• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 14
  • 11
  • 7
  • 6
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 56
  • 11
  • 10
  • 8
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Exécution sécurisée de code sur systèmes embarqués / Trustworthy code execution on embedded devices

Perito, Daniele 13 October 2011 (has links)
Les systèmes embarqués sont utilisés dans de nombreux systèmes critiques, depuis les automobiles jusqu'aux les systèmes de contrôle industriels. La plupart des recherches sur ces systèmes embarqués se sont concentrés sur l'amélioration de leur fiabilité face à des fautes ou erreurs de fonctionnent non intentionnelles, moins de travaux on été réalisés considérant les attaques intentionnelles. Ces systèmes embarqués sont de plus en plus connectés, souvent à Internet, via des réseaux sans fils, par exemple pour leur administration à distance. Cela augmente les risques d'attaques à distance ou d'injection de code malicieux. Les fautes de fonctionnement de ces équipements peuvent causer des dommages physiques comme par example rendre des appareils médicaux dangereux. Par conséquent, il est primordial de protéger ces systèmes embarqués contre les attaques. Dans cette thèse nous présentons des attaques et défenses contre les systèmes embarqués contraints. Nous présentons plusieurs attaques contre des techniques d'attestation logicielle utilisées dans les systèmes embarqués. Puis nous présentons la conception et l'implémentation d'une technique d'attestation logicielle qui est résistante aux attaque présentées précédemment. Finalement, nous présentons la conception d'une solution permettant de réaliser l'attestation de code ainsi que la création d'une racine de confiance dynamique (dynamic root of trust) pour les systèmes embarqués. Cette solution est prouvée sure et ne dépend pas d'assomptions fortes faites dans le cas de l'attestation logicielle. / Embedded devices are currently used in many critical systems, ranging from automotive to medical devices and industrial control systems. Most of the research on such devices has focused on improving their reliability against unintentional failures, while fewer efforts have been spent to prevent intentional and malicious attacks. These devices are increasingly being connected via wireless and connected to the Internet for remote administration, this increases the risk of remote exploits and malicious code injected in such devices. Failures in such devices might cause physical damage and health and safety risks. Therefore, protecting embedded devices from attacks is of the utmost importance. In this thesis we present novel attacks and defenses against low-end embedded devices. We present several attacks against software-based attestation techniques used in embedded devices. Furthermore we design and implement a novel software-based attestation technique that is immune to the aforementioned attacks. Finally, we design a hardware solution to attest and establish a dyna
42

Development of Design Guidelines for CIP Joint Connections with U-bar Reinforcement

Hanks, Richard Aaron 01 May 2011 (has links)
The interstate highway system is vitally dependent upon current and future bridges. These bridges must be designed economically to continue the serviceability with limited maintenance. For precast bridge construction a portion of the design must consider the bridge connections. Some current connections have proved insufficient in serviceability as there is uncontrolled cracking. In other connections there are uncertainties in the calculations (or lack of calculations) which require design guidelines. This thesis presents design recommendations for precast decking u-bar reinforcement in tension which results from negative moment over a pier. Testing results from the University of Tennessee were analyzed to determine the design recommendations. The calculated capacity of the specimens was determined first by strut and tie modeling by AASHTO and ACI, but was shown to be insufficient. Proposed changes to the current calculation of the strut width as specified in AASHTO and ACI STM methods were discussed in order to match the test results. However, strut and tie modeling demonstrated that the design for the lacer bar was inadequate. Since the strut and tie modeling method resulted in an inaccurate lacer bar size, another method was developed. A triangular shape develops from the flow of forces in the connection joint zone; as a result, a free body diagram (FBD) was developed from the concrete triangular shape. This diagram showed how the forces flow in the in-situ joint as well as how they are resisted. A formula was developed from the FBD to determine the capacity of the joint which accurately reflected the capacities from tests. A FBD was also made of the lacer bar utilizing the forces and geometry calculated from the capacity calculations. A computer analysis program was used to determine the forces in the lacer bar. The lacer bar could then be designed since the required forces to resist (moment and shear) were known. A comparison of the strut and tie model to the triangular method led to the conclusion that both can determine the longitudinal reinforcement spacing, joint overlap length, and concrete strength, but only the triangular method can determine a more sufficient lacer bar size.
43

A study of European Monetary Union and Exchange Rate Theory

Wu, Ping-Cheng 19 June 2000 (has links)
After two world wars, the West European Economy goes through serious recession. Through the cold war, the representatives of west European countries, German and France, feel that they must cooperate. Hence, by the bases of economic co-operations, the West Europe starts to integrate their resources and political alliances. From the ¡§Economic Community (EC)¡¨ to ¡§Economic and Monetary Union (EMU)¡¨, most West European countries go through several obstacles, like the Collapse of Bretton Woods System in 1971 and the European Crisis in 1992,¡K¡K, etc. Finally, in 1th, Jan., 1999, 11 countries of European Union establish EMU and expect to take Euro as their single currency formally in 2002. They also establish European Central Bank (ECB) to execute the Euro zone¡¦s single monetary policy. The status of Euro after 1th Jan., 1999 is the purpose of this study. This article tries to use the Exchange Rate decision theories, Purchasing Power Parity (PPP) and Interest Rate parity (IRP), to investigate the relationship between Euro and USD. From several statistical empirical tests, it reveals that the trends of Euro couldn¡¦t correspond with the theoretical wants, ie PPP and IRP can¡¦t catch the trends of Euro. By the outcome of ¡§Sign Test¡¨ and ¡§Wilcoxon Sign-Rank Test¡¨, it can be found obviously that the Euro indeed is undervalued from the establishment to Apr., 2000 if we don¡¦t take the transaction costs into account. As a result of the outcome of empirical finds, the article starts to investigate the reasons why the theoretical values from exchange rate decision theories are not equal with real ones. One is that if the empirical models ignore some important factors which lead to the biases of models¡Fthe other is if Euro is undervalued during this observation periods. From the economic macro-environmental analyses, the article can infer that because of the Kosov Wars, Russian economic reform problems, the increase of short interest rate gap between USD and Euro, the different economic reform paces among member countries of EMU,¡K¡K, etc. result in the main factors of the weak currency - Euro.
44

Simulace průmyslového protokolu CIP / CIP industrial protocol simulation

Molent, Michal January 2020 (has links)
The thesis is about industrial automatic CIP protocol, which belongs to SCADA systems. The first part is focused on basic principles of CIP protocol and on analysis of two protocols (EtherNET/IP and DeviceNet), which are based on CIP protocol. The second part deals with designing scenarios for a simulation. The simulation of one-way communication, two-way communication with help of reads from the console and two-way real time communication between Raspberries PI 3B+. The third part deals with a realization of the simulation, a start-up and a function of predefined scenarios and graphic interface. The fourth part deals with analysis network communication in situations, which occur during a protocol EtherNet/IP simulation.
45

HMI aplikace ve standardu S88 pro čistící stanici v potravinářském průmyslu / HMI application in S88 standard for cleaning station in food industry

Adamec, David January 2010 (has links)
The main theme of this thesis is creating HMI applications for a program written in standard S88 with trying of function control system. The introductory section is devoted to the standard S88 with introduction of the main concepts and description of design control system. Other parts are devoted to the description of the CIP station, a program description and requirements for HMI and introduction of HMI performance. The last part deals with the testing functions of the control system in simulation.
46

CIP Safety / CIP Safety

Šindelek, Milan January 2016 (has links)
This master’s thesis deals with the security machinery using available technologies. It contains a description to assess and reduce the risk of machine design of security measures and their application. In each section are provides descriptions of the standards, using the CIP Safety communication technology, design and implementation security measures of machine at two demonstration learning tasks.
47

Recovery of Cleaning Agents from Food Manufacturing Waste Stream using Novel Filtration Technology

Kim, Woo-Ju January 2021 (has links)
No description available.
48

Simulation of cantilever construction of cable-stayed bridges taking into account time dependent phenomena

Farre Checa, Josep January 2017 (has links)
In the design of cable-stayed bridges, the construction analysis is very important since the worst stresses are usually reached during the construction process. In addition, if the bridge is made of concrete, the effects of time dependent phenomena have great importance. Some commercial software are able to simulate the construction process, but one of their main drawbacks is that they simulate in a backward approach where creep is difficult to analyze. In this thesis a new criterion to define the Objective Service Stage (OSS) is presented which takes the constructive process into account. Tensioning operations are very expensive, so the main goal is to define the pretension forces in the stays such that only one pretension operation is necessary in each stay.  Furthermore, an algorithm has been developed to simulate the construction process of cable-stayed bridges erected by cantilever method. This algorithm includes the creep effects into the structure. The Dischinger simplification, which is explained in this document, has been improved in order to better take into account the loading time and the age of the concrete in every stage. The creep simulation of the algorithm has been validated with some patch tests. The developed algorithm has been implemented in a full scale FEM model adapted from the Giribaile Dam project developed in 1990. In this study case, the new OSS criterion is implemented. Moreover, the axial forces in the stays, the bending moments, and the displacements are analyzed during the construction process and a comparison is carried out between two cases: with and without taking creep into account. With the new OSS criterion, the Objective Service Stage is achieved without taking the creep into account. However the creep effects, which are of huge importance in concrete bridges built by cantilever method, require the definition of an OSS which considers time dependent phenomena.
49

Protein engineering to explore and improve affinity ligands

Linhult, Martin January 2003 (has links)
In order to produce predictable and robust systems forprotein purification and detection, well characterized, small,folded domains descending from bacterial receptors have beenused. These bacterial receptors, staphylococcal protein A (SPA)and streptococcal protein G (SPG), possess high affinity to IgGand / or HSA. They are composed of repetitive units in whicheach one binds the ligand independently. The domains foldindependently and are very stable. Since the domains also havewellknown three-dimensional structures and do not containcysteine residues, they are very suitable as frameworks forfurther protein engineering. Streptococcal protein G (SPG) is a multidomain proteinpresent on the cell surface ofStreptococcus. X-ray crystallography has been used todetermine the binding site of the Ig-binding domain. In thisthesis the region responsible for the HSA affinity of ABD3 hasbeen determined by directed mutagenesis followed by functionaland structural analysis. The analysis shows that the HSAbindinginvolves residues mainly in the second α-helix. Most protein-based affinity chromatography media are verysensitive towards alkaline treatment, which is the preferredmethod for regeneration and removal of contaminants from thepurification devices in industrial applications. Here, aprotein engineering strategy has been used to improve thetolerance to alkaline conditions of different domains fromprotein G, ABD3 and C2. Amino acids known to be susceptibletowards high pH were substituted for less alkali susceptibleresidues. The new, engineered variants of C2 and ABD shownhigher stability towards alkaline pH. Also, very important forthe potential use as affinity ligands, these mutated variantsretained the secondary structure and the affinity to HSA andIgG, respectively. Moreover, dimerization was performed toinvestigate whether a higher binding capacity could be obtainedby multivalency. For ABD, binding studies showed that divalentligands coupled using non-directed chemistry demonstrated anincreased molar binding capacity compared to monovalentligands. In contrast, equal molar binding capacities wereobserved for both types of ligands when using a directed ligandcoupling chemistry involving the introduction and recruitmentof a unique C-terminal cysteine residue. The staphylococcal protein A-derived domain Z is also a wellknown and thoroughly characterized fusion partner widely usedin affinity chromatography systems. This domain is consideredto be relatively tolerant towards alkaline conditions.Nevertheless, it is desirable to further improve the stabilityin order to enable an SPA-based affinity medium to withstandeven longer exposure to the harsh conditions associated withcleaning in place (CIP) procedures. For this purpose adifferent protein engineering strategy was employed. Smallchanges in stability due to the mutations would be difficult toassess. Hence, in order to enable detection of improvementsregarding the alkaline resistance of the Z domain, a by-passmutagenesis strategy was utilized, where a mutated structurallydestabilized variant, Z(F30A) was used as a surrogateframework. All eight asparagines in the domain were exchangedone-by-one. The residues were all shown to have differentimpact on the alkaline tolerance of the domain. By exchangingasparagine 23 for a threonine we were able to remarkablyincrease the stability of the Z(F30A)-domain towards alkalineconditions. Also, when grafting the N23T mutation to the Zscaffold we were able to detect an increased tolerance towardsalkaline treatment compared to the native Z molecule. In allcases, the most sensitive asparagines were found to be locatedin the loops region. In summary, the work presented in this thesis shows theusefulness of protein engineering strategies, both to explorethe importance of different amino acids regarding stability andfunctionality and to improve the characteristics of aprotein. <b>Keywords:</b>binding, affinity, human serum albumin (HSA),albumin-binding domain (ABD), affinity chromatography,deamidation, protein A, stabilization, Z-domain, capacity,protein G, cleaning-in-place (CIP), protein engineering, C2receptor.
50

三次元一般曲線座標系に対するCIP法粘性流解法

高下, 和浩, KOHGE, Kazuhiro, 峯村, 吉泰, MINEMURA, Kiyoshi, 内山, 知実, UCHIYAMA, Tomomi 03 1900 (has links)
No description available.

Page generated in 0.0237 seconds