• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 9
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 14
  • 14
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Securing sensor network

Zare Afifi, Saharnaz January 2014 (has links)
Indiana University-Purdue University Indianapolis (IUPUI) / A wireless sensor network consists of lightweight nodes with a limited power source. They can be used in a variety of environments, especially in environments for which it is impossible to utilize a wired network. They are easy/fast to deploy. Nodes collect data and send it to a processing center (base station) to be analyzed, in order to detect an event and/or determine information/characteristics of the environment. The challenges for securing a sensor network are numerous. Nodes in this network have a limited amount of power, therefore they could be faulty because of a lack of battery power and broadcast faulty information to the network. Moreover, nodes in this network could be prone to different attacks from an adversary who tries to eavesdrop, modify or repeat the data which is collected by other nodes. Nodes may be mobile. There is no possibility of having a fixed infrastructure. Because of the importance of extracting information from the data collected by the sensors in the network there needs to be some level of security to provide trustworthy information. The goal of this thesis is to organize part of the network in an energy efficient manner in order to produce a suitable amount of integrity/security. By making nodes monitor each other in small organized clusters we increase security with a minimal energy cost. To increase the security of the network we use cryptographic techniques such as: public/ private key, manufacturer signature, cluster signature, etc. In addition, nodes monitor each other's activity in the network, we call it a "neighborhood watch" In this case, if a node does not forward data, or modifies it, and other nodes which are in their transmission range can send a claim against that node.
12

The implementation of sector policing in the Limpopo Province

Mudau, Musiiwa Eric 31 October 2008 (has links)
The aim of this research was to establish whether sector policing had been integrated in the SAPS in the Limpopo Province, and to supply information to the SAPS and community members that may improve their ability to implement sector policing. The research question ”How members in the Limpopo Province perceive sector policing” is investigated in this research. A literature study on sector policing was completed and thereafter a questionnaire was developed. An empirical study was done by questionnaire on the status of sector policing in the SAPS in the Limpopo Province during March, April, May and June 2008. The sample involved 333 police and community members were used in the analysis. / Police Practice / M.A. (Police Science)
13

The implementation of sector policing in the Limpopo Province

Mudau, Musiiwa Eric 31 October 2008 (has links)
The aim of this research was to establish whether sector policing had been integrated in the SAPS in the Limpopo Province, and to supply information to the SAPS and community members that may improve their ability to implement sector policing. The research question ”How members in the Limpopo Province perceive sector policing” is investigated in this research. A literature study on sector policing was completed and thereafter a questionnaire was developed. An empirical study was done by questionnaire on the status of sector policing in the SAPS in the Limpopo Province during March, April, May and June 2008. The sample involved 333 police and community members were used in the analysis. / Police Practice / M.A. (Police Science)
14

An evaluation of the practices and operations of community police forums in Tshwane

Mthiyane, Refilwe Cynthia 03 1900 (has links)
The purpose of the study is to evaluate practices and operations of Community Police Forums and their sub-structures in Tshwane. This includes various approaches that are used to implement and manage the operations of Community Police Forums and their sub-structures. This research is designed to determine different operational approaches that are used by the Community Police Forums and their sub-structures to curb the criminal activities including those of their respective members. The qualitative research method was utilised for this study, achieving stated research objectives and answering the research questions. The population in the study included members of the South African Police Service and Community Police Forums in Tshwane District, as well as officials in the Directorate Community Police Relations within the Gauteng Department of Community Safety. The study revealed that Community Police Forums and their sub-structures are essential in the reduction of crime and they can be used as force multipliers to the South African Police Service. It also shows that there are legislative framework that Community Police Forums and their sub-structures are supposed to function under and adhere to. Monitoring mechanisms are in place to ensure that these structures function within the stipulated framework. Therefore, based on these findings, recommendations were made on practices and operations of Community Police Forums and their sub-structures. / Criminology and Security Science / M.A. (Criminal Justice)

Page generated in 0.0504 seconds