• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 815
  • 226
  • 1
  • Tagged with
  • 1042
  • 1026
  • 1024
  • 150
  • 124
  • 104
  • 101
  • 90
  • 88
  • 80
  • 79
  • 62
  • 60
  • 59
  • 56
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

Visualizing atmospheric data on a mobile platform

Bragazzi Ihrén, Maximilian, Ingbrant Björs, Henrik January 2017 (has links)
Weather data is important for almost everyone today. Thedaily weather report, home thermometers, and a lot of otherthings affect our every day life. In order to develop betterand more efficient equipment, tools and algorithms, thepeople working with this data need to be able to access it inan easily accessible and easy to read format. In thisresearch, methods of visualizing data on mobile platformsare evaluated based on what researchers in the field wants,since their respective fields might want to use very specificvisualizations. The implementability of these visualizationsare then evaluated, based on the implementations madethroughout this paper. The results show that the researchersknow what they want, and that what they want isimplementable on mobile platforms given some limitationscaused by performance.
192

Wireless vehicle control : A study of the application of 5G

Holm, Rasmus January 2020 (has links)
In this day and age, with highly available and fast networks, many tasks are being performed remotely. However, certain tasks cannot be flawlessly executed remotely, for instance, the tasks performed by professional drivers. Their jobs demand a lot of visual cues, fast actions, and low response times, which is difficult in particular when task execution is performed wirelessly. With the release of 5G, which promises to deliver reliable and rapid response times with URLLC, high bitrates with eMBB, and supports a massive number of devices with mMTC, many companies and researchers are trying to investigate if 5G is an enabler for wireless control of commercial vehicles. This thesis first examines the latency requirements for remote control operations, and then see how 5G can meet those requirements. In this respect, the thesis discovers the latency thresholds without affecting the control performance in a scenario with users operating a small robot. Then, various tests were performed using a trial 5G system to evaluate its performance in terms of latency, video quality, bandwidth, and signal strength. In controlling robot experiments, the results showed that the highest acceptable cycle latency, both for accurate maneuvering and satisfying operator experience, is around 154ms. These results were then used as a benchmark in the tests conducted using a 4G public network and a single-cell 5G network. These tests revealed that 5G could deliver lower latencies, higher bitrates, and similar video quality when compared to 4G. However, it was difficult to retain good signal quality over 5G, especially when roaming in non-line-of-sight propagation areas. This behavior is as expected due to the terminal’s association with a single 5G base station, which can be easily mitigated with denser deployments.
193

Multi-factor Authentication : System proposal and analysis of continuous authentication methods

Fält, Markus January 2020 (has links)
It is common knowledge that the average user has multiple online accounts which all require a password. Some studies have shown that the number password for the average user is around 25. Considering this, one can see that it is unreasonable to expect the average user to have 25 truly unique passwords. Because of this multi-factor authentication could potentially be used to reduce the number of passwords to remember while maintaining and possibly exceeding the security of unique passwords. This thesis therefore, aims to examine continuous authentication methods as well as proposing an authentication system for combining various authentication methods. This was done by developing an authentication system using three different authentication factors. This system used a secret sharing scheme so that the authentication factors could be weighted according to their perceived security. The system also proposes a secure storage method for the secret shares and the feasibility of this is shown. The continuous authentication methods tests were done by testing various machine learning methods on two public datasets. The methods were graded on accuracy and the rate at which the wrong user was accepted. This showed that random forest and decision trees worked well on the particular datasets. Ensemble learning was then tested to see how the two continuous factors performed once combined into a single classifier. This gave an equal error rate of around 5% which is comparable to state-of-the-art methods used for similar datasets.
194

Enhancing Censorship Resistance in the Tor Anonymity Network

Winter, Philipp January 2014 (has links)
Baksidestext The Tor network was originally designed as low-latency anonymity network.However, as the years progressed, Tor earned a reputation as also being a useful tool to circumvent Internet censorship. At times, the network counted 30,000 users only from China. Censors reacted by tightening their grip on the national communication infrastructure. In particular, they developed techniques to prevent people from being able to access the Tor network. This arms race now counts several iterations and no end is in sight. This thesis contributes to a censorship-resistant Tor network in two ways. First, it analyses how existing censorship systems work. In particular, the Great Firewall of China is analysed in order to obtain an understanding of its capabilities as well as to explore circumvention opportunities. Second, this thesis proposes practical countermeasures to circumvent Internet censorship. In particular, it presents a novel network protocol which is resistant to the Great Firewall's active probing attacks.
195

A timing approach to network-based anomaly detection for SCADA systems

Lin, Chih-Yuan January 2020 (has links)
Supervisory Control and Data Acquisition (SCADA) systems control and monitor critical infrastructure in society, such as electricity transmission and distribution systems. Modern SCADA systems are increasingly adopting open architectures, protocols, and standards and being connected to the Internet to enable remote control. A boost in sophisticated attacks against SCADA systems makes SCADA security a pressing issue. An Intrusion Detection System (IDS) is a security countermeasure that monitors a network and tracks unauthenticated activities inside the network. Most commercial IDSs used in general IT systems are signature-based, by which an IDS compares the system behaviors with known attack patterns. Unfortunately, recent attacks against SCADA systems exploit zero-day vulnerabilities in SCADA devices which are undetectable by signature-based IDSs. This thesis aims to enhance SCADA system monitoring by anomaly detection that models normal behaviors and finds deviations from the model. With anomaly detection, zero-day attacks are possible to detect. We focus on modeling the timing attributes of SCADA traffic for two reasons: (1) the timing regularity fits the automation nature of SCADA systems, and (2) the timing information (i.e., arrival time) of a packet is captured and sent by a network driver where an IDS is located. Hence, it’s less prone to intentional manipulation by an attacker, compared to the payload of a packet. This thesis first categorises SCADA traffic into two groups, request-response and spontaneous traffic, and studies data collected in three different protocol formats (Modbus, Siemens S7, and IEC-60870-5-104). The request-response traffic is generated by a polling mechanism. For this type of traffic, we model the inter-arrival times for each command and response pair with a statistical approach. Results presented in this thesis show that request-response traffic exists in several SCADA traffic sets collected from systems with different sizes and settings. The proposed statistical approach for request-response traffic can detect attacks having subtle changes in timing, such as a single packet insertion and TCP prediction for two of the three SCADA protocols studied. The spontaneous traffic is generated by remote terminal units when they see significant changes in measurement values. For this type of traffic, we first use a pattern mining approach to find the timing characteristics of the data. Then, we model the suggested attributes with machine learning approaches and run it on traffic collected in a real power facility. We test our anomaly detection model with two types of attacks. One causes persistent anomalies and another only causes intermittent ones. Our anomaly detector exhibits a 100% detection rate with at most 0.5% false positive rate for the attacks with persistent anomalies. For the attacks with intermittent anomalies, we find our approach effective when (1) the anomalies last for a longer period (over 1 hour), or (2) the original traffic has relatively low volume.
196

Is Green IT Threat to Security? : Assessing the Green IT from Information Assurance and Security Perspective

Umair, Rafia January 2012 (has links)
With rapid growth and pervasive usage of internet and information technology, information assurance and security has become the top most challenging issues for many organizations. Security professionals and experts have been striving hard to protect the computers, information and centralized network system. These security risks increase more when information is held outside the internal computing environment. Additionally, IT industries are recently pushed by environment regulation to reduce the CO2 footprint of information technology system, production and processes lines. According to recent statistics IT industry is responsible of generating 3% of carbon footprint (Frangiskatos, Ghassemian and Diane, 2010) through their massive consumption of energy. One of the solutions to reduce the energy consumption by Information Communication Technology (ICT) is introduction of Green IT solutions such as Virtualization, thin client, cloud computing, paper reduction, on-line communication system, travel reduction and computer recycling. These Green IT efforts have many green benefits and leading a change in IT processes and system for the protection of environment. But the efforts to reduce, energy consumption, efficient utilization of resources and electronic waste (e-waste) and change in IT may put the system and information on risk if “Green IT” initiatives and solutions are not reviewed from an Information Assurance perspective. As a result it can impact the continuity of business and its assets. This thesis provides a literature review on Green IT from information assurance and security perspective. The purpose of thesis is to assess how Green IT could be threat to security. Its key areas of focus on information assurance and security threats and risks in Green IT solutions which are being promoted for environmental protection. Thesis also highlights the vulnerabilities in Green IT solutions. Thesis presents security challenges of Green IT, need to focus, towards the goal of secure Green IT. While thesis does not discuss any specific defense mechanism, it provides a path for future research in this domain. I believe that thesis work points towards an interesting and important area in Green IT security. / <p>Validerat; 20121129 (global_studentproject_submitter)</p>
197

Experiences when choosing BtrFS or ZFS for large storage : A systematic literature review

Sillanpää, Robin January 2021 (has links)
In any computer system a critical part is storage and today´s increasing demand for storage space require a flexible filesystem that offers the required scalability and supply the features that system administrators require to maintain data in safe and error-free way e.g., that data is correct and free from bit rot. Another consideration is that performance is important for the overall experience. Two file systems that are good candidates are Btrfs and ZFS. This work examines articles from 3 databases through a literature review, extract experiences and lessons learned from implementation and use of the two file systems. The literature study indicates an overall positive experience with several benefits. However, most of the articles contained experiences from the implementation and use of ZFS and BtrFS fall into its shadow. The study also tells the importance of thorough research before implementation to weigh the pros and cons.
198

Analysis of a cloud-based system

Ingstorp, Henrik January 2021 (has links)
Processing heavy data is a tough job for small devices, such as smartphones, smartwatches and sometimes even computers. Hence the rise of cloud computing, where powerful devices can be set to perform the computing and send the output back to the unit via an internet connection. This approach for solving the problem comes with some downsides, the main two being lack of resources in the cloud and internet connectivity. In order for a cloud-based system to perform well, the response times need to be good enough to create a satisfactory experience for the user. As a developer, it is not always clear how the system performs and it may perform well in some conditions and worse in others. Hence there is a need to monitor the systems' performance and expose the system to different conditions. One example of a condition can be a temporary overflow of users, slow internet connectivity, or simply too long working times for the process in the cloud leading to a queue of users.\newlineThis thesis will mainly be about the development of an analysis tool that is used in order for developers to monitor how their cloud-based system acts under different conditions. Conditions that are close to actual users' normal behavior but also conditions that are not so common, such as flooding the system with users. The solution is only intended to be used on the specific system it was built for, however, it is easy to change the system being tested but the tests may not be as useful for other systems. The final solution is functional but would need further work in order to be used commercially. It is possible to test systems and render graphs that give information on how well the system performs with the solution acquired from this thesis. With the tool, testers can change parameters and test the system in different conditions that are chosen in the settings for the test. It was considered a working solution and the problem can be solved using the code that is available in the GitHub Repository.
199

Towards Virtual Sensors Via Tensor Completion

Raeeji Yaneh Sari, Noorali January 2021 (has links)
<p>Sensors are being used in many industrial applications for equipment health mon-itoring and anomaly detection. However, sometimes operation and maintenanceof these sensors are costly. Thus companies are interested in reducing the num-ber of required sensors as much as possible. The straightforward solution is tocheck the prediction power of sensors and eliminate those sensors with limitedprediction capabilities. However, this is not an optimal solution because if we dis-card the identified sensors. Their historical data also will not be utilized anymore.However, typically such historical data can help improve the remaining sensors’signal power, and abolishing them does not seem the right solution. Therefore, wepropose the first data-driven approach based on tensor completion for re-utilizingdata of removed sensors, in addition to remaining sensors to create virtual sensors.We applied the proposed method on vibration sensors of high-speed separators,operating with five sensors. The producer company was interested in reducing thesensors to two. But with the aid of tensor completion-based virtual sensors, weshow that we can safely keep only one sensor and use four virtual sensors thatgive almost equal detection power compared to when we keep only two physicalsensors.</p>
200

Development of an Interactive VR Experience for an Art Museum / Utveckling av en interaktiv VR-upplevelse för ett konstmuseum

Enros, Max January 2020 (has links)
In this project, a prototype for a virtual reality museum experience was developed. The virtual environment contains paintings and birds that the user can interact with to display information. A text panel or an image is displayed next to the object the user interacted with. The text or image displayed contains information about the object. A narration of the information can be played for some of the images and text panels. This enhances the experience of the museum compared to looking at an object in the real world. The virtual reality experience allows the museum to be more interactive and fun for the visitors. A few user tests were performed to test the usability of the experience. The tests found a few usability problems that have to be fixed before this experience could be part of a real museum. / I detta projekt utvecklades en prototyp för ett virtual reality museum. Den virtuella miljön innehåller tavlor och fåglar som användaren kan interagera med för att visa information. En textpanel eller en bild visas bredvid objektet som användaren interagerade med. Texten eller bilden som visas innehåller information om objektet. En inspelning av informationen kan spelas upp för några av bilderna och textpanelerna. Detta förbättrar museets upplevelse jämfört med att titta på ett objekt i den verkliga världen. Virtual reality-upplevelsen gör att museet kan vara mer interaktivt och roligt för besökarna. Några användartester genomfördes för att testa upplevelsens användbarhet. Testerna hittade några användbarhetsproblem som måste åtgärdas innan denna upplevelse kan vara en del av ett verkligt museum.

Page generated in 0.0612 seconds