• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 325
  • 78
  • 38
  • 28
  • 21
  • 19
  • 13
  • 12
  • 8
  • 7
  • 6
  • 4
  • 3
  • 3
  • 2
  • Tagged with
  • 666
  • 454
  • 205
  • 177
  • 132
  • 104
  • 101
  • 95
  • 73
  • 65
  • 64
  • 63
  • 60
  • 59
  • 50
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
301

Radar Processing Techniques for Using the LimeSDR Mini as a Short-Range LFM Radar

Stratford, Jacob Scott 18 July 2023 (has links) (PDF)
Drone-mounted ground penetrating radar (GPR) has the capability to investigate terrain that is inaccessible or hazardous to humans. A linear frequency-modulated (LFM) radar with the potential for GPR applications is described based on the LimeSDR Mini software defined radio (SDR). Challenges of the LimeSDR Mini radar include the SDR's lack of support for transmitter-receiver synchronization and high bleedthrough leakage. These issues are overcome through corrective software processing techniques including deconvolution of the SDR's system impulse response and digital feed-through nulling. Feed-through nulling is effective at reducing bleedthrough leakage, achieving a 26 dB reduction in power. Although high noise can confound the identification of targets with small radar cross sections in dynamic environments, the LimeSDR Mini radar is demonstrated to display a moving target across multiple ranges. This research demonstrates the increasing accessibility of SDR radar for drone applications, as the LimeSDR Mini is lightweight and low-cost compared to high-end SDRs typically used in SDR radar.
302

Synthesis and Characterization of Well-Defined, Amphiphilic, Ionic Copolymers

Liu, Yuqing 01 December 2011 (has links)
No description available.
303

Agile, Resilient and Cost-efficient Mobile Backhaul Networks

Yaghoubi, Forough January 2017 (has links)
The exponentially increasing traffic demand for mobile services requires innovative solutions in both access and backhaul segments of 5th generation (5G) mobile networks. Although, heterogeneous networks (HetNets) are a promising solution for the wireless access, the backhaul segment has received considerably less attention and falls short in meeting the stringent requirements of 5G in terms of capacity and availability. HetNets together with mobility requirements motivate the use of microwave backhauling that supports fiber-like capacity with millimeter-wave communications. However, higher carrier frequencies are subject to weather disturbances like rain that may substantially degrade the network throughput. To mitigate this effect, we develop a fast and accurate rain detection algorithm that triggers a network-layer strategy, i.e., rerouting. The results show that with small detection error the network throughput increases while posing small overhead on the network. The rain impact can be alleviated by centralized rerouting under the software defined networking paradigm. However, careless reconfiguration may impose inconsistency that leads to a significant temporary congestion and limits the gain of rerouting. We propose a consistency-aware rerouting framework by considering the cost of reconfiguration. At each time, the centralized controller may either take a rerouting or no-rerouting decision in order to minimize the total data loss. We use a predictive control algorithm to provide such an online sequence of decisions. Compared to the regular rerouting, our proposed approach reduces the throughput loss and substantially decreases the number of reconfigurations. In the thesis we also study which backhaul option is the best from a techno-economic perspective. We develop a comprehensive framework to calculate the total cost of ownership of the backhaul segment and analyze the profitability in terms of cash flow and net present value. The results highlight the importance of selecting proper backhaul solution to increase profitability. / <p>QC 20170308</p>
304

Evolving Expert Knowledge Bases: Applications of Crowdsourcing and Serious Gaming to Advance Knowledge Development for Intelligent Tutoring Systems

Floryan, Mark 01 May 2013 (has links)
This dissertation presents a novel effort to develop ITS technologies that adapt by observing student behavior. In particular, we define an evolving expert knowledge base (EEKB) that structures a domain's information as a set of nodes and the relationships that exist between those nodes. The structure of this model is not the particularly novel aspect of this work, but rather the model's evolving behavior. Past efforts have shown that this model, once created, is useful for providing students with expert feedback as they work within our ITS called Rashi. We present an algorithm that observes groups of students as they work within Rashi, and collects student contributions to form an accurate domain level EEKB. We then present experimentation that simulates more than 15,000 data points of real student interaction and analyzes the quality of the EEKB models that are produced. We discover that EEKB models can be constructed accurately, and with significant efficiency compared to human constructed models of the same form. We are able to make this judgment by comparing our automatically constructed models with similar models that were hand crafted by a small team of domain experts. We also explore several tertiary effects. We focus on the impact that gaming and game mechanics have on various aspects of this model acquisition process. We discuss explicit game mechanics that were implemented in the source ITS from which our data was collected. Students who are given our system with game mechanics contribute higher amounts of data, while also performing higher quality work. Additionally, we define a novel type of game called a knowledge-refinement game (KRG), which motivates subject matter experts (SMEs) to contribute to an already constructed EEKB, but for the purpose of refining the model in areas in which confidence is low. Experimental work with the KRG provides strong evidence that: 1) the quality of the original EEKB was indeed strong, as validated by KRG players, and 2) both the quality and breadth of knowledge within the EEKB are increased when players use the KRG.
305

Cybersecurity of Maritime Communication Systems : Spoofing attacks against AIS and DSC

Forsberg, Joakim January 2022 (has links)
For a long time, ships have relied on navigators that could figure out their course andlocation based on seeing objects around them. However, this approach is limited to thenavigators’ ability, and with the increasing number of ships, this job becomes harder andharder. With these aspects in mind, the new system, the Automatic identification system(AIS), was created as a tool to help navigators to navigate and increase safety on the sea.AIS is an automatic identification system and is designed to send out information aboutthe vessel and its location. This thesis looks at the state of the art of Automatic identifica-tion systems and Digital selective calling systems to evaluate the security aspects of thesesystems. The thesis aims to investigate if these two systems are susceptible to spoofingattacks and what resources are required for creating successful attacks. Two experimentswere used to achieve this aim and answer the research questions. The first one was to eval-uate the Automatic identification system and test different spoofing attacks on that system.The second experiment was to test different spoofing attacks on the Digital selective callingsystem. Both of these experiments used two software-defined radios for the experiments.The experiment results show that some of the attacks tested on the systems were success-ful, and the attacks tested were successfully executed against the created system. Theseattacks were created and performed using two software-defined radios to send and receivemessages. To conclude, the two systems are susceptible to spoofing attacks. However, anattacker can gain the necessary information to create spoofing attacks on the systems, withvarying consequences and some limitations.
306

Model Based Testing for Programmable Data Planes / Modellbaserad testning för programmerbara dataplan

Rixon, Gustav January 2023 (has links)
The advent of Software Defined Networking (SDN) and programmable data planes has revolutionized the networking domain, enabling the programming of networking functions down to the silicon level responsible for data packet switching. Unfortunately, while this programmability offers greater flexibility and control, it also increases the likelihood of introducing software bugs. To counter this risk, rigorous testing methodologies and strategies are essential to ensure the reliability, security, and stability of SDN deployments. A comprehensive approach should combine various techniques, including formal verification, fuzz, and performance testing. Model-Based Testing (MBT) is a technique that can significantly enhance the effectiveness of SDN testing. By leveraging formal models of the system under test, MBT automatically generates test cases that can help identify potential issues in network configuration, data plane programming, and network protocols. Utilizing MBT allows network administrators to systematically explore SDN components’ possible states and transitions, resulting in a higher level of coverage and confidence in the system’s overall stability and security. However, a lack of information on applying MBT in an SDN environment challenges its full implementation and utilization in this field. This master thesis aims to investigate and demonstrate the application of MBT to programmable data plane functions. This work uses VLAN tagging as the target data plane function, and AltWalker is employed as the MBT tool for generating and executing tests on an SDN switch. The results present an initial testing methodology that, when applied to the VLAN tagging function, can provide insights into the potential benefits and challenges of using MBT for SDN testing. This thesis lays the groundwork for further exploration and refinement of MBT methodologies in the context of SDN and programmable data plane functions.
307

Securing SDN Data Plane:Investigating the effects of IP SpoofingAttacks on SDN Switches and its Mitigation : Simulation of IP spoofing using Mininet

JABBU, SHIVAKUMAR YADAV, MADIRAJU, ANIRUDH SAI January 2023 (has links)
Background:Software-Defined Networking (SDN) represents a network architecture that offers a separate control and data layer, facilitating its rapid deployment and utilization for diverse purposes. However, despite its ease of implementation, SDN is susceptible to numerous security attacks, primarily stemming from its centralized nature. Among these threats, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks pose the most substantial risks. In the event of a successful attack on the SDNcontroller, the entire network may suffer significant disruption. Hence, safe guarding the controller becomes crucial to ensure the integrity and availability of the SDN network. Objectives:This thesis focuses on examining the IP spoofing attack and its impact on the Data Plane, particularly concerning the metrics of an SDN switch. The investigation centers around attacks that manipulate flow-rules to amplify the number of rules and deplete the resources of a switch within the Data Plane of an SDN network. To conduct the study, a software-defined network architecture was constructed using Mininet, with a Ryu controller employed for managing network operations. Various experiments were carried out to observe the response of the SDN system when subjected to an IP spoofing attack, aiming to identify potential mitigation strategies against such threats. Method and Results: To simulate the resource exhaustion scenario on the SDN network’s Data Plane,we deliberately triggered an escalation in the number of flow-rules installed in the switch. This was achieved by sending packets with spoofed IP addresses, there by exploiting the switch’s limited resources. Specifically, we focused on monitoring the impact on CPU utilization, storage memory, latency, and throughput within the switch. Detailed findings were presented in the form of tables, accompanied by graphical representations to visually illustrate the effects of increasing flow rules on the switches. Furthermore, we explored potential mitigation measures by developing an application that actively monitors the flow rules on the Ryu controller, aiming to detect and counteract such resource-exhausting effects.
308

Accelerating Audio Data Analysis with In-Network Computing

Wu, Huanzhuo 19 July 2023 (has links)
Digital transformation will experience massive connections and massive data handling. This will imply a growing demand for computing in communication networks due to network softwarization. Moreover, digital transformation will host very sensitive verticals, requiring high end-to-end reliability and low latency. Accordingly, the emerging concept “in-network computing” has been arising. This means integrating the network communications with computing and also performing computations on the transport path of the network. This can be used to deliver actionable information directly to end users instead of raw data. However, this change of paradigm to in-network computing raises disruptive challenges to the current communication networks. In-network computing (i) expects the network to host general-purpose softwarized network functions and (ii) encourages the packet payload to be modified. Yet, today’s networks are designed to focus on packet forwarding functions, and packet payloads should not be touched in the forwarding path, under the current end-to-end transport mechanisms. This dissertation presents fullstack in-network computing solutions, jointly designed from network and computing perspectives to accelerate data analysis applications, specifically for acoustic data analysis. In the computing domain, two design paradigms of computational logic, namely progressive computing and traffic filtering, are proposed in this dissertation for data reconstruction and feature extraction tasks. Two widely used practical use cases, Blind Source Separation (BSS) and anomaly detection, are selected to demonstrate the design of computing modules for data reconstruction and feature extraction tasks in the in-network computing scheme, respectively. Following these two design paradigms of progressive computing and traffic filtering, this dissertation designs two computing modules: progressive ICA (pICA) and You only hear once (Yoho) for BSS and anomaly detection, respectively. These lightweight computing modules can cooperatively perform computational tasks along the forwarding path. In this way, computational virtual functions can be introduced into the network, addressing the first challenge mentioned above, namely that the network should be able to host general-purpose softwarized network functions. In this dissertation, quantitative simulations have shown that the computing time of pICA and Yoho in in-network computing scenarios is significantly reduced, since pICA and Yoho are performed, simultaneously with the data forwarding. At the same time, pICA guarantees the same computing accuracy, and Yoho’s computing accuracy is improved. Furthermore, this dissertation proposes a stateful transport module in the network domain to support in-network computing under the end-to-end transport architecture. The stateful transport module extends the IP packet header, so that network packets carry message-related metadata (message-based packaging). Additionally, the forwarding layer of the network device is optimized to be able to process the packet payload based on the computational state (state-based transport component). The second challenge posed by in-network computing has been tackled by supporting the modification of packet payloads. The two computational modules mentioned above and the stateful transport module form the designed in-network computing solutions. By merging pICA and Yoho with the stateful transport module, respectively, two emulation systems, i.e., in-network pICA and in-network Yoho, have been implemented in the Communication Networks Emulator (ComNetsEmu). Through quantitative emulations, the experimental results showed that in-network pICA accelerates the overall service time of BSS by up to 32.18%. On the other hand, using in-network Yoho accelerates the overall service time of anomaly detection by a maximum of 30.51%. These are promising results for the design and actual realization of future communication networks.
309

A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

Adabala, Yashwanth Venkata Sai Kumar, Devanaboina, Lakshmi Venkata Raghava Sudheer January 2024 (has links)
Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. This thesis explores the development of a DDoS attack prevention technique in SDN environments using the Ryu controller application. The research aims to address the vulnerabilities in SDN, particularly focusing on flooding and Internet Protocol (IP) spoofing attacks, which are a significant threat to network security. The study employs an experimental approach, utilizing tools like Mininet-VM (VirtualMachine), Oracle VM VirtualBox, and hping3 to simulate a virtual SDN environment and conduct DDoS attack scenarios. Key methodologies include packet sniffing and rule-based detection by integrating Snort IDS (Intrusion Detection System), which is critical for identifying and mitigating such attacks. The experiments demonstrate the effectiveness of the proposed prevention technique, highlighting the importance of proper configuration and integration of network security tools in SDN. This work contributes to enhancing the resilience of SDN architectures against DDoS attacks, offering insights into future developments in network security.
310

Rights of ownership in the United States as identified through defined benefit plan conversion

Burke, Richard 01 May 2012 (has links)
Employer provided Qualified Plans ("Qualified Plans") are the most efficient supplement to Social Security savings and benefits. Given the significance of the benefits provided as well as the short-term Revenue constraints upon the Federal government in the form of substantially protracted tax deferrals, Qualified Plan legislation should maintain a conservative disposition. Incremental legislative action in the right direction will steadily graduate ERISA to its intended purpose. Unfortunately ERISA is a convoluted maze of formalities, definitions, and regulation that are only substantially understood by an expert and have yet to be adequately explained to the public at large. Recent publications such as Retirement Heist rouse the public's consciousness of retirement Plans by enumerating perceived abuses by large corporations. These alleged abuses certainly reflect innovative manipulations within the constraints of Qualified Plans. However, my thesis will prove that these "abuses" reflect the United States' disposition toward the rights of proprietorship regarding the Qualified Plan. The intent of the thesis is to illustrate this disposition through a study of the Amara v. Cigna Corp. case as well as a review of an actual LLC's defined benefit plan conversion to a cash balance plan. I will compare and contrast the different approaches taken by these two employers and justify the varied success they each experienced in converting their plans. Through this process, the thesis shall draw conclusions on the United States' dispositions toward ownership of the qualified plan.

Page generated in 0.1516 seconds