• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 139
  • 62
  • 29
  • 12
  • 9
  • 5
  • 4
  • 4
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 315
  • 122
  • 59
  • 57
  • 53
  • 40
  • 37
  • 36
  • 34
  • 31
  • 30
  • 28
  • 24
  • 23
  • 21
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Object Security in the Internet of Things

Palombini, Francesca January 2015 (has links)
The Internet of Things and the constrained environment that comes from the growth of constrained devices connected to the Internet brings new security challenges that cannot be solved in a satisfactory way with only transport layer security. A more flexible solution is required, both to protect sensitive data and user privacy but also to distribute policies in a secure and standardized way. The same privacy problems arise in the general web setting with processing and storage more and more moving into the cloud. One solution is to move the security higher up in the network stack and to protect objects instead of byte streams, as proposed in the IETF draft [15] evaluated in this thesis. Focusing on this solution, an implementation has been proposed, and tests and measurements have been carried out to show its overhead. The implementation, as well as the measurement results, is presented in this work. / I takt med att ”Internet of things” växer och antalet begränsade enheter ökar uppstår allt fler säkerhetsutmaningar som inte kan lösas tillräckligt bra med transport layer security. Det finns ett behov av en mer flexibel lösning, dels för att skydda känslig data och användarnas integritet och dels för att distribuera policyer på ett säkert och standardiserat sätt. Samma integritetsproblem återfinns i generella webbmiljön då beräkning och lagring blir mer molnbaserat. En lösning på problemet är att flytta säkerhetsåtgärder högre upp i internetstacken och skydda objekt istället för byte-strömmar. Dessa säkerhetsåtgärder har föreslagits i utkastet från IETF [15] som utvärderas i denna avhandling. En implementation, med fokus på denna lösningen, föreslås i avhandlingen. Tester och mätningar har utförts för att visa lösningens overhead. Genomförandet av testerna och mätresultaten presenteras också i detta arbete.
62

Cadre méthodologique et applicatif pour le développement de réseaux de capteurs fiables / The design of reliable sensor networks : methods and applications

Lalem, Farid 11 September 2017 (has links)
Les réseaux de capteurs sans fil émergent comme une technologie innovatrice qui peut révolutionner et améliorer notre façon de vivre, de travailler et d'interagir avec l'environnement physique qui nous entoure. Néanmoins, l'utilisation d'une telle technologie soulève de nouveaux défis concernant le développement de systèmes fiables et sécurisés. Ces réseaux de capteurs sans fil sont souvent caractérisés par un déploiement dense et à grande échelle dans des environnements limités en terme de ressources. Les contraintes imposées sont la limitation des capacités de traitement, de stockage et surtout d'énergie car ils sont généralement alimentés par des piles.Nous visons comme objectif principal à travers cette thèse à proposer des solutions permettant de garantir un certain niveau de fiabilité dans un RCSF dédié aux applications sensibles. Nous avons ainsi abordé trois axes, qui sont :- Le développement de méthodes permettant de détecter les noeuds capteurs défaillants dans un RCSF,- Le développement de méthodes permettant de détecter les anomalies dans les mesures collectées par les nœuds capteurs, et par la suite, les capteurs usés (fournissant de fausses mesures).- Le développement de méthodes permettant d'assurer l'intégrité et l'authenticité des données transmise dans un RCSF. / Wireless sensor networks emerge as an innovative technology that can revolutionize and improve our way to live, work and interact with the physical environment around us. Nevertheless, the use of such technology raises new challenges in the development of reliable and secure systems. These wireless sensor networks are often characterized by dense deployment on a large scale in resource-onstrained environments. The constraints imposed are the limitation of the processing, storage and especially energy capacities since they are generally powered by batteries.Our main objective is to propose solutions that guarantee a certain level of reliability in a WSN dedicated to sensitive applications. We have thus proposed three axes, which are:- The development of methods for detecting failed sensor nodes in a WSN.- The development of methods for detecting anomalies in measurements collected by sensor nodes, and subsequently fault sensors (providing false measurements).- The development of methods ensuring the integrity and authenticity of transmitted data over a WSN.
63

Intrusion Detection in Mobile Adhoc Networks

Kumar, Kavitha January 2009 (has links)
No description available.
64

Investigating credit based mechanisms for enhancing performance in wireless ad hoc networks

Goldberg, Ariel Shei 12 1900 (has links)
Thesis (MSc)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: This thesis explores two key aspects of wireless ad hoc networks. The first aspect concerns the topic of stimulating cooperation between nodes in a wireless ad hoc network. The functionality of a wireless ad hoc network depends entirely on the willingness of nodes to relay messages on behalf of other nodes. Network functionality depends on ensuring cooperation between nodes, so that each node benefits from continued participation in the network. This suggests an important question: how can cooperation among individual nodes be managed to improve overall wireless ad hoc network performance? The second aspect explored in this thesis concerns the concept of optimal resource utilisation. Wireless ad hoc networks are characterised by limited bandwidth and energy resources, which facilitates deployment in situations in which traditional infrastructure based networks are not practical. This suggests another important question: how can the use of the limited energy and bandwidth resources of wireless ad hoc networks be optimised? This research relies on the concept of a credit-based market economy. Nodes in simulated ad hoc networks use credits to pay for the cost of sending their own traffic and earn credits by forwarding traffic on behalf of other nodes. We show that a credit-based market economy approach can be employed to stimulate and regulate cooperation between nodes in a wireless ad hoc network. We show that this approach can be implemented in a simple decentralised manner and that it has several variants depending on which node is considered to be paying for the service, what the price of each service should be and how we route packets around the network using information derived from the credit-based economy. This thesis demonstrates that several variants of a credit-based scheme can be implemented in a packet based simulator and that these variants result in the stable operation of the network and improve the overall performance. The credit-based mechanisms also show significant improvement to network performance in resource constrained conditions and represent an effective means for optimising limited energy and bandwidth resource. The effectiveness of the credit-based mechanisms increases as the load on the networks increases. / AFRIKAANSE OPSOMMING: Hierdie tesis ondersoek twee belangrike aspekte van draadlose ad hoc-netwerke. Die eerste aspek het betrekking op die onderwerp van 'n stimulerende samewerking tussen die nodusse in 'n draadlose ad hoc-netwerk. Dat die network funksioneer hang daarvan af om samewerking tussen die nodusse te verseker sodat elke nodus voordeel put uit voortgesette deelname in die netwerk. Dit dui op 'n belangrike vraag: Hoe kan die samewerking tussen die individuele nodusse bestuur word om die prestasie van 'n draadlose ad hoc-netwerk te verbeter? Die tweede aspek wat in hierdie tesis ondersoek word, behels die konsep van optimale hulpbronbenutting. Draadlose ad hoc-netwerke word gekenmerk deur beperkte bandwydte- en energie-hulpbronne, wat ontplooiing bewerkstellig in situasies waar tradisionele infrastruktuur-gebaseerde netwerke nie practise moontlik is nie. Dit dui op 'n ander belangrike vraag: Hoe kan die gebruik van die beperkte energie- en bandwydte-hulpbronne van draadlose ad hoc-netwerke optimaal bestuur word? Hierdie navorsing berus op die konsep van 'n krediet-gebaseerde markekonomie. Nodusse in gesimuleerde ad hoc-netwerke gebruik krediete om te betaal vir die versending van hul eie verkeer en nodusse verdien krediete deur die verkeer van ander nodusse aan te stuur. Ons wys dat die benadering van 'n krediet-gebaseerde markekonomie gebruik kan word om die samewerking tussen die nodusse in 'n draadlose ad hoc-netwerk te stimuleer en te reguleer. Ons wys dat hierdie benadering geïmplementeer kan word op 'n eenvoudige gedesentraliseerde wyse. Ons ondersoek verskeie variasies van die benadering, na gelang van watter nodus oorweeg word om vir die diens te betaal, wat die prys van elke diens moet wees en hoe inligting afgelei van die krediet-gebaseerde ekonomie gebruik kan word om pakkies in die netwerk te roeteer. Hierdie tesis toon dat verskeie variante van 'n krediet-gebaseerde skema geïmplementeer kan word in 'n netwerksimulator en dat hierdie variante die stabiele bedryf van en algehele verbetering in die prestasie van die network tot gevolg het. Die krediet-gebaseerde meganismes toon 'n beduidende verbetering in hulpbronbenutting en netwerkprestasie in omgewings met beperkte hulpbronne en verteenwoordig 'n doeltreffende manier om die beperkte energie- en bandwydte-hulpbronne optimaal te benut. Laastens, die doeltreffendheid van die krediet-gebaseerde meganismes word verhoog as die las op die netwerke word verhoog.
65

AD HOC NETWORKING OVERVIEW AND APPLICATION TO A BATTLEFIELD SENSORS SYSTEM

Kaba, James, Hashfield, Paul 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / Ad hoc networking protocols enable the formation of self-organizing networks with automatic selfhealing operation in dynamic environments. There are a number of existing or planned ad hoc implementations and a body of research on protocols and performance. Ad Hoc technologies promise significant impact in future communications architectures. This paper presents a general overview of ad hoc networking and presents specific examples, including a recent implementation of a prototype ad hoc networked sensor system. The protocols used have unique characteristics derived by tailoring particular protocols to the specific application requirements. The potential relevance of ad hoc networking to possible telemetry applications is discussed.
66

Impact of normal ageing and cerebral hypoperfusion on myelinated axons and its relation to the development of Alzheimer's disease

Karali, Kanelina January 2014 (has links)
Cerebral hypoperfusion can occur in normal ageing and is proposed to underlie white matter disturbances observed in the ageing brain. Moreover, cerebral hypoperfusion and white matter attenuation are early events in the progression of Alzheimer’s disease (AD). White matter mostly consists of myelinated axons which have distinct protein architecture, segregated into defined regions; the axon initial segment (AIS), the node of Ranvier, paranode, juxtaparanode, and internode. These sites are essential for action potential initiation and/or propagation and subsequently effective brain function. At the outset of the studies in the thesis there was evidence that the different regions within the myelinated axons are vulnerable to injury and disease. Thus it is hypothesised that in response to normal ageing and/or cerebral hypoperfusion these structures are altered and associated with cognitive impairment and that these effects are exacerbated in a transgenic mouse model (APPSw,Ind, J9 line) which develops age-dependent amyloid-β (Αβ) pathology. The first study aims to investigate the effect of normal ageing and Aβ deposition on myelinated axons and on learning and memory. To address this, the effects of normal ageing on the integrity of the AIS, nodes of Ranvier, myelin, axons, synapses and spatial working memory are examined in young and aged wild-type and TgAPPSw,Ind mice. A significant reduction in the length of nodes of Ranvier is demonstrated in aged wild-type and TgAPPSw,Ind mice. In addition, the length of AIS, is significantly reduced in the aged wild-type animals while the young TgAPPSw,Ind have significantly shorter AIS than the young wild-type mice. These effects are not influenced by the presence of Aβ. Myelin integrity is affected by age but this is more prominent in the wild-type animals whilst axonal integrity is intact. Moreover, there is an age-related decrease of presynaptic boutons only in the TgAPPSw,Ind mice. Contrary to the original hypothesis, working memory performance is not altered with age or influenced by increasing Aβ levels. The second study aims to examine the effects of cerebral hypoperfusion in combination with Αβ pathology and/or ageing on cognitive performance and the structure of myelinated axons. To address this, the effects of surgically induced cerebral hypoperfusion on the integrity of the nodes of Ranvier, paranodes, myelin, axons and spatial working memory performance are investigated in young and aged wild-type and TgAPPSw,Ind mice. A decrease in nodal length is observed in response to hypoperfusion in young and aged animals. This effect is shown to be exacerbated in the young TgAPPSw,Ind animals. Moreover, the disruption of the nodal domain is shown to occur without any gross alterations in myelin and axonal integrity. It is also demonstrated that in response to hypoperfusion, spatial working memory performance is defected in young and aged animals of both genotypes. This deficit is exacerbated in the young TgAPPSw,Ind. The observed changes in the nodal structure are associated with poor working memory performance indicating functional implication for the nodal changes. These data highlight that structures within myelinated axons are vulnerable to ageing and cerebral hypoperfusion. Therefore, the development of strategies that minimize injury or drive repair to these regions is necessary together with therapeutic approaches against the vascular insults that induce hypoperfusion and lead to white matter attenuation and cognitive decline. In the future, it would be interesting to investigate how alterations at the AIS/nodes of Ranvier affect neuronal excitability.
67

Systems Approach to Cross-Layer Optimization of a Complex Wireless Environment

Gwanvoma, Stephen B. 10 1900 (has links)
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada / This paper presents a method for the optimization of mixed networks that incorporates a mixed layer optimization of performance features. The expanded integrated Network Enhanced Telemetry (iNET) system envisioned telemetering for large and complex networks which will require core telemetry networks with ad hoc extensions for coverage. Organizing such a network has been successfully accomplished in simulations using a K-mean clustering algorithm. This paper shows how the features of these network elements will be captured and disseminated in a real system. This management of network elements across multiple layers is characterized as cross-layer optimization. This paper will also show how such cross layer features can be combined for a globally optimum solution. It shows by example how the iNET system comprising multiple ground stations, gateways, frequency, nodes, and three performance measures can be optimized to achieve overall optimal system performance.
68

From partner selection to collaboration in information sharing multi-agent systems

Park, Jisun 01 June 2010 (has links)
This research advances distributed information sharing by equipping nodes (e.g., software agents) in a distributed network with (1) partner selection algorithms in cooperative environments, and (2) strategies for providing and requesting information in competitive environments. In cooperative environments, information providers are willing to provide requested information, but information consumers must consider uncertainty in the quality of provided information when selecting appropriate information providers. In competitive environments, if a self-interested agent can be an information consumer and provider at the same time, agents need to determine the best ways to request and provide information so that the information acquisition utility can be maximized. This research defines a set of metrics for evaluating information acquisition utility, and presents a game-theoretic approach for determining the best information sharing strategies based on stochastic games. The results show how agents build collaborative relationships with appropriate agents and how the information acquisition utility is affected by those relationships. / text
69

EFFICIENT GREEDY-FACE-GREEDY GEOGRAPHIC ROUTING PROTOCOLS IN MOBILE AD HOC AND SENSOR NETWORKS

Sun, Yan 01 January 2012 (has links)
This thesis describes and develops two planarization algorithms for geographic routing and a geographic routing protocol for mobile ad hoc and sensor networks. As all nodes are mobile and there is no fixed infrastructure, the design of routing protocols is one of the most challenging issues in mobile ad hoc and sensor networks. In recent years, greedyface- greedy (GFG) geographic routing protocols have been widely used, which need nodes to construct planar graphs as the underlying graphs for face routing. Two kinds of planarization algorithms have been developed, idealized and realistic planarization algorithms, respectively. The idealized planarization algorithms make the ideal assumption that the original network graph is a unit-disk graph (UDG). On the other hand, the realistic planarization algorithms do not need the original network to be a UDG. We propose an idealized planarization algorithm, which constructs an Edge Constrained Localized Delaunay graph (ECLDel). Compared to the existing planarized localized Delaunay graph [42], the construction of an ECLDel graph is far simpler, which reduces the communication cost and saves the network bandwidth. We propose a Pre-Processed Cross Link Detection Protocol (PPCLDP), which generates a planar spanning subgraph of the original network graph in realistic environments with obstacles. The proposed PPCLDP outperforms the existing Cross Link Detection Protocol [32] with much lower communication cost and better convergence time. In GFG routing protocols, greedy routing may fail at concave nodes, in which case, face routing is applied to recover from the greedy routing failure. This may cause extra hops in routing in networks containing voids. We propose a Hill-Area-Restricted (HAR) routing protocol, which avoids the extra hops taken in the original GFG routing. Compared to the existing Node Elevation Ad hoc Routing [4], the proposed HAR guarantees the packet delivery and decreases the communication cost greatly.
70

Additive Fertigung von Metallen – Einsatz des LaserCUSING®s im Bereich Automotive

Pastuschka, Lisa, Appel, Peter 10 December 2016 (has links) (PDF)
Die Additive Fertigung spielt heutzutage auch in der Automobilindustrie eine bedeutende Rolle. Eine Ausprägungsform, das pulverbett-basierte LaserCUSING®-Verfahren, bietet viele neue Möglichkeiten. Im Folgenden wird zunächst ein kurzer Überblick über das Verfahren gegeben und anschließend der Einsatz des LaserCUSING®s im Bereich Automotive anhand eines gemeinsamen Projekts der EDAG Engineering GmbH, des Laser Zentrums Nord, der BLM Group und der Concept Laser GmbH verdeutlicht. Hier wurde auf Basis des EDAG Light Cocoon ein topologisch optimierter und hybrid gefertigter Spaceframe entwickelt. Die Karosserieknoten wurden mittels LaserCUSING® additiv hergestellt.

Page generated in 0.0551 seconds