• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 196
  • 129
  • 94
  • 48
  • 20
  • 18
  • 13
  • 11
  • 8
  • 7
  • 6
  • 6
  • 4
  • 4
  • 3
  • Tagged with
  • 651
  • 78
  • 77
  • 60
  • 55
  • 52
  • 46
  • 45
  • 43
  • 41
  • 38
  • 36
  • 35
  • 34
  • 32
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

Physical Situations for Developing The Geometric Concept of Similarity

Kirtley, Richard H. January 1964 (has links)
No description available.
122

Large-Scale Modeling of Smart Cities Considering the Mutual Impact of Transportation and Communication Systems

Elbery, Ahmed Abdelnaeim 11 June 2018 (has links)
Intelligent Transportation Systems (ITSs) are key components of the transportation systems within future smart cities, in which information and communication technologies interact to enhance the transportation system. By collecting and analyzing real-time data, and applying advanced data analytics techniques, ITS can make better-informed decisions, that are sent back to the network actuators (cars, drivers, traffic signals, travelers,... etc.) to solve or at least mitigate the ongoing transportation problems. In such feedback systems, the communication network is a major component that interacts with the transportation applications. Consequently, it is imperative to study the mutual interactions and effects between the communication and the transportation networks. The key enabler for such studies is the large-scale modeling of communication and transportation systems. However, developing such models is challenging, not only because of the intricate interdependency between the communication and transportation systems but also because of the scale of such systems that usually covers a city-level network with hundreds of thousands of travelers concurrently moving and communicating in the network. Consequently, in our research, we are interested in studying the mutual impact of the communication and transportation systems in large-scale networks while focusing on eco-routing navigation applications that attempt to minimize the transportation network carbon footprint. Our objectives are: 1) enabling the large-scale modeling of transportation systems in smart cities including both transportation and communication systems and 2) studying the mutual interactions between the communication and the transportation systems in real-world networks. Under this umbrella, we introduced two simulation frameworks to realistically model the communication in vehicular systems. Subsequently, we use them to study the mutual influence of the communication and transportation system. Moreover, we designed, developed, and tested a multi-modal agent-based simulation platform which can simulate large-scale transportation systems. The results show that, in congested road networks, the communication performance has a significant impact on the transportation system performance. Moreover, the results show that there is a negative mutual impact loop that may lead to a degrading performance of both systems. Thus, it is important to consider this impact when deploying new ITS technologies that utilize vehicular wireless communication. / PHD
123

An Assessment of the Attention Demand Associated with the Processing of Information for In-Vehicle Information Systems (IVIS)

Gallagher, John Paul 04 May 2001 (has links)
Technological interventions are being considered to alleviate congestion and to improve the quality of driving on our nation's highways. These new technology interventions will be capable of increasing the amount of information provided to the driver; therefore, steps must be taken to ensure they do not require a high attention demand. (Limited attention resources can be diverted from the primary task of driving to a secondary in-vehicle task). The attention demand required as part of the process of extracting information has been studied relatively extensively. However, the processing required to make complex decisions is not well understood and provides cause for concern. This study investigated the attention demand required to perform several types of tasks, such as selecting a route, selecting the cheapest route, and selecting the fastest route. The three objectives of this study were: 1) To investigate driver performance during IVIS tasks that required additional processing of information after the extraction of information from a visual display. 2) To develop a method for evaluating driver performance with regard to safety. This task was accomplished by performing an extensive review of the literature, and developing two composite measures. 3) To provide descriptive data on the proportion of drivers who exceeded a threshold of driver performance for each of the different IVIS tasks. An instrumented vehicle, equipped with cameras and sensors, was used to investigate on-road driver behavior on a four-lane divided road with good visibility. A confederate vehicle was driven in front of the instrumented vehicle to create a vehicle following situation. Thirty-six drivers participated in this study. Age, presentation format, information density, and type of task were the independent variables used in this study. Results from this study indicate that a high proportion of drivers' will have substantially degraded performance performing IVIS tasks such as selecting a route or a hotel from several possibilities. Findings also indicate that tasks involving computations, such as selecting the quickest or cheapest route, require a high attention demand and consequently should not be performed by a driver when the vehicle is in motion. In addition, text-based messages in paragraph format should not be presented to the driver while the vehicle is in motion. The graphic icon format should be utilized for route planning tasks. / Ph. D.
124

Quantifying the Safety Impacts of Intelligent Transportation Systems

Avgoustis, Alexis 02 June 1999 (has links)
An average of 6.5 million crashes are reported to the police every year in the United States. Safety is significantly important considering the rapid increase on traffic volume on American roads. This thesis describes the development of a safety model whose primary objective is to capture the benefits of Intelligent Transportation Systems (ITS) on safety. The specific ITS component that is examined in more detail is traffic signal coordination. The model was tested in a micro-simulation environment using INTEGRATION traffic simulation model as well as in a field data evaluation. The General Estimates System (GES) database was chosen as the primary national database to extract accident data. These data were used for the development of the statistical foundation for the safety model. Crash rates were produced using extracted crash frequencies and annual vehicle miles traveled figures from the Highway Statistics (FHWA, 1997). Regression analysis was performed to predict the behavior of several crash types, as they were associated with a variety of variables, for example the facility speed limit and time the crash occurred. The model was developed in FORTRAN code that estimates the accident risk of a facility based on its free-speed. Two methods were used to test the model: 1. field data from the city of Phoenix, Arizona were used in a GPS (Global Positioning Systems) floating car that tracked the accident risk on a second by second basis. Before and after signal coordination scenarios were tested thus yielding a result that the accident risk is less in the after scenario. 2. the model was then tested in a micro-simulation environment using the INTEGRATION traffic model. A hypothetical network, as well as the Scottsdale/Rural road corridor in Phoenix were used. The sensitivity analysis of before and after signal coordination scenarios indicated that after the signals were coordinated, the crash risk was lower, thus proving that the model could capture the benefits of this ITS component. Reducing the number of crashes is an important aspect of improving safety. Traffic signal coordination smoothens traffic on a facility and reduces its potential accident risk by producing less vehicle-to vehicle interactions. Also, traffic signal control increases the free-speed of a facility. The advantage of this safety model is the fact that it can be used to capture a variety of ITS technologies and not only signal coordination that is examined in more detail in this thesis. / Master of Science
125

Microscopic Fuel Consumption and Emission Modeling

Ahn, Kyoungho 06 January 1999 (has links)
Mathematical models to predict vehicle fuel consumption and emission metrics are presented in this thesis. Vehicle fuel consumption and emissions are complex functions to be approximated in practice due to numerous variables affecting their outcome. Vehicle energy and emissions are particularly sensitive to changes in vehicle state variables such as speed and acceleration, ambient conditions such as temperature, and driver control inputs such as acceleration pedal position and gear shift speeds, among others. Recent empirical studies have produced large amounts of data concerning vehicle fuel consumption and emissions rates and offer a wealth of information to transportation planners. Unfortunately, unless simple relationships are found between fuel consumption and vehicle emission metrics, their application in microscopic traffic and macroscopic planning models becomes prohibitive computationally. This thesis describes the development of microscopic energy and emission models using nonlinear multiple regression and neural network techniques to approximate vehicle fuel consumption and emissions field data. The energy and emission models described in this thesis utilized data collected by the Oak Ridge National Laboratory. The data include microscopic fuel consumption and emission measurements (CO, HC, and NOx) for eight light duty vehicles as a function of vehicle speed and acceleration. The thesis describes modeling processes and the tradeoffs between model accuracy and computational efficiency. Model verification results are included for two vehicle driving cycles. The models presented estimate vehicle fuel consumption within 2.5% of their actual measured values. Vehicle emissions errors fall in the range of 3-33% with correlation coefficients ranging between 0.94 and 0.99. Future transportation planning studies could also make use of the modeling approaches presented in the thesis. The models developed in this study have been incorporated into a microscopic traffic simulation tool called INTEGRATION to further demonstrate their application and relevance to traffic engineering studies. Two sample Intelligent Transportation Systems (ITS) application results are included. In the case studies, it was found that vehicle fuel consumption and emissions are more sensitive to the level of vehicle acceleration than to the vehicle speed. Also, the study shows signalization techniques can reduce fuel consumption and emissions significantly, while incident management techniques do not affect the energy and emissions rates notably. / Master of Science
126

Caracterização da diversidade genética de isolados Amazônicos de Crinipellis perniciosa oriundos de tecido infectado de Theobroma cacao / Characterization of the genetic diversity of Amazonian isolates of Crinipellis perniciosa from infected tissues of Theobroma cacao

Silva, Jurema Rosa de Queiroz 18 April 2007 (has links)
A doença vassoura-de-bruxa do cacaueiro (Theobroma cacao), causada pelo basidiomiceto Crinipellis perniciosa, levou a total destruição da lavoura sul-baiana, previamente cultivada principalmente com variedades altamente suscetíveis, tornando o Brasil, um país tipicamente exportador de cacau em importador em poucos anos. A perda da resistência do genótipo ?Scavina 6?, única fonte de resistência reconhecida contra C. perniciosa, está associada à variabilidade genética do patógeno. Diante disto, o objetivo deste estudo foi caracterizar a diversidade genética de isolados de C. perniciosa derivados de tecido infectado de Theobroma cacao (vassoura vede), originalmente coletados na Amazônia (Amazonas, Pará e Rondônia), uma região de ocorrência endêmica do fungo, usando marcadores moleculares. A identificação de relações genéticas entre isolados amazônicos e da Bahia e a possível existência de isolados geográficos também foram objetos deste trabalho. Primeiramente, a confirmação de identidade dos isolados Amazônicos foi conduzida usando amplificação e digestão da região ITS do rDNA e marcadores teloméricos. Todos os isolados avaliados foram confirmados como C. perniciosa. O primer telomérico TeloC1, previamente apresentado para discriminar o biótipo C, permitiu a separação do biótipo C dos biótipos S e L, porém, revelou variabilidade genética nos isolados de Cametá, PA e Cacaulândia, RO. Usando marcadores telomérico amplificado com o primer TeloA1R e ERIC, uma grande diversidade foi encontrada para os isolados da Região Amazônica em comparação àqueles da Bahia. Dentro dos isolados Amazônicos, a maior diversidade foi detectada para os isolados de Rondônia (Ji-Paraná, Cacaulândia e Ariquemes) e Pará (Cametá), áreas com 11 ocorrência endêmica ou de instalação histórica (mais de 300 anos) do cacaueiro, respectivamente. Isolados coletados em municípios localizados na regiãoTransamazônica, tais como Anapú, Altamira, Brasil Novo, Medicilândia e Uruará apresentaram maior similaridade com aqueles de Santarém e municípios relacionados à Belém, como Cametá, Baião e Mocajuba. Estes resultados sugerem que isolados da região Transamazônica pode ter sido originados de Belém ou Santarém, Pará. Na Bahia, houve a formação de dois grupos de isolados como previamente demonstrado. Os marcadores moleculares Microssatélites, ERIC e teloméricos foram eficientes na detecção da variabilidade genética em C. perniciosa. A diversidade genética observada auxiliará na identificação e escolha de regiões com maior diversidade de isolados para serem usados na seleção para resistência à vassoura-de-bruxa em programas de melhoramento do cacau / Witches broom disease of cacao (Theobroma cacao L.), caused by the basidiomycete Crinipellis perniciosa, devastated the producing region of Southern Bahia, previously cultivated mainly with highly susceptible cultivars, forcing Brazil, a typical exporter country to become a cocoa importer. The loss of resistance of the genotype ?Scavina 6?, the unique source of resistance against C. perniciosa has been associated with pathogen genetic variability. Thus, the objective of this study was to characterize the genetic diversity of C. perniciosa isolated derived from infected tissues of T. cacao (green-brooms), originally collected in the Amazon (Amazonas, Pará and Rondônia states), a region with endemic occurrence of the fungus, using molecular markers. The identification of the genetic relationships among the Amazonian and Bahian isolates, and the possible existence of geographical isolates were also objectives of this work. First, the identification confirmation of the Amazonian isolates was conducted using amplification and digestion of the ITS region of the rDNA and telomeric markers. All isolates evaluated were confirmed as C. perniciosa. The telomeric primer TeloC1, previously shown to discriminate the C biotype, allowed the separation of biotype C from biotypes S and L, but it revealed genetic diversity for isolates from Cametá, PA and Cacaulândia, RO. Using another telomeric marker amplified with TeloA1 primer and ERIC, a large genetic diversity was detected for isolates from the Amazon in comparison to Bahian. Within the Amazonian isolates, more diversity was detected for isolates from Rondônia (Ji-Paraná, Cacaulândia and Ariquemes) and Pará (Cametá), areas with endemic occurrence of wild cacao or historical introduction and cultivation (over 300 years), respectively. Isolates colletected at the Transamazônica roadway, such as from Anapú, Altamira, Brasil Novo, Medicilândia and Uruará presented more similarity with those from Santarém and locales nearer to Belém, such as Cametá, Baião and Mocajuba. These results suggested that isolates from the Transamazônica region might have originated from Belém or Santarém, Pará. In Bahia, there were two groups of isolates as previously demonstrated. Microsatellite, ERIC and telomeric markers were efficient in detecting the genetic variability of C. perniciosa. The genetic diversity observed will help in identifying and choosing regions with more diverse isolates to be used to screen for witches? broom resistance in cacao breeding programs
127

Efficient Secure Communication in VANETs under the Presence of new Requirements Emerging from Advanced Attacks

Bittl, Sebastian 29 September 2017 (has links)
Drahtlose ad-hoc Netzwerke zwischen Fahrzeugen, sog. Vehicular ad-hoc Networks (VANETs), bilden einen Ansatz zur Verbesserung der Verkehrssicherheit, indem sie zukünftige kooperative Fahrerassistenzsysteme ermöglichen. Diese Netzwerke erfordern ein hohes Sicherheitsniveau, sowohl in Bezug auf Datenintegrität und -authentizität als auch im Bereich Datenschutz. Aktuell verfügbare Technologien können diese Anforderungen nicht vollständig erfüllen. Etliche Nachteile aktueller VANET-Ansätze werden in dieser Arbeit aufgezeigt. In dieser Arbeit werden drei Schachpunkte von ETSI ITS bzw. WAVE basierten VANETs identifiziert, welche Angriffe auf Teilnehmer dieser Netzwerke ermöglichen. Diese ergeben sich aus 1. konstanten und für Teilnehmer charakteristischen Datensätzen innerhalb der zyklisch versandten Statusnachrichten, welche den Datenschutz der Fahrzeuge und damit auch ihrer Fahrer gefährden, 2. die Strategie zur Verteilung von digitalen Zertifikaten von Zertifizierungsstellen erlaubt es selbst Angreifern mit minimalen Fähigkeiten (einzelner, statischer Angreifer von außerhalb des Netzwerkes) die Kanallast in einem großen Teilgebiet des Netzwerkes massiv zu erhöhen, 3. GNSS Manipulation durch sog. spoofing erlaubt Angriffe auf zeit- und ortsbasiere Informationen in Fahrzeugen, wodurch sich folgende Gefährdungen ergeben: a. Der Grundanforderung Teilnehmer durch Nichtabstreitbarkeit der gesendeten Daten für ihr Verhalten zur Rechenschaft ziehen zu können wird die Grundlage entzogen, da der Zeitpunkt des Sendens der Daten nicht mehr sicher festgestellt werden kann. b. Die Zugangskontrolle zum System wird gefährdet, da angegriffene Teilnehmer veraltete Nachrichten und digitale Zertifikate akzeptieren. c. Angreifer können einen sog. Sybil Angriff durchführen. Es ist notwendig die identifizierten Sicherheitsprobleme zu beheben um eine sichere Verwendung von VANETs für zukünftige kooperative Fahrerassistenzsysteme zu ermöglichen. Weiterhin werden einige Designprobleme in ETSI ITS Protokollen identifiziert. Die bisherige Art der Nachrichtenzusammensetzung auf den einzelnen Protokollschichten führt häufig zu Gesamtnachrichten, welche die zulässige maximale Gesamtlänge auf niedrigen Protokollschichten überschreitet. Da solche Nachrichten nicht versandt werden könne, können diverse wichtige Datensätze nicht im Netzwerk verteilt werden. Außerdem ist keine verschlüsselte Ende-zu-Ende Kommunikation über eine Multi-Hop Verbindung möglich, da die notwendigen Routing-Informationen den weiterleitenden Teilnehmern nicht zur Verfügung stehen. Es werden Vorschläge diskutiert, wie diese Probleme gelöst werden können. Zur Adressierung der genannten Probleme werden u.a. folgende Maßnahmen vorgeschlagen: 1. Eine sichere Zeitsynchronisierung in VANETs ist notwendig. 2. Das Speichern von mehreren Fahrzeug-Zertifikaten mit gleicher Laufzeit ist zu vermeiden. 3. Das Speichern von Fahrzeug-Zertifikaten mit zukünftiger Laufzeit ist auf ein Minimum zu begrenzen. 4. Konstante und gleichzeitig für Teilnehmer charakteristische Datensätze sind nicht zu versenden. 5. Weitere Mechanismen zur Minimierung der Kanallast durch Zertifikatsverteilung sind notwendig, u.a. a. nach einem Pseudonymwechsel sollte dieser explizit signalisiert werden um das Versenden aller Zertifikate in der Umgebung durch die Detektion eines neuen Nachbarn zu verhindern. b. es sollte keine Verteilung von Zertifikatsketten erfolgen, da einzelne Zertifikate ausreichen. c. die Anzahl der Übermittlungen von Zertifikaten von Zertifizierungsstellen ist zu minimieren. Die Anwendung der genannten Verbesserungen überwindet die meisten Sicherheitsprobleme (1,2, und 3c). Für die weiteren Probleme kann der notwendige Aufwand für einen erfolgreichen Angriff deutlich erhöht werden. / Vehicular ad-hoc networks (VANETs) are an important approach to increase future safety of driving by enabling cooperative advanced driver assistance systems. However, rigid security and privacy requirements employed to conducted wireless data exchange still pose significant challenges for VANET approaches. Several weaknesses of the current state of the art of VANET approaches from ETSI ITS as well as WAVE standard frameworks have been identified in this work. Three main attack surfaces of ETSI ITS or WAVE based VANETs are identified in this thesis, which are 1. constant and distinctive content in data fields within frequently sent VANET messages highly endanger privacy of vehicles, and thereby also their drivers, 2. the distribution strategy of certificate authority (CA) certificates allows even a simple static outsider attacker to massively increase the channel load within a large area around the attacker, which significantly exceeds his own communication range, and 3. GNSS spoofing modifying time and position information inside nodes a. endangers the basic system requirement of accountability by circumventing the nonrepudiation feature of the employed digital signature scheme, b. endangers the access control system by forcing the acceptance of outdated messages and certificates, and c. enables an attacker to perform a Sybil attack. The identified security problems need to be overcome to re-enable secure usage of VANETs and ADASs, which are based on the information obtained via VANETs. Several protocol design weaknesses of the ETSI ITS approach have been identified. It is found that the standardized way of cross layer message assembly leads to frequent violation of low layers’ maximum packet size restrictions. This causes inabilities to distribute important data sets from the application layer. Furthermore, confidential end-to-end encrypted communication over a multi-hop connection is impossible, as forwarders cannot access required routing information. This is caused by incorrect data encryption rules. Approaches to overcome the found shortcomings are proposed and evaluated. To overcome the outlined security issues, several improvements have been proposed. These include, 1. secure time synchronization among nodes, but current mechanisms can hardly provide it, 2. caching of multiple pseudonym certificates being valid during the same time span is to be avoided, 3. pre-caching of pseudonym certificates valid in the future is to be limited to a minimum, 4. presence of constant but distinctive data sets within VANET messages has to be avoided to enable privacy conserving pseudonym changes, 5. mechanisms for limiting the channel load caused by certificate distribution are required, especially a. after a pseudonym change the number of superficial pseudonym certificate distributions due to new neighbor detection should be limited by using explicit signaling of the change, b. sending of certificate chains should be removed altogether, instead individual dissemination should be used for CA certificates, and c. the number of CA certificate deliveries after a request for such a kind of certificate should be limited to a minimum by using targeted requests. By employing the given improvements most of the found security weaknesses can be overcome (issues 1, 2 and 3c). For the remaining weaknesses the required capabilities for a successful attack can be made significantly more challenging.
128

Filogeografia de Cattleya loddigesii Lindl. e Cattleya harrisoniana (ex Lindl.) Bateman (Orchidaceae) / Phylogeography of the Cattleya loddigesii Lindl. and Cattleya harrisoniana (ex Lindl.) Bateman

Tomé, Thaís Melega 13 September 2016 (has links)
O Brasil abrange grande diversidade de espécies da família Orchidaceae, onde o gênero Cattleya se destaca devido a reconhecida importância horticultural e espécies altamente relacionadas de difícil delimitação taxonômica. Anteriormente, Cattleya loddigesii e C. harrisoniana foram reconhecidas como espécies distintas devido à descontinuidade morfológica, fenológica e distribuição geográfica. Entretanto, esses critérios não são suficientes para determinar com clareza a delimitação dessas espécies, uma vez que existem populações com características morfológicas e fenológicas intermediárias consideradas introgredidas. Com o intuito de esclarecer o relacionamento entre C. loddigesii e C. harrisoniana, a relação das populações introgredidas, a estruturação das populações, bem como padrões filogeográficos envolvidos, análises filogeográficas baseadas em sequencias de DNA de cloroplasto (cpDNA) e DNA nuclear ribossomal (ITS) foram utilizadas. No total, foram amostrados 130 indivíduos das duas espécies distribuídos em 17 populações. Os resultados obtidos suportam a distinção entre as plantas, onde a árvore de estimativa de tempo de divergência para ITS separou mais evidentemente em clados distintos as duas espécies, corroborando a alta estruturação encontrada pela AMOVA (ΦCT = 0,597), distribuição haplotípica e análises bayesianas. Apesar disso, os resultados para cpDNA não evidenciaram claramente essa distinção. Os resultados obtidos pelo software Migrate também suportam a distinção das espécies e, ainda, sugerem que as populações introgredidas são mais relacionadas com C. loddigesii. Ademais, os dados sugerem que a estruturação populacional encontrada segue o modelo de isolamento por distância, assim como sugeriram as análises de clados aninhados - NCPA e bayesiana. Ademais, os resultados de estruturação para ambas as regiões, e as possíveis incongruências entre os resultados de cpDNA e ITS estão indicando que existe maior número de indivíduos híbridos e introgressão, necessitando de novos estudos para corroborar essas evidências. Uma das possíveis razões pelo amplo compartilhamento de haplótipos, principalmente para cpDNA, pode ter sido devido à conectividade mantida através das populações introgredidas. Além disso, a reprodução alogâmica, a dispersão por abelhas e a dispersão de sementes pelo vento a longas distâncias podem também ter contribuído para a conexão entre elas. Os resultados da reconstrução filogeográfica, bem como o número de migrantes sugerem que as populações se dispersaram em direção ao Norte-Sul em períodos glaciais do Pleistoceno. Além disso, a alta diversidade e a diferenciação das populações do extremo Sul de SP indicam indícios de uma possível zona de refúgio neste local. / Brazil covers a wide range of species of the orchid family, where the Cattleya genus stands out due to a recognized horticultural importance and highly related species difficult taxonomic delimitation. Previously, Cattleya loddigesii and C. harrisoniana were recognized as distinct species due to morphological, phenological and geographical distribution discontinuity. However, these criteria are not sufficient to determine clearly the identification of these species, as there are populations with intermediate morphological and phenological characteristics considered introgressed. In order to clarify the relationship between C. loddigesii and C. harrisoniana, the ratio of introgressed populations, the population structure and the phylogeographic patterns involved, phylogeographic analyses based on chloroplast DNA sequences (cpDNA) and ribosomal nuclear DNA (ITS), were used. Overall, we sampled 130 individuals of the two species distributed into 17 populations. Results support the distinction between plants, where the tree of divergence time estimate for ITS separated the two species more clearly into distinct clades, corroborating the high structure found by AMOVA (ΦCT = 0.597), haplotype distribution and Bayesian analyses. Nevertheless, the results for cpDNA did not demonstrated that distinction clearly. The results obtained by the Migrate software also support the species distinction and suggest that the introgressed populations are more closely related to C. loddigesii. Furthermore, the data suggest that the population structure found follows the isolation by distance model, as also suggested in the nested clades - NCPA and Bayesian analyses. Furthermore, the population structure results for both regions, plus possible inconsistencies between the cpDNA and ITS results, may indicate that there is a greater number of hybrid individuals and introgression, requiring new studies to corroborate this evidence. One of the possible reasons for the broad sharing of haplotypes, especially for cpDNA, may have been due to connectivity maintained through introgressed populations. Furthermore, the allogamous reproduction, the dispersal by bees and dispersal of seeds by wind over long distances may also have contributed to the connection between them. The results of phylogeographic reconstruction, as well as the number of migrants suggest that the population is dispersed towards North-South in glacial periods of the Pleistocene. In addition, the high diversity and differentiation of populations of the Southern tip of SP indicate evidence of a possible refuge zone at this area.
129

Contribution to the Intelligent Transportation System : security of Safety Applications in Vehicle Ad hoc Networks / Contribution aux systèmes de transport intelligents : sécurité des applications de sureté dans les réseaux de véhicules ad hoc

Nguyen-Minh, Huong 29 September 2016 (has links)
Le développement du transport partout dans le monde a fourni un grand nombre d'avantages pour de nombreux aspects de la vie humaine. Les systèmes de transport intelligents (ITS) sont des applications avancées qui visent à rendre les réseaux de transport plus sûrs, plus pratiques et plus intelligents. Selon leurs usages, ils peuvent être classés en deux types d'applications ITS, qui sont des applications de sûreté et des applications non-sûreté. Le réseau de véhicules ad hoc (VANET) est un élément clé des systèmes ITS, car il permet la communication entre les unités de transport. Ces communications prennent en charge différentes applications ITS avec différentes propriétés. Parmi les deux types d'applications, nous nous intéressons aux applications de sûreté qui ont des contraintes de qualité de service et des contraintes de sécurité plus strictes. Selon le scénario considéré et l'application de sûreté donnée, les informations échangées entre les véhicules doivent être diffusé localement dans une communication à un seul saut et / ou également notifiées aux véhicules à large dimension. L'objectif principal de cette thèse est d'améliorer les performances des applications de sûreté en termes de qualité de service et de sécurité, à la fois dans une communication à un saut et dans une communication multi-sauts. Nous nous intéressons à la fiabilité, la connectivité et le déni de service (DoS). Nous étudions et proposons des solutions techniques provenant de couches inférieures (Physique, Liaison et Réseaux) qui jouent un rôle fondamental dans l'atténuation des défis créés par la nature de l'environnement des véhicules. Tout d'abord, nous introduisons une nouvelle méthode efficace pour fiabiliser la radiodiffusion. Dans notre système, les messages de sécurité sont rediffusés lorsque l'expéditeur est sollicité. Cela augmente le pourcentage de véhicules qui reçoivent les messages alors que le nombre de messages dupliqués reste limité. En second lieu, en tenant compte de la fragmentation du réseau, nous étudions des solutions qui permettent de pallier la déconnexion temporaire du réseau pour apporter l'information de sécurité aux destinataires. Basé sur les propriétés sociales des réseaux de véhicules, nous proposons un protocole de transfert basé sur des relations sociales pour relayer la communication entre les véhicules et des points d'intérêt qui fournissent des services de sécurité avec des contraintes de temps plus souples, telles que la recherche et le sauvetage. Troisièmement, nous étudions l'attaque de brouillage, une sorte d'attaques DoS, qui est cruciale pour les applications de sûreté et qui et facilement réalisable au niveau des couches inférieures. Nous modélisons l'attaque de brouillage afin d'étudier la dégradation causée par l'attaque sur les performances du réseau. La dégradation à un certain niveau dans les performances du réseau est une indication de présence d'attaques de brouillage dans le réseau; donc les résultats de cette analyse nous permettent de déterminer les seuils de performance du réseau pour distinguer entre les scénarios normaux et les scénarios attaqués. Toutefois, selon cette analyse, le procédé utilisant la dégradation comme une indication pour détecter une attaque de brouillage est impossible pour des applications temps réel. Par conséquent, nous proposons des nouvelles méthodes afin de détecter les attaques de brouillage temps réel. Nos méthodes permettent la détection en temps réel avec une grande précision, non seulement chez le moniteur central mais aussi au niveau de chaque véhicule. Par conséquent, les véhicules sont avertis sur l'attaque assez tôt pour récupérer la communication et réagir à ces attaques. / The development of transportation all over the world has been providing a lot of benefits for many aspects of human life. Intelligent Transportation Systems (ITS) are advanced applications that aim to make the transport networks safer, more convenient and smarter. According to their usages, they can be classified into two types of ITS applications, which are safety applications and non-safety applications. Vehicular ad hoc network (VANET) is a key component of ITS since it enables communications among transportation units. These communications support different ITS applications with various properties. Between two types of applications, we are interested in safety applications which have tighter quality and security constraints. Depending on an applied scenario of a given safety application, the exchanged information among vehicles must be broadcast locally within one-hop communication and/or also be notified to vehicles in large range. The main objective of this thesis is to improve the performance of safety applications in term of the quality of service and security, in both one-hop communication and multi-hop communication. We focus on reliability, connectivity and Denial of Services (DoS) attack. We study and propose technical solutions coming from lower layers (Physical, MAC and network layers) which play a fundamental role in mitigation to challenges created by the nature of the vehicular environment. Firstly, we introduce a reliable scheme to achieve the reliability for broadcasting. In our scheme, the safety messages are rebroadcast when the sender is solicited. This increases the percentage of vehicles receiving the messages while duplicated messages are limited. Secondly, with consideration of the fragmentation of the network, we study solutions that overcome the temporary disconnection in the network to bring the safety information to the recipients. Based on the social properties of vehicular networks, we propose a social-based forwarding protocol to support the communication between vehicles to points of interest that provide safety services with looser time constraints, such as search and rescue. Thirdly, we investigate jamming attack, a kind of DoS attacks, which is crucial for safety applications because of the adequate condition of the attack at the lower layers. We model jamming attack on broadcasting in order to study the degradation caused by the attack on network performance. The degradation at a certain level in network performance is an indication of a jamming attack presence in the network; therefore results from this analysis will allow us to determine network performance thresholds to distinguish between normal and attacked scenarios. However, according to our analysis, the method using the degradation as an indication to detect a jamming attack is not feasible for real-time applications. Hence, we propose methods to detect jamming attacks in real-time. Our methods allow real-time detection with high accuracy, not only at the central monitor but also at each vehicle. Therefore, vehicles are noticed about the attack soon enough to recover the communication and react to these attacks.
130

Avaliação de fungos entomopatogênicos visando ao controle da ampola da erva-mate Gyropsylla spegazziniana (Lizer & Trelles) (Hemiptera: Psyllidae) / Activity and characterization of entomopathogenic fungi against paraguay tea ampul (gyropsylla spegazziniana) (lizer & trelles) (hemiptera: psyllidae)

Formentini, Marina Andressa 20 September 2012 (has links)
Made available in DSpace on 2017-07-10T14:38:34Z (GMT). No. of bitstreams: 1 Marina.pdf: 1184727 bytes, checksum: 464327ef9797c59ec694ee14413ca72c (MD5) Previous issue date: 2012-09-20 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / This study aimed to select and characterize strains of entomopathogenic fungi in order to control Gyropsylla spegazziniana. For this, the fifth instar nymphs were transferred to Paraguay tea seedlings, followed by spraying conidial suspensions of 48 strains of Beauveria spp., Metarhizium anisopliae, Isaria spp. and Lecanicillium spp. at a concentration of 1 × 109 conidia/mL. The seedlings were placed in PVC cages kept in a climatized room (26 ± 1°C; 12 h photophase and 60 ± 10% R.H.), and the insect mortality was evaluated daily for 10 days. The most active isolates were compared by means of vegetative growth, conidial production in culture media, insecticidal activity and molecular analyses, by sequencing the region rDNA-ITS and RAPD. The genus 22 Beauveria spp. was more efficient among the entomopathogenic fungi, especially for strain Unioeste 44 that showed the best performance, demonstrating its potential to control the pest. Molecular analysis of rDNA-ITS region allowed the identification of isolates as B. bassiana e B. brongniartii and RAPD markes were associated with virulence / O objetivo desse trabalho foi selecionar e caracterizar isolados de fungos entomopatogênicos, visando o controle dessa praga. Para tal, ninfas de 5o ínstar foram transferidas para mudas de erva-mate, seguido da pulverização de suspensões de conídios (1 × 109 conídios/mL) de 48 isolados de Beauveria spp., Metarhizium anisopliae, Isaria spp. e Lecanicillium spp. As mudas foram acondicionadas em gaiolas de PVC, e mantidas em sala climatizada (26 ± 1°C; 12 h de fotofase e U.R. 60 ± 10%). 21 A mortalidade dos insetos foi avaliada diariamente, por 10 dias e os isolados mais ativos foram comparados entre si por meio do crescimento vegetativo, produção de conídios em meios de cultura, atividade inseticida e análises moleculares, por meio do seqüenciamento da região rDNA-ITS e marcadores RAPD. O gênero Beauveria spp. foi mais eficiente dentre os fungos entomopatogênicos, em especial o isolado Unioeste 44 que apresentou o melhor desempenho, evidenciando seu potencial para o controle da praga. As análises moleculares da região rDNA-ITS possibilitou a identificação dos isolados como B. bassiana e B. brongniartii e os marcadores RAPD foram associados à virulência

Page generated in 0.0181 seconds