providers of fully trusting the TEE issuer. Second, we provide a solution in which TEE is used not only for execution protection, but also to guarantee more elaborated security properties (i.e. self-protection and self-healing) to a complex software system like an OS kernel
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Prítel, Pavol. "Implementace protokolu EtherCAT pro procesor ARM." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2016. http://www.nusl.cz/ntk/nusl-240937.

Повний текст джерела
Анотація:
The aim of this report is introduction and implementation of EtherCAT protocol on Texas Instruments AM437x microcontroller. The primary goal is to implement EtherCAT communication with slave device. The EtherCAT configurable digital output module is implemented as example application.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Santi, Juliana de 1982. "Gerenciamento ativo de filas para o protocolo "High Speed Transmission Control Protocol" em redes com produto banda-atraso elevado." [s.n.], 2008. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276151.

Повний текст джерела
Анотація:
Orientador: Nelson Luis Saldanha da Fonseca
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-13T10:35:13Z (GMT). No. of bitstreams: 1 Santi_Julianade_M.pdf: 1658984 bytes, checksum: 8a9f078587406a06815484e4fe057f7d (MD5) Previous issue date: 2008
Resumo: A utilização eficiente da banda passante em redes de alta velocidade e grandes atrasos, denominadas redes com produto banda-atraso elevado (PBA), tornou-se um grande desafio. Isto ocorre devido aos ajustes do protocolo Transmission Control Protocol (TCP). O High Speed TCP (HSTCP), uma variante do TCP para redes com PBA elevado, emprega ajustes mais agressivos permitindo, assim, que a utilização da banda seja escalável. As políticas de Gerenciamento Ativo de Filas ou Active Queue Management (AQM), monitoram o nível de ocupação das filas nos roteadores e notificam o congestionamento incipiente aos emissores TCP através do descarte/marcação de pacotes. O sistema de controle de congestionamento apresenta natureza de retroalimentação, na qual a taxa de transmissão dos nós fontes é ajustada em função do nível de ocupação da fila. Os controladores AQM determinam a probabilidade de descarte/marcação para maximizar a vazão e minimizar perdas, garantindo, assim, a estabilidade do tamanho da fila independentemente das variações das condições da rede. Neste trabalho, define-se a política de gerenciamento ativo de filas HSTCP-H2 para redes com PBA elevado que utilizam o protocolo HSTCP. Para a derivação de HSTCP­H2: são utilizadas técnicas de Teoria de Controle Ótimo. A principal característica desta política é considerar o atraso do sistema o que permite melhor utilização dos recursos disponíveis. A estabilidade e os objetivos de desempenho do sistema são expressos e solu­cionados através de Desigualdades Matriciais Lineares, permitindo que os parâmetros do controlador possam ser calculados através da solução de um problema convexo simples. Diferentes controladores foram derivados considerando-se diferentes objetivos de de­sempenho, os quais consideram as características de redes com produto banda-atraso elevado. Através de simulações, os desempenhos dos controladores derivados são avalia­dos e a eficácia do controlador que apresentou o melhor desempenho foi comparado com o desempenho da política de AQM RED. São considerados cenários com enlace gargalo único e com múltiplos gargalos.
Abstract: The efficient utilization of bandwidth in high speed and large delay networks, called high bandwidth-delay product networks (BDP), has become a major challenge. This is due to adjustments of the Transmission Control Protocol (TCP). The High Speed TCP HSTCP): a TCP variant to high BDP networks, employs more aggressive adjustments, allowing scalable bandwidth utilization. The Active Queue Management (AQM) policies monitor the queue length in the routers and notify incipient congestion to TCP source by marking or dropping packets. The congestion control system presents intrinsic feedback nature, where the transmission rates of the sources are adjusted according to the level of congestion inferred by the queue occupancy. The AQM controllers determine the dropping marking probability values to maximize throughput and minimize losses, giving guarantees to stabilize the queue length independent of network conditions. In this work, it is defined HSTCP-H2, an active queue management policy to high BDP networks, which adopt the HSTCP as their transport protocol. Optimal control theory is used to conceive HSTCP-H2. The novelty of the proposed approach lies in consider the delay of the system which allows better use of available resources. Furthermore, in the proposed approach, stability and performance objectives are completely expressed as Linear Matrix Inequalities (LMIs), thus requiring the solution of a single convex problem for the computation of the controller parameters. Different controllers are derived considering different design goals, which take into ac­count the characteristics of the high bandwidth-delay product networks. The performance produced by different optimal controllers was investigated. The efficacy of the control­ler with the best performance was then compared to the performance of RED policy. The simulation experiments were carried out using topologies with single and multiple bottleneck.
Mestrado
Redes de Computadores
Mestre em Ciência da Computação
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Skopal, Miroslav. "Univerzální hardwarová platforma podporující operační systém Linux." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218709.

Повний текст джерела
Анотація:
This thesis deals with the development problems and creating of the multi- purpose hardware platform, which supports operating system Linux. It is focused on the microprocessors using ARM architecture with architecture ARM7, ARM9 and ARM11. The scope of the first part of this thesis was searching the sales of available 32 bit ARM microprocessors. The second part is attended to a particular Mini2440 development kit, its animation and the subsequent development of the kernel drivers for OS Linux platform. One of this thesis details was also the development of my own expansive hardware module and a capacity keypad for a usage with Mini2440 developmental kit.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Talkington, Gregory Joshua. "Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.

Повний текст джерела
Анотація:
The solutions presented in this dissertation describe a new paradigm in which we shepherd these network security protocols through atmosphere transitions, offering new ways to analyze and monitor the state of the protocol. The approach involves identifying a protocols transitional weaknesses through adaption of formal models, measuring the weakness as it exists in the wild by statically analyzing applications, and show how to use network traffic analysis to monitor protocol implementations going into the future. Throughout the effort, we follow the popular Open Authorization protocol in its attempts to apply its web-based roots to a mobile atmosphere. To pinpoint protocol deficiencies, we first adapt a well regarded formal analysis and show it insufficient in the characterization of mobile applications, tying its transitional weaknesses to implementation issues and delivering a reanalysis of the proof. We then measure the prevalence of this weakness by statically analyzing over 11,000 Android applications. While looking through source code, we develop new methods to find sensitive protocol information, overcome hurdles like obfuscation, and provide interfaces for later modeling, all while achieving a false positive rate of below 10 percent. We then use network analysis to detect and verify application implementations. By collecting network traffic from Android applications that use OAuth, we produce a set of metrics that when fed into machine learning classifiers, can identify if the OAuth implementation is correct. The challenges include encrypted network communication, heterogeneous device types, and the labeling of training data.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Cyr, Geneviève. "Interface configurable pour un processeur ARM basée sur le protocole VCI." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ65560.pdf.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Wickramarathna, Thamali Dilusha N. "Modeling and Performance Evaluation of a Delay and Marking Based Congestion Controller." Scholarly Repository, 2008. http://scholarlyrepository.miami.edu/oa_theses/101.

Повний текст джерела
Анотація:
Achieving high performance in high capacity data transfers over the Internet has long been a daunting challenge. The current standard of Transmission Control Protocol (TCP), TCP Reno, does not scale efficiently to higher bandwidths. Various congestion controllers have been proposed to alleviate this problem. Most of these controllers primarily use marking/loss or/and delay as distinct feedback signals from the network, and employ separate data transfer control strategies that react to either marking/loss or delay. While these controllers have achieved better performance compared to existing TCP standard, they suffer from various shortcomings. Thus, in our previous work, we designed a congestion control scheme that jointly exploits both delay and marking; D+M (Delay Marking) TCP. We demonstrated that D+M TCP can adapt to highly dynamic network conditions and infrastructure using ns-2 simulations. Yet, an analytical explanation of D+M TCP was needed to explain why it works as observed. Furthermore, D+M TCP needed extensive simulations in order to assess its performance, especially in relation to other high-speed protocols. Therefore, we propose a model for D+M TCP based on distributed resource optimization theory. Based on this model, we argue that D+M TCP solves the network resource allocation problem in an optimal manner. Moreover, we analyze the fairness properties of D+M TCP, and its coexistence with different queue management algorithms. Resource optimization interpretation of D+M TCP allows us to derive equilibrium values of steady state of the controller, and we use ns-2 simulations to verify that the protocol indeed attains the analytical equilibria. Furthermore, dynamics of D+M TCP is also explained in a mathematical framework, and we show that D+M TCP achieves analytical predictions. Modeling the dynamics gives insights to the stability and convergence properties of D+M TCP, as we outline in the thesis. Moreover, we demonstrate that D+M TCP is able to achieve excellent performance in a variety of network conditions and infrastructure. D+M TCP achieved performance superior to most of the existing high-speed TCP versions in terms of link utilization, RTT fairness, goodput, and oscillatory behavior, as confirmed by comparative ns-2 simulations.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Kamran, Mudassar. "Applications of novel imaging protocols and devices in interventional neuroradiology." Thesis, University of Oxford, 2015. http://ora.ox.ac.uk/objects/uuid:ccb2550c-cb28-42f1-bd95-4dcee4ec1ff4.

Повний текст джерела
Анотація:
The historical development, current practice, and the future of interventional neuroradiology are intricately linked to the advancements in the imaging and devices used for neuroendovascular treatments. This thesis explores the advanced imaging potential of the C-arm imaging systems used in the neurointerventional suite and investigates the initial clinical experience with a new flow diverter device to treat the intracranial aneurysms. A cohort of aneurysmal SAH patients who developed delayed cerebral ischaemia (DCI) were prospectively studied with a new parenchymal blood volume (PBV) research protocol C-arm CT examination concurrent with a magnetic resonance (MR) imaging examination that included perfusion and diffusion weighted sequences. Using a robust quantitative volume-of-interest analysis, it was demonstrated that C-arm CT PBV measurements are in agreement with MR-PWI CBV and CBF, and the PBV represents a composite perfusion parameter with both blood-flow (≈60%) and blood-volume (≈40%) weightings. Subsequently, using a voxel-wise ROC curve analysis and MR-DWI, it was shown that using optimal thresholds, C-arm CT PBV measurements allow reliable demarcation of the irreversibly infarcted parenchyma. For evaluation of ischaemic parenchyma, the PBV measurements were reliable for moderate-to-severe ischaemia but were prone to underestimate the mild-to-moderate ischaemia. A catalogue of reference mean PBV measurements was then created for various anatomical regions encompassing the whole brain after excluding any locations with ongoing ischaemia or infarction. Next, using an ROI-based analysis of the C-arm CT projection data, steady-state contrast concentration assumption underlying the PBV calculations was investigated. It was demonstrated that for clinical scans, the ideal steady-state assumption is not fully met, however, for a large majority of C-arm CT examinations the temporal characteristics of TDCs closely approximate the expected ideal steady-state. The degree to which the TDC of a C-arm CT scan approximates the ideal steady-state was found to influence the resulting PBV measurements and their agreement to MR-CBV. Moreover, the temporal characteristics of TDCs showed inter-subject variation. Finally, the C-arm CT cross-sectional soft tissue images were demonstrated to be of adequate quality for the assessment of ventricles and for the detection of procedural vessel rupture. These findings advance the understanding of the nature of PBV parameter, establish the optimal PBV thresholds for infarction, provide reference PBV measurements, and highlight the limitations of C-arm CT PBV imaging. The work is of considerable clinical significance and has implications for implementation of C-arm CT PBV imaging in the interventional suite for management of patients with acute brain ischaemia. In regards to the initial clinical experience with the flow diversion treatment of intracranial aneurysms, the procedural, angiographic, and clinical outcomes were studied. Several pertinent technical and clinical issues were highlighted for this new treatment approach. Based on the observations made during this work, a new grading schema was then developed to monitor the angiographic outcomes after flow diversion treatment. Using the angiographic data for patients treated with FD, the new grading schema was demonstrated to be sufficiently sensitive to register gradual aneurysm occlusion and evaluate parent artery patency, with an excellent inter-rater reliability and applicability to various aneurysm morphologies. This work (largest multi-centre series at the time of its publication) informed the interventional neuroradiology community about the safety, efficacy, and outcomes of flow diversion treatment. Additionally, it provided a sensitive and reliable scale to evaluate the angiographic outcomes after flow diversion treatment, in both research and clinical practice.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

PEDRAZA, GONZÁLEZ LAURA MILENA. "Blueprinting, implementation, and application of fully automatic protocols for the QM/MM modeling of photo-excited states of rhodopsin variants." Doctoral thesis, Università di Siena, 2021. http://hdl.handle.net/11365/1141640.

Повний текст джерела
Анотація:
The semi-automatic building of QM/MM models of rhodopsins has been recently proposed, by means of a new technology called Automatic Rhodopsin Model protocol. In its original version, here called original ARM protocol, published in 2016, the constructed QM/MM models were found to be useful for biophysical studies and for protein engineering, but had the disadvantage of being time-consuming to prepare, error-prone, and, also, difficult to replicate when the same model was independently constructed by different investigators. These issues were a consequence of the <> (i.e., not fully automated) nature of the protocol, since (i) the generation of its input was achieved through <> of the template structure and (ii) the code (i.e., the computer program) for the construction of the QM/MM model was written as a non homogeneous collection of bash scripts, not driven by a parent program. Such methodological and computational pitfalls impaired the possibility of comparatively studying hundreds of rhodopsins (i.e., light-sensitive proteins belonging to the same superfamily), as well as hoping that, in the future, a similar protocol could be generalized to other families of light-responsive proteins (e.g., Xanthorhodopsin, phytochromes or synthetic rhodopsin mimics) of interest for biological or biotechnological applications. In order to overcome the above drawbacks, this doctoral Thesis is devoted to the design of a substantially improved ARM methodological framework, characterized by a fully automated, rather than manual, construction of QM/MM models. Accordingly, I introduce the blueprinting of four different ARM-based fully automatic protocols for the QM/MM modeling of rhodopsin electronically excited states. Furthermore, I present their implementation into a new, user-friendly, Python-based software package, called ARM software package, conceived for allowing the use of each protocol via a ``one-click'' command given either at the command-line or, in certain cases, Web-interface levels. Finally, I report on the performance of the four ARM-based protocols, highlighting both their methodological and scientific capabilities as well as their current limitations. To do so, I have constructed and employed a benchmark set of about 150 wild-type and mutant rhodopsins, as well as carried out selected applications, directed to the prediction of trends in light-induced properties, including absorption and emission spectra, as well as excited-state molecular dynamics. Such trends unveil different mechanistic aspects of color tuning and fluorescence emission, as well as, more in perspective, the systematic prediction of photoisomerization quantum yields. In conclusion, the research carried out during my doctoral Thesis has generated and explored novel, automated, ARM-based research tools and, most importantly, a programming framework called the ARM package. I believe that these tools and package have the potential to be generalized, thanks to their characteristics that I will thoroughly describe. In other words, my hope is that the research line started with my thesis will not only be useful for achieving better performing QM/MM models of rhodopsins but be expanded to deal with other sets of light-responsive proteins useful, for instance, in optogenetic studies.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Huzioka, Daniel Tetsuo. "Um protocolo ALM baseado em desigualdade triangular para distribuição de conteúdo." reponame:Repositório Institucional da UFPR, 2010. http://hdl.handle.net/1884/24864.

Повний текст джерела
Анотація:
Resumo: A comunicação por difusão seletiva, ou multicast, permite que uma única transmissão seja feita para um grupo de destinatários. Aplicações de distribuição de conteúdo em larga escala na Internet demandam este tipo de comunicação. Por não haver amplo suporte à comunicação multicast na camada de rede da Internet, alguns protocolos (chamados protocolos ALM Application Layer Multicast) simulam a camada de rede através de redes sobrepostas na camada de aplicação, permitindo o uso da comunicação multicast sobre essas redes. Neste trabalho apresentamos o PALMS, um protocolo ALM voltado para a distribuição de contedo conteínuo proveniente de uma única fonte. Os objetivos principais do PALMS são a distribuição de conteúdo utilizando poucas mensagens de controle e a possibilidade de implantação na estrutura atual da Internet. A arquitetura do PALMS consiste de um servidor responsável pela geração de conteúdo, um tracker responsável pelo auxílio a entrada de nós na rede e pelos peers, que além de consumirem o conteúdo também são responsáveis por propaga-lo pela rede. Os peers se organizam em grupos, e acordos de compartilhamento nos grupos determinam de quem o peer recebe e para quais peers o uxo deve ser transmitido.O PALMS conta com um mecanismo que permite aos peers realizarem trocas de acordos além de diminuir o tempo de recebimento do conteúdo. Este mecanismo utiliza o round-trip-time (RTT) entre os peers, e baseia-se no conceito de desigualdades triangulares. Quando um peer atesta que, ao trocar os acordos de recebimento e transmissão com seu peer transmissor, o tempo de recebimento das mensagens diminui, os acordos são trocados assim como e as posições dos peers no grupo. O protocolo foi implementado no simulador PeerSIM utilizando a linguagem Java, e comparado a outros protocolos de distribuição de conteúdo. Experimentos demonstram que, além do PALMS apresentar-se como uma solução factível na Internet hoje, ele também utiliza menor largura de banda para mensagens de controle que as alternativas apresentadas.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Smith, Sarah C. "Evaluating a Stepped Care Protocol for Postpartum Depression in a Pediatric Primary Care Clinic." Digital Commons @ East Tennessee State University, 2017. https://dc.etsu.edu/etd/3277.

Повний текст джерела
Анотація:
Postpartum depression (PPD) is a prevalent, complex illness impacting 10% to 20% of mothers and their families. Treatments for PPD, such as medication and psychotherapy, are effective at reducing the severity of symptoms and generally improving quality of life for new mothers and their families. Unfortunately, many mothers with PPD go unrecognized due to a lack of standardized screening methods. Further, mothers regularly encounter barriers to accessible, evidence-based follow-up care to treatment even when symptoms of PPD are detected. The use of a stepped care protocol, set in a pediatric primary care clinic, is one proposed strategy to address the insufficient rates of screening, detection, and maternal contact with treatment. This study examines the feasibility of implementing a stepped care protocol to screen and provide brief therapeutic treatment to mothers reporting symptoms of PPD in one pediatric primary care clinic. The RE-AIM (reach, effectiveness, adoption, implementation, and maintenance) framework was used to evaluate implementation outcomes. Results suggest this stepped care protocol was feasibly implemented in one pediatric primary care clinic. The protocol was largely successful in screening mothers at a majority of well child checks (83.76%) for PPD and connecting them with resources based on the severity of symptoms reported. Future studies should further evaluate the impact brief onsite mental health treatments have on reports of PPD symptoms, longitudinal maternal and child outcomes as a result of the protocol, as well as the protocol’s replicability to pediatric practices elsewhere.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Pfeffer, Mary Graves. "Venture Capital Investment and Protocol Analysis." Thesis, North Texas State University, 1987. https://digital.library.unt.edu/ark:/67531/metadc331014/.

Повний текст джерела
Анотація:
This study used protocol analysis to identify key variables in the venture capital investment decision-making process. The study used a fictional business plan which was based on six actual business plans. This fictional business plan was presented to ten venture capitalists who were asked to review it to decide whether to interview the investee. The protocols obtained from these subjects were analyzed to determine patterns within the subjects' review. The sections of the business plan which were commonly reviewed first were the deal structure, the executive summary, and the management section. The management section was used by the greatest number of subjects. The market section was used the greatest number of times. The data were also organized by type of operators used in each subject's protocols. Information Search/Retrieval operators were most common, followed by Task Structuring/Set Goal operators. When classified into the four major categories of Task Structuring/Set Goal, Information Acquisition, Analytical/ Inferential, and Choice operators, Analytical/Inferential operators were used most frequently. Choice operators were least used. The phrases were analyzed by the relevant section in the business plan. The market received the greatest number of references, followed by references to the product and to management. However, when references to the income statement and balance sheet were combined as phrases relevant to the financial statements, the financial statements were referred to more frequently than the product or the people. The subjects appeared to use an unidentified choice program within which certain models could be identified as subroutines. The subjects used an elimination-by-aspects model to screen the business plan. If the business plan met the criteria within the elimination-by-aspects model of the subject, the subject used an additive/nonlinear model for the remainder of the review. The results of this study indicate that financial statements provide information important in the venture capital investment decision-making process. This finding is contrary to the advice usually given to potential venture capital investees.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Kellams, Ann, Cadey Harrel, Stephanie Omage, Carrie Gregory, and Casey Rosen-Carole. "ABM Clinical Protocol #3: Supplementary Feedings in the Healthy Term Breastfed Neonate, Revised 2017." MARY ANN LIEBERT, INC, 2017. http://hdl.handle.net/10150/626017.

Повний текст джерела
Анотація:
A central goal of The Academy of Breastfeeding Medicine is the development of clinical protocols for managing common medical problems that may impact breastfeeding success. These protocols serve only as guidelines for the care of breastfeeding mothers and infants and do not delineate an exclusive course of treatment or serve as standards of medical care. Variations in treatment may be appropriate according to the needs of an individual patient.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Oberdan, Thomas. "Protocols, truth and convention." Amsterdam ; Atlanta, GA : Rodopi, 1993. http://catalogue.bnf.fr/ark:/12148/cb35609110v.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Chung, Jae Won. "Congestion control for streaming media." Link to electronic thesis, 2005. http://www.wpi.edu/Pubs/ETD/Available/etd-081805-084831/.

Повний текст джерела
Анотація:
Dissertation (Ph.D.) -- Worcester Polytechnic Institute.
Keywords: streaming media; streaming transport protocol; active queue management (AQM); Internet congestion control. Includes bibliographical references (p. 236-248).
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Negré, Walkmar Silva. "Proposta de protocolos de segurança para a prevenção, a contenção e a neutralização de agente agressor bioativo em incidentes bioterroristas e estudo por docking molecular do fator letal do Bacillus anthracis (Antraz)." Universidade Federal de São Carlos, 2010. https://repositorio.ufscar.br/handle/ufscar/6983.

Повний текст джерела
Анотація:
Made available in DSpace on 2016-08-17T18:39:39Z (GMT). No. of bitstreams: 1 3802.pdf: 4112819 bytes, checksum: e42717f19397f311cb6978ed3341685c (MD5) Previous issue date: 2010-10-29
For centuries, infectious agents have been used as weapons in armed conflicts. In 1972 the Biological Weapons Convention prohibited the creation and stockpiling of biological weapons. However, some countries continued to research and develop these weapons. Proof of this fact was the crash in 1979 in a military factory in the USSR, where Bacillus anthracis were dispersed. Biotechnology in a globalizing world facilitates and contributes not only to the development of weapons programs of regular armies, but also to terrorist groups. Examples of such this are the contamination by the bacterium Salmonella typhimurium by a religious fanatic group that in 1984 poisoned 751 people in the U.S., and the bacterium Bacillus anthracis spores mailed in the U.S. to several people during 2001 and 2002, immediately after the attacks of September 11th. A biological weapon is of extreme difficult detection by security equipment. Most infectious agents are present in almost every continent, making it easier to obtain. The production is cheap and it is easy to carry, being a small amount enough to reach very large area and thousands of people. It is an invisible weapon, odorless and causes symptoms unknown to most physicians. So, given this background, in this master thesis we attempt to demonstrate the reality of the threat of a biological weapon based on Anthrax as the biological agent used as a weapon of mass destruction. Based on this study, we show the fragility of the state system for dealing with such incidents, and we propose security protocols in order to regulate what should be done in time of crisis, defining its management and streamline the decision-making. Finally, using the technique of molecular docking, we also studied the lethal factor of anthrax, and proposed the compound 1-Phenylsulfonyl-2-propanone (DARXOJ, C9H10O3S) as a good candidate to inhibit its effects.
Há séculos agentes infecciosos são utilizados como armas em conflitos bélicos. Em 1972 a Convenção sobre Armas Biológicas proibiu a criação e armazenamento de armas biológicas. No entanto alguns países continuaram a pesquisa e o desenvolvimento dessas armas. Prova desse fato foi o acidente em 1979 em uma fábrica militar na URSS, onde foram dispersos esporos de Bacillus anthracis. A Biotecnologia no mundo globalizado facilita e contribui não apenas aos programas de desenvolvimento de armas dos exércitos regulares, mas também aos grupos terroristas. Exemplos disso são a intoxicação pela bactéria Salmonella typhimurium por um grupo fanático religioso que em 1984, nos EUA, intoxicou 751 pessoas, e os esporos da bactéria Bacillus anthracis enviados pelo correio para várias pessoas em 2001 e 2002, imediatamente após os atentados de 11 de setembro nos EUA. Uma arma biológica é muito difícil de ser detectada por equipamento de segurança. A maioria dos agentes infecciosos está presente em quase todos os continentes, o que facilita a sua obtenção. A produção é barata e simples de transportar, podendo atingir com pequena quantidade área muito grande e milhares de pessoas. É uma arma invisível, inodora e que provoca sintomas desconhecidos pela maioria dos médicos. Em face desse panorama, neste trabalho procuramos demonstrar a realidade da ameaça de uma arma biológica e elegemos o Antraz como agente biológico utilizado como arma de destruição em massa. Neste estudo, mostramos a fragilidade do sistema estatal para lidar com este tipo de incidente, e propomos protocolos de segurança com o objetivo de regular os procedimentos no momento de crise, definindo o gerenciamento para melhorar e otimizar as tomadas de decisões. Finalmente, por meio do uso da técnica de docking molecular, também estudamos o fator letal do Antraz, e propusemos o composto 1-Fenilsulfonil-2-propanona (DARXOJ, C9H10O3S) como um bom candidato a inibir os seus efeitos.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Castro, Bianca Portes de. "PALMS+: protocolo ALM baseado em desigualdade triangular para distribuição de streaming de vídeo." Universidade Federal de Juiz de Fora (UFJF), 2014. https://repositorio.ufjf.br/jspui/handle/ufjf/4831.

Повний текст джерела
Анотація:
Submitted by Renata Lopes (renatasil82@gmail.com) on 2017-06-06T14:59:44Z No. of bitstreams: 1 biancaportesdecastro.pdf: 1203353 bytes, checksum: 0cd5843bff9e747e5432fff99ec1e565 (MD5)
Approved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2017-06-07T11:04:29Z (GMT) No. of bitstreams: 1 biancaportesdecastro.pdf: 1203353 bytes, checksum: 0cd5843bff9e747e5432fff99ec1e565 (MD5)
Made available in DSpace on 2017-06-07T11:04:29Z (GMT). No. of bitstreams: 1 biancaportesdecastro.pdf: 1203353 bytes, checksum: 0cd5843bff9e747e5432fff99ec1e565 (MD5) Previous issue date: 2014-08-25
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Aplicações multimídia são muito populares na internet. Grande parte delas necessita de multicast para escalar. É sabido que multicast em nível de redes não foi implementado como desejado. Protocolos em nível de aplicação são a solução atual. Apesar do sucesso dos protocolos ALM (Application Layer Multicast), a maioria dos protocolos existentes são custosos e acarretam grande sobrecarga de controle à rede. Neste trabalho, apresentamos um novo protocolo de fluxo contínuo baseado em árvore, utilizando a desigualdade triangular entre cada três peers para gerenciamento dinâmico da topologia (o PALMS+). O novo protocolo é simples e com baixa sobrecarga. Mesmo assim, seu desempenho é tão bom quanto o estado da arte. Experimentos realizados na plataforma Oversim (OMNet++) demonstraram que o PALMS+ manteve desempenho tão bom quanto o estado da arte (e.g. protocolo NICE), mesmo quando submetido a alto churn em uma rede heterogênea. De fato, a sobrecarga nos peers do novo protocolo é menor que 10% da sobrecarga gerada pelo NICE. O protocolo PALMS+ entrega os dados em menos de 1,5s. O novo protocolo mostra-se adequado a vídeo ao vivo, escalando mesmo em cenários realistas e com alto churn.
Multimedia applications are very popular on the internet. Many of these applications need multicast to scale. However, network layer multicast has not been implemented in the internet. Application layer multicast (ALM) protocols are a practical alternative. However, despite their popularity, many existing ALM protocols and mechanisms are expensive and bring a large overhead control on the network. In the present work, a new protocol is proposed for content distribution based on tree, using the triangular inequality between every three peers to dynamic topology control (the PALMS+). The new protocol is simple and with low overhead. Nevertheless, its performance as good as the state of the art. Experimental results conducted with the OverSim platform (OMNet++) suggest that PALMS+ improves the performance of a state-of-art implementation of ALM protocol when compared against the NICE protocol. Furthermore, the control message overhead at peers using the PALMS+ protocol is reduced by 10%, when compared with NICE. In the PALMS+ protocol, chunks are delivered up to 1,5s. Results confirm that proposed implementation of PALMS+ is very suitable to real-time video streaming, even when churn is high.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Harrison, Jane. "Indig-curious : what are the challenges for non Aboriginal theatre practitioners in accessing and interpreting Aboriginal themes?" Thesis, Queensland University of Technology, 2009. https://eprints.qut.edu.au/32152/1/Jane_Harrison_Thesis.pdf.

Повний текст джерела
Анотація:
How do non-Indigenous theatre practitioners, especially actors, access and incorporate Aboriginal themes in the plays they create or perform in? Will it ever be acceptable for a non-Aboriginal actor to play an Aboriginal role? In literature there are clear protocols for writing Aboriginal characters and themes. In the visual arts and in dance, non-Indigenous practitioners might 'reference' Aboriginal themes, but what about in theatre performance? This research embodies one cultural dilemma in a creative project and exegesis: exploring the complex issues which emerge when an Aboriginal playwright is commissioned to write an 'Aboriginal themed' play for two non-Aboriginal actors.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Alkubeily, Mothanna. "Les protocoles multicast applicatif : stabilité et sécurité." Compiègne, 2009. http://www.theses.fr/2009COMP1852.

Повний текст джерела
Анотація:
Le Multicast Applicatif (ALM : Application-Level Multicast) a été proposé comme une alternative prometteuse pour pallier aux problèmes de déploiement d'IP multicast. Toutefois, l'ALM hérite du problème de réarrangement de l'arbre dans les sessions fortement dynamiques. De plus, dans le cas des sessions ALM sécurisées, le processus de réarrangement induit un problème de passage à l'échelle (scalabilité) appelé 1-affects-n où un événement d'arrivée/départ déclenche un processus de renouvellement total des clés pour garantir la confidentialité dans la session. Dans cette thèse, nous commençons par étudier, comparer et classifier les protocoles ALM existants en analysant leurs propriétés, performances et scalabilité. Nous proposons ensuite une nouvelle technique, appelée MDA (Membership Duration Aware), pour surmonter le problème de réarrangement et améliorer la stabilité de l'arbre ALM. La technique MDA peut être appliquée à tout protocoles ALM afin d'améliorer ses performances. Nous proposons, enfin, un protocole de gestion de clés efficace, appelé TKS (Transition Key Scheme), qui réduit le surcoût de renouvellement des clés dans les sessions ALM fortement dynamiques. TKS utilise une clé TEK (Traffic Encryption Key) unique pour le groupe et un nombre réduit de clés de transitions utilisées pour gérer temporairement les nouveaux arrivants
Application-Level Multicast (Overlay multicast) has been proposed as an efficient alternative to palliate the lack of deployment of the IP Multicast. However it stili suffer from the tree rearrangement problem in dynamic group sessions. In addition, in the case of secured ALM sessions, the rearrangement process induces the 1-affects-n scalability problem where a unique join/leave event leads to an overall rekeying process in order to guarantee the session confidentiality. In this thesis we first review, compare and classify most of the up to date ALM protocols based on their properties, performances and scalability. We then propose a new technique called Membership Duration Aware Application-Level Multicast (MDA) in order to overcome the rearrangement problem and to improve the stability of the ALM overlay Crees. MDA technique can be applied with all existing ALM protocols to enhance their stability performances. Finally, we propose an efficient key management protocol, called Transition Key Scheme (TKS), which reduces the key management overhead in case of highly dynamic sessions. To do so, TKS uses a unique TEK (Traffic Encryption Key) for the group and a small number of individual transition keys to temporally manage recently joining members
Стилі APA, Harvard, Vancouver, ISO та ін.
27

De, Silva Vashista C. "Core-Shell Based Metamaterials: Fabrication Protocol and Optical Properties." Thesis, University of North Texas, 2017. https://digital.library.unt.edu/ark:/67531/metadc1062904/.

Повний текст джерела
Анотація:
The objective of this study is to examine core-shell type plasmonic metamaterials aimed at the development of materials with unique electromagnetic properties. The building blocks of metamaterials under study consist of gold as a metal component, and silica and precipitated calcium carbonate (PCC) as the dielectric media. The results of this study demonstrate important applications of the core-shells including scattering suppression, airborne obscurants made of fractal gold shells, photomodification of the fractal structure providing windows of transparency, and plasmonics core-shell with a gain shell as an active device. Plasmonic resonances of the metallic shells depend on their nanostructure and geometry of the core, which can be optimized for the broadband extinction. Significant extinction from the visible to mid-infrared makes fractal shells very attractive as bandpass filters and aerosolized obscurants. In contrast to the planar fractal films, where the absorption and reflection equally contribute to the extinction, the shells' extinction is caused mainly by the absorption. This work shows that the Mie scattering resonance of a silica core with 780 nm diameter at 560 nm is suppressed by 75% and only partially substituted by the absorption in the shell so that the total transmission is noticeably increased. Effective medium theory supports our experiments and indicates that light goes mostly through the epsilon-near-zero shell with approximately wavelength independent absorption rate. Broadband extinction in fractal shells allows as well for a laser photoburning of holes in the extinction spectra and consequently windows of transparency in a controlled manner. Au fractal nanostructures grown on PCC flakes provide the highest mass normalized extinction, up to 3 m^2/g, which has been demonstrated in the broad spectral range. In the nanoplasmonic field active devices consist of a Au nanoparticle that acts as a cavity and the dye molecules attached to it via thin silica shell as the active medium. Such kind of devices is considered as a nano-laser or nano-amplifier. The fabricated nanolasers were studied for their photoluminescence kinetic properties. It is shown that the cooperative effects due to the coupling of dye molecules via Au nanoparticle plasmons result in bi-exponential emission decay characteristics in accord with theory predictions. These bi-exponential decays involve a fast superradiant decay, which is followed by a slow subradiant decay. To summarize, this work shows new attractive properties of core-shell nanoparticles. Fractal Au shells on silica cores prove to be a good scattering suppressor and a band pass filter in a broadband spectral range. They can also be used as an obscurant when PCC is used as the core material. Finally, gold nanoparticles coated with silica with dye results in bi-exponential decays.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Pierantozzi, Stefano. "Modellazione e comparazione del protocollo TCP in scenari di mobilità." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7440/.

Повний текст джерела
Анотація:
Nell'ultimo ventennio l'impatto delle tecnologie wireless ha rivoluzionato il modo di comunicare. Tuttavia oltre a svariati benefici sono emersi diversi problemi di integrazione e ottimizzazione. Uno tra i protocolli più conosciuto e utilizzato in ambito di comunicazioni di rete, il TCP, viene sempre più spesso usato all'interno di sistemi wireless, per le sue caratteristiche di affidabilità e controllo, senza però fornire supporto specifico. Ciò è materia di forte dibattito e ricerca, che mira a cercare di raffinare le differenti versioni di TCP per renderle wireless-oriented. In questo lavoro si analizzano due varianti di sistema che sfruttano il TCP in scenari di mobilità, una con TCP classico e l'altra con TCP modificato tramite l'aggiunta di un meccanismo di ritrasmissione anticipata, e se ne studiano i vari aspetti e comportamenti, valutandone le prestazioni per mezzo di metodi matematici consolidati in letteratura.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Schwartz, Joseph Howard. "Development and Application of an Assessment Protocol for Watershed Based Biomonitoring." Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc279219/.

Повний текст джерела
Анотація:
With numerous bioassessment methodologies available, a regional protocol needs to be developed to ensure that results are comparable. A regional assessment protocol was developed that includes collecting five benthic macroinvertebrate samples, identifying organisms to genus, and calculating the following metrics: Number of Taxa, Total Number of Individuals, Simpson's Diversity Index, Shannon's Diversity Index, Percent Contribution of Dominant Taxa, Hilsenhoffs Biotic Index, and Percent Contribution of Dipterans. Once the protocol was developed, it was used to assess the Bayou Chico tributaries and watershed. All three tributaries had been significantly impacted by human activity as had the watershed as a whole. This study indicates that a regional protocol could be developed and is appropriate for biomonitoring at the watershed scale.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Xu, Ke. "Mobile agent security through multi-agent cryptographic protocols." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4473/.

Повний текст джерела
Анотація:
An increasingly promising and widespread topic of research in distributed computing is the mobile agent paradigm: code travelling and performing computations on remote hosts in an autonomous manner. One of the biggest challenges faced by this new paradigm is security. The issue of protecting sensitive code and data carried by a mobile agent against tampering from a malicious host is particularly hard but important. Based on secure multi-party computation, a recent research direction shows the feasibility of a software-only solution to this problem, which had been deemed impossible by some researchers previously. The best result prior to this dissertation is a single-agent protocol which requires the participation of a trusted third party. Our research employs multi-agent protocols to eliminate the trusted third party, resulting in a protocol with minimum trust assumptions. This dissertation presents one of the first formal definitions of secure mobile agent computation, in which the privacy and integrity of the agent code and data as well as the data provided by the host are all protected. We present secure protocols for mobile agent computation against static, semi-honest or malicious adversaries without relying on any third party or trusting any specific participant in the system. The security of our protocols is formally proven through standard proof technique and according to our formal definition of security. Our second result is a more practical agent protocol with strong security against most real-world host attacks. The security features are carefully analyzed, and the practicality is demonstrated through implementation and experimental study on a real-world mobile agent platform. All these protocols rely heavily on well-established cryptographic primitives, such as encrypted circuits, threshold decryption, and oblivious transfer. Our study of these tools yields new contributions to the general field of cryptography. Particularly, we correct a well-known construction of the encrypted circuit and give one of the first provably secure implementations of the encrypted circuit.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Krishnan, Anupama. "The Multipath Fault-Tolerant Protocol for Routing in Packet-Switched Communication Network." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4199/.

Повний текст джерела
Анотація:
In order to provide improved service quality to applications, networks need to address the need for reliability of data delivery. Reliability can be improved by incorporating fault tolerance into network routing, wherein a set of multiple routes are used for routing between a given source and destination. This thesis proposes a new fault-tolerant protocol, called the Multipath Fault Tolerant Protocol for Routing (MFTPR), to improve the reliability of network routing services. The protocol is based on a multipath discovery algorithm, the Quasi-Shortest Multipath (QSMP), and is designed to work in conjunction with the routing protocol employed by the network. MFTPR improves upon the QSMP algorithm by finding more routes than QSMP, and also provides for maintenance of these routes in the event of failure of network components. In order to evaluate the resilience of a pair of paths to failure, this thesis proposes metrics that evaluate the non-disjointness of a pair of paths and measure the probability of simultaneous failure of these paths. The performance of MFTPR to find alternate routes based on these metrics is analyzed through simulation.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Chen, Yan. "Traitement transactionnel dans un environnement OSI." Grenoble 2 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb376126461.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Ayeh, Eric. "An investigation into graph isomorphism based zero-knowledge proofs." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12076/.

Повний текст джерела
Анотація:
Zero-knowledge proofs protocols are effective interactive methods to prove a node's identity without disclosing any additional information other than the veracity of the proof. They are implementable in several ways. In this thesis, I investigate the graph isomorphism based zero-knowledge proofs protocol. My experiments and analyses suggest that graph isomorphism can easily be solved for many types of graphs and hence is not an ideal solution for implementing ZKP.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Madrigal-Bauguss, Jessica A. "The Effect of a Brief Acceptance-Based Protocol on Health Related Relational Framing." Thesis, University of North Texas, 2010. https://digital.library.unt.edu/ark:/67531/metadc30488/.

Повний текст джерела
Анотація:
Behavior analysts who study verbal behavior theorize that people derive relationships between stimuli - forming stimulus classes such that psychological functions transfer among stimuli and therefore affect behavior. Verbal processes are thought to play a role in cancer patients' behavioral flexibility. The current study examined if an analogue intervention produced changes in relations between health-relevant stimuli from pre- to post-test in patient and student samples. A matching-to-sample (MTS) task required participants to form three 4-member classes that included health, treatment, or neutral terms. Participants next listened to either an acceptance-based or a control-based rationale and therapy exercise, or a distracter task. Then, they were re-exposed to the MTS task. Latencies and accuracies for learning each class as well as between condition differences were examined. Finally, changes in ratings of stimuli from pre to post analogues were measured. Differences in stimuli ratings were seen in the student sample, reflecting transfer of function and some reduction in responsiveness to stimuli following intervention, but overall no learning performances are found. Discussion explores the consistency of the findings with acceptance and commitment therapy (ACT) theory in light of the seemingly lack of findings.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Vishwanathan, Roopa. "Exploring Privacy in Location-based Services Using Cryptographic Protocols." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc68060/.

Повний текст джерела
Анотація:
Location-based services (LBS) are available on a variety of mobile platforms like cell phones, PDA's, etc. and an increasing number of users subscribe to and use these services. Two of the popular models of information flow in LBS are the client-server model and the peer-to-peer model, in both of which, existing approaches do not always provide privacy for all parties concerned. In this work, I study the feasibility of applying cryptographic protocols to design privacy-preserving solutions for LBS from an experimental and theoretical standpoint. In the client-server model, I construct a two-phase framework for processing nearest neighbor queries using combinations of cryptographic protocols such as oblivious transfer and private information retrieval. In the peer-to-peer model, I present privacy preserving solutions for processing group nearest neighbor queries in the semi-honest and dishonest adversarial models. I apply concepts from secure multi-party computation to realize our constructions and also leverage the capabilities of trusted computing technology, specifically TPM chips. My solution for the dishonest adversarial model is also of independent cryptographic interest. I prove my constructions secure under standard cryptographic assumptions and design experiments for testing the feasibility or practicability of our constructions and benchmark key operations. My experiments show that the proposed constructions are practical to implement and have reasonable costs, while providing strong privacy assurances.
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Niare, Tiéma M. "Simplification du protocole de pesées des agneaux en ferme." Grenoble 2 : ANRT, 1986. http://catalogue.bnf.fr/ark:/12148/cb37600039d.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Boukhari, Souha. "Approche unifiée pour le développement et l'intégration de protocole." Grenoble 2 : ANRT, 1988. http://catalogue.bnf.fr/ark:/12148/cb376121904.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
38

Asfour, Taghrid. "Protocoles de communication multicast fiables." Paris : École nationale supérieure des télécommunications, 2001. http://catalogue.bnf.fr/ark:/12148/cb388211552.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Eads, Julie A. (Julie Anne). "Self-Monitoring of Stressors as an Additive Component to a Stress Management Training Protocol." Thesis, University of North Texas, 1992. https://digital.library.unt.edu/ark:/67531/metadc332845/.

Повний текст джерела
Анотація:
The purpose of this study was to examine whether or not self-monitoring of stressors and physiological response to stressors enhances the effectiveness of a stress management technique, specifically relaxation training. The primary hypothesis which stated that the RSMS group would experience a greater reduction in depression (on the Beck Depression Inventory), and enhancement in self-efficacy (on the General Self-efficacy Scale) than all other groups, was not supported.
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Win, Htoo Aung. "BSM Message and Video Streaming Quality Comparative Analysis Using Wave Short Message Protocol (WSMP)." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1538706/.

Повний текст джерела
Анотація:
Vehicular ad-hoc networks (VANETs) are used for vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. The IEEE 802.11p/WAVE (Wireless Access in Vehicular Environment) and with WAVE Short Messaging Protocol (WSMP) has been proposed as the standard protocol for designing applications for VANETs. This communication protocol must be thoroughly tested before reliable and efficient applications can be built using its protocols. In this paper, we perform on-road experiments in a variety of scenarios to evaluate the performance of the standard. We use commercial VANET devices with 802.11p/WAVE compliant chipsets for both BSM (basic safety messages) as well as video streaming applications using WSMP as a communication protocol. We show that while the standard performs well for BSM application in lightly loaded conditions, the performance becomes inferior when traffic and other performance metric increases. Furthermore, we also show that the standard is not suitable for video streaming due to the bursty nature of traffic and the bandwidth throttling, which is a major shortcoming for V2X applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

Jones, Nicole A. (Nicole Amy). "Morning and Afternoon Response to Exercise Using Two Test Protocols." Thesis, University of North Texas, 1995. https://digital.library.unt.edu/ark:/67531/metadc277988/.

Повний текст джерела
Анотація:
The purpose was to investigate time of day on responses to two types of exhaustive cycle ergometer tests. Sixteen males performed six exercise tests: three - constant power protocol and three - incremental protocol. The first test was a learning trial; the other tests were performed one in the morning and one in the afternoon. ANOVA revealed that O2 deficit and lactate were higher in the afternoon than the morning. Regardless of test type, time to exhaustion tended to be higher in the afternoon. VO2max was unaffected by the time of day and test type. These results confirmprevious reports of a time of day effect on anaerobic capacity, and support the contention that V02max is stable about a day.
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Zhou, Yanliang. "Efficient Linear Secure Computation and Symmetric Private Information Retrieval Protocols." Thesis, University of North Texas, 2020. https://digital.library.unt.edu/ark:/67531/metadc1752381/.

Повний текст джерела
Анотація:
Security and privacy are of paramount importance in the modern information age. Secure multi-party computation and private information retrieval are canonical and representative problems in cryptography that capture the key challenges in understanding the fundamentals of security and privacy. In this dissertation, we use information theoretic tools to tackle these two classical cryptographic primitives. In the first part, we consider the secure multi-party computation problem, where multiple users, each holding an independent message, wish to compute a function on the messages without revealing any additional information. We present an efficient protocol in terms of randomness cost to securely compute a vector linear function. In the second part, we discuss the symmetric private information retrieval problem, where a user wishes to retrieve one message from a number of replicated databases while keeping the desired message index a secret from each individual database. Further, the user learns nothing about the other messages. We present an optimal protocol that achieves the minimum upload cost for symmetric private information retrieval, i.e., the queries sent from the user to the databases have the minimum number of bits.
Стилі APA, Harvard, Vancouver, ISO та ін.
43

Zakaria, Mahmoud. "Un protocole générique pour les environnements répartis à objets : GRIP /." Paris : École nationale supérieure des télécommunications, 1998. http://catalogue.bnf.fr/ark:/12148/cb37007399r.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Demerjian, Jacques. "Services d'autorisation et intégration au protocole d'attribution dynamique des adresses /." Paris : École nationale supérieure des télécommunications, 2005. http://catalogue.bnf.fr/ark:/12148/cb39977341q.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Gupta, Neeraj Kant. "Modeling and Analysis of Next Generation 9-1-1 Emergency Medical Dispatch Protocols." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc500122/.

Повний текст джерела
Анотація:
Emergency Medical Dispatch Protocols are guidelines that a 9-1-1 dispatcher uses to evaluate the nature of emergency, resources to send and the nature of help provided to the 9-1-1 caller. The current Dispatch Protocols are based on voice only call. But the Next Generation 9-1-1 (NG9-1-1) architecture will allow multimedia emergency calls. In this thesis I analyze and model the Emergency Medical Dispatch Protocols for NG9-1-1 architecture. I have identified various technical aspects to improve the NG9-1-1 Dispatch Protocols. The devices (smartphone) at the caller end have advanced to a point where they can be used to send and receive video, pictures and text. There are sensors embedded in them that can be used for initial diagnosis of the injured person. There is a need to improve the human computer (smartphone) interface to take advantage of technology so that callers can easily make use of various features available to them. The dispatchers at the 9-1-1 call center can make use of these new protocols to improve the quality and the response time. They will have capability of multiple media streams to interact with the caller and the first responders.The specific contributions in this thesis include developing applications that use smartphone sensors. The CPR application uses the smartphone to help administer effective CPR even if the person is not trained. The application makes the CPR process closed loop, i.e., the person who administers the CPR as well as the 9-1-1 operator receive feedback and prompt from the application about the correctness of the CPR. The breathing application analyzes the quality of breathing of the affected person and automatically sends the information to the 9-1-1 operator. In order to improve the Human Computer Interface at the caller and the operator end, I have analyzed Fitts law and extended it so that it can be used to improve the instructions given to a caller. In emergency situations, the caller may be physically or cognitively impaired. This may happen either because the caller is the injured person, or because the caller is a close relative or friend of the injured person. Using EEG waves, I have analyzed and developed a mathematical model of a person's cognitive impairment. Finally, I have developed a mathematical model of the response time of a 9-1-1 call and analyzed the factors that can be improved to reduce the response time. In this regard, another application, I have developed, allows the 9-1-1 operator to remotely control the media features of a caller's smartphone. This is needed in case the caller is unable to operate the multimedia features of the smartphone. For example, the caller may not know how to zoom in the smartphone camera.All these building blocks come together in the development of an efficient NG9-1-1 Emergency Medical Dispatch protocols. I have provided a sample of these protocols, using the existing Emergency Dispatch Protocols used in the state of New Jersey. The new protocols will have fewer questions and more visual prompts to evaluate the nature of the emergency.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Chraïbi, Chakib. "Contribution au test de protocoles OSI." Grenoble 2 : ANRT, 1987. http://catalogue.bnf.fr/ark:/12148/cb37603984f.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Nassif, Nadia Adel. "Especificação formal em SDL e simulação de protocolos que combinam a tecnica de Label-Swapping com o roteamento de camada 3 para o transporte do Ip sobre o ARM." [s.n.], 1999. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260009.

Повний текст джерела
Анотація:
Orientador: Walter da Cunha Borelli
Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-07-25T16:20:30Z (GMT). No. of bitstreams: 1 Nassif_NadiaAdel_M.pdf: 10953982 bytes, checksum: cacb2be7368db5f807502c09fe7bed13 (MD5) Previous issue date: 1999
Resumo: A tese trata da especificação formal em SDL (Specification and Description Language) e da simulação através do SDT 1 (SDL Design Tool), de um classificador de fluxo X/V usado no IpSwitching e, do LDP (Label Distribution Protocol) do MPLS (MultiProtocol Label Switching), partindo-se das recomendações do IETF (Internet Engineering Task Force). Tanto o IpSwitching como o MPLS são protocolos que utilizam a combinação da técnica de label-swappingcom o roteamento de camada 3, para transportar pacotes de um protocolo de rede sem conexão sobre uma tecnologia de comutação, como o IP sobre o ATM. Com o objetivo de se avaliar a performance do IpSwithing em relação à variação dos parâmetros do classificador de fluxo X/V, que é parte integrante do controlador de um IpSwitch, foram realizadas simulações com diferentes traces de tráfego IP. Em relação ao MPLS é proposto uma especificação única que combina as características dos procedimentos de distribuição de labelcom a máquina de estado do LDP. O objetivo é analisar através de simulações, o comportamento de um LSR (Label Switching Router) em diferentes configurações, diante do recebimento de mensagens LDP e do estabelecimento de LSPs (Label Switched Paths). .. Palavras Chaves: SDL - Specification and Description Language, SDT ¿ SDL Design Tool, Especificação Formal, Simulação, MSC - Message Sequence Cha'rt, IP sobre ATM, IpSwitching, Classificador de Fluxo, MPLS - MultiProtocol Label Switching, LDP ...Observação: O resumo, na íntegra, poderá ser visualizado no texto completo da tese digital
Abstract: The thesis deals with formal specification using SDL (Specification and Description Language) and the simulation using SDT 2 (SDL Design Tool) of the flow classifier X/Y used in IpSwitching, and of the LDP (Label Distribution Protocol) from MPLS (MultiProtocol Label Switching), based on the IETF (Internet Engineering Task Force) recomenda tions. IpSwitching and MPLS are protocols that use the combination of the label-swapping technique with the layer 3 routing, forwarding connectionless traffic over a switching technology like IP over ATM. In order to analize the IpSwitching performance varying the flow classifier X/Y paremeters, which is part of the IpSwitch controller, it was used different IP traffic traces on the simulations. Concerning the MPLS it is proposed a single specification that combines the LDP procedures and LDP state machine. The goal is to verify the LSR (Label Switching Router) behaviour in recieving LDP messages and establishing LSPs (Label Switched Path), using different LSR configurations. ;Key Words: SDL - Specification and Description Language, SDT - SDL Design Tool, Formal Specification, Simulation, MSC - Message Sequence Chart, IP over ATM, IpSwitching, Flow Classifier, MPLS - MultiProtocol Label Switching, LDP - Label Distribution Protocol, label-swapping. ...Note: The complete abstract is available with the full electronic digital thesis or dissertations
Mestrado
Mestre em Engenharia Elétrica
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Talbi, Mehdi. "Spécification et vérification automatique des propriétés des protocoles de vote électronique en utilisant la logique ADM." Rennes 1, 2010. http://www.theses.fr/2010REN1S073.

Повний текст джерела
Анотація:
Les systèmes de vote électronique sont basés sur des protocoles cryptographiques faisant usage de primitives avancées (chiffrement homomorphe, signature en aveugle, etc. ) et impliquant des canaux de communication élaborés (anonymes, privés) dans le but de garantir certaines propriétés de sécurité : éligibilité, équité, anonymat, etc. Pour les systèmes critiques tels que celui du vote électronique, l’usage des méthodes formelles, pour prouver que les propriétés prétendues satisfaites par un protocole sont réellement garanties, devrait être incontournable. Dans cette thèse, nous proposons d’utiliser la logique modale ADM afin de spécifier une sélection de propriétés de sécurité. Ces propriétés sont vérifiables par rapport à un modèle à base de traces représentant des exécutions valides du protocole. Notre modélisation des protocoles tient en compte de la présence d’un intrus actif dont le pouvoir de déduction est ajusté en fonction des spécificités introduites par le vote électronique. La modélisation des protocoles et la spécification des propriétés sont appuyées par une étude de cas portant sur le protocole de vote FOO dont nous proposons une analyse de sa sécurité. En complément, nous proposons d’exploiter le système de preuve qui accompagne la logique ADM, afin d’implémenter un outil permettant d’automatiser le processus de la vérification formelle des propriétés spécifiées par rapport aux traces du protocole analysé
It is a well known fact that only formal methods can provide a proof that a given system meets its requirements. Their use should be mandatory for critical systems such as electronic voting. In this thesis, we propose the use of the modal and linear ADM logic in order to specify a set of security properties that a voting protocol is required to satisfy : eligibility, non-reusability, accuracy, fairness, anonymity, receipt-freeness, etc. Our goal is to check these properties against a trace-based model where a trace represents a valid run of the protocol. Protocol executions take place in a hostile environment controlled by an active intruder whose deduction power is incremented according to electronic voting cryptographic primitives (blind signature, bit-commitment, homomorphic encryption, zero-knowledge proof, etc. ). Protocol modeling and properties specification are applied to the FOO protocol as a case study. Additionally, we propose to exploit the tableau-based proof system of the ADM logic, in order to develop a tool enabling the automatic verification of security properties against selected traces of the analyzed protocol
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Heitz, Layne. "The Validation of a Short-cycle Formative Assessment Observation Protocol for Science and Mathematics Instruction." Thesis, University of North Texas, 2013. https://digital.library.unt.edu/ark:/67531/metadc407820/.

Повний текст джерела
Анотація:
Over the years, teachers, administrators, and policy makers have been concerned with optimizing learning for all students. The No Child Left Behind Act put an emphasis on summative assessments, which measure what students have learned. In contrast, formative assessment has been shown in many studies to improve student achievement and motivation because it is applied while students are learning. The purpose of this study was to investigate, for middle and high school mathematics and science instruction, the validity and reliability of a newly developed observation instrument called AssessToday, which is used in a single class period to assess a teacher’s use of short-cycle formative assessment. The content validity of the instrument was supported through an extensive literature review, feedback from experts in the field of formative assessment, and an examination of 98 classroom observations. For assessing reliability of the instrument, inter-rater reliability coefficients were calculated using data collected by trained observers who independently rated teachers during the same class period using three measures: percentage of agreement between raters, Cohen’s kappa, and Fleiss kappa. Cohen’s kappa (N = 36 pairs) ranged from .62 to 1.00 for all observer pairs with an average kappa of .75 for mathematics (n = 16 pairs) and .76 for science (n = 20 pairs). The recommended threshold for kappa is k = .70. An exploratory factor analysis was conducted on the observation data and the determined factors related to the theoretical framework established in the literature. The results affirmed that the instrument is a tool to be utilized in short-cycle formative assessment with middle and high school science and mathematics teachers.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Joglekar, Sachin P. "Embedded monitors for detecting and preventing intrusions in cryptographic and application protocols." Thesis, University of North Texas, 2003. https://digital.library.unt.edu/ark:/67531/metadc4414/.

Повний текст джерела
Анотація:
There are two main approaches for intrusion detection: signature-based and anomaly-based. Signature-based detection employs pattern matching to match attack signatures with observed data making it ideal for detecting known attacks. However, it cannot detect unknown attacks for which there is no signature available. Anomaly-based detection builds a profile of normal system behavior to detect known and unknown attacks as behavioral deviations. However, it has a drawback of a high false alarm rate. In this thesis, we describe our anomaly-based IDS designed for detecting intrusions in cryptographic and application-level protocols. Our system has several unique characteristics, such as the ability to monitor cryptographic protocols and application-level protocols embedded in encrypted sessions, a very lightweight monitoring process, and the ability to react to protocol misuse by modifying protocol response directly.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії