Дисертації з теми "Security systems Mathematics"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-32 дисертацій для дослідження на тему "Security systems Mathematics".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Singh, Gurpreet. "Statistical Modeling of Dynamic Risk in Security Systems." Thesis, KTH, Matematisk statistik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-273599.
Повний текст джерелаBig data har använts regelbundet inom ekonomi för att bygga prognosmodeller, det är dock ett relativt nytt koncept inom säkerhetsbranschen. Denna studie förutsäger vilka larmkoder som kommer att låta under de kommande 7 dagarna på plats $L$ genom att observera de senaste 7 dagarna. Logistisk regression och neurala nätverk används för att lösa detta problem. Eftersom att problemet är av en multi-label natur tillämpas logistisk regression i kombination med binary relevance och classifier chains. Modellerna tränas på data som har annoterats med två separata metoder. Den första metoden annoterar datan genom att endast observera plats $L$ och den andra metoden betraktar $L$ och $L$:s omgivning. Eftersom problemet är multi-labeled kommer annoteringen sannolikt att vara obalanserad och därför används resamplings metoden, SMOTE, och random over-sampling för att öka frekvensen av minority labels. Recall, precision och F1-score mättes för att utvärdera modellerna. Resultaten visar att den andra annoterings metoden presterade bättre för alla modeller och att classifier chains och binary relevance presterade likartat. Binary relevance och classifier chains modellerna som tränades på datan som använts sig av resamplings metoden SMOTE gav ett högre macro average F1-score, dock sjönk prestationen för neurala nätverk. Resamplings metoden SMOTE presterade även bättre än random over-sampling. Neurala nätverksmodellen överträffade de andra två modellerna på alla metoder och uppnådde högsta F1-score.
Bengtsson, Mattias. "Mathematical foundation needed for development of IT security metrics." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-9766.
Повний текст джерелаIT security metrics are used to achieve an IT security assessment of certain parts of the IT security environment. There is neither a consensus of the definition of an IT security metric nor a natural scale type of the IT security. This makes the interpretation of the IT security difficult. To accomplish a comprehensive IT security assessment one must aggregate the IT security values to compounded values.
When developing IT security metrics it is important that permissible mathematical operations are made so that the information are maintained all the way through the metric. There is a need for a sound mathematical foundation for this matter.
The main results produced by the efforts in this thesis are:
• Identification of activities needed for IT security assessment when using IT security metrics.
• A method for selecting a set of security metrics in respect to goals and criteria, which also is used to
• Aggregate security values generated from a set of security metrics to compounded higher level security values.
• A mathematical foundation needed for development of security metrics.
Seotsanyana, Motlatsi. "Formal specification and verification of safety interlock systems : a comparative case study /." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/710.
Повний текст джерелаLi, Ling Feng. "An image encryption system based on two-dimensional quantum random walks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950660.
Повний текст джерелаAgarwal, Akash. "A Study of Communication Link Removal in Static and Dynamic Teams." The Ohio State University, 2017. http://rave.ohiolink.edu/etdc/view?acc_num=osu1510680159436136.
Повний текст джерелаTerashima, Robert Seth. "Tweakable Ciphers: Constructions and Applications." PDXScholar, 2015. https://pdxscholar.library.pdx.edu/open_access_etds/2484.
Повний текст джерелаGoeschel, Kathleen. "Feature Set Selection for Improved Classification of Static Analysis Alerts." Diss., NSUWorks, 2019. https://nsuworks.nova.edu/gscis_etd/1091.
Повний текст джерелаFung, Charles Way Hun. "Multi-marcação de vídeo baseada em marca d'água LWT-SVD usando abordagem lateral." Universidade Tecnológica Federal do Paraná, 2012. http://repositorio.utfpr.edu.br/jspui/handle/1/328.
Повний текст джерелаVídeos digitais se tornaram uma forma de comunicação altamente utilizada na rede, entretanto estes dados são facilmente copiados e distribuídos. Isto se deve ao crescente número de ferramentas que surgiram com este objetivo, causando quebra dos direitos autorais e distribuição ilegal de conteúdo. A solução mais estudada para este problema são as marcas d'água digitais, que provêm segurança em forma de autenticação e verificação de violação. Neste trabalho, foi desenvolvido um novo método de inserção e extração de marcas d'água em um vídeo, usando o processo chamado abordagem lateral. Este possibilita a marcação em blocos de frames. As diversas marcas inseridas são usadas como redundância para aumentar a robustez contra ataques. Os testes realizados seguiram o padrão dos benchmarks Vidmark e Stirmark, os quais demonstram a eficiência do método em manter a marca d'água mesmo após ataques.
Digital videos have become the most used way to communicate, however these data are easily copied and distributed. That happen due the growing number of tools that are create with this goal, causing breach of copyright and illegal distribution of content. The most studied solution that can solve this problem are the digital watermarks that provide security like authentication and tamper detection. In this work, we developed a new method of embedding and extracting watermarks in a video using a process called side view. This process allows watermark a block of frames. The several watermarks embedded can be used like redundance to grow the robustness of the method against attacks. The tests followed the standard benchmarks Vidmark and Stirmark that show the performance of the method in keep the watermark even after attacks.
Ma, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Повний текст джерелаSuriadi, Suriadi. "Strengthening and formally verifying privacy in identity management systems." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/39345/1/Suriadi_Suriadi_Thesis.pdf.
Повний текст джерелаParriaux, Jeremy. "Contrôle, synchronisation et chiffrement." Phd thesis, Université de Lorraine, 2012. http://tel.archives-ouvertes.fr/tel-00749151.
Повний текст джерелаAlmohri, Hussain. "High Assurance Models for Secure Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/22030.
Повний текст джерелаComplex attacks on large networks are only possible with the existence of vulnerable intermediate machines, routers, or mobile devices (that we refer to as network components) in the network. Vulnerabilities in highly connected servers and workstations, that compromise the heart of today\'s networks, are inevitable. Also, modern mobile devices with known vulnerabilities cause an increasing risk on large networks. Thus, weak security mechanisms in vulnerable network components open the possibilities for effective network attacks.
On the other hand, lack of systematic methods for an effective static analysis of an overall complex network results in inconsistent and vulnerable configurations at individual network components as well as at the network level. For example, inconsistency and faults in designing firewall rules at a host may result in enabling more attack vector. Further, the dynamic nature of networks with changing network configurations, machine availability and connectivity, make the security analysis a challenging task.
This work presents a hybrid approach to security by providing two solutions for analyzing the overall security of large organizational networks, and a runtime framework for protecting individual network components against misuse of system resources by cyber attackers. We observe that to secure an overall computing environment, a static analysis of a network is not sufficient. Thus, we couple our analysis with a framework to secure individual network components including high performance machines as well as mobile devices that repeatedly enter and leave networks. We also realize the need for advancing the theoretical foundations for analyzing the security of large networks.
To analyze the security of large enterprise network, we present the first scientific attempt to compute an optimized distribution of defensive resources with the objective of minimizing the chances of successful attacks. To achieve this minimization, we develop a rigorous probabilistic model that quantitatively measures the chances of a successful attack on any network component. Our model provides a solid theoretical foundation that enables efficient computation of unknown success probabilities on every stage of a network attack. We design an algorithm that uses the computed attack probabilities for optimizing security configurations of a network. Our optimization algorithm uses state of the art sequential linear programming to approximate the solution to a complex single objective nonlinear minimization problem that formalizes various attack steps and candidate defenses at the granularity of attack stages.
To protect individual network components, we develop a new approach under our novel idea of em process authentication.
We argue that to provide high assurance security, enforcing authorization is necessary but not sufficient. In fact, existing authorization systems lack a strong and reliable process authentication model for preventing the execution of malicious processes (i.e., processes that intentionally contain malicious goals that violate integrity and confidentiality of legitimate processes and data). Authentication is specially critical when malicious processes may use various system vulnerabilities to install on the system and stealthily execute without the user\'s consent.
We design and implement the Application Authentication (A2) framework that is capable of monitoring application executions and ensuring proper authentication of application processes. A2 has the advantage of strong security guarantees, efficient runtime execution, and compatibility with legacy applications. This authentication framework reduces the risk of infection by powerful malicious applications that may disrupt proper execution of legitimate applications, steal users\' private data, and spread across the entire organizational network.
Our process authentication model is extended and applied to the Android platform. As Android imposes its unique challenges (e.g., virtualized application execution model), our design and implementation of process authentication is extended to address these challenges. Per our results, process authentication in Android can protect the system against various critical vulnerabilities such as privilege escalation attacks and drive by downloads.
To demonstrate process authentication in Android, we implement DroidBarrier. As a runtime system, DroidBarrier includes an authentication component and a lightweight permission system to protect legitimate applications and secret authentication information in the file system. Our implementation of DroidBarrier is compatible with the Android runtime (with no need for modifications) and shows efficient performance with negligible penalties in I/O operations and process creations.
Ph. D.
Morshed, Md Monzur. "Effective protocols for privacy and security in RFID systems applications." Thesis, Staffordshire University, 2012. http://eprints.staffs.ac.uk/1896/.
Повний текст джерелаEisman, Elyktra. "GIS-integrated mathematical modeling of social phenomena at macro- and micro- levels—a multivariate geographically-weighted regression model for identifying locations vulnerable to hosting terrorist safe-houses: France as case study." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2261.
Повний текст джерелаLux, Thomas Christian Hansen. "Interpolants, Error Bounds, and Mathematical Software for Modeling and Predicting Variability in Computer Systems." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/100059.
Повний текст джерелаDoctor of Philosophy
It is common for scientists to collect data on something they are studying. Often scientists want to create a (predictive) model of that phenomenon based on the data, but the choice of how to model the data is a difficult one to answer. This work proposes methods for modeling data that operate under very few assumptions that are broadly applicable across science. Finally, a software package is proposed that would allow scientists to better understand the true distribution of their data given relatively few observations.
Ashe, James Patrick. "A vulnerability assessment of the East Tennessee State University administrative computer network." [Johnson City, Tenn. : East Tennessee State University], 2004. http://etd-submit.etsu.edu/etd/theses/available/etd-0301104-151512/unrestricted/AsheJ030204b.pdf.
Повний текст джерелаTitle from electronic submission form. ETSU ETD database URN: etd-0301104-151512. Includes bibliographical references. Also available via Internet at the UMI web site.
Friot, Nicolas. "Itérations chaotiques pour la sécurité de l'information dissimulée." Thesis, Besançon, 2014. http://www.theses.fr/2014BESA2035/document.
Повний текст джерелаDiscrete dynamical systems by chaotic or asynchronous iterations have proved to be highly interesting toolsin the field of computer security, thanks to their unpredictible behavior obtained under some conditions. Moreprecisely, these chaotic iterations possess the property of topological chaos and can be programmed in anefficient way. In the state of the art, they have turned out to be really interesting to use notably through digitalwatermarking schemes. However, despite their multiple advantages, these existing algorithms have revealedsome limitations. So, these PhD thesis aims at removing these constraints, proposing new processes whichcan be applied both in the field of digital watermarking and of steganography. We have studied these newschemes on two aspects: the topological security and the security based on a probabilistic approach. Theanalysis of their respective security level has allowed to achieve a comparison with the other existing processessuch as, for example, the spread spectrum. Application tests have also been conducted to steganalyse and toevaluate the robustness of the algorithms studied in this PhD thesis. Thanks to the obtained results, it has beenpossible to determine the best adequation of each processes with targeted application fields as, for example,the anonymity on the Internet, the contribution to the development of the semantic web, or their use for theprotection of digital documents. In parallel to these scientific research works, several valorization perspectiveshave been proposed, aiming at creating a company of innovative technology
Louw, Lloyd A. B. "Automated face detection and recognition for a login system." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/438.
Повний текст джерелаSimons, William R. "The challenges of network security remediation at a regional university." [Johnson City, Tenn. : East Tennessee State University], 2005. http://etd-submit.etsu.edu/etd/theses/available/etd-0209105-075524/unrestricted/SimonsW022105f.pdf.
Повний текст джерелаTitle from electronic submission form. ETSU ETD database URN: etd-0209105-075524 Includes bibliographical references. Also available via Internet at the UMI web site.
Langin, Chester Louis. "A SOM+ Diagnostic System for Network Intrusion Detection." OpenSIUC, 2011. https://opensiuc.lib.siu.edu/dissertations/389.
Повний текст джерелаYang, Fang. "A Comprehensive Approach for Bulk Power System Reliability Assessment." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14488.
Повний текст джерелаGuyeux, Christophe. "Désordre des itérations chaotiques et leur utilité en sécurité informatique." Besançon, 2010. http://www.theses.fr/2010BESA2019.
Повний текст джерелаFor the first time, the divergence and disorder properties of “chaotic iterations”, a tool taken from the discrete mathematics domain, are studied. After having used discrete mathematics to deduce situations of non-convergence, these iterations are modeled as a dynamical system and are topologically studied into the framework of the mathematical theory of chaos. We prove that their adjective “chaotic” is well chosen : these iterations are chaotic, according to the definitions of Devaney, Li-Yorke, expansivity, topological entropy, Lyapunov exponent, and so on. These properties have been established for a topology different from the order topology, thus the consequences of this choice are discussed. We show that these chaotic iterations can be computed without any loss of properties, and that it is possible to circumvent the problem of the finiteness of computers to obtain programs that are proven to be chaotic according to Devaney, etc. The procedure proposed in this document is followed to generate a digital watermarking algorithm and a hash function, which are chaotic according to the strongest possible sense. At each time, the advantages of being chaotic as defined in the mathematical theory of chaos is justified, the properties to check are chosen depending on the objectives to reach, and the programs are evaluated. A novel notion of security for steganography is introduced, to address the lack of tool for estimating the strength of an information hiding scheme against certain types of attacks. Finally, two solutions to the problem of secure data aggregation in wireless sensor networks are proposed
Крихівський, М. В. "Прогнозування показників екологічної безпеки міст за результатами моніторингу навколишнього середовища (на прикладі Івано-Франківська)". Thesis, Івано-Франківський національний технічний університет нафти і газу, 2014. http://elar.nung.edu.ua/handle/123456789/4679.
Повний текст джерелаВ диссертационной работе отображены ход и результаты исследования влияния микроэлементного состава почв города Ивано-Франковска на здоровье его жителей. Проанализировано экологическое состояние почв в городе. Исходя из анализа выполненных расчетов, сделаны выводы о том, что концентрации исследуемых микроэлементов в почвах всей территории города Ивано-Франковска отражают умеренный уровень опасности. Есть некоторое незначительное отклонение по отдельным химическим элементам и участкам, но они несущественно влияет на ситуацию состояния экологической безопасности города. Выявлена статистическая связь между концентрациями микроэлементов и болезнями людей. Для этого использовались непараметрические методы с исользованием ранговых корреляций. Предложены математические модели показателей уровня экологической безопасности с медицинской точки зрения. Для этого была выполненен предварительный анализ геометрической структуры сооокупности рассчитаных данных, проанализирована геометрия парных корреляций. Были использованы линейная функция; параметрических функции, которые с помощью несложных преобразований сводятся к линейной; степенные и тригонометрические полиномы. На основе найденных зависимостей разработаны эколого-медицинские индексы и динамические эколого-медицинские индексы, которые численно выражают уровень безопасности соотношений концентраций отдельных микроэлементов в почвах для здоровья людей. Динамические индексы учитывают развитие процессов во времени, что позволяет прогнозировать изменения состояния здоровья. Структура общих индексов соответствует структуре болезней - экологических маркеров - и смертности от них. Общие индексы определены как линейная свертка экологически медицинских индексов типов болезней. Разработана методология определения показателей уровня экологической безопасности территории с числовыми показателями экологического состояния литосферы и минерально-сырьевых ресурсов; геофизсферы и космических ресурсов; геоморфосферы и территориальных ресурсов; поверхностной и подземной гидросферы, динамики и качества водных ресурсов; атмосферы и климатических ресурсов; педосферы и земельных ресурсов; фитосферы, растительных и рекреационных ресурсов; зоосферы, ресурсов животного мира; демосферы, заболеваемости населения в связи с экологическими факторами и показателя экологического воздействия техносферы на природные компоненты. Предложено их свести к интегральному показателю уровня экологической безопасности, предварительно номировав измерянные и рассчитанные параметры. Спроектирована и разработана информационная аналитическая система для экологических служб. Она состоит из 6 основных программ расчета: фоновых значений загрязнения ЕсоPhone, статистических параметров ЕсоStat, концентрационных интервалов безопасности жизнедеятельности InterConcSafetyLife, экологически безопасных для существования геосистем интервалов концентрации загрязнителей ЕсоSafetyGeosystems, эколого-медицинских показателей состояния почв ЕсоМеdIndeх и прогнозирования заболеваемости и смертности ЕсоМеdIndeх. Интеллектуальная часть информационной системы представлена семантической сетью. Реализована эта семантическая сеть нечетким графом, который описан нечеткими множествами вершин и ребер, задающими, соответственно, объекты урбоэкосистемы и отношения между ними. Нормирование принятия решений использует две нормы. Норма полезностей альтернатив определена отношением полезности альтернативы и максимально возможной полезности, а норма риска - как риск потерять полезность.
The thesis displays the progress and results of investigation of the chemical composition of the soil of the city of Ivano-Frankivsk on the health of its inhabitants. Analyzed the ecological condition of the soil in the city. Found a statistical association between the concentrations of trace elements and human disease. The mathematical models of indicators of environmental safety from a medical point of view. On the basis of the found dependencies developed ecological and health codes and dynamic ecological and health codes that numerically express the security level concentration ratios of individual trace elements in the soil to human health. Dynamic indexes take into account the development of processes in time, which allows to predict changes in health status. The structure corresponds to the structure of the general indexes of disease - ecological markers - and mortality. General indices are defined as a linear convolution of environmentally medical indexes types of diseases. Developed methodology of measuring indicators of environmental safety grounds with numerical indicators of ecological condition of the lithosphere and mineral resources, the ecological state geofizsphere and space resources; geomorfosphere ecological state and territorial resources, the ecological state of the surface and underground hydrosphere, dynamics and quality of water resources, the ecological state of the atmosphere and climatic resources ecological status pedosphere and land resources; environmental condition phytosphere plant and recreational resources; ecological state of the zoosphere, wildlife resources; demosphere ecological status, morbidity due to environmental factors and indicators of environmental impact on natural components of the technosphere. Proposed are reduced to the integral indicator of the level of ecological safety. Designed and developed an information system for environmental analytical services. Functional information system implemented by 6 program blocks: input input data, modeling, analysis and forecasting, generating documents, integrators and report generator. The intelligent part of the system uses a semantic network that is fuzzy directed graph with vertices and edges marked. Decision-making is normalized by two methods. The first method is based on the utility of alternatives, and the second - on the risks of alternatives.
Gebbie, Stewart. "A survey of the mathematics of cryptology." Thesis, 2009. http://hdl.handle.net/10539/6608.
Повний текст джерелаMatondo, Sandra Bazebo. "Two-level chaos-based cryptography for image security." 2012. http://encore.tut.ac.za/iii/cpro/DigitalItemViewPage.external?sp=1001028.
Повний текст джерелаDiscusses a desirable chaos-based encryption scheme for image storage and transmission is one that can resist different types of attacks in less time and with successful decryption. To resist different kinds of attacks, a higher security level is required. As a result, there is a need to enhance the security level of existing chaos-based image encryption schemes using hyper-chaos. To increase the level of security using hyper-chaos, the research will present a scheme that combines two different techniques that are used to improve the degree of security of chaos-based cryptography; a classical chaos-based cryptographic technique and a hyper-chaos masking technique. The first technique focuses on the efficient combination and transformation of image characteristics based on hyper-chaos pseudorandom numbers. The second technique focuses on driving the hyper-chaos system by using the results of the first technique to change the transmitted chaos dynamic as well as using synchronisation and a high-order differentiator for decryption. To achieve the objective of our research the following sub-problems are addressed.
Ling, Jie. "Smart card fault attacks on public key and elliptic curve cryptography." Thesis, 2014. http://hdl.handle.net/1805/5967.
Повний текст джерелаBlömmer, Otto, and Seifert presented a fault attack on elliptic curve scalar multiplication called the Sign Change Attack, which causes a fault that changes the sign of the accumulation point. As the use of a sign bit for an extended integer is highly unlikely, this appears to be a highly selective manipulation of the key stream. In this thesis we describe two plausible fault attacks on a smart card implementation of elliptic curve cryptography. King and Wang designed a new attack called counter fault attack by attacking the scalar multiple of discrete-log cryptosystem. They then successfully generalize this approach to a family of attacks. By implementing King and Wang's scheme on RSA, we successfully attacked RSA keys for a variety of sizes. Further, we generalized the attack model to an attack on any implementation that uses NAF and wNAF key.
"An intelligent vehicle security system based on human behaviors modeling." 2006. http://library.cuhk.edu.hk/record=b5892893.
Повний текст джерелаThesis (M.Phil.)--Chinese University of Hong Kong, 2006.
Includes bibliographical references (leaves 99-106).
Abstracts in English and Chinese.
Chapter 1 --- Introduction --- p.1
Chapter 1.1 --- Motivation --- p.1
Chapter 1.2 --- Overview --- p.2
Chapter 1.3 --- Organization of the Thesis --- p.3
Chapter 2 --- Related Research --- p.6
Chapter 2.1 --- Information Technology in Cars --- p.6
Chapter 2.2 --- Anti-theft Protection --- p.8
Chapter 2.3 --- Learning Human Behaviors --- p.10
Chapter 2.4 --- Neural Network Learning --- p.11
Chapter 3 --- Experimental Design --- p.14
Chapter 3.1 --- Overview --- p.14
Chapter 3.2 --- Driving Simulation Subsystem --- p.14
Chapter 3.3 --- Data Sensing and Capturing Subsystem --- p.15
Chapter 3.4 --- Data Analysis Subsystem --- p.17
Chapter 4 --- Data Preprocessing for Feature Selection --- p.23
Chapter 4.1 --- Introduction --- p.23
Chapter 4.2 --- Fast Fourier Transform --- p.23
Chapter 4.3 --- Principal Component Analysis --- p.24
Chapter 4.4 --- Independent Component Analysis --- p.26
Chapter 5 --- Classification via Support Vector Machine --- p.28
Chapter 5.1 --- Introduction --- p.28
Chapter 5.1.1 --- Why Using Support Vector Machine --- p.28
Chapter 5.1.2 --- Mathematic Description --- p.29
Chapter 5.2 --- Problem Formulation --- p.31
Chapter 5.3 --- Approach --- p.31
Chapter 5.4 --- Experimental Results --- p.34
Chapter 5.4.1 --- Preprocess Data Analysis --- p.34
Chapter 5.4.2 --- Models Design --- p.37
Chapter 5.5 --- Discussion --- p.44
Chapter 6 --- Evaluation via Hidden Markov Model --- p.47
Chapter 6.1 --- Introduction --- p.47
Chapter 6.1.1 --- Why Using Hidden Markov Model --- p.48
Chapter 6.1.2 --- Mathematic Description --- p.50
Chapter 6.2 --- Problem Formulation --- p.51
Chapter 6.3 --- Approach --- p.53
Chapter 6.4 --- Experimental Results --- p.56
Chapter 6.4.1 --- Model-to-model Measure --- p.56
Chapter 6.4.2 --- Human-to-model Measure --- p.63
Chapter 6.4.3 --- Parameters Optimization --- p.66
Chapter 6.5 --- Discussion --- p.69
Chapter 7 --- System Design and Implementation --- p.71
Chapter 7.1 --- Introduction --- p.71
Chapter 7.2 --- Hardware --- p.72
Chapter 7.3 --- Software --- p.78
Chapter 7.4 --- System Demonstration --- p.80
Chapter 8 --- Conclusion and Future Work --- p.82
Chapter 8.1 --- Contributions --- p.82
Chapter 8.2 --- Future Work --- p.84
Chapter A --- Hidden Markov Model Training --- p.87
Chapter A.1 --- Forward-backward Algorithm --- p.87
Chapter A.2 --- Baum-Welch Algorithm --- p.87
Chapter B --- Human Driving Behavior Data --- p.90
Chapter C --- Publications Resulted from the Study --- p.98
(11186139), Benjamin D. Harsha. "Modeling Rational Adversaries: Predicting Behavior and Developing Deterrents." Thesis, 2021.
Знайти повний текст джерелаLuruli, Fululedzani Lucy. "ARIMA forecasts of the number of beneficiaries of social security grants in South Africa." Diss., 2011. http://hdl.handle.net/10500/5810.
Повний текст джерелаMathematical Sciences
M.Sc. (Statistics)
(6012225), Huian Li. "Transparent and Mutual Restraining Electronic Voting." Thesis, 2019.
Знайти повний текст джерелаMemarmoshrefi, Parisa. "A Bio-Inspired Autonomous Authentication Mechanism in Mobile Ad Hoc Networks." Doctoral thesis, 2012. http://hdl.handle.net/11858/00-1735-0000-000D-F078-0.
Повний текст джерелаEloff, Corné. "Spatial technology as a tool to analyse and combat crime." Thesis, 2006. http://hdl.handle.net/10500/1193.
Повний текст джерелаCriminology
D.Litt. et Phil. (Criminology)