• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 8
  • 5
  • 5
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 25
  • 25
  • 10
  • 9
  • 9
  • 8
  • 6
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Bus Bunching Prediction and Transit Route Demand Estimation Using Automatic Vehicle Location Data / バスロケーションデータを用いたバスバンチングの予測と路線バス利用者の需要推定に関する研究

Sun, Wenzhe 25 May 2020 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(工学) / 甲第22653号 / 工博第4737号 / 新制||工||1740(附属図書館) / 京都大学大学院工学研究科都市社会工学専攻 / (主査)教授 山田 忠史, 教授 藤井 聡, 准教授 SCHMOECKER Jan-Dirk / 学位規則第4条第1項該当 / Doctor of Philosophy (Engineering) / Kyoto University / DFAM
12

Odposlech a záznam telekomunikačního provozu / Wiretapping and recording of telecommunication traffic

Born, Natalie January 2020 (has links)
Wiretapping and recording of telecommunication traffic Abstract The thesis deals with the institute of wiretapping and recording of telecommunication traffic, which deserves closer attention due to the constant development of technologies. The aim of the thesis is to analyse the main issues of the regulation not only according to the pivotal criminal procedure norm, but also according to other acts, especially in the context of constitutional limits. The thesis is divided into five chapters. In the initial chapter, the author briefly deals with wiretapping of telecommunications traffic from a technological perspective followed by an analysis of the development of wiretapping and recording of telecommunications traffic, in terms of foreign legislation and then Czech legal system. It takes into account not only the historical development of §88 and §88a of the Criminal Procedure Code but also the parallel regulation of wiretapping in the Police Act of 1991. In the second chapter, the author outlines the constitutional limits not only in the terms of the Charter but also according to the Convention and the related case law of the European Court of Human Rights. In the crucial third chapter, the author examines the regulation of wiretapping and recording of telecommunications traffic according to applicable law...
13

Activity Support Based on Human Location Data Analysis with Environmental Factors / 環境要因を考慮した人の位置情報分析に基づく行動支援

Kasahara, Hidekazu 23 March 2016 (has links)
京都大学 / 0048 / 新制・課程博士 / 博士(情報学) / 甲第19851号 / 情博第602号 / 新制||情||105(附属図書館) / 32887 / 京都大学大学院情報学研究科知能情報学専攻 / (主査)教授 美濃 導彦, 教授 石田 亨, 教授 岡部 寿男 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM
14

The dynamic behaviour of distance protection relays on series compensated lines under fault conditions.

Magagula, Xolani. January 2014 (has links)
M. Tech. Electrical Engineering / Investigates the reasons behind the poor performance of distance relays on series compensated lines. In order to achieve this objective, a case study will be established in a power system software (DigSilent Power Factory). Furthermore, a practical incident that occurred on Eskom's compensated network will be examined. However, prior to investigating the performance of the distance relay on transmission lines, there are some other critical aspects that have to be thoroughly understood. These aspects include amongst others: transmission line modelling ; numeric relay algorithms ; distance protection philosophies ; series compensation phenomena ; analysis of distance relays performance on both compensated and uncompensated lines and the action and influence of the MOV. The study will provide a better understanding regarding the dynamic behaviour of the impedance protection relay under fault conditions on series compensated lines and the behaviour of the MOV during a fault.
15

Geotagging in social media : exploring the privacy paradox

Menfors, Martina, Fernstedt, Felicia January 2015 (has links)
Increasingly, online social media networks allow users to use geotagging. This method of adding location data to various content shared in real time has introduced privacy related issues and threats to the users of such networks. Previous research present opposing findings on whether users actually care about their location privacy or not, and it has also been shown that users often display a behaviour inconsistent with their concerns. When asked, users tend to report high privacy concerns, but in contrast, they will then not let their privacy concerns affect or limit their behaviour online; the privacy paradox is a description of this dichotomy. The problem, however, is not only that location privacy seems to be a paradoxical issue; the sharing of location data provides users with new possibilities that can potentially have negative consequences for them, such as someone else being able to identify one’s identity, home location, habits or other sensitive information. Social media network users communicate that a part of this is due to the lack of control over which information they share, with whom and where.This study employs a qualitative method, using unstructured interviews in a pre-study and a self-completion questionnaire. The purpose of the study is to examine and gain a better understanding of how the privacy paradox can help to better explain users’ location data disclosure preferences in the context of social media networking, and to help social media network developers in order to reduce privacy-related issues in social media networking applications with geotagging capabilities. The findings indicate that the paradox indeed is evident in user’s stated geotagging behaviour, and that users are slightly more worried about their location privacy than their overall online privacy. The conclusions offer a couple of different explanations for the paradox, and we argue that the contradiction of the paradox can be seen as a constant trade-off between benefits and risks of geotagging. We also give some examples of such advantages and disadvantages.
16

Data retention - ukládání provozních a lokalizačních údajů / Data retention -depositing operational and localizing data

Jirovský, Lukáš January 2015 (has links)
DP - Lukáš Jirovský, Data retention, 2015 Abstract Data retention - storing of traffic and location metadata The topic of this thesis is data retention - traffic and location metadata storing (and providing to state) by telecommunication providers according to Czech and European law (including rulings of constitutional courts). It also describes compliance or conflict with the users right to privacy and also possibilities to provide this data to users. There is also technical description of the data with their meaning and statistics of crimes detection according to validity of this law.
17

Modelling chaotic systems with neural networks : application to seismic event predicting in gold mines

Van Zyl, Jacobus 12 1900 (has links)
Thesis (MSc (Computer Science))-- University of Stellenbosch, 2001. / ENGLISH ABSTRACT: This thesis explores the use of neural networks for predicting difficult, real-world time series. We first establish and demonstrate methods for characterising, modelling and predicting well-known systems. The real-world system we explore is seismic event data obtained from a South African gold mine. We show that this data is chaotic. After preprocessing the raw data, we show that neural networks are able to predict seismic activity reasonably well. / AFRIKAANSE OPSOMMING: Hierdie tesis ondersoek die gebruik van neurale netwerke om komplekse, werklik bestaande tydreekse te voorspel. Ter aanvang noem en demonstreer ons metodes vir die karakterisering, modelering en voorspelling van bekende stelsels. Ons gaan dan voort en ondersoek seismiese gebeurlikheidsdata afkomstig van ’n Suid-Afrikaanse goudmyn. Ons wys dat die data chaoties van aard is. Nadat ons die rou data verwerk, wys ons dat neurale netwerke die tydreekse redelik goed kan voorspel. / Integrated Seismic Systems International
18

Denní rytmy obcí Středočeského kraje / Daily rhythms of municipatilies in Central Bohemian region

Frydrych, Pavel January 2018 (has links)
An object of this diploma thesis is a study of daily rhythms of municipalities in the Central Bohemian Region. The aim is to bring new insights into the daily rhythms of the suburban zone of the Prague Metropolitan Area and the Central Bohemian Region. The work has three main objectives. The first objective is to create a typology of the Central Bohemian municipalities according to their daily rhythms. Mobile phone location data is used to create the typology. There was used a method called cluster analysis. The second objective is to evaluate the daily rhythms in selected municipalities (Kněževes, Ořech, Tochovice) in detail with other data (mobile phone location data from Prague Institute of Planning and Development and commuting data from the Census 2011). Using these sources, I want to highlight the obstacles, but also the benefits of using mobile phone location data in studying of daily rhythms. The last objective is to describe in these three municipalities the pacemakers which influent their timing. The results show that in the Central Bohemian region dominate municipalities with a residential type of daily rhythm. Most of these municipalities are located in the suburban zone of Prague, while in other municipalities of the Central Bohemian region is the rhythm often almost balanced. Large...
19

Providing Context to the Clues: Recovery and Reliability of Location Data from Android Devices

Bell, Connie 01 January 2015 (has links)
Mobile device data continues to increase in significance in both civil and criminal investigations. Location data is often of particular interest. To date, research has established that the devices are location aware, incorporate a variety of resources to obtain location information, and cache the information in various ways. However, a review of the existing research suggests varying degrees of reliability of any such recovered location data. In an effort to clarify the issue, this project offers case studies of multiple Android mobile devices utilized in controlled conditions with known settings and applications in documented locations. The study uses data recovered from test devices to corroborate previously identified accuracy trends noted in research involving live-tracked devices, and it further offers detailed analysis strategies for the recovery of location data from devices themselves. A methodology for reviewing device data for possible artifacts that may allow an examiner to evaluate location data reliability is also presented. This paper also addresses emerging trends in device security and cloud storage, which may have significant implications for future mobile device location data recovery and analysis. Discussion of recovered cloud data introduces a distinct and potentially significant resource for investigators, and the paper addresses the cloud resources' advantages and limitations.
20

Wireless privacy and personalized location-based services: the challenge of translating the legal framework into business practices

Gratton, Eloïse 08 1900 (has links)
L'avancement des communications sans-fil permet l'obtention de nouveaux services bases sur l'habileté des fournisseurs de services sans-fil à déterminer avec précision, et avec l'utilisation de technologies de pistage, la localisation et position géographiquement d'appareils sans-fil Cette habileté permet d'offrir aux utilisateurs de sans-fil de nouveaux services bases sur la localisation et la position géographique de leur appareil. Le développement des services basés sur la localisation des utilisateurs de sans-fil soulevé certains problèmes relatifs à la protection de la vie privée qui doivent être considérés. En effet, l'appareil sans-fil qui suit et enregistre les mouvements de I 'utilisateur permet un système qui enregistre et entrepose tous les mouvements et activités d'un tel utilisateur ou encore qui permet l'envoi de messages non anticipes à ce dernier. Pour ce motif et afin de protéger la vie privée des utilisateurs de sans-fil, une compagnie désirant développer ou déployer une technologie permettant d'offrir ce genre de services personnalisés devra analyser l'encadrement légal touchant la protection des données personnelles--lequel est dans certains cas vague et non approprié à ce nouveau contexte--ainsi que la position de l'industrie dans ce domaine, et ce, afin d'être en mesure de traduire cet encadrement en pratiques commerciales. Cette analyse permettra d'éclairer le fournisseur de ces services sur la façon d'établir son modèle d'affaires et sur le type de technologie à développer afin d'être en mesure de remédier aux nouveaux problèmes touchant la vie privée tout en offrant ces nouveaux services aux utilisateurs de sans-fil. / The proliferation of mobile communications is leading to new services based on the ability of service providers to determine, with increasing precision and through the use of location determination technologies, the geographic location of wireless devices and allow their users to receive services based on such location. The development of location-based services introduces new privacy risks for consumers that must be addressed. The portability of wireless devices coupled with their ability to pinpoint the location of wireless users and reveal it to others could produce a system where the everyday activities and movements of these users are tracked and recorded, and where wireless users receive unanticipated messages on their device. For this reason and in order to preserve the privacy of wireless users, a company looking to deploy a technology related to the providing of personalized location-based services ("LBS Provider") will have to analyze the privacy legal framework, coming either from legal sources--that may be in some case vague and not specific to this new context--or from the industry, and translate such framework into business practices. Such analysis may help in establishing what kind of business model and technology should be adopted and developed by LBS Providers in order to ensure the privacy of wireless users while providing this new type of service.

Page generated in 0.093 seconds