• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 155
  • 72
  • 51
  • 45
  • 14
  • 8
  • 7
  • 6
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 436
  • 293
  • 78
  • 61
  • 48
  • 47
  • 47
  • 43
  • 42
  • 37
  • 37
  • 35
  • 32
  • 32
  • 32
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Our Shared Storm: Exploring Five Scenarios of Climate Fiction Futures

January 2020 (has links)
abstract: This project uses the tools of speculative climate fiction to explore and imagine the future of the United Nations climate negotiations in each of the five Shared Socioeconomic Pathway (SSP) scenarios. Climate fiction (cli-fi) proves a powerful but imperfect tool for envisioning future challenging and turning scientific models into meaningful narratives. / Dissertation/Thesis / Masters Thesis Sustainability 2020
202

Estimation of Tourist Travel Patterns with Recursive Logit Models based on Wi-Fi Data with Kyoto City Case Study / Wi-Fiデータを用いた再帰的ロジットモデルによる観光行動パターンの推定に関する研究-京都市を例として-

Gao, Yuhan 23 March 2021 (has links)
京都大学 / 新制・課程博士 / 博士(工学) / 甲第23178号 / 工博第4822号 / 新制||工||1753(附属図書館) / 京都大学大学院工学研究科都市社会工学専攻 / (主査)教授 山田 忠史, 教授 藤井 聡, 准教授 SCHMOECKER Jan-Dirk / 学位規則第4条第1項該当 / Doctor of Philosophy (Engineering) / Kyoto University / DFAM
203

Indoor Positioning System for Smart Devices

Yang, Yuan 19 November 2021 (has links)
No description available.
204

Hantering av mät-filer från Wi-Fi fjärrkontroll / MANAGEMENT OF MEASUREMENT FILES FROM WI-FI REMOTE CONTROL

Kalo, Alexander January 2021 (has links)
A measuring system Striton has been developed at the department of biomedicalengineering, University Hospital of Umeå, for motion analysis using motion sensors whichattaches to the patient’s lower body to assess the risk for potential neurological andmusculoskeletal damage. The measuring system is comprised of two motion sensor unitsand a remote control where data is gathered based on step height, step width, theorientation of the calves and step frequency. The motion sensor units which attach to thecalves are comprised of a MCU with a built in Wi-Fi module, a IMU and and time-of-flightsensors. Data is transferred through Wi-Fi and stored on a SD-card as CSV-files on theremote control which is comprised of a Raspberry Pi Zero WH running a Linux operatingsystem (Raspbian). The remote control also has the functions to initiate and complete ameasurement as well as mark an event. The extraction of data from the remote control toanother unit for analysis occurs through SSH and SFTP using third-party programs whichmay require technical knowledge. A unique software was designed specifically for Stritonfor the operating system Windows 10 using Visual Studio (2019) which provides thefunctions to connect to a predefined Wi-Fi access point as well as automatically reconnectto previously connected access point at shutdown, connect through SFTP, list the savedfiles on the remote control, perform file operations, synchronize the date and time on theremote control as well as change settings in the software which is saved locally in a settingsfile. The user interface is minimalistic with the intention to reduce complexity and timerequirement to extract the data from the measuring system Striton. / Ett mätsystem Striton har utvecklats av CMTS, Medicinsk Teknik – FoU på NorrlandsUniversitetssjukhus för rörelseanalys med hjälp av rörelsesensorer som fästs på patientensunderben för att bedöma en potentiell neurologisk samt muskuloskeletal skada.Mätsystemet består av två sensorenheter samt en fjärrkontroll där data samlas in baseratpå höjd av steg, stegbredd, underbenens orientering samt stegfrekvens. Sensorenheternasom fästs på underbenen består av en MCU med inbyggd Wi-Fi modul, IMU och time-offlight sensorer. Data förs över via Wi-Fi och lagras på ett SD-kort i form av CSV-filer påfjärrkontrollen beståendes av en Raspberry Pi Zero WH som driver ett Linuxoperativsystem (Raspbian). Fjärrkontrollen har även funktionerna att kunna starta ochstoppa en mätning samt markera en händelse. Extrahering av data från fjärrkontrollen tillen annan enhet för analys sker via SSH och SFTP med hjälp av tredjepartsprogram som kankräva teknisk kunskap. En unik programvara designades specifikt för Striton tilloperativsystemet Windows 10 i miljön Visual Studio (2019) och tillhandahålleregenskaperna att kunna ansluta till en bestämd Wi-Fi åtkomstpunkt samt automatisktåteransluta till föregående åtkomstpunkt vid avslut, ansluta via SFTP, visa sparade filer frånfjärrkontrollen, utföra filoperationer, synkronisera datum och tid på fjärrkontrollen samtändra inställningar i programvaran som sparas i en lokal inställningsfil. Gränssnittet ärminimalistiskt med syfte att reducera komplexiteten samt tidsåtgången för extrahering avdata från mätsystemet Striton.
205

Inteligentní elektroměr / Intelligent electricity meter

Haman, Martin January 2020 (has links)
The diploma thesis describe design and realization of smart energy meter. The smart energy meter allows remote reading of the measured values and with connected externals modules also switching of connected load. The theoretical part covered measured values definition, required function analysis, components selection and design of smart energy meter. The practical part deal with firmware development, programming, remote control and reading of the measured values. The final chapter deal with realization and calibration of the smart energy meter.
206

Black-box analýza zabezpečení Wi-Fi / Black-Box Analysis of Wi-Fi Stacks Security

Venger, Adam January 2021 (has links)
Zariadenia, na ktoré sa každodenne spoliehame, sú stále zložitejšie a využívajú zložitejšie protokoly. Jedným z týchto protokolov je Wi-Fi. S rastúcou zložitosťou sa zvyšuje aj potenciál pre implementačné chyby. Táto práca skúma Wi-Fi protokol a použitie fuzz testingu pre generovanie semi-validných vstupov, ktoré by mohli odhaliť zraniteľné miesta v zariadeniach. Špeciálna pozornosť bola venovaná testovaniu Wi-Fi v systéme ESP32 a ESP32-S2. Výsledkom práce je fuzzer vhodný pre testovanie akéhokoľvek Wi-Fi zariadenia, monitorovací nástroj špeciálne pre ESP32 a sada testovacích programov pre ESP32. Nástroj neodhalil žiadne potenciálne zraniteľnosti.
207

Zabezpečení bezdrátových sítí IEEE 802.11 / Security of wireless computer networks IEEE 802.11

Škodák, Jaroslav January 2008 (has links)
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.
208

Optimalizace vedení logistiky skladového hospodářství ve velké firmě / Logistic process leadership optimization in big enterprise

Přichystal, Tomáš January 2008 (has links)
The Master’s thesis deals with logistics and resources monitoring area, which is inseparable part of every production oriented economic activity. It uses electronic monitoring systems for more effective dealing with stock records in a production company that has many stores. The monitoring utilizes modern technologies, that are burgeoning and finding its use in all branches of market.
209

Ochrana bezdrátových sítí poskytovatelů internetu / Security protection techniques of wireless networks of internet providers

Žiško, Róbert January 2009 (has links)
This master’s thesis can be used as the guidebook for Wi-Fi networks provider in non-licensed zones 2,4GHz and 5GHz. It is good tool to understand wireless technology area and its protection. Reader can follow network design and avoid mistakes that are mentioned in work. This text shouldn’t be a tool or a guide for possible attackers, but an impulse for small providers who provide their networks in unsecured form. In the opening chapter of my work, matters of Wi-Fi networks are thoroughly analyzed. As they are able to get internet connection in a lot of inaccessible places, they are considered to be crucial for the present times. The basic procedure describing Wi-Fi planning is written in thesis and also its legislative that has to be strictly observed. The big disadvantage is riskiness of the wireless connection that allows attackers to attack network in many ways. For mentioned reason it is very important to take utmost account of Wi-Fi network’s security and attack resistance. Unfortunately a lot of networks are either secured partially or unsecured at all. These types of networks are frequently attacked in order to get “free” Internet access or because of competitors fight. In the text below we can find possible Wi-Fi attack forms using by attackers to get Internet access or destroy network hardware what can cause big financial loss to providers. I described design and realization of little-town network using safety tools implementation based on my experience. For that purpose I implemented benchmark tests in graphics as well as practical format.
210

Zabezpečení standardu 802.11 a jeho možnosti / 802.11 standard security techniques and their features

Endrle, Pavel January 2009 (has links)
This master´s thesis is about 802.11 standard security techniques and their features. Particular types of this standard and its features are shown in the introduction. Wireless network security cypher alghoritm types, their features, weaknesses and principles of functions are closely described in next few chapters. Realized attacks on these security alghoritms with their principles are described and shown in the practical part of thesis. One chapter is about effectivity, accessibility and practicability valorization of these attacks in practice.

Page generated in 0.0291 seconds