• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 214
  • 61
  • 44
  • 25
  • 19
  • 14
  • 6
  • 5
  • 3
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 466
  • 113
  • 104
  • 92
  • 74
  • 63
  • 55
  • 52
  • 47
  • 43
  • 41
  • 37
  • 35
  • 35
  • 34
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Decentralized Consensus Control of a Rigid-Body Spacecraft Formation with Communication Delay

Nazari, Morad, Butcher, Eric A., Yucelen, Tansel, Sanyal, Amit K. 04 1900 (has links)
The decentralized consensus control of a formation of rigid-body spacecraft is studied in the framework of geometric mechanics while accounting for a constant communication time delay between spacecraft. The relative position and attitude (relative pose) are represented on the Lie group SE(3) and the communication topology is modeled as a digraph. The consensus problem is converted into a local stabilization problem of the error dynamics associated with the Lie algebra se(3) in the form of linear time-invariant delay differential equations with a single discrete delay in the case of a circular orbit, whereas it is in the form of linear time-periodic delay differential equations in the case of an elliptic orbit, in which the stability may be assessed using infinite-dimensional Floquet theory. The proposed technique is applied to the consensus control of four spacecraft in the vicinity of a Molniya orbit.
22

ROBUST COMMUNICATION IN HETEROGENEOUS AND DISTRIBUTED SYSTEMS

Eriksson, Lennart January 2017 (has links)
This thesis work has aimed to implement a robust communication system for military aircrafts produced by Saab. A big part of the thesis focuses on a comparison study of different possible designs and their impact on the system. From the comparison study a decentralized, Peer to Peer, Publish/Subscribe system was selected for implementation. All publications are sent directly from a publisher to the subscribers without any intermediate forwarding node. This has shown good results in comparison to the previous centralized solution where all data had to pass through a single server node. The new system has one master node that is responsible for registrations of both publishers and subscribers and distribute any necessary information to affected clients. This thesis has shown that the Single Point of Failure that was one of the main issues on the previous design has been removed and the performance of the system has increased as well. The Round Trip Time of a set of messages has shown to be improved up to 70.78%.
23

Privacy Issues in Decentralized Online Social Networks and other Decentralized Systems

Greschbach, Benjamin January 2016 (has links)
Popular Online Social Networks (OSNs), such as Facebook or Twitter, are logically centralized systems. The massive information aggregation of sensitive personal data at the central providers of these services is an inherent threat to the privacy of the users. Leakages of these data collections happen regularly – both intentionally, for example by selling of user data to third parties and unintentionally, for example when outsiders successfully attack a provider. Motivated by this insight, the concept of Decentralized Online Social Networks (DOSNs) has emerged. In these proposed systems, no single, central provider keeps a data collection of all users. Instead, the data is spread out across multiple servers or is distributed completely among user devices that form a peer-to-peer (P2P) network. Encryption is used to enforce access rights of shared content and communication partners ideally connect directly to each other. DOSNs solve one of the biggest privacy concerns of centralized OSNs in a quite forthright way – by getting rid of the central provider. Furthermore, these decentralized systems can be designed to be more immune to censorship than centralized services. But when decentralizing OSNs, two main challenges have to be met: to provide user privacy under a significantly different threat model, and to implement equal usability and functionality without centralized components. In this work we analyze the general privacy-problems in DOSNs, especially those arising from the more exposed metadata in these systems. Furthermore, we suggest three privacy-preserving implementations of standard OSN features, i.e. user authentication via password-login, user search via a knowledge threshold and an event invitation system with fine-grained privacy-settings. These implementations do not rely on a trusted, central provider and are therefore applicable in a DOSN scenario but can be applied in other P2P or low-trust environments as well. Finally, we analyze a concrete attack on a specific decentralized system, the Tor anonymization network, and suggest improvements for mitigating the identified threats. / Populära sociala nätverkstjänster som Facebook och Instagram bygger på en logiskt centraliserad systemarkitektur. Tjänsteleverantörerna har därför tillgång till omfattande ansamlingar av känsliga personuppgifter,vilket innebär en oundviklig risk för integritetskränkningar. Med jämna mellanrum läcks dessa informationsansamlingar till tredje part – antingen när tjänsteleverantören själv säljer eller ger dem tillexterna aktörer, eller när obehöriga får åtkomst till tjänsteleverantörens datasystem. Decentraliserade sociala nätverkstjänster (eng. Decentralized Online Social Networks, DOSNs) är en lovande utveckling för att minska denna risk och för att skydda användarnas personliga information såväl från tjänsteleverantören som från tredje part. Ett vanligt sätt att implementera ett DOSN är genom en icke-hierarkisk nätverksarkitektur (eng. peer-to-peer network) för att undvika att känsliga personuppgifter samlas på ett ställe som är under tjänsteleverantörens kontroll. Kryptering används för att skydda kommunikationen och för att realisera åtkomstkontrollen av information som ska delas med andra användare. Att inte längre ha en tjänsteleverantör som har tillgång till all data innebär att den största riskfaktorn for integritetskränkningar tas bort. Men genom att ersätta den centrala tjänsteleverantören med ett decentraliserat system tar vi även bort ett visst integritetsskydd. Integritetsskyddet var en konsekvens av att förmedlingen av all användarkommunikation skedde genom tjänsteleverantörens servrar. När ansvaret för lagring av innehållet, hantering av behörigheterna, åtkomst och andra administrativa uppgifter övergår till användarna själva, blir det en utmaning att skydda metadata för objekt och informationsflöden, även om innehållet är krypterat. I ett centraliserat system är dessa metadata faktiskt skyddade av tjänsteleverantören – avsiktligt eller som en sidoeffekt. För att implementera de olika funktioner som ska finnas i ett integritetsskyddande DOSN, är det nödvändigt både att lösa dessa generella utmaningar och att hantera frånvaron av en betrodd tjänsteleverantör som har full tillgång till all data. Användarautentiseringen borde till exempel ha samma användbarhet som i centraliserade system. Det vill säga att det är lätt att ändra lösenordet, upphäva rättigheterna för en stulen klientenhet eller återställa ett glömt lösenord med hjälp av e-post eller säkerhetsfrågor – allt utan att förlita sig på en betrodd tredje part. Ett annat exempel är funktionen att kunna söka efter andra användare. Utmaningen där är att skydda användarinformationen samtidigt som det måste vara möjligt att hitta användare baserad på just denna informationen. En implementation av en sådan funktion i ett DOSN måste klara sig utan en betrodd tjänsteleverantör som med tillgång till alla användardata kan upprätthålla ett globalt sökindex. I den här avhandlingen analyserar vi de generella risker för integritetskränkningar som finns i DOSN, särskilt de som orsakas av metadata. Därutöver föreslår vi tre integritetsskyddande implementationer av vanliga funktioner i en social nätverkstjänst: lösenordsbaserad användarautentisering, en användarsökfunktion med en kunskapströskel och en inbjudningsfunktion för evenemang med detaljerade sekretessinställningar. Alla tre implementationerna är lämpliga för DOSN-scenarier eftersom de klarar sig helt utan en betrodd, central tjänsteleverantör, och kan därför även användas i andra sammanhang såsom icke-hierarkiska nätverk eller andra system som måste klara sig utan en betrodd tredje part. Slutligen analyserar vi en attack på ett specifikt decentraliserat system, anonymitetstjänsten Tor, och diskuterar hur systemet kan skyddas mot de analyserade sårbarheterna. / <p>QC 20161115</p>
24

Comparison of Video file transmission : over Dat protocol and Hypertext transfer protocol

Artback, Jonathan January 2019 (has links)
Context. Scalability and bittrate is an large concern when build-ing infrastructure and application for video content delivery. Manyresearch and companies have for a long time looked at peer to peertechnology as a way of solving the issue by utilizing the clients capac-ity.Objectives. The first objectives is to see if Dat protocol would be agood fit for video file delivery. Comparing with the widely used HTTPtoo see the differences in scalability and bitrate. The challenges withimplementing such a solution and tactic for the future if choosing to.Methods. In order to achieve the objectives of our research a compar-ing network experiment in similar manners and with the same clientbase was conducted.Conclusions. The Dat protocol show good scalability and perfor-mance especially on larger number of clients. Some future works suchas peer-selecting and load balancing are needed before Dat can be usedas protocol for video delivery on commerical sites.Keywords:P2P, Decentralized, Video, conten
25

Self-Assembling Decentralized Control Constructs for Large-Scale Variably-Interconnected Systems

Ippolito, Corey A. 01 December 2016 (has links)
There is an emerging need to develop new techniques for control system design that better address the challenges posed by modern large-scale cyber-physical systems. These systems are often massive networks of interconnected and interoperating subsystems that fuse physical processes, embedded computation, automation technologies, and communication. The resulting problems are dimensionally large, exhibit significant time-varying structural variations during operation, and feature complex dynamics, constraints and objectives across local and global-system scales. These properties are difficult to address using traditional control theoretic methods without substantial loss of performance and robustness. To overcome these limitations, this dissertation presents new concepts and methods for control of modern large-scale variably-structured systems through self-assembling and self-configuring control constructs that allow for fundamental restructuring of the control system’s topology in response to the current system structure. We present the System Component Graph (SCG) formulation as a mathematical framework that generalizes and extends directed graph methods from decentralized control. We present algorithms, methods, and metrics for real-time decentralization and control-structure optimization, utilizing the inclusion principle for addressing interconnected overlapping dynamics and optimal linear-quadratic (LQ) methods for local decentralized subsystem control. Global system control and performance is achieved through a centralized planner that provides continuous real-time optimized trajectories as guidance command inputs to each subsystem. We present the method of Random Subcomplement Trees (RST) for pseudo-optimal real-time trajectory planning of large-scale systems which formalizes and extends the method of rapidly-exploring random trees in a control optimization framework. The RST method defines transformations from the higher-dimension state space into an intermediate lower-dimensional search space, where optimal transitions between subspace states are defined. In the context of this approach, the resulting decentralized topology found within the SCG framework provides the RST subspace definition and requisite transformations, and optimal transitions in the search space are found through forward evaluation of the closed-loop decentralized subsystem dynamics. The methods developed in this thesis are applied to a set of real-world problems spanning various domains and demonstrate the application of these methods from first-principle modeling through control system analysis, design, implementation, and evaluation in experimental tests and simulation.
26

Improving Routing Security Using a Decentralized Public Key Distribution Algorithm

Goold, Jeremy C. 13 April 2005 (has links)
Today's society has developed a reliance on networking infrastructures. Health, financial, and many other institutions deploy mission critical and even life critical applications on local networks and the global Internet. The security of this infrastructure has been called into question over the last decade. In particular, the protocols directing traffic through the network have been found to be vulnerable. One such protocol is the Open Shortest Path First (OSPF) protocol. This thesis proposes a security extension to OSPF containing a decentralized certificate authentication scheme (DecentCA) that eliminates the single point of failure/attack present in current OSPF security extensions. An analysis of the security of the DecentCA is performed. Furthermore, an implementation of DecentCA in the Quagga routing software suite is accomplished.
27

Partial nitritation-anammox using pH-controlled aeration in submerged attached growth bioreactors

Shannon, James Murray 01 May 2014 (has links)
No description available.
28

Social Adjustment at a Decentralized EU Institution

Hansson, Johanna, Spinelli Scala, Dan January 2009 (has links)
<p>This study investigates which out of seven predetermined factors influence the social adjustment of expatriates at a decentralized EU institution. Much of the existing literature that deals with expatriate adjustment departs from the assumption that the expatriates are entering an organization which is greatly influenced by the culture and customs of the country in which it is located, and that the expatriate is in minority in terms of nationality. In the decentralized EU institutions on the other hand (1) the culture of the organization and host country are markedly different from each other, and (2) the organization consists of mostly expatriates rather than host country nationals.</p><p>Three sources of data are used; secondary sources, questionnaires and interviews. The results show that all seven factors which were investigated to some extent influenced social adjustment. The unique nature of the decentralized EU institutions could be the reason to why organizational cultural novelty was perceived as more important for interaction adjustment and general cultural novelty more important for general adjustment. The unique nature also could also be the reason to the negative relationship between spouse adjustment and general adjustment, possibly because the expatriate families are more inclined to live in an international "bubble" when both work and social connections are multicultural.</p>
29

An Effective Approach to Nonparametric Quickest Detection and Its Decentralized Realization

Yang, Dayu 01 May 2010 (has links)
This dissertation focuses on the study of nonparametric quickest detection and its decentralized implementation in a distributed environment. Quickest detection schemes are geared toward detecting a change in the state of a data stream or a real-time process. Classical quickest detection schemes invariably assume knowledge of the pre-change and post-change distributions that may not be available in many applications. A distribution free nonparametric quickest detection procedure is presented based on a novel distance measure, referred to as the Q-Q distance calculated from the Quantile-Quantile plot. Theoretical analysis of the distance measure and detection procedure is presented to justify the proposed algorithm and provide performance guarantees. The Q-Q distance based detection procedure presents comparable performance compared to classical parametric detection procedure and better performance than other nonparametric procedures. The proposed procedure is most effective when detecting small changes. As the technology advances, distributed sensing and detection become feasible. Existing decentralized detection approaches are largely parametric. The decentralized realization of Q-Q distance based nonparametric quickest detection scheme is further studied, where data streams are simultaneously collected from multiple channels located distributively to jointly reach a detection decision. Two implementation schemes, binary quickest detection and local decision fusion, are described. Experimental results show that the proposed method has a comparable performance to the benchmark parametric cumulative sum (CUSUM) test in binary detection. Finally the dissertation concludes with a summary of the contributions to the state of the art.
30

Social Adjustment at a Decentralized EU Institution

Hansson, Johanna, Spinelli Scala, Dan January 2009 (has links)
This study investigates which out of seven predetermined factors influence the social adjustment of expatriates at a decentralized EU institution. Much of the existing literature that deals with expatriate adjustment departs from the assumption that the expatriates are entering an organization which is greatly influenced by the culture and customs of the country in which it is located, and that the expatriate is in minority in terms of nationality. In the decentralized EU institutions on the other hand (1) the culture of the organization and host country are markedly different from each other, and (2) the organization consists of mostly expatriates rather than host country nationals. Three sources of data are used; secondary sources, questionnaires and interviews. The results show that all seven factors which were investigated to some extent influenced social adjustment. The unique nature of the decentralized EU institutions could be the reason to why organizational cultural novelty was perceived as more important for interaction adjustment and general cultural novelty more important for general adjustment. The unique nature also could also be the reason to the negative relationship between spouse adjustment and general adjustment, possibly because the expatriate families are more inclined to live in an international "bubble" when both work and social connections are multicultural.

Page generated in 0.089 seconds