• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 777
  • 215
  • 1
  • Tagged with
  • 993
  • 977
  • 975
  • 139
  • 115
  • 99
  • 98
  • 83
  • 82
  • 74
  • 72
  • 60
  • 57
  • 57
  • 51
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Radio Jamming Detection and Forensics Analysis of Inter-Vehicular Communication Traces

Samadi, Nima, Lupan, Mihail January 2019 (has links)
No description available.
32

Verification and scheduling techniques for real-time embedded systems /

Cortés, Luis Alejandro, January 2005 (has links)
Diss. Linköping : Univ., 2005.
33

Why is security still an issue? : A study comparing developers’ software security awareness to existing vulnerabilities in software applications / Varför är säkerhetshål i mjukvara fortfarande ett problem? : En jämförande studie mellan utvecklares medvetenhet kring mjukvarusäkerhet och existerande sårbarheter i deras mjukvara

Backman, Lars January 2018 (has links)
The need for secure web applications grows ever stronger the more sensitive, personal data makes its’ way onto the Internet. During the last decade, hackers have stolen enormous amounts of data from high profile companies and social institutions. In this paper, we answer the question of why security breaches still occur; Why do programmers write vulnerable code? To answer this question, we conducted a case study on a smaller software development company. By performing penetration tests, surveys and interviews we successfully identified several weaknesses in their product and their way of working, that could lead to security breaches in their application. We also conducted a security awareness assessment and found multiple contributing factors to why these weaknesses occur. Insufficient knowledge, misplaced trust, and inadequate testing policies are some of the reasons why these vulnerabilities appeared in the studied application.
34

Utvärderingsprogram för radomer

Eklund, Olov January 2019 (has links)
Under 1930-talet utvecklades RADAR (Radio Detection and Ranging) av många länder samtidigt och oberoende av varandra. Radarn utvecklades för att kunna upptäcka fientliga objekt, till exempel flygplan. Ett problem var att radarantennen utsätts för väder, vind och andra miljörelaterade påfrestningar. Lösningen till detta problem var att sätta ett skydd ovanpå radarn. Detta skydd kallas för en radom. Radom är en akronym från engelskans radar dome. SAAB Applied Composites AB, ACAB (tidigare GKN Applied Composites AB ) tillverkar och utvecklar bland annat radomer i form av noskoner till flygplan. Radomen fungerar som skydd för radarantennen. För att undersöka radomens radaregenskaper utförs mätningar på radarn med och utan radom. Detta generar en stor mängd mätdata. Examensarbetets syfte är att ta fram ett datorprogram som samlar och behandlar denna mätdata samt presenterar data grafiskt. Programmet som utveklades heter OErep. Examensarbetet har resulterat i ett program OErep som fungerar som ett ramverk för vidare utveckling av ett testprogram för utvärdering av radomemätdata. För detta har C++ använts som programeringsspråk. Arbetet har utförts delvis på Applied Composites AB och delvis på Linköpings Universitet. Avgränsningar I detta examensarbetet behandlas enbart funktionerna Transmission Efficiency, Sidelobe Level och Main Lobe Beam Width. Det finns betydligt fler funktioner som inte behandlats i detta arbete. Syfte Vid mätningar av radomer generas stora mängder mätdata som behandlas på ett semi-manuelt sätt. Syftet med detta examensarbetet är att utveckla ett program som underlättar sammanställning och behandlingen av den insamlade datan.
35

Redesign av nätverk på Brinken : Kartläggning och förbättringsförslag

Marklund, Jonathan, Fredriksson, Erik January 2018 (has links)
Brinkens nätverk har växt över tid genom att flera separata aktörer varit delaktiga i utvecklandet samt underhållet av nätverket. Det faktum att flera entreprenörer har genomfört olika förändringar enligt egna preferenser i Brinkens elnischer, har lett till den situation som återfinns idag. Istället för att på ett enhetligt sätt dokumentera och strukturera befintliga elnischer, har unika lösningar för samma problem tillämpats i de olika skåpen. I 18 av 20 elnischer återfinns dessutom otidsenlig utrustning i form av Token Ring, detta ökar risken för högre felfrekvens och är kostsamt i jämförelse med modern utrustning. Upprätthållandet av god säkerhet har ignorerats till den grad att fyra skåp på Brinken saknar all form av säkerhet. Säkerhet är en väldigt viktig beståndsdel som med alla medel bör hållas intakt för att undvika obehörig åtkomst och sabotage.     I dagsläget saknar stora delar av nätverket redundans i form av alternativa vägar. Enligt nuvarande lösning återfinns det skåp som vid fel orsakar förlorad uppkoppling för både direkt anslutna kontor men även kontor som är anslutna till andra skåp. Det innebär att ett omotiverat stort antal kontor påverkas trots att skåpet de är anslutna till fungerar enligt önskat.   Det arbete som genomförts har innefattat en genomgående dokumentation av hela Brinkens nätverk. Enligt den analys som vi utfört har en rad problem med varierande risknivå detekterats och rangordnats utifrån dess kritiska inverkan på nätverket. Utifrån det material som samlats in genom förstudien har åtgärdsförslag tagits fram för samtliga problem.   Nedanstående grafer visar fördelningen av problemens risknivå samt hur de kommer utvecklas om ingen åtgärd utförs. Ett kritiskt problem upptäcktes i fyra elnischer och allvarliga problem uppdagades vid 65 tillfällen.
36

ON THE USE OF BASE CHOICE STRATEGY FOR TESTING INDUSTRIAL CONTROL SOFTWARE

Eklund, Simon January 2018 (has links)
Testing is one of the most important parts of software development. It is used to ensure that the software is of a certain quality. In many situations it is a time consuming task that is manually performed and error prone. In the last couple of years a wide range of techniques for automated test generation have been explored with the goal of performing more efficient testing both in terms of cost and time. Many of these techniques are using combinatorial methods to explore different combinations of test inputs. Base Choice (BC) is a combinatorial method that has been shown to be efficient and effective at detecting faults. However, it is not very well studied how BC compares to manual testing performed by industrial engineers with experience in software testing. This thesis presents the results of a case study comparing BC testing with manual testing. We investigate the quality of manual tests and tests created using BC strategy in terms of decision coverage, fault detection capability and cost efficiency (in terms of number of test cases). We used recently developed industrial programs written in the IEC 61131-3 FBD language, a popular programming language for embedded software using programmable logic controllers. For generating tests using BC we used the Combinatorial Testing Tool (CTT) developed at M¨alardalen University. The results of this thesis show that manual tests performed significantly better than BC generated tests in terms of achieved decision coverage and fault detection. In average manually written tests achieved 97.38% decision coverage while BC tests suites only achieved 83.10% decision coverage. In fault detection capabilities, manual test suites found in average 88.90% of injected faults compared to 69.53% fault detection by BC generated test suites. We also found that manual tests are slightly shorter in terms of number of tests compared to BC testing. We found that the use of BC is heavily affected by the choice of the base values chosen by the tester. By using more precise base choice values in BC testing may have yielded different results in terms of decision coverage and fault detection.
37

Designing a Scheduler for Cloud-Based FPGAs

Jonsson, Simon January 2018 (has links)
The primary focus of this thesis has been to design a network packet scheduler for the 5G (fifth generation) network at Ericsson in Linköping, Sweden. Network packet scheduler manages in which sequences the packages in a network will be transmitted, and will put them in a queue accordingly. Depending on the requirement for the system different packet schedulers will work in different ways. The scheduler that is designed in this thesis has a timing wheel as its core. The packages will be placed in the timing wheel depending on its final transmission time and will be outputted accordingly. The algorithm will be implemented on an FPGA (Field Programmable gate arrays). The FPGA itself is located in a cloud environment. The platform in which the FPGA is located on is called "Amazon EC2 F1", this platform can be rented with a Linux instance which comes with everything that is necessary to develop a synthesized file for the FPGA. Part of the thesis will discuss the design of the algorithm and how it was customized for a hardware implementation and part of the thesis will describe using the instance environment for development.
38

A Combination method of Fingerprint Positioning and Propagation Model Based localization scheme in 3D Large-Scale Indoor Space

Liu, Jun January 2018 (has links)
To achieve the concrete aim of improving the positioning accuracy for large-scale indoor space in this thesis, we propose a weighted Gaussian and Mean hybrid filter (G-M filter) to obtain the G-M mean of received signal strength indicator (RSSI) measurements, which is implemented by taking the practically experimental measurements of received signal strength indicator and analyzing the characteristics of received signal strength indicator. Meanwhile, various path loss models have been utilized to estimate the separation between the transmitting antenna and the receiver (T-R separation) by calculating the G-M mean of received signal strength indicator, therefore, a dynamic-parameter path loss model has been proposed which can be appropriate to enhance the accuracy of estimated T-R separation and accurately describe the indoor position. Moreover, an improved fingerprint positioning has been proposed as the basic method combined with our tetrahedral trilateration scheme to reduce the positioning error of a large-scale 3D indoor space which can achieve the average localization error of 1.5 meters.
39

Modeling the interactions between tasks and the memory system

Ceballos, Germán January 2017 (has links)
Making computer systems more energy efficient while obtaining the maximum performance possible is key for future developments in engineering, medicine, entertainment, etc. However it has become a difficult task due to the increasing complexity of hardware and software, and their interactions. For example, developers have to deal with deep, multi-level cache hierarchies on modern CPUs, and keep busy thousands of cores in GPUs, which makes the programming process more difficult. To simplify this task, new abstractions and programming models are becoming popular. Their goal is to make applications more scalable and efficient, while still providing the flexibility and portability of old, widely adopted models. One example of this is task-based programming, where simple independent tasks (functions) are delegated to a runtime system which orchestrates their execution. This approach has been successful because the runtime can automatically distribute work across hardware cores and has the potential to minimize data movement and placement (e.g., being aware of the cache hierarchy). To build better runtime systems, it is crucial to understand bottlenecks in the performance of current and future multicore systems. In this thesis, we provide fast, accurate and mathematically-sound models and techniques to understand the execution of task-based applications concerning three key aspects: memory behavior (data locality), scheduling, and performance. With these methods, we lay the groundwork for improving runtime system, providing insight into the interplay between the schedule's behavior, data reuse through the cache hierarchy, and the resulting performance. / UPMARC
40

Quality of Experience Provisioning in Mobile Cloud Computing

Berrios Moron, Jonathan Glenn January 2018 (has links)
No description available.

Page generated in 0.0702 seconds