• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14
  • 13
  • 6
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 63
  • 16
  • 11
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Subversive women : female performing artists in Zurich Dada /

Weinstein, Katherine. January 1900 (has links)
Thesis (Ph.D.)--Tufts University, 2001. / Adviser: Laurence Senelick. Submitted to the Dept. of Drama. Includes bibliographical references (leaves 177-188). Access restricted to members of the Tufts University community. Also available via the World Wide Web;
42

Návrh laboratorních úloh pro výuku síťových technologií a protokolů / Laboratory exercises explaining network technologies and protocols

Coufal, Tomáš January 2019 (has links)
Diploma thesis deals with creation of laboratory exercises in ns-3 environment. Each one of three exercises consists of theoretical introduction and instructions to carry out the simulation. The first exercise´s topic is routing protocol BGP. The second exercise is focused on transport protocols TCP, UDP, SCTP. In the last exercise, the basic network devices and topologies are simulated. The ARP and RIPv2 protocols are simulated as well.
43

Penetrační testování ANC / Penetration testing of ANC

Dušek, Jakub January 2021 (has links)
This diploma thesis deals with the evaluation of a security solution that was recently deployed by a British company renting office space. This validation system is based on a database of MAC addresses, a database of clients and active filtering of connected devices. The first part explains the concepts of computer network, VLAN and basic concepts needed to understand the function of dynamic assignment of VLAN and IP addresses. The second part is devoted to measurements based on hypotheses, according to which measures are proposed in the last part to solve these security problems.
44

Odolnost komunikační jednotky LAN proti útokům z Internetu / LAN communication unit resistivity against Internet origination attacks

Valach, Michal January 2009 (has links)
This thesis is focused on crypto-module RCM 3700, which is used for encrypted data transmission. Following work analyses basic network protocols and some sort of attacks in Ethernet network. The main goal of these attacks is to collect information and services about the device and to analyze transmitted data. Based on these information attacks can be done more precisely than without them. The main target of these attacks is the denial of particulary service or data abuse. Furthermore, in the diploma thesis configuration of router CISCO 2801 is applied in order to improve the LAN security. The deveploment board, which includes reset function, supplied circuit and interface for RS 232, was designed for crypto-module RCM 3700.
45

Systém pro vzdálené monitorování elektrických veličin / System for Remote Monitoring of Electrical Values

Kvasnička, Pavel January 2012 (has links)
The work deals with the measurement of electrical quantities, distribution of data across the Ethernet network into the Internet and intelligent selection of the required values to be transmitted and stored on a central node. The work describes the communication protocols in scale that is necessary for implementation, discussed the requirements for computational resources and microcontroller control is proposed by flowcharts. Attached are source codes in C programming language for microcontroller and PHP scripts for storing and presenting data on Web server.
46

Synthesis of Cucurbit[7]uril Based Affinity Derivatization Tags and Evaluation of their Use in the Enrichment and Identification of Carbonylated Plasma Proteins

Smith, Ashton K. 02 June 2020 (has links)
No description available.
47

Implementations of Fourier Methods in CFD to Analyze Distortion Transfer and Generation Through a Transonic Fan

Peterson, Marshall Warren 01 June 2016 (has links)
Inlet flow distortion is a non-uniform total pressure, total temperature, or swirl (flow angularity) condition at an aircraft engine inlet. Inlet distortion is a critical consideration in modern fan and compressor design. This is especially true as the industry continues to increase the efficiency and operating range of air breathing gas turbine engines. The focus of this paper is to evaluate the Computational Fluid Dynamics (CFD) Harmonic Balance (HB) solver in STAR-CCM+ as a reduced order method for capturing inlet distortion as well as the associated distortion transfer and generation. New methods for quantitatively describing and analyzing distortion transfer and generation are investigated. The geometry used is the rotor 4 fan geometry, consisting of one rotor and one stator. The inlet boundary condition is a 90-degree sector total pressure distortion profile with total pressure and swirl held constant. Multiple HB simulations with varying mode combinations and distortion intensities are analyzed and compared against full annulus Unsteady Reynolds Averaged Navier-Stokes (URANS) simulations. Best practices and recommendations for the implementation of the HB solver are given. The pre-existing Society of Automotive Engineers Aerospace Recommended Practice (SAE-ARP) 1420b descriptors are demonstrated to be inadequate for the purposes of analyzing distortion transfer and generation on a stage-to-stage basis. New implementations of Fourier methods are presented as an alternative to the SAE-ARP 1420b descriptors. These Fourier descriptors are shown to describe distortion transfer and generation to a higher degree of fidelity than the SAE-ARP 1420b descriptors. These new descriptors are demonstrated on the analysis of full annulus URANS and HB simulations. The HB solver is shown to be capable of capturing distortion transfer, generation and performance degradation. Recommendations for the optimal implementation of the HB method are given.
48

Granskning och optimering av data- och IP-telefoninätverk

Eriksson, Jhonny, Karlsson, Joel January 2010 (has links)
<p>The company Västra Mälardalens Kommunalförbund, VMKF, wishes to revise and optimize their present data and IP-telephony network as of today consists of the three municipalities Köping, Arboga and Kungsör. As a municipal corporation, they seek consultation regarding internal as well as external review and investigation of the main structure of the network, its functionality and safety. By today’s increasing demands of Internet accessibility, availability of services and security far more extends the requirement of a complete network design. The foundation of networking rests on the balance between each of these necessities. Therefore, it is of grave importance to optimize a network design, use of hardware and to minimize the administrative overhead. In particular, when the municipality is short of resources and time means money. By letting an impartial investigation of the network act as a starting point it was established that several improvement could be applied. Among these a reconstructed and improved network topology that includes subjects as routing, switching, safety and security, quality of service and technical administrative overhead and the implementation of a real time monitoring of network bandwidth consumption.</p> / <p>Företaget Västra Mälardalens Kommunalförbund, VMKF, har önskemål om att granska och optimera deras befintliga data- och IP-telefoninätverk som i dagsläget spänner över de tre kommunerna Köping, Arboga och Kungsör. Som ett kommunalägt företag önskar de konsultation rörande intern såväl som extern granskning och optimering av huvuddelen av nätverkets funktionalitet samt säkerhet. I och med dagens ökade Internetanvändning och funktionalitetsbehov ställs allt högre krav på tillgänglighet, säkerhet och användarvänlighet. Nätverksteknik bygger mycket på balansen mellan dessa tre punkter. Därför gäller det att optimera nätverkets design, hårdvaruanvändning och att minimera administrativa laster. Detta i synnerhet då kommunens resurser är knappa och då tid i dagens samhälle innebär pengar. Genom att låta en granskning över nätverket som det ser ut i dag ligga till grund konstaterades att flertalet förbättringsmöjligheter kunde genomföras. Bland dessa återfinns en omstrukturerad nätverksdesign som innefattar routing, switching, säkerhet, QoS och teknisk administration samt implementeringen av en realtidsövervakning av bandbreddsanvändning.</p>
49

Granskning och optimering av data- och IP-telefoninätverk

Eriksson, Jhonny, Karlsson, Joel January 2010 (has links)
The company Västra Mälardalens Kommunalförbund, VMKF, wishes to revise and optimize their present data and IP-telephony network as of today consists of the three municipalities Köping, Arboga and Kungsör. As a municipal corporation, they seek consultation regarding internal as well as external review and investigation of the main structure of the network, its functionality and safety. By today’s increasing demands of Internet accessibility, availability of services and security far more extends the requirement of a complete network design. The foundation of networking rests on the balance between each of these necessities. Therefore, it is of grave importance to optimize a network design, use of hardware and to minimize the administrative overhead. In particular, when the municipality is short of resources and time means money. By letting an impartial investigation of the network act as a starting point it was established that several improvement could be applied. Among these a reconstructed and improved network topology that includes subjects as routing, switching, safety and security, quality of service and technical administrative overhead and the implementation of a real time monitoring of network bandwidth consumption. / Företaget Västra Mälardalens Kommunalförbund, VMKF, har önskemål om att granska och optimera deras befintliga data- och IP-telefoninätverk som i dagsläget spänner över de tre kommunerna Köping, Arboga och Kungsör. Som ett kommunalägt företag önskar de konsultation rörande intern såväl som extern granskning och optimering av huvuddelen av nätverkets funktionalitet samt säkerhet. I och med dagens ökade Internetanvändning och funktionalitetsbehov ställs allt högre krav på tillgänglighet, säkerhet och användarvänlighet. Nätverksteknik bygger mycket på balansen mellan dessa tre punkter. Därför gäller det att optimera nätverkets design, hårdvaruanvändning och att minimera administrativa laster. Detta i synnerhet då kommunens resurser är knappa och då tid i dagens samhälle innebär pengar. Genom att låta en granskning över nätverket som det ser ut i dag ligga till grund konstaterades att flertalet förbättringsmöjligheter kunde genomföras. Bland dessa återfinns en omstrukturerad nätverksdesign som innefattar routing, switching, säkerhet, QoS och teknisk administration samt implementeringen av en realtidsövervakning av bandbreddsanvändning.
50

Entwicklung des Kommunikationsteilsystems für ein objektorientiertes, verteiltes Betriebssystem

Becher, Mike 09 November 1998 (has links)
Thema dieser Arbeit ist die Entwicklung eines Kommunikationsteilsystems fuer das Experimentiersystem CHEOPS zur Ermoeglichung einer Interobjektkommunika- tion zwischen Objekten auf dem gleichen bzw. verschiedenen Systemen. Ausgangspunkte stellen dabei eine verfuegbare Implementation eines Ethernet- Treibers der Kartenfamilie WD80x3 fuer MS-DOS, eine geforderte Kommunikations- moeglichkeit mit UNIX-Prozessen sowie die dort benutzbaren Protokoll-Familien dar. Die Arbeit beschaeftigt sich mit der Analyse und Konzipierung des Ethernet- Treibers sowie der Internet-Protokoll-Familie fuer CHEOPS als auch deren Implementation resultierend in einem minimalen Grundsystem. Weiterhin wird ein erster Entwurf fuer ein spaeter weiterzuentwickelndes bzw. zu vervoll- staendigendes Netz-Interface vorgeschlagen und durch eine Beispiel-Implemen- tierung belegt.

Page generated in 0.0154 seconds