• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 26
  • 10
  • 8
  • 4
  • 2
  • 1
  • 1
  • Tagged with
  • 54
  • 17
  • 13
  • 8
  • 7
  • 7
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

QoS v systému UMTS / QoS in UMTS

Kavan, Radovan January 2009 (has links)
This thesis treats of QoS (Quality of Service) in UMTS system. The term quality of service is frequently used, recently, however not only in computer networks, but also more and more in mobile networks also. Present system of 2nd generation (2G) GSM enables only limited exploitation of QoS function. System UMTS is a system of 3rd generation (3G) already and contains quality of service in greater measure which is ensured with number of algorithms and functions. Individual QoS functions enable effective utilization of radio interface, support maintenance of planned coverage and offer high spectral efficiency. Functions that cater to quality of service are called RRM functions (Radio Resource Management). There exist five basic functions in UMTS system that are Admission control (AC), Power control (PC), Load control (LC), Handover control (HC) and Packet scheduler (PS). These functions are responsible for control of network access, control of power, control of network load, control of handover and packet (bit rate) scheduling. Last three functions are usually collectively designated as Congestion control, control of network overload. UMTS layer model, differentiation of services, traffic classes and 3GPP concept are also discussed. In thesis the attention is piad to Admission control algorithm – control of network access – in the uplink direction and to different ways of load (in the cell) modeling. Individual approaches are simulated in MATLAB. A possibility of using algorithm in the real system is discussed in conclusion.
52

Voltametrické stanovení genotoxického 4-nitroindanu na rtuťových a stříbrných amalgámových elektrodách / Voltammetric Determination of Genotoxic 4-Nitroindane at Mercury and Silver Amalgam Electrodes

Burdová, Vendula January 2011 (has links)
Presented Diploma Thesis is focused on electroanalytical determination of genotoxic 4-nitroindane, one of the nitrated polycyclic aromatic hydrocarbons (NPAHs). A hydrocarbon indane (a component of petrol) is a precursor of 4-nitroindane. NPAHs are produced all above by combustion processes in gasoline and diesel engines. It has been shown that NPAHs can be many times more mutagenic or carcinogenic than their parent PAHs, so the analysis of these dangerous pollutants becomes important for modern environmental analytical chemistry. Optimal conditions for determination of 4-nitroindane have been investigated in buffered water-methanolic solutions and electrochemical transformations of 4-nitroindane have been studied by DC voltammetry (DCV), differential pulse voltammetry (DPV) and cyclic voltammetry at a hanging mercury drop electrode (HMDE) and at a mercury meniscus modified silver solid amalgam electrode (m-AgSAE). For voltammetric determination of 4-nitroindane, the following techniques were used: DCV (limit of quantification (LQ) ~ 7. 10-8 mol. l-1 ), DPV (LQ ~ 1. 10-7 mol. l-1 ) and adsorptive stripping voltammetry (AdSV; LQ ~ 7. 10-9 mol. l-1 ) at HMDE, and DCV (LQ ~ 1. 10-7 mol. l-1 ) and DPV (LQ ~ 1. 10-7 mol l-1 ) at m-AgSAE. The applicability of the newly developed...
53

Voltametrické stanovení herbicidu Aclonifenu pomocí rtuťových elektrod / Voltammetric Determination of Herbicide Aclonifen Using Mercury Electrodes

Murcková, Klára January 2012 (has links)
Presented Diploma Thesis is focused on electroanalytical determination of the herbicide Aclonifen, which belongs to a group of herbicides derived from diphenylether. These herbicides are used due to their effects - inhibition of protoporfyrinogen oxidase synthesis and also inhibition of biosynthesis of carotenoids. Due to its widespread use in agricultural, toxical effects on humans and because of its negative impacts particularly on aquatic ecosystems there is a need for methods capable of determining the presence of Aclonifen in the environment to monitor its ecological impacts. Optimal conditions for the determination of Aclonifen have been investigated in BR buffer - methanolic solution and in BR buffer. Electrochemical behavior of the substance has been studied using direct current voltammetry (DCV), differential pulse voltammetry (DPP) and adsorptive stripping voltammetry (AdSV) on the hanging mercury drop electrode (HMDE) and by using TAST polarography and differential pulse polarography (DPP) on the dropping mercury electrode (DME). UV/VIS spectrophotometric detection was used for comparison to electrochemical detection. Used wavelengths were 308 nm and 388 nm. For electrochemical determination of Aclonifen the above mentioned techniques were used and following results were obtained: DCV...
54

Vers des communications de confiance et sécurisées dans un environnement véhiculaire / Towards trusted and secure communications in a vehicular environment

Tan, Heng Chuan 13 September 2017 (has links)
Le routage et la gestion des clés sont les plus grands défis dans les réseaux de véhicules. Un comportement de routage inapproprié peut affecter l’efficacité des communications et affecter la livraison des applications liées à la sécurité. D’autre part, la gestion des clés, en particulier en raison de l’utilisation de la gestion des certificats PKI, peut entraîner une latence élevée, ce qui peut ne pas convenir à de nombreuses applications critiques. Pour cette raison, nous proposons deux modèles de confiance pour aider le protocole de routage à sélectionner un chemin de bout en bout sécurisé pour le transfert. Le premier modèle se concentre sur la détection de noeuds égoïstes, y compris les attaques basées sur la réputation, conçues pour compromettre la «vraie» réputation d’un noeud. Le second modèle est destiné à détecter les redirecteurs qui modifient le contenu d’un paquet avant la retransmission. Dans la gestion des clés, nous avons développé un système de gestion des clés d’authentification et de sécurité (SA-KMP) qui utilise une cryptographie symétrique pour protéger la communication, y compris l’élimination des certificats pendant la communication pour réduire les retards liés à l’infrastructure PKI. / Routing and key management are the biggest challenges in vehicular networks. Inappropriate routing behaviour may affect the effectiveness of communications and affect the delivery of safety-related applications. On the other hand, key management, especially due to the use of PKI certificate management, can lead to high latency, which may not be suitable for many time-critical applications. For this reason, we propose two trust models to assist the routing protocol in selecting a secure end-to-end path for forwarding. The first model focusses on detecting selfish nodes, including reputation-based attacks, designed to compromise the “true” reputation of a node. The second model is intended to detect forwarders that modify the contents of a packet before retransmission. In key management, we have developed a Secure and Authentication Key Management Protocol (SA-KMP) scheme that uses symmetric cryptography to protect communication, including eliminating certificates during communication to reduce PKI-related delays.

Page generated in 0.0343 seconds