• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 144
  • 64
  • 49
  • 47
  • 39
  • 17
  • 16
  • 10
  • 5
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 455
  • 178
  • 125
  • 85
  • 82
  • 82
  • 81
  • 66
  • 60
  • 52
  • 51
  • 50
  • 50
  • 50
  • 50
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

The effect of expanded shale lightweight aggregates on the hydraulic drainage properties of clays

Mechleb, Ghadi 05 November 2013 (has links)
Fine grained soils, in particular clays of high plasticity, are known to have very low values of hydraulic conductivity. This low permeability causes several problems related to vegetation growth and stormwater runoff. One way to improve the permeability of clay soils is by using coarse aggregates as a fill material. Recently, Expanded Shale has been widely applied as an amendment to improve drainage properties of clayey soils. However, limited effort has been made to quantify the effect of Expanded Shale on the hydraulic conductivity or on the volume change of fine grained soils. Specifically, the field and laboratory tests required to quantify the amounts of Expanded Shale to be mixed with clays to obtain desired hydraulic conductivity values have not been conducted. This paper presents the results of a series of laboratory fixed-wall permeameter tests conducted on naturally occurring clay deposits in the Austin area with different plasticity. The testing program comprised of clay samples with different quantities of Expanded Shale aggregates by volume, ranging between 0 and 50%, and compacted at two different compaction efforts (60% and 100% of the standard Proctor compaction effort). The laboratory test results indicate that the hydraulic conductivity of the three soils increases by at least an order of magnitude when the Expanded Shale is mixed in quantities between 25 to 30% by volume depending on the compaction effort. Expanded Shale amended samples also showed lower swelling potential with increasing amendment quantities. Moreover, when the clay with the higher plasticity was mixed with 25% Expanded Shale, the compression and recompression ratios decreased by 25% and 15% respectively. / text
52

Collar-Integrated Small Mammal GPS Tracker

Kundu, Ina, Rice, Sean, Klug, Kevin, Chen, Hao, Marquez, Elizabeth, Zhong, Yizhou 10 1900 (has links)
ITC/USA 2013 Conference Proceedings / The Forty-Ninth Annual International Telemetering Conference and Technical Exhibition / October 21-24, 2013 / Bally's Hotel & Convention Center, Las Vegas, NV / A position beaconing system for tracking small mammals, such as the Golden Lion Tamarin, was developed and tested. GPS acquires location of the animal. The system utilizes a VHF radio transmitter tuned to 144.390 MHz, which is located in the amateur radio band. APRS was selected as the protocol for position, transmission, and recovery. This allows users to benefit from any existing APRS enabled devices. The beacon was designed by attempting to optimize operational longevity and minimize size. Consequently, the system is implemented on a single board and enclosed for protection. As the system must be comfortable for the mammal, it was manufactured from lightweight components and enclosed in a plastic housing. To attach the case to the mammal, it is connected to a flexible, zig-zag, wearable antenna, which functions as a collar.
53

An investigation into possible means of increasing the strength of lightweight high strength concrete

Edwards, Derek Oswald. January 1993 (has links)
published_or_final_version / Civil and Structural Engineering / Master / Master of Philosophy
54

MUTUAL AUTHENTICATION SCHEME FOR MOBILE RFID SYSTEMS

Allahem, Hisham 28 March 2013 (has links)
Radio Frequency Identification (RFID) systems are rapidly becoming popular in a variety of applications such as supply chain management, storage management and healthcare. Such a system consists of a tag with a unique identifier, a tag reader and a backend server. Due to the system's limited computational resources, it can be subject to various types of attacks. This can exacerbate when the reader itself is mobile. The objective of this thesis is to propose a mutual authentication scheme for mobile RFID systems. Our proposed scheme uses a shared encryption key generated and updated by the mobile reader to authenticate the system entities. The encryption keys are updated at the end of each authentication session. Experimental results show that the proposed scheme meets the security and privacy goals, and resists known attacks on mobile RFID systems
55

Investigation of mix design and properties of high-strength/high-performance lightweight concrete

Buchberg, Brandon S. 05 1900 (has links)
No description available.
56

A Lightweight Coordination Approach for Resource-Centric Collaborations

Ghandehari, Morteza Unknown Date
No description available.
57

Thinking outside the TBox multiparty service matchmaking as information retrieval

Lambert, David James January 2010 (has links)
Service oriented computing is crucial to a large and growing number of computational undertakings. Central to its approach are the open and network-accessible services provided by many different organisations, and which in turn enable the easy creation of composite workflows. This leads to an environment containing many thousands of services, in which a programmer or automated composition system must discover and select services appropriate for the task at hand. This discovery and selection process is known as matchmaking. Prior work in the field has conceived the problem as one of sufficiently describing individual services using formal, symbolic knowledge representation languages. We review the prior work, and present arguments for why it is optimistic to assume that this approach will be adequate by itself. With these issues in mind, we examine how, by reformulating the task and giving the matchmaker a record of prior service performance, we can alleviate some of the problems. Using two formalisms—the incidence calculus and the lightweight coordination calculus—along with algorithms inspired by information retrieval techniques, we evolve a series of simple matchmaking agents that learn from experience how to select those services which performed well in the past, while making minimal demands on the service users. We extend this mechanism to the overlooked case of matchmaking in workflows using multiple services, selecting groups of services known to inter-operate well. We examine the performance of such matchmakers in possible future services environments, and discuss issues in applying such techniques in large-scale deployments.
58

Characterization of shear and bending stiffness for optimizing shape and material of lightweight beams

Amany, Aya Nicole Marie. January 2007 (has links)
Optimized slender and short-thick beams are used in building, aircraft and machine structures to increase performance at a lower material cost. A previous work proposes an optimum shape, material and size selection model to design lightweight slender beams under pure bending. In short-thick beams, the transverse shear effects are no longer negligible and impact the choice of the optimum shape. This work extends such an optimum selection model to consider both slender and short-thick beams, by formulating the total beam stiffness design requirement as a combination of shear and bending stiffness. Selection charts are developed to show the impact of design variables, such as shape, size, material and slenderness, on the total beam stiffness. The model of total beam stiffness is validated against computational results from finite element analyses of beam models. A case study demonstrates the use of the selection charts to compare the performance of beams at the conceptual design stage.
59

Design and Analysis of Security Schemes for Low-cost RFID Systems

Chai, Qi 01 1900 (has links)
With the remarkable progress in microelectronics and low-power semiconductor technologies, Radio Frequency IDentification technology (RFID) has moved from obscurity into mainstream applications, which essentially provides an indispensable foundation to realize ubiquitous computing and machine perception. However, the catching and exclusive characteristics of RFID systems introduce growing security and privacy concerns. To address these issues are particularly challenging for low-cost RFID systems, where tags are extremely constrained in resources, power and cost. The primary reasons are: (1) the security requirements of low-cost RFID systems are even more rigorous due to large operation range and mass deployment; and (2) the passive tags' modest capabilities and the necessity to keep their prices low present a novel problem that goes beyond the well-studied problems of traditional cryptography. This thesis presents our research results on the design and the analysis of security schemes for low-cost RFID systems. Motivated by the recent attention on exploiting physical layer resources in the design of security schemes, we investigate how to solve the eavesdropping, modification and one particular type of relay attacks toward the tag-to-reader communication in passive RFID systems without requiring lightweight ciphers. To this end, we propose a novel physical layer scheme, called Backscatter modulation- and Uncoordinated frequency hopping-assisted Physical Layer Enhancement (BUPLE). The idea behind it is to use the amplitude of the carrier to transmit messages as normal, while to utilize its periodically varied frequency to hide the transmission from the eavesdropper/relayer and to exploit a random sequence modulated to the carrier's phase to defeat malicious modifications. We further improve its eavesdropping resistance through the coding in the physical layer, since BUPLE ensures that the tag-to-eavesdropper channel is strictly noisier than the tag-to-reader channel. Three practical Wiretap Channel Codes (WCCs) for passive tags are then proposed: two of them are constructed from linear error correcting codes, and the other one is constructed from a resilient vector Boolean function. The security and usability of BUPLE in conjunction with WCCs are further confirmed by our proof-of-concept implementation and testing. Eavesdropping the communication between a legitimate reader and a victim tag to obtain raw data is a basic tool for the adversary. However, given the fundamentality of eavesdropping attacks, there are limited prior work investigating its intension and extension for passive RFID systems. To this end, we firstly identified a brand-new attack, working at physical layer, against backscattered RFID communications, called unidirectional active eavesdropping, which defeats the customary impression that eavesdropping is a ``passive" attack. To launch this attack, the adversary transmits an un-modulated carrier (called blank carrier) at a certain frequency while a valid reader and a tag interacts at another frequency channel. Once the tag modulates the amplitude of reader's signal, it causes fluctuations on the blank carrier as well. By carefully examining the amplitude of the backscattered versions of the blank carrier and the reader's carrier, the adversary could intercept the ongoing reader-tag communication with either significantly lower bit error rate or from a significantly greater distance away. Our concept is demonstrated and empirically analyzed towards a popular low-cost RFID system, i.e., EPC Gen2. Although active eavesdropping in general is not trivial to be prohibited, for a particular type of active eavesdropper, namely a greedy proactive eavesdropper, we propose a simple countermeasure without introducing extra cost to current RFID systems. The needs of cryptographic primitives on constraint devices keep increasing with the growing pervasiveness of these devices. One recent design of the lightweight block cipher is Hummingbird-2. We study its cryptographic strength under a novel technique we developed, called Differential Sequence Attack (DSA), and present the first cryptanalytic result on this cipher. In particular, our full attack can be divided into two phases: preparation phase and key recovery phase. During the key recovery phase, we exploit the fact that the differential sequence for the last round of Hummingbird-2 can be retrieved by querying the full cipher, due to which, the search space of the secret key can be significantly reduced. Thus, by attacking the encryption (decryption resp.) of Hummingbird-2, our algorithm recovers 36-bit (another 28-bit resp.) out of 128-bit key with $2^{68}$ ($2^{60}$ resp.) time complexity if particular differential conditions of the internal states and of the keys at one round can be imposed. Additionally, the rest 64-bit of the key can be exhaustively searched and the overall time complexity is dominated by $2^{68}$. During the preparation phase, by investing $2^{81}$ effort in time, the adversary is able to create the differential conditions required in the key recovery phase with at least 0.5 probability. As an additional effort, we examine the cryptanalytic strength of another lightweight candidate known as A2U2, which is the most lightweight cryptographic primitive proposed so far for low-cost tags. Our chosen-plaintext-attack fully breaks this cipher by recovering its secret key with only querying the encryption twice on the victim tag and solving 32 sparse systems of linear equations (where each system has 56 unknowns and around 28 unknowns can be directly obtained without computation) in the worst case, which takes around 0.16 second on a Thinkpad T410 laptop.
60

An investigation into possible means of increasing the strength of lightweight high strength concrete /

Edwards, Derek Oswald. January 1993 (has links)
Thesis (M. Phil.)--University of Hong Kong, 1993.

Page generated in 0.0244 seconds