• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 155
  • 72
  • 51
  • 45
  • 14
  • 8
  • 7
  • 6
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 436
  • 293
  • 78
  • 61
  • 48
  • 47
  • 47
  • 43
  • 42
  • 37
  • 37
  • 35
  • 32
  • 32
  • 32
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Evaluation, Optimization and Characterization of Miniaturized Triple Band Antennas for Wi-Fi 6 and Wi-Fi 6E / Utvärdering, optimering och karakterisering av miniatyriserade trippelbandsantenner för Wi-Fi 6 och Wi-Fi 6E

Cheng, Muzi January 2022 (has links)
Antenna is a key component in wireless devices such as cell phones, laptops and smartwatches. With the new generation of Wi-Fi technology: Wi-Fi 6E coming out, 1200MHz bandwidth from 5.925GHz to 7.125GHz is freed for use. Mobile devices are expected to meet the required bandwidth allocated for Wi-Fi 6E. However, electrically small antenna design for Wi-Fi 6 and 6E applications has been a challenge. Reducing the size of antennas while maintaining the performance is one major issue. The goal of this project is to evaluate different antennas and try to find the potential compact antenna that could cover Wi-Fi 6 and Wi-Fi 6E bands. In this project, we evaluated different types of electrically small antennas, explored parameters that affect antenna performance, characterized one nominated antenna in High Frequency Simulation Software(HFSS), prototyped the antenna in Altium Designer and measured the antenna performance using Network Analyzer. The measurement result shows that the proposed antenna is omni-directional, partially meet the fixed frequency requirement and has low efficiency at 2.4GHz but good efficiency at 6GHz bands. The conclusion is that the proposed antenna is good for the extended bandwidth of Wi-Fi 6 but for the whole Wi-Fi 6E the performance still needs to be improved in future work. / Antenn är en nyckelkomponent i trådlösa enheter som mobiltelefoner, bärbara datorer och smartklockor. Med den nya generationens Wi-Fi-teknik: Wi-Fi 6E kommer ut, 1200MHz bandbredd från 5,925GHz till 7,125GHz frigörs för användning. Mobila enheter förväntas uppfylla den erforderliga bandbredden som tilldelats för Wi-Fi 6E. Däremot har en elektrisk liten antenndesign för Wi-Fi 6 och 6E-applikationer varit en utmaning. Att minska storleken på antennerna samtidigt som prestandan bibehålls är en stor fråga. Målet med detta projekt är att utvärdera olika antenner och försöka hitta den potentiella kompakta antennen som kan täcka Wi-Fi 6- och Wi-Fi 6E-banden. I det här projektet utvärderade vi olika typer av elektriskt små antenner, utforskade parametrar som påverkar antennprestanda, karakteriserade en nominerad antenn i High Frequency Simulation Software (HFSS), prototypade antennen i Altium Designer och mätte antennens prestanda med hjälp av Network Analyzer. Mätresultatet visar att den föreslagna antennen är rundstrålande, delvis uppfyller kravet på fast frekvens och har låg verkningsgrad vid 2,4GHz men bra effektivitet vid 6GHz-band. Slutsatsen är att den föreslagna antennen är bra för den utökade bandbredden för Wi-Fi 6 men för hela Wi-Fi 6E behöver prestandan fortfarande förbättras i framtida arbete.
132

”Learning by doing är bäst av allt egentligen” : Nyare säkerhetsstandarder och kunskapsinhämtninginom trådlösa nätverk

Mulshine, Tim, Berkemar, Linus January 2023 (has links)
Då data som transporteras över trådlösa nätverk sänds genom luften i form av radiovågor är det viktigt att säkra upp nätverkskommunikationen med nya, erkändasäkerhetsstandarder. Däremot är användningsgraden av nyare säkerhetsstandarder inom Wi-Fi, specifikt WPA3 och PMF, låg. Samtidigt finns ett behov att öka förståelsen för relevanta metoder för kunskapsinhämtning. Syftet med studien är att ge rekommendationer för hur små och medelstora företag kan öka säkerheten i trådlösa nätverk. Studien identifierar orsaker till den låga användningsgraden av nyare säkerhetsstandarder i trådlösa nätverk och även hur nätverksadministratörer håller sig uppdaterade om standarderna. En kvalitativ ansats valdes för att besvara studiens syfte, vilket genomfördes med hjälp av 23 semi-strukturerade intervjuer med nätverksadministratörer i Sverige. Studiens resultat visar på ett tydligt tema där klientbasen i nätverken är huvudanledningen till avvaktandet med att implementera nyare säkerhetsstandarder, där kompabilitet upplevs som ett problem samtidigt som det råder okunskap om standarderna. Bland respondenterna anses metoden praktiskt laborerande vara mest effektiv för kunskapsinhämtning och fortbildning, ofta i samband med läsande av teori för att bilda en grundläggande förståelse. Studien landar i rekommendationer om de nyare säkerhetsstandarderna och kunskapsinhämtning riktade mot nätverksadministratörer, företag och även myndigheter och organisationer som bidrar med riktlinjer om trådlösa nätverk. / As data transmitted over wireless networks is sent through air, in the form of radio waves, it is important to secure network communication with new, recognized security standards. However, the adoption rate of newer security standards in Wi-Fi, specifically WPA3 and PMF, is low. At the same time, there is a need to increase understanding of relevant methods for knowledge acquisition. This study’s purpose is to provide recommendations on how small and medium-sized enterprises can increase the security of wireless networks. The study identifies reasons for the low adoption rate of newer security standards in wireless networks and how network administrators stay updated on the standards. A qualitative approach was chosen to address the study's purpose, which was conducted through 23 semi-structured interviews with network administrators in Sweden. The study's results reveal a clear theme where the client base in the networks is the main reason for reservations to implement newer security standards, with compatibility being perceived as a problem alongside a lack of knowledge about the standards. Among the respondents, practical experimentation is considered the most effective method for knowledge acquisition and continuous education, often combined with reading of theory to form a fundamental understanding. The study concludes with recommendations on the newer security standards and knowledge acquisition targeted towards network administrators, companies, as well as authorities and organizations that provide guidelines on wireless networks.
133

Security analysis of a modern smart camera / Säkerhetsanalys av en smart kamera

Johannesson, Simon, Pettersson, Victor January 2022 (has links)
IoT devices have historically lacked in the security standards but at the same time it is a continuously growing market it is important that the security analyzes continue in order to evaluate the development of the security in the IoT industry. This research is a security analysis of the Deltaco SH-IPC05 WIFI Camera, it is an inexpensive device that can be accessed through a mobile application from anywhere on the internet via the cloud. It follows the Practical and Agile Threat Research for IoT (PatrIoT) methodology and is delimited to network traffic and the software of the device. Due to legal limitations the cloud is not included in the analysis and the hardware security is not included due to time constraints. The device was found to use default credentials for its Open Network Video Interface Forum (ONVIF) service, but it is easy for a user to change the default password from the mobile application if the user can guess what the default password is, and the service is not enabled by default. Three DoS attacks were identified to be effective, two of which caused the device to crash and reboot and the third one prevented the camera from responding until the attack ended. One of the attacks that consistently crashed the camera, could keep crashing the camera repeatedly thus keeping it offline. When analyzing the network traffic, it was possible to consistently detect the packets that notified users of motion or sound detection by looking for specific TCP packet sizes and ports. Although some issues were found the device appeared to be generally secure with encrypted network traffic and minimally exposed services. / Bland IoT-enheter har säkerheten historiskt sett ofta varit eftersatt men det är samtidigt en ständigt växande marknad, därför är det viktigt att säkerhetsanalyserna fortsätter för att utvärdera utvecklingen av säkerheten inom IoT industrin. Denna rapport är resultatet av en säkerhetsanalys av Deltaco SH-IPC05 WIFI Camera, det är en billig enhet som kan nås genom en mobilapplikation via molnet. Den följer metodiken för Practical and Agile Threat Research for IoT (PatrIoT) och är avgränsad till nätverkstrafik och enhetens programvara. På grund av juridiska begränsningar ingår det inte att analysera molnet och hårdvara ingår inte på grund av tidsbrist. Enheten visade sig använda standardlösenord för sin ONVIF-tjänst men tjänsten måste aktiveras av användaren och det är möjligt att ändra lösenordet via mobilapplikationen om användaren kan gissa sig till standardlösenordet. Enheten var mottaglig för tre olika DoS-attacker. Två av dem fick kameran att krasha och starta om varav en av dem kunde återupprepas för att hålla enheten offline så länge som önskades. Det var möjligt att identifiera de paket som skickades från kameran när den skulle notifiera användare om upptäckta rörelser eller ljud. Även om vissa problem hittades verkade enheten vara säker i allmänhet med krypterad nätverkstrafik och minimalt exponerade tjänster.
134

(Not) Drawing The Line: Technology Reexamined

Liguori, Elizabeth Angela 07 June 2017 (has links)
(Not) Drawing The Line: Technology Re-examined is the culmination of interdisciplinary research exploring the nature of materiality and process in the fields of art, science, and technology. Exploration and experimentation in these diverse disciplines have helped to illuminate many of the ideas and concepts that have guided the overall research process. These explorations have also honed the ability to critically examine how technology is perceived and represented, post-internet.   This document illustrates the processes involved in the conception and creation of a body of work manifested through visual and technological problem solving, investigative research of materials and technologies, and the fundamental concerns of art, technology, form and pattern. These empirical areas of research are punctuated by literary texts on the philosophy of art and technology that have informed many of the visual comparisons represented. This body of evidence is an exploration of the idea that the evolution of technological developments can often be attributed to the creation of art through the heuristic experimentation and visual explorations of the artist. / Master of Fine Arts
135

An investigation into the use of kriging for indoor Wi-Fi received signal strength estimation / Petrus Jacobus Joubert

Joubert, Petrus Jacobus January 2014 (has links)
Kriging is proposed as a tool for Wi-Fi signal strength estimation for complex indoor environments. This proposal is based on two studies suggesting that kriging might be suitable for this application. Both of these studies have shortcomings in supporting this proposal, but their results encourage a more in depth investigation into this. Even though kriging is a geostatistical method developed for geographical interpolation, it has been used successfully in a wide range of other applications as well. This further suggests that kriging might be a versatile method to overcome some of the difficul- ties of existing signal strength estimation methods. Two main types of signal strength estimation are deterministic methods and empirical methods. Deterministic methods are generally very complex and requires input parameters that are difficult to obtain. Empirical methods are known to have low accuracy which makes them unreliable for practical use. Three main investigations are presented in order to evaluate the use of kriging for this application. A sampling plan is proposed as part of a generic application protocol for the practical use of kriging for Wi-Fi signal strength. It is concluded that kriging can be conffidently used as an estimation technique for Wi-Fi signal strength in complex indoor environments. Kriging is recommended for practical applications, especially where in- sufficient information is available about a building or where time consuming site surveys are not feasible. / MIng (Computer and Electronic Engineering), North-West University, Potchefstroom Campus, 2015
136

An investigation into the use of kriging for indoor Wi-Fi received signal strength estimation / Petrus Jacobus Joubert

Joubert, Petrus Jacobus January 2014 (has links)
Kriging is proposed as a tool for Wi-Fi signal strength estimation for complex indoor environments. This proposal is based on two studies suggesting that kriging might be suitable for this application. Both of these studies have shortcomings in supporting this proposal, but their results encourage a more in depth investigation into this. Even though kriging is a geostatistical method developed for geographical interpolation, it has been used successfully in a wide range of other applications as well. This further suggests that kriging might be a versatile method to overcome some of the difficul- ties of existing signal strength estimation methods. Two main types of signal strength estimation are deterministic methods and empirical methods. Deterministic methods are generally very complex and requires input parameters that are difficult to obtain. Empirical methods are known to have low accuracy which makes them unreliable for practical use. Three main investigations are presented in order to evaluate the use of kriging for this application. A sampling plan is proposed as part of a generic application protocol for the practical use of kriging for Wi-Fi signal strength. It is concluded that kriging can be conffidently used as an estimation technique for Wi-Fi signal strength in complex indoor environments. Kriging is recommended for practical applications, especially where in- sufficient information is available about a building or where time consuming site surveys are not feasible. / MIng (Computer and Electronic Engineering), North-West University, Potchefstroom Campus, 2015
137

Valen syns : - formge med värderingar

Säfwenberg, Andreas January 2012 (has links)
Går det att i arkitekturen se åsikter och värderingar? Med utgångspunkt i politiska ståndpunkter har jag givit mig på valstugan och dess utformning. Valstugorna är idag ofta snarlika varandra oavsett vilket parti som använder dem. Att kunna se olika partiers värderingar och ståndpunkter även i formgivningen av den plats där de möter väljarna, är något som gynnar både väljarna och partierna själva. / Is it possible to see opinions and values in architecture? Starting from political viewpoints, I’ve taken up the ‘election cottage’ and its layout. Election cottages today are often all rather alike, regardless of the party using them. To be able to see the various parties’ values and viewpoints in the layout of the place where they meet the voters is something that benefits both the voters and the parties themselves.
138

Influence of catalytic systems on the synthesis of (dis)entangled UHMWPE and its implications on mechanical properties

Romano, Dario January 2014 (has links)
Two different catalysts (bis[N-(3-tert-butylsalicylidene)-pentafluoroanilinato] titanium (IV) dichloride and [1-(8-quinolyl)indenyl] chromium (III) dichloride catalysts) activated with aluminoxane based co-catalysts (MAO, PMAO, MMAO12 and MMAO3A) have been evaluated in the polymerisation of ethylene leading to UHMWPE having a reduced number of entanglements between the chains. The effect of a co-catalyst modifier (BHT) on the catalytic systems and the resulting polymers is also addressed. Both catalysts are capable to promote the synthesis of UHMWPE having a reduced amount of entanglements in the conditions used. Uniaxial solid-state deformation of UHMWPE samples of different molar masses have been evaluated and related with the entanglement state of the polymers synthesised. A clear relationship between some mechanical properties and the molar mass/entanglement density of the polymers synthesised has been found.
139

An Anomaly Behavior Analysis Intrusion Detection System for Wireless Networks

Satam, Pratik January 2015 (has links)
Wireless networks have become ubiquitous, where a wide range of mobile devices are connected to a larger network like the Internet via wireless communications. One widely used wireless communication standard is the IEEE 802.11 protocol, popularly called Wi-Fi. Over the years, the 802.11 has been upgraded to different versions. But most of these upgrades have been focused on the improvement of the throughput of the protocol and not enhancing the security of the protocol, thus leaving the protocol vulnerable to attacks. The goal of this research is to develop and implement an intrusion detection system based on anomaly behavior analysis that can detect accurately attacks on the Wi-Fi networks and track the location of the attacker. As a part of this thesis we present two architectures to develop an anomaly based intrusion detection system for single access point and distributed Wi-Fi networks. These architectures can detect attacks on Wi-Fi networks, classify the attacks and track the location of the attacker once the attack has been detected. The system uses statistical and probability techniques associated with temporal wireless protocol transitions, that we refer to as Wireless Flows (Wflows). The Wflows are modeled and stored as a sequence of n-grams within a given period of analysis. We studied two approaches to track the location of the attacker. In the first approach, we use a clustering approach to generate power maps that can be used to track the location of the user accessing the Wi-Fi network. In the second approach, we use classification algorithms to track the location of the user from a Central Controller Unit. Experimental results show that the attack detection and classification algorithms generate no false positives and no false negatives even when the Wi-Fi network has high frame drop rates. The Clustering approach for location tracking was found to perform highly accurate in static environments (81% accuracy) but the performance rapidly deteriorates with the changes in the environment. While the classification algorithm to track the location of the user at the Central Controller/RADIUS server was seen to perform with lesser accuracy then the clustering approach (76% accuracy) but the system's ability to track the location of the user deteriorated less rapidly with changes in the operating environment.
140

The relationship between ilm and khabar in the work of al-Shafii

Shukri, Abdul Salam Muhammad January 1999 (has links)
This study examines in detail the basis of al-Shafi`i's arguments for the supremacy of oral tradition over communal legal practice. It concentrates on one broad issue, the definition of `ilm (knowledge) and one technical issue, the problem of authenticating a particular khabar (oral tradition or report, plural akhbar, ) and its binding nature, especially a report of the category known as the specialists' report (khabar al-khassa). On the first issue, this study examines the concept of knowledge based on reports (`ilm al-khabar) because it had an important influence on al-Shafi`i. This is followed by a detailed account of al-Shafi`i's own discussion of `ilm. It brings out clearly that al-Shafi`i means religious law when discussing `ilm. It also shows how knowledge of religious law can be obtained. Al-Shafi`i's approach is to restrict the argument to knowledge of specialised and debatable points, rather than what is generally accepted. He seeks to prove the indispensability in this area of specialists' knowledge of reliable documentation external to the law itself. The following chapter deals with the question of authenticating a khabar from the Prophet (a hadith), not as purely technical question but within a polemical context in which the practical difficulty of authenticating a khabar was used by those opposed to the intellectual dominance of oral tradition as a reason not to use the khabar. In the final chapter al- Shaf i's arguments with two identifiable schools of opposing thought, ahl al-kaläm and ahl al-figh, are examined in detail. The thesis as a whole gives a significant insight into the efficacy and durability of al-Shafi`i's arguments, not so much by defeating his opponents' arguments but by buttressing those of the defenders and advocates of oral tradition.

Page generated in 0.0193 seconds