• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 5
  • 1
  • 1
  • Tagged with
  • 18
  • 18
  • 9
  • 6
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Information warfare targeting : people and processes /

Wang, Kenny NMN. January 2003 (has links) (PDF)
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, December 2003. / Thesis advisor(s): Dan C. Boger, Raymond Buettner. Includes bibliographical references (p. 49-52). Also available online.
2

Computerized system control 2 implementing hierarchical levels and man-computer interactive decision-making in an experimental control system.

Edström, Anders, January 1900 (has links)
Akademisk avhandling--Handelshögskolan i Göteborg. / Extra t.p. with thesis statement inserted. Bibliography: p. 46-47.
3

Integrating participatory GIS and political ecology to study flood vulnerability in the Limpopo Province of South Africa

Nethengwe, Nthaduleni S. January 1900 (has links)
Thesis (Ph. D.)--West Virginia University, 2007. / Title from document title page. Document formatted into pages; contains xv, 227 p. : ill. (some col.), col. maps. Includes abstract. Includes bibliographical references (p. 194-211).
4

IPv6 tactical network management

Dobrydney, John F. January 2009 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Bordetsky, Alex. "September 2009." Description based on title screen as viewed on November 9, 2009. Author(s) subject terms: IP, tactical sensor network, TNT, Internet Protocol Version 6, network management, quality of service, DiffServ, information management. Includes bibliographical references (p. 197-202). Also available in print.
5

Comparisons of attacks on honeypots with those on real networks

Duong, Binh T. January 2006 (has links) (PDF)
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2006. / Thesis Advisor(s): Neil C. Rowe. "March 2006." Includes bibliographical references (p. 55-56). Also available online.
6

Telekomunikacijų tinklais perduodamos informacijos kontrolė baudžiamajame procese: teoriniai ir praktiniai aspektai / Control of information transmitted by the telecommunications networks in criminal procedure: theoretical and practical aspects

Buckutė, Dalia 03 January 2007 (has links)
Lietuvos valstybei atgavus nepriklausomybę, keitėsi ir Lietuvos Respublikos teisės sistema, kuri turėjo atitikti pakitusius socialinius, ekonominius ir politinius šalies poreikius. Siekiant apsaugoti kiekvieno žmogaus teises ir pagrindines laisves, buvo būtina įstatymiškai aiškiai ir konkrečiai sureglamentuoti telekomunikacijų tinklais perduodamos informacijos kontrolę, bei įrašų darymą tiek operatyvinėje veikloje, tiek baudžiamajame procese. Nuo 2003 m. gegužės 01 d. Lietuvoje pradėjo galioti naujas Baudžiamojo proceso kodeksas, kuris daugumos teisininkų atitinka demokratinėje Europoje priimtus teisės principus, o taip pat ir žmogaus teisių ir pagrindinių laisvių apsaugos srityje. Tačiau telekomunikacijų tinklais perduodama informacija gali būti kontroliuojama ne tik remiantis BPK, bet ir vykdant operatyvinę veiklą, remiantis operatyvinės veiklos įstatymu. / After receiving the independence of Lithuania, has been changed and Lithuanian low system, which must be in keeping with changed social, economical and political country needs. Trying to protect the rights and the main liberties of every person, it was necessary to regulate the control of information transmitted by telecommunication networks and making records in operative activity and in criminal code. Since May 1st, 2003 a new code started being in force in Lithuania. In opinion of the majority of lawyers this code corresponds to the law principles accepted in democratic Europe, also in the sphere of human rights and protection of the main liberties. However the control of information transmitted by telecommunication networks in Lithuania is possible not only by Code on Criminal Procedure, but also might be regulated by Law on Operational Activities. In this work is paid a considerable attention to an establishment of the ratio of the means of proceedings compulsion provided in the Code on Criminal Procedure of Republic of Lithuania and the methods of the operational activities consolidated in the Law on Operational Activities. An importance of the notion used in the Criminal Proceedings Code of Republic of Lithuania in a definition of separate means of proceeding compulsion as well as necessity of an establishment of the limits of application of compulsion are stressed. Also are discussed contradictions of regulations of control of information transmitted by the... [to full text]
7

Analyzing the effects of Network Centric Warfare on warfighter empowerment /

Williamson, Ahmed T. January 2002 (has links) (PDF)
Thesis (M.S. in Leadership and Human Resource Development)--Naval Postgraduate School, June 2002. / AD-A405 963. Thesis advisor(s): Susan Hocevar, William Kemple. Includes bibliographical references (p. 157-160). Also available online.
8

Model based synchronization of monitoring and control systems /

Storoshchuk, Orest Lev. Poehlman, William Frederick Skipper. January 2003 (has links)
Thesis (Ph.D.)--McMaster University, 2003. / Advisor: W. Poehlman. Includes bibliographical references (p. 273-290). Also available via World Wide Web.
9

Metodos de construção de codigos quanticos CSS e conexões entre codigos quanticos e matroides / Construction methods of CSS quantum codes and relationships between quantum codes and matroids

La Guardia, Giuliano Gadioli 07 December 2008 (has links)
Orientadores: Reginaldo Palazzo Junior, Carlile Campos Lavor / Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação / Made available in DSpace on 2018-08-11T22:44:54Z (GMT). No. of bitstreams: 1 LaGuardia_GiulianoGadioli_D.pdf: 1126065 bytes, checksum: c3ad65915db4e87e1752adbbbbef2841 (MD5) Previous issue date: 2008 / Resumo: Como principais contribuições desta tese, apresentamos novos métodos de construção que geram novas famílias de códigos quânticos CSS. As construções são baseadas em códigos cíclicos (clássicos) BCH, Reed-Solomon, Reed-Muller, Resíduos quadráticos e também nos códigos derivados do produto tensorial de dois códigos Reed-Solomon. Os principais códigos quânticos construídos neste trabalho, em termos de parâmetros, são os derivados dos códigos BCH clássicos. Além disso, estudamos as condições necessárias para analisar as situações nas quais os códigos cíclicos quânticos (clássicos) são códigos MDS (do inglês, Maximum- Distance-Separable codes). Apresentamos, também, novas conexões entre a teoria de matróides e a teoria dos códigos quânticos CSS, que acreditamos serem as primeiras conexões entre tais teorias. Mais especificamente, demonstramos que a função enumeradora de pesos de um código quântico CSS é uma avaliação do polinômio de Tutte da soma direta dos matróides originados a partir dos códigos clássicos utilizados na construção CSS. / Abstract: This thesis proposes, as the main contributions, constructions method of new families of quantum CSS codes. These constructions are based on classical cyclic codes of the types BCH, Reed-Solomon, Reed-Muller, Quadratic Residue and also are based on product codes of classical Reed-Solomon codes. The main family of quantum codes constructed in this work, i. e., quantum codes having better parameters, are the ones derived from classical BCH codes. Moreover, we present some new conditions in which quantum CSS cyclic codes are quantumMDS codes. In addition, we provide the elements to connect matroid theory and quantum coding theory. More specifically, we show that the weight enumerator of a CSS quantum code is equivalent to evaluating the Tutte polynomial of the direct sum of the matroid associated to the classical codes used in the CSS construction. / Doutorado / Telecomunicações e Telemática / Doutor em Engenharia Elétrica
10

STUDY ON INFORMATION THEORY: CONNECTION TO CONTROL THEORY, APPROACH AND ANALYSIS FOR COMPUTATION

Theeranaew, Wanchat 09 February 2015 (has links)
No description available.

Page generated in 0.1461 seconds