• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 84
  • 29
  • 22
  • 12
  • 11
  • 9
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 205
  • 52
  • 25
  • 21
  • 20
  • 19
  • 18
  • 18
  • 17
  • 17
  • 17
  • 15
  • 15
  • 15
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Improvement Strategies in Construction Sites : Development of Rapid Site Assessment for House-building Industry

Urban, Pontus January 2019 (has links)
The construction industry has deteriorated during the past 40 years. Up to 35 % of the production cost is from wastes. The manufacturing industry has had an opposite development, in many cases owing to the contributions of Lean Production and various assessment tools. The assessment tools evaluate manufacturing plants regarding their implementation of Lean, where from improvement strategies can be developed. The goal of the master thesis was to develop an assessment tool that could be used for evaluating Lean construction, which is emerging in the business. The assessment tool is called Rapid Site Assessment (RSA). The foundation of the RSA is the Rapid Plant Assessment (RPA) which is performed by taking a brief plant tour, in a team of expert researchers. 20 polar questions are coupled to eleven categories, evaluated to identify the plants potential and develop an improvement strategy. Five more assessment tools have been combined with the RPA and validated with Lean Construction and Lean references. The master thesis has been exploratory with a deductive approach, where qualitatively data was acquired. The assessment tool based on the literature review was tested at six different house- building sites. Validity has been obtained by triangulation, a reviewing supervisor, and six different site tests. Reliability was guaranteed by distinguishing the line of work with help of an experienced supervisor, meticulous documentation, and regular guidance meetings. The result is the RSA consisting of 32 statements coupled to eleven categories: customer satisfaction; safety, environment, cleanliness and order; visual management; scheduling system; levels of inventory, use of space, and movement of material; teamwork and motivation; Condition and maintenance of equipment and tools; management of complexity and variability; supply chain integration; commitment to quality; commitment to continuous improvements. The six site tests revealed that the house-building industry has development potential. The interviews and the RSA evaluations were generally similar. The analysis showed that the RSA tests grasped the sites but was not sufficiently rich for a complete understanding. The assessment needed to be developed, and additional interviews were added to the assessment tool. The categories were mostly relevant, but interviews needed to be added to decrease biases, though this would include the interpretations of more individuals in the project. Comparing different professions perceptions would increase credibility. This could solve the issue that most data were gathered by communication with few employees on site, and not observations. Further, some statements also suited to many categories and could be broken up. The master thesis was thoroughly planned but some issues needed to be discussed. The thesis was independently performed, and the assessor was inexperienced in plants and construction sites which aggravated the assessments. The issues were solved by experience feedback from the research group and supervisor. Finally, the RPA was considered repetitive, resulting in a repetitive RSA, but this was not considered a problem though the data was analysed differently in the categories. However, the repetitiveness could aggravate performing an efficient report, which could decrease the readers creditability comprehension. In the future the RSA should be developed for different types of construction projects, roadworks and industries etc, and tested by other researchers to increase credibility. The master thesis demonstrated that the RSA could be developed by combining assessment tools, although it could not be performed in a brief tour. By adding interviews, credible improvement strategies can probably be developed from the RSA.
82

Modular Exponentiation on Reconfigurable Hardware

Blum, Thomas 03 September 1999 (has links)
"It is widely recognized that security issues will play a crucial role in the majority of future computer and communication systems. A central tool for achieving system security are cryptographic algorithms. For performance as well as for physical security reasons, it is often advantageous to realize cryptographic algorithms in hardware. In order to overcome the well-known drawback of reduced flexibility that is associated with traditional ASIC solutions, this contribution proposes arithmetic architectures which are optimized for modern field programmable gate arrays (FPGAs). The proposed architectures perform modular exponentiation with very long integers. This operation is at the heart of many practical public-key algorithms such as RSA and discrete logarithm schemes. We combine two versions of Montgomery modular multiplication algorithm with new systolic array designs which are well suited for FPGA realizations. The first one is based on a radix of two and is capable of processing a variable number of bits per array cell leading to a low cost design. The second design uses a radix of sixteen, resulting in a speed-up of a factor three at the cost of more used resources. The designs are flexible, allowing any choice of operand and modulus. Unlike previous approaches, we systematically implement and compare several versions of our new architecture for different bit lengths. We provide absolute area and timing measures for each architecture on Xilinx XC4000 series FPGAs. As a first practical result we show that it is possible to implement modular exponentiation at secure bit lengths on a single commercially available FPGA. Secondly we present faster processing times than previously reported. The Diffie-Hellman key exchange scheme with a modulus of 1024 bits and an exponent of 160 bits is computed in 1.9 ms. Our fastest design computes a 1024 bit RSA decryption in 3.1 ms when the Chinese remainder theorem is applied. These times are more than ten times faster than any reported software implementation. They also outperform most of the hardware-implementations presented in technical literature."
83

Analýza útoků na asymetrické kryptosystémy / Analysis of attacks on asymmetric cryptosystems

Tvaroh, Tomáš January 2011 (has links)
This thesis analyzes various attacks on underlying computational problem of asymmetric cryptosystems. First part introduces two of the most used problems asymmetric cryptography is based on, which are integer factorization and computation of discrete logarithm. Algorithms for solving these problems are described and for each of them there is a discussion about when the use of this particular algorithm is appropriate and when it isn't. In the next part computational problems are related to algorithms RSA and ECC and it is shown, how solving the underlying problem enables us to crack the cypher. As a part of this thesis an application was developed that measures the efficiency of described attacks and by providing easy-to-understand enumeration of algorithm's steps it can be used to demonstrate how the attack works. Based on the results of performed analysis, most secure asymmetric cryptosystem is selected along with some recommendations regarding key pair generation.
84

MODERN CRYPTOGRAPHY

Lopez, Samuel 01 June 2018 (has links)
We live in an age where we willingly provide our social security number, credit card information, home address and countless other sensitive information over the Internet. Whether you are buying a phone case from Amazon, sending in an on-line job application, or logging into your on-line bank account, you trust that the sensitive data you enter is secure. As our technology and computing power become more sophisticated, so do the tools used by potential hackers to our information. In this paper, the underlying mathematics within ciphers will be looked at to understand the security of modern ciphers. An extremely important algorithm in today's practice is the Advanced Encryption Standard (AES), which is used by our very own National Security Agency (NSA) for data up to TOP SECRET. Another frequently used cipher is the RSA cryptosystem. Its security is based on the concept of prime factorization, and the fact that it is a hard problem to prime factorize huge numbers, numbers on the scale of 2^{2048} or larger. Cryptanalysis, the study of breaking ciphers, will also be studied in this paper. Understanding effective attacks leads to understanding the construction of these very secure ciphers.
85

Utvärdering av produkter för säker autentisering i Windowsmiljö / Evaluation of secure authentication products in a Windows environment

Backman, Mattias January 2004 (has links)
<p>In this report hardware based alternatives to password authentication in a Windows domain are evaluated for the needs of a certain company. In order to investigate the demands on such alternatives interviews with people concerned have been carried out. The demands which resulted from the interviews have been used to select types of hardware tokens for evaluation. Two products which offer authentication with smart cards and USB tokens have been selected and closer evaluated. These are RSA Passage which offers both hardware options and Rainbow iKey which uses USB tokens. Both products are evaluated based on the demands and additional evaluation criteria. The information from the evaluations is used to compare the products.</p>
86

Wear and Fixation of the acetabular component : in vivo evaluation of different polyethylenes and modes of fixation in total hip arthroplasty / Verschleiβ und Verankerung der Pfanne von Hüftendoprothesen : In vivo Beurteilung von unterschiedlichen Polyethylenen und Fixationsarten

Röhrl, Stephan Maximilian January 2004 (has links)
Polyethylene wear and micromotion of the implant play an important role in multifactorial etiology of osteolysis leading to aseptic loosening of the acetabular components. Despite excellent results in primary total hip arthoplasty in a 10-15 year perspective there are still unsolved problems. The weakest link is the longevity of the actabular component. Young and active patients have a clearly worse outcome than older patients. Consequences of polyehtylene wear and ways to reduce wear have therefore been in focus during recent years. Radiostereometry (RSA) is the golden standard in measuring in vivo micromotions. In 4 clinical studies including 332 patients we used therefore RSA to record the efficacy of fixation of cemented and uncemented cups. The amount of wear of old and newly designed polyethylenes (PE) was related to cup stability and radiological and clinical measures of outcome. This study showed that cementless cups inserted with pressfit technique do not need additional augmentation. Screws and pegs increase the risk for radiolucencies and osteolystic lesions but are helpful tools in cases where primary stability is jeopardized. In the second decade clinically silent osteolysis is common for the porous coated Harris Galante cup with unsealed screw holes. The locking mechanism of the PE liner in this cup is unsatisfactory and an increase of liner dissociations is expected. EtO sterilized PE displayed high in vivo wear and we do not recommend its continued use but close monitoring of patients with earlier inserted EtO sterilized implants. The substantially reduced wear in cemented highly cross-linked PE cups without any negative in vivo tradeoffs might have a substantial impact on choice of material and operating technique in the near future. However, we still recommend its restrained use in controlled series until longer follow-up data is available. Nevertheless, the short term in vivo results of modern highly cross-linked PE look promising and ight improve the outcome of cemented and uncemented hip arthroplasties by reducing complication and revisions.
87

Form and Finish of Implants in Uncemented Hip Arthroplasty : Effects of Different Shapes and Surface Treatments on Implant Stability

Lazarinis, Stergios January 2013 (has links)
The design of an uncemented hip arthroplasty implant affects its long-term survival. Characteristics such as the form and the finish of the implant are crucial in order to achieve the best possible conditions for long-term implant survival. In this thesis we hypothesized that different shapes of stems and cups used in primary and revision total hip arthroplasty (THA), and their finish with hydroxyapatite (HA) coating affect implant stability and thus long-term survival. In 2 prospective cohort studies the clinical outcome, the stability measured with radiostereometric analysis (RSA), and the periprosthetic changes in bone mineral density (BMD) measured with dual-energy x-ray absorptiometry (DXA) were investigated in 2 uncemented THA implants – the CFP stem and the TOP cup. In 3 register studies the effect of HA coating on uncemented THA implants used in primary and revision arthroplasty was investigated. Both implants investigated in the prospective cohort studies showed an excellent short-term clinical outcome with good primary stability, but neither their novel form nor the finish with HA protected the implants from the proximal periprosthetic demineralization that usually occurs around other uncemented THA implants. The register studies revealed that HA coating on cups used in primary and revision THA is a risk factor for subsequent revision of the implant. The use of HA coating on the stem in primary THA did not affect long-term survival. Additionally, the shape of an implant plays a crucial role for implant stability and survival. In conclusion, this thesis highlights that the finish of implants with HA coating does not prevent periprosthetic proximal femoral bone loss and can even enhance the risk of revision of both primary and secondary cups. Importantly, the shape of uncemented THA implants affect their stability, showing that the implant form is a crucial factor for the long-term survival.
88

Osteoarthritis of the Hip and Uncemented Total Hip Arthroplasty : Effects of Immediate Weight Bearing on Implant Stability, Bone Mineral Density, and Body Composition

Wolf, Olof January 2010 (has links)
The initial recommendation for the postoperative regime after uncemented total hip arthroplasty (THA) was 6-12 weeks of partial weight bearing (PWB) to obtain a stable implant position during bone ingrowth. In recent years patients with uncemented THA have increasingly practiced full weight bearing (FWB) after surgery, which has largely been based on clinical experience rather than on scientific evidence. The aim of this thesis was to investigate the effects of FWB versus PWB for 3 months on the stability of the implants and on bone mineral density (BMD), as well as body composition (BC) of the lower extremities. We used radiostereometric analysis (RSA) to measure implant micromotion and dual X-ray absorptiometry (DXA) to measure BMD and BC. Forty-six patients with strictly unilateral osteoarthritis of the hip (OAH) received uncemented THA. These patients were then randomized to the FWB or PWB groups and followed for 5 years. In a preoperative cross-sectional study the BMD of the hip and heel were compared between the OAH-affected side and the healthy side. The study showed an increase of BMD at the femoral neck and a decrease at the total hip and trochanter. The results of a RSA study of cup stability showed that there might be minimal movement in medial and proximal directions during the first postoperative week. These results indicate that the RSA baseline investigation of uncemented cups should be performed as early as possible after the first postoperative day. FWB had no adverse effects on the stability of the uncemented press-fit cups or the uncemented cementless Spotorno (CLS) femoral stems after a 5-year follow-up. There was no difference in periprosthetic BMD around the CLS stem regardless of the postoperative weight bearing regime. All zones around the femoral stem indicated a recovery in BMD toward baselines, except the calcar region, which showed progressive loss in BMD to -22% at 5 years post-surgery. FWB had no effect on the changes in BC after surgery. In conclusion, FWB is safe in uncemented THA in terms of stability, BMD and BC. Furthermore, THA apparently counteracts age-related changes in BC but not in BMD.
89

Energy-Efficient Multiple-Word Montgomery Modular Multiplier

Chen, Chia-Wen 25 July 2012 (has links)
Nowadays, Internet plays an indispensable role in human lives. People use Internet to search information, transmit data, download ?le, and so on. The data transformed to the composed digital signal by ¡¦0¡¦ and ¡¦1¡¦ are transmitted on Internet . However, Internet is open and unreliable, data may be stolen from the other people if they are not encrypted. In order to ensure the security and secret of data, the cryptosystem is very important. RSA is a famous public-key cryptosystem, and it has easy concept and high security. It needs a lot of modular exponentiations while encryption or decryption. The key length of RSA is always larger than 1024 bits to ensure the high security. In order to achieve real time transmission, we have to speed up the RSA cryptosystem. Therefore, it must be implemented on hardware. In RSA cryptosystem, modular exponentiation is the only operation. Modular exponentiation is based on modular multiplications. Montgomery¡¦s Algorithm used simple additions and shifts to implement the complex modular multiplication. Because the key length is usually larger than 1024 bits, some signals have a lot of fan-outs in hardware architecture. Therefore, the signals have to connect buffers to achieve enough driving ability. But, it may lead to longer delay time and more power consumption. So, Tenca et al. proposed a Multiple Word Montgomery Algorithm to improve the problem of fan-out. Recently, Huang et al. proposed an algorithm which can reduce data dependency of Tenca¡¦s algorithm. This research is based on the architecture of Huang¡¦s algorithm and detects the redundant operations. Then, we block the unnecessary signals to reduce the switch activities. Besides, we use low power shift register to reduce the power consumption of shift register. Experimental results show that our design is useful on decreasing power consumption.
90

A Study on Children and School Pedestrians’ Safety in

Akgul, Veysel Dogan January 2008 (has links)
<p>Child pedestrian safety is one of the biggest safety issues regarding planning of a well arranged urban traffic. The fact that vulnerable road users suffer most from traffic incidents also raises concern for children. Children need special care while considering traffic safety. The factors are various that they differ from adults by many aspects. For their physically smaller size, immature ability to judge the traffic situations, lack of experience about traffic and mental deficiencies like losing concentration after short periods, they are much more susceptible to the traffic hazards than adults. Various studies have been carried and many applications regarding child and school pedestrian safety worldwide and the most hazardous periods were found as afternoon hours. Age factor generally is flexible but as the child grows older, mobility increases and risks become larger. The risk factors also include the social and economical environment that children living in good life standards suffer less than those are not. Education is also crucial on adopting the sense of road safety on children’s perspective. Simulation based studies have proved to be effective in order to draw child’s attention to the subject, however it should be combined with field trips to gain a more realistic and solid idea about the matter. Besides, engineering measures rise up as another milestone where roadside and land use planning is important. Traffic calming measures have proved to be effective to warn road users and thus form a safer traffic environment for children. Special applications for school zones such as flashing lights, narrowed crossways or 30km/h areas have been effective. The case study concerns the evaluation of child pedestrian safety in the vicinities of various accidents previously happened in Norrköping. Two methods were used to examine the degree of safety for the places of incidents. For locations near an intersection, road safety audit and traffic conflicts technique were applied, while, for the incident points along streets, only road safety audit technique was used. It is stated that, because of the multivariable aspect of the problem, collective application of various safety evaluation solutions would give better idea on the risk of the location and possible improvements for the future.</p>

Page generated in 0.0523 seconds