• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 31
  • 13
  • 8
  • 6
  • 6
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 96
  • 28
  • 26
  • 21
  • 13
  • 12
  • 10
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Περιγραφή και ανάλυση IP TV / IP TV overview and analysis

Φούκος, Γιώργος, Βλάχος, Βασίλης 13 September 2011 (has links)
Το αντικείμενο της παρούσας διπλωματικής εργασίας είναι η περιγραφή και ανάλυση συστημάτων IP TV. Στο 1ο κεφάλαιο παρατίθεται ο ορισμός του IP TV και γίνεται αναφορά στην διαφορά του από το internet TV. Στη συνέχεια παρουσιάζεται η υποδομής ενός IP TV δικτύου, οι εφαρμογές του και οι υπηρεσίες που αυτό μπορεί να παρέχει στους χρήστες. Κατόπιν περιγράφονται τα πλεονεκτήματα της ψηφιακής μετάδοσης σήματος και αναλύονται τα μοντέλα συνεργασίας και διαχείρισης περιεχομένου. Στο 2ο κεφάλαιο εμβαθύνουμε στα ευρυζωνικά δίκτυα και στη διανομή του IP TV και πως αυτή επιτυγχάνεται μέσω διαφόρων τεχνολογιών που εφαρμόζονται σήμερα (πιο συγκεκριμένα το ADSL). Ταυτόχρονα επεξηγούνται οι τεχνολογίες του δικτύου πυρήνα που ακολουθούνται από τους παρόχους και αφορούν - κατά το μεγαλύτερο μέρος τους - στα ενσύρματα δίκτυα καθώς και ποιοί παράγοντες αυτών επηρεάζουν το IP TV. Στο 3ο κεφάλαιο ακολουθεί λεπτομερής τεχνική περιγραφή και ανάλυση των συστημάτων IP TV, των υπηρεσιών τύπου Broadcast και των διαδραστικών υπηρεσιών video κατ’ απαίτηση του συνδρομητή. Εξειδικεύονται τα επιμέρους τμήματα ενός ολοκληρωμένου IP TV συστήματος, παρουσιάζεται το πώς αυτά αλληλεπιδρούν μεταξύ τους αλλά και με το σύνολο του δικτύου. Αναλύεται το δίκτυο ασφαλείας που απαραιτήτως δημιουργείται για να είναι δυνατή η λειτουργία αυτών των συστημάτων και οι τρόποι μετάδοσης του περιεχομένου. Επιπρόσθετα περιγράφεται η τεχνολογία multicasting σε IP TV δίκτυο και η αρχιτεκτονική που απαιτείται για να επιτευχθεί. Στο 4ο κεφάλαιο δίνεται ιδιαίτερη έμφαση στις τεχνικές ασφαλείας που εφαρμόζονται και ειδικότερα στα IP TV Conditional Access και στα συστήματα DRM. Αναλύεται το πώς αυτά υλοποιούνται σε επίπεδο hardware και σε επίπεδο software (λογισμικού) και παρουσιάζονται οι τεχνικές κρυπτογράφησης που ακολουθούνται. Γίνεται αναφορά υβριδικών τέτοιων συστημάτων που περικλείουν μέρος και των 2 προαναφερθέντων τεχνικών και μελετώνται τα συστήματα DRM και πως αυτά υλοποιούνται. Η σημαντική εφαρμογή των IP TV συστημάτων, video on demand (χρήση βίντεο υπηρεσίας κατ’ απαίτηση του χρήστη) αναλύεται στο 5ο κεφάλαιο. Αυτό το κεφάλαιο έχει αφιερωθεί στην συγκεκριμένη υπηρεσία, στο πώς αυτή είναι διαθέσιμη σήμερα εμπορικά, πως κατέστη δυνατή η υλοποίηση της τεχνικά, τα πρωτόκολλα που χρησιμοποιούνται στα εν λόγω δίκτυα. Τέλος (6ο και 7ο κεφάλαιο) παρουσιάζονται λύσεις από παρόχους που δραστηριοποιούνται στον Ελλαδικό χώρο (για τους οποίους υπήρχε διαθέσιμη πληροφορία) και στο 8ο κεφάλαιο παρουσιάζονται οι τεχνικές απαιτήσεις για την υπηρεσία IP TV. / --
22

Design support for eco-efficiency improvements in manufacturing

Litos, Lampros January 2016 (has links)
Eco-efficiency improvements in manufacturing is a controversial subject for researchers, practitioners as well as policy makers. The widely accepted definition of "doing more with less" is not accurate enough to guide the design of improvements that can deliver products in a sustainable way. The outcome of these challenges is evident through significant environmental performance variations across various levels of manufacturing operations. The study is driven by the complexity of manufacturing systems and sought to offer design support for practitioners that aim to improve eco-efficiency. A maturity model has been developed in this work that simulates the influence of manufacturing practices on eco-efficiency. The model takes the form of a maturity grid (PMGE) that overlooks practices at process, management systems and top-management levels and incorporates 15 dimensions of performance overall. Evidence shows that practices tend to evolve from reactive to proactive as manufacturing systems mature and embrace eco- efficiency as a systemic property. It was also found that mature companies achieve improvements in energy and resources by relying on existing internal capabilities. Tools to facilitate research and intervene with practitioners in real-life problems were developed and tested. The researcher combined research findings and tools into a maturity-based method (PMGEM) for eco-efficiency improvements. The method intends to help practitioners plan and design eco- efficiency improvements aligned to existing internal capabilities and adopt a more proactive behaviour to environmental challenges. PMGEM was ultimately applied in two case studies with ultimate goal to help practitioners resolve real-life challenges. The applications were positively commented and encourage further work in this field. The researcher envisages that methods such as PMGEM are deeply needed in manufacturing to support practitioners approach complex concepts such as eco-efficiency. Simplification and decomposition techniques with a clear intended use can facilitate the implementation of ambitious improvement strategies for sustainable development.
23

Digital Rights Management on an IP-based set-top box / Digital Rights Managemnet för en IP-baserad set-top box

Hallbäck, Erik January 2005 (has links)
Digital Rights Management (DRM) is a technology that allows service and content providers to distribute and sell digital content in a secure way. The content is encrypted and packaged with a license that is enforced before playback is allowed. This thesis covers how a DRM system works and gives some cryptographic background. It also shows how Microsoft DRM for Network Devices can be implemented on an ip-based set-top box.
24

Digital rights management of audio distribution in mobile networks

Löytynoja, M. (Mikko) 05 December 2008 (has links)
Abstract Nowadays, content is increasingly in digital form and distributed in the Internet. The ease of making perfect copies of the digital content has created a need to develop a means to protect it. Digital rights management (DRM) relates to systems designed to protect the intellectual property rights of the digital content. The DRM systems try to enable a secure distribution of digital content to the users and to prevent the unauthorized copying, usage, and distribution of the content. This is usually done in practice using encryption and digital watermarking techniques. This thesis concentrates on the problem of protecting and distributing multimedia content securely in mobile environment. The research objectives are: (1) to design an overall DRM architecture which allows an easy content distribution to the user in mobile environment; (2) to develop protection methods that can be used in mobile devices with limited computational capabilities to prevent unauthorized usage of the audio content; (3) to create methods for managing and enforcing the user’s rights and restrictions to the content usage; (4) to study a method for providing the users with an easy access to new digital content and services. The research is carried out by first developing an overall DRM platform to mobile environment. The experimental prototype of the platform is implemented on server side to PC environment and the client runs on a mobile phone. The platform is used to test the functionality and complexity of the content protection methods developed which are based on digital watermarking and encryption techniques. The main results of the thesis are: (1) a DRM platform for mobile devices that supports peer-to-peer networking and license negotiation; (2) audio protection methods utilizing digital watermarking and encryption techniques which support content superdistribution and content preview; (3) methods for counting offline how many times content has been played on the user’s terminal using watermarking and hash chains; (4) a method for adding metadata, such as a web link, into audio content, so that it survives digital to analog to digital transformation and recording with a mobile phone.
25

Innovation inom Digital Rights Management / Innovation within Digital Rights Management

Agushi, Camrie January 2005 (has links)
The thesis deals with the topic of Digital Rights Management (DRM), more specifically the innovation trends within DRM. It is focused on three driving forces of DRM. Firstly, DRM technologies, secondly, DRM standards and thirdly, DRM interoperability. These driving forces are discussed and analyzed in order to explore innovation trends within DRM. In the end, a multi-facetted overview of today’s DRM context is formed. One conclusion is that the aspect of Intellectual Property Rights is considered to be an important indicator of the direction DRM innovation is heading. / Uppsatsen behandlar ämnet Digital Rights Management (DRM), mer specifikt innovationstrenderna inom DRM. Fokus är på tre drivkrafter i DRM. För det första, DRM teknologier, för det andra, DRM standarder, och för det tredje, DRM interoperabilitet. Dessa drivkrafter diskuteras och analyseras för att kunna utforska innovationstrenderna inom DRM. Avslutningsvis formas en multifacetterad översikt av dagens DRM-kontext. En slutsats är att aspekten av Intellectual Property Rights anses vara en viktig indikator av den riktning som DRM innovationen går mot.
26

Le droit à l'interopérabilité : études de droit de la consommation / The right to interoperability : study of consume law

Duponchelle, Marie 09 April 2015 (has links)
L'interopérabilité devrait être officiellement reconnue, aujourd'hui, comme un droit du consommateur : elle répond à ses besoins de maîtriser ses données, ainsi que d'interconnecter ses outils numériques. Ce droit devrait être opposable aux sujets passifs que sont les éditeurs de logiciels et de contenus numériques. Cependant, le corpus juridique actuel, comprenant essentiellement une obligation d'information précontractuelle et une obligation de ne pas faire obstacle à l'interopérabilité, ne permet pas la mise en œuvre effective de ce droit. Il semble donc nécessaire de formuler des propositions de révision des textes existants, dans la préservation d'un équilibre avec la protection du droit d'auteur et des droits voisins. En premier lieu, s'agissant de l'obligation d'information, les modifications doivent viser à la systématisation de l'information précontractuelle relativement à l'interopérabilité logicielle, à la charge des sujets passifs du droit. En second lieu, s'agissant de l'obligation de ne pas faire obstacle à l'interopérabilité, les propositions doivent avoir pour objet l'instauration d'une réelle obligation de faire, relativement à la mise en œuvre de l'interopérabilité, ce selon deux axes : une obligation de recourir à un format ouvert et non protégé de données ; l'établissement d'une responsabilité de plein droit concernant cette obligation de mise en œuvre effective de l'interopérabilité. / Today, interoperability should be formally recognized as a consumers' right: it meets their needs to control their data, and to interconnect their digital tools. This right should be enforceable against publishers of software and digital contents, considered as passive subjects. However, the current legal corpus, which actually only comprises a pre-contractual information requirement and an obligation not to obstruct interoperability, does not allow for an effective implementation of this right. It therefore seems necessary to make proposals for the revision of existing texts, which would preserve a balance with the protection of copyright and related rights. First, with regard to the information requirement, the changes should be aimed at a systematization of pre-contractual information regarding software interoperability, implemented by the passive subjects of law. Second, with regard to the obligation not to obstruct interoperability, proposals must aim at the establishment of a real obligation to act, with respect to the implementation of interoperability, in two ways : a requirement to use open and unprotected data formats ; the establishment of a strict liability to ensure an effective implementation of interoperability.
27

Analýza trhu s elektronickými knihami / Analysis of eBooks Market

Nováková, Marie January 2013 (has links)
The presented thesis analyzes the eBook market. The aim of the thesis is to establish the optimal way of pricing electronic books. The most important entities of book markets are defined, and the utmost stress is put on changes in the entities' role that have been brought about by the coming of eBooks. The thesis is not only limited to the model of sales of eBooks, but also discussed are alternative business models based on the eBook as an object of monetization. The conclusion of the thesis summarizes the findings, and introduces possible trends in the development of the described subject.
28

The Effects of Blocked and Random Word Lists on the Production of False Memories

Williams, Melonie 01 January 2007 (has links) (PDF)
This study separated participants into four different conditions based on a 2 (blocked or random study trials) x 2 (blocked or random test trials) between-subjects design. Using the Deese-Roediger-McDermott (DRM) paradigm the researcher investigated whether or not false memories were produced at the time of study or the time of test. According to the paradigm, participants who view a series of categorical words (mad, fear, hate, rage, temper) are thought to semantically associate critical lures (anger), as a part of the list presented, more frequently than participants who see a string of unrelated terms. The production of false memory is commonly accredited to the priming effect and the relationships among categorical terms. The current study explored whether manipulating blocked versus random word lists had an effect on false memory rates and further examined the conditions under which false memories are produced, in order to gain a better understanding of the phenomenon. Participants' responses were assessed based on their recall under either blocked or random conditions in both the study and test phases. Using measures of recognition and reaction time (RT), the results indicate that false memories are created primarily during original study and not during · the test of recognition. However, although the highest rates of false memories occurred during the blocked-study condition, the fastest reaction times for false memories were seen during blocked-test. These findings can contribute to the theoretical understanding of the origin of false memory. After comparing false memory rates and reaction times, concluding whether or not the mind exclusively produces these memories during the encoding process has yet to be determined.
29

PEER TO PEER DIGITAL RIGHTS MANAGEMENT USING BLOCKCHAIN

Rinaldi, James 01 January 2018 (has links) (PDF)
Content distribution networks deliver content like videos, apps, and music to users through servers deployed in multiple datacenters to increase availability and delivery speed of content. The motivation of this work is to create a content distribution network that maintains a consumer’s rights and access to works they have purchased indefinitely. If a user purchases content from a traditional content distribution network, they lose access to the content when the service is no longer available. The system uses a peer to peer network for content distribution along with a blockchain for digital rights management. This combination may give users indefinite access to purchased works. The system benefits content rights owners because they can sell their content in a lower cost manner by distributing costs among the community of peers.
30

Investigação sobre o estabelecimento de falsas memórias por meio do paradigma da equivalência de estímulos / Investigations on the establishment of false memories through stimulus equivalence paradigm

Aggio, Natalia Maria 18 August 2014 (has links)
Made available in DSpace on 2016-06-02T20:30:09Z (GMT). No. of bitstreams: 1 6278.pdf: 3722087 bytes, checksum: 5d4fe7ef1accdc79a886f6fa9eec0aff (MD5) Previous issue date: 2014-08-18 / Universidade Federal de Minas Gerais / False memories are defined as remembering events that never happened or remember facts in a distorted way. In cognitive psychology this phenomenon has been studied through the Deese-Roediger-McDermott (DRM) paradigm, in witch lists of words semanticaly related are used. In behavior analysis, the paradigm of stimulus equivalence is a proposition to study semantic relations. This doctoral dissertation presents three studies with undergraduate students in witch DRM and the stimulus equivalence paradigms were used in association to investigate false memories. First and second studies aimed to replicate the phenomenon in a experimental situations, using both Paradigms. Difference concentrates in the controlled variables. In Study 1, nonsense words were used as stimuli. Procedure was divided into two phases. Phase 1: formation of three twelve members equivalence classes. Phase 2: verification of false memories using lists based on DRM paradigm. A list with 10 out of the 12 stimuli from each of the three classes was presented (study list). After completing a distracter task a lists composed by all stimuli from previously list (targets), the rest of the stimuli form the classes (critical distractors) and four more nonsense words (non-related distracters) were shown. Participants should indicate witch stimuli were presented on study list. Participant recognized significantly more critical distratctors, compared to non-related stimuli. However, results could be due to the novelty of non-related distractors. In the second study, this variable was controlled. In Study 2, bot phases were presented, but in Phase 1, participants were first taught three four-stimuli equivalence classes in witch one set of stimuli was familiar pictures. Later, three classes with twelve stimuli were taught. Stimuli from the first three classes were used as non-related distractors. Participant did not recognized significantly more critical distratctors, compared to non-related. It is argued that results could be due to a weak relations between stimuli from the equivalence classes. The third study aimed to increase the relations between stimuli and to investigate the effect of including emotional stimuli in equivalence classes, on false memories. Study 2 was replicated and in the twelve-member classes, a set of stimuli was pictures with happiness, angry or neutrality expressions. Only in neutral list critical ditractors were recognized significantly more than non-related distractors. Results indicates list with emotions are less likely to produce false memories. / Falsas memórias são definidas como lembranças de eventos que nunca aconteceram ou lembranças distorcidas de fatos do passado. Na psicologia cognitiva, este fenômeno tem sido estudado por meio do paradigma Deese-Roediger-McDermott (DRM) que utiliza listas com palavras associadas semanticamente. Na análise do comportamento, existe a proposta do estudo de relações semânticas utilizando o paradigma da equivalência de estímulos. A presente tese apresenta três estudos que utilizaram o paradigma DRM e o de equivalência de estímulos no estudo de falsas memórias. O primeiro e o segundo estudos tiveram por objetivo replicar o fenômeno, em situação experimental, utilizando os dois paradigmas. A diferença esteve nas variáveis controladas em ambos os estudos. No Estudo 1 foram utilizadas apenas pseudopalavras como estímulos. O procedimento foi dividido em duas fases. Fase 1: treino para formação de três classes de equivalência compostas por 12 estímulos. Fase 2: teste de falsas memórias. Uma lista era apresentada com alguns dos estímulos das classes formadas na fase anterior (lista de estudo). Após um tarefa distratora, era apresentada uma lista composta por todos os estímulos da lista de estudo (alvos), o restante dos estímulos das classes, que não constavam na lista de estudo (distratores críticos) e mais quatro novos estímulos (distratores não relacionados). Os resultados mostraram reconhecimento significativamente maior dos distratores críticos do que dos não relacionados. Uma variável importante observada foi que os resultados poderiam ser fruto da novidade dos distratores críticos. No segundo estudo essa variável foi controlada. No Estudo 2, as duas fases também estiveram presentes, porém na Fase 1 foram ensinadas, primeiramente, três classes de equivalência com quatro estímulos, em que um dos conjuntos de estímulos era composto por figuras familiares. Em seguida, três classes com 12 estímulos foram ensinadas. Qs estímulos das primeiras classes foram utilizados como distratores não relacionados. Os resultados apontaram que não houve diferenças significativas no reconhecimento dos dois tipos de distratores. Argumenta-se que esse resultado possa ser fruto de um baixo grau de relacionamento entre os estímulos das classes de equivalência. O terceiro estudo pretendeu aumentar a força das relações de equivalência e verificar a influência da utilização de estímulos com conteúdos emocionais nas classes de equivalência na ocorrência de falsas memórias. O estudo 2 foi replicado e, para as classes com 12 estímulos, os estímulos de um dos conjuntos de cada classe eram ou expressões faciais de alegria, ou de raiva, ou de neutralidade. Apenas na lista neutra, os distratores críticos foram mais reconhecidos que os não relacionados. Os resultados indicam que listas com conteúdo emocional são menos sujeitas a falsas memórias.

Page generated in 0.0251 seconds