• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 3
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 18
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

An OTP ROM Using a Standard Logic CMOS Process and The Application In a DDFS Implementation

Jhuang, Guo-Lin 16 July 2007 (has links)
The first topic of this thesis presents a one-time programmable (OTP) ROM using a standard logic CMOS process. A high voltage is applied to the gate-oxide to breakdown the MOS in the ROM-cell. It results in a low resistance compared to that of unprogrammed cells. Therefore, we can realize an OTP ROM with this characteristic on a CMOS logic ASIC or SOC. The second topic is a DDFS (Direct Digital Frequency Synthesizer) implementation. A straight-line approximation algorithm for sinusoid with compensation is adopted in the proposed DDFS such that the accuracy could be maintained and the cost is reduced. Most important of all, the proposed CMOS OTP ROM is employed as the sinusoidal look-up ROM table to simplify the ROM fabrication without any additional process step.
2

Odos tyliojo periodo tyrimo reikšmė, nustatant periferinių nervų pažeidimą / A study of peripheral nerve disorders using the cutaneous silent period

Švilpauskė, Jovita 16 October 2006 (has links)
Methods for assessing small peripheral nerve fiber function objectively are limited. The cutaneous silent period (CuSP), a transient supression of electromyographic voluntary activity that follows painful stimuli, could serve as an objective functional measure of the A delta fibers. The aim of this study was to evaluate function of small diameter A delta nerve fibers using the CuSP in normals and in patients with both focal (carpal tunnel syndrome - CTS) and generalised (polyneuropathies - PNP) peripheral nerve injuries. The objectives of the study were the following: 1. To determine the CuSP normal values by age, gender, side, height and weight in healthy controls. 2. To study the topography and extension of the CuSP by changing recording and stimulating sites in healthy controls. 3. To evaluate the CuSP in patients with CTS of different severity and to compare these results with those of healthy controls. 4. To estimate the CuSP onset latency and duration in relation with median nerve evoked compound muscle action potential amplitude, distal latency and conduction velocity in patients with CTS. 5. To evaluate the CuSP in patients with PNP of different types and to compare these results with those of healthy controls. 6. To estimate the CuSP onset latency and duration in relation with median nerve evoked compound muscle action potential amplitude, distal latency and conduction velocity in patients with PNP. We investigated the CuSP of the upper and lower limbs of 50 normal... [to full text]
3

Autentizace v informačních systémech / authentication for information system

Jenčík, Štěpán January 2017 (has links)
This thesis is focused on authentication methods, for regular private users and company solutions. Based on the analysis of individual authentication methods discussed in a theoretical part, the most suitable solutions are chosen. The practical part then offers various solutions divided into categories based on the users profiles. This presented overview suggests possible follow up discussion topics and an outline of the future development in the area of authentication methods and tools.
4

Výber autentizačnej metódy pri prihlasovaní do elektronického bankovníctva v nadväznosti na zrušenie autentizácie GRID kartou / Choose authentication method for logging in to the electronic banking at the same time as cancellation of GRID cards authentication

Mazák, Matej January 2017 (has links)
The aim of this Master thesis is to choose appropriate authentication method for logging in to the electronic banking. The chosen solution will serve as an additional factor for authentication and authorization of client and at the same time as the replacement of the outdated security method GRID card. Development and direction of the electronic banking is explained in the theoretical part of the thesis. Further on, the advantages of this channel that are provided to clients and bank, are described. Some of the trends which daily affect the direction of the electronic banking are also described. Security is very important part of the electronic banking and that is why it is mentioned in the each part of this thesis. The practical part contains proposed cancellation procedure of GRID cards and proposal of the new solutions that could replace them in the future. It also contains selection and description of evaluation criteria and multi-criteria evaluation of the selected solutions. Saaty method and scoring method were used to determine the weight of the particular criteria. Conclusion of the thesis compares achieved results of the individual authentication methods and assets of this Master thesis.
5

Experimental Study of GPRS/WLAN Systems Integration / Experimentell Studie av GPRS/WLAN System Integration

Nyström, Joakim, Seppälä, Mikael January 2003 (has links)
<p>The convergence of future networks relies on the evolution of technology that enables seamless roaming abilities across non-heterogenous networks for mobile clients. This thesis presents an experimental study of a GPRS-WLAN integration scenario where the objective is to analyze various aspects of the issues related to charging, mobility, roaming and security between GPRS and WLAN networks. The mainly discussed integration scenario in this thesis is loosely coupled systems working on RADIUS platforms, which together with MobileIP and IPSec provides the mobile client with a secure and access-technology independent network access platform. </p><p>In order to accommodate GPRS client authentication for WLAN operators, there is a prominent need for the incorporation of necessary GPRS functionality into present AAA servers. RADIUS has been studied as the initial target for the implementation of a GPRS interface towards SMS-Cs and HLRs.The authentication of a mobile client is performed against a HLR/AuC in a GPRS network, either over SS7 links or through the incorporation of SIGTRAN protocols over SCTP. SIGTRANsolutions has the ability to join WLAN networks in a SS7 resource sharing model where the SS7 authentication signalling traffic is transported over IP networks to a Signalling Gateway acting as the logical interface against SS7 networks. </p><p>GPRS-WLAN accounting may be solved through direct roaming agreements between mobile operators and in such a case transport CDR’s over FTP between their billing systems. If roaming agreements does not exist, it may be viable to establish relationships between WLANs and brokers as well as mobile operators and brokers. The brokering model provides a scalable model that allows easier exchange of charging and billing information on an infrastructure based on WLAN and GPRS billing systems. Standardised transmission protocols for accounting information such as GTP’/TAP3 may be utilised in order to provide a generic billing exchange format between billing systems and operators. </p><p>Furthermore, different network architectures may have different requirements in order to accommodate GPRS clients with WLAN access. A few network architectures has been analysed, and the developed GPRS AAA Interface Daemon (GAID) has been put into context in order to present a generic GPRS-WLAN systems integration solution for WLAN operators. </p><p>The analysed solutions in this thesis give various possibilities for WLAN operators to setup wireless services for bypassing mobile clients. The implementational work provides a RADIUS platform, which can be enhanced with functionality that enables communication over any interface in the future.</p>
6

Implementace OTP ve vybraném systému / OTP implementation in a selected information system

Jajtner, Petr January 2016 (has links)
At present, it is necessary to protect sensitive data against abuse, but also allow au-thorized persons to change these data. To increase the security of logging for authorized persons we often introduce a two-factors authentication, where the first step is verification of the user's identity and in a second step is required to insert a one-time password called OTP. This thesis deals with implementation of OTP and integration into the selected sys-tem. It also includes test and verification of the functionality of the selected solution.
7

Experimental Study of GPRS/WLAN Systems Integration / Experimentell Studie av GPRS/WLAN System Integration

Nyström, Joakim, Seppälä, Mikael January 2003 (has links)
The convergence of future networks relies on the evolution of technology that enables seamless roaming abilities across non-heterogenous networks for mobile clients. This thesis presents an experimental study of a GPRS-WLAN integration scenario where the objective is to analyze various aspects of the issues related to charging, mobility, roaming and security between GPRS and WLAN networks. The mainly discussed integration scenario in this thesis is loosely coupled systems working on RADIUS platforms, which together with MobileIP and IPSec provides the mobile client with a secure and access-technology independent network access platform. In order to accommodate GPRS client authentication for WLAN operators, there is a prominent need for the incorporation of necessary GPRS functionality into present AAA servers. RADIUS has been studied as the initial target for the implementation of a GPRS interface towards SMS-Cs and HLRs.The authentication of a mobile client is performed against a HLR/AuC in a GPRS network, either over SS7 links or through the incorporation of SIGTRAN protocols over SCTP. SIGTRANsolutions has the ability to join WLAN networks in a SS7 resource sharing model where the SS7 authentication signalling traffic is transported over IP networks to a Signalling Gateway acting as the logical interface against SS7 networks. GPRS-WLAN accounting may be solved through direct roaming agreements between mobile operators and in such a case transport CDR’s over FTP between their billing systems. If roaming agreements does not exist, it may be viable to establish relationships between WLANs and brokers as well as mobile operators and brokers. The brokering model provides a scalable model that allows easier exchange of charging and billing information on an infrastructure based on WLAN and GPRS billing systems. Standardised transmission protocols for accounting information such as GTP’/TAP3 may be utilised in order to provide a generic billing exchange format between billing systems and operators. Furthermore, different network architectures may have different requirements in order to accommodate GPRS clients with WLAN access. A few network architectures has been analysed, and the developed GPRS AAA Interface Daemon (GAID) has been put into context in order to present a generic GPRS-WLAN systems integration solution for WLAN operators. The analysed solutions in this thesis give various possibilities for WLAN operators to setup wireless services for bypassing mobile clients. The implementational work provides a RADIUS platform, which can be enhanced with functionality that enables communication over any interface in the future.
8

A Trip Planner for the Itract System supporting real-time updates

Liden, Natalie January 2014 (has links)
Mobile applications and real-time data are excellent tools for rapidly sharing information. Such information may concern public transportation, such as time tables and traffic delays. This project has involved the development of a trip planner, which can subscribe to real-time data in order to inform the end user about the position of transit vehicles and trip updates. A trip planner is an application which, after having been given a start and a destination by the user, generates the possible trip between these two locations. The route is displayed upon a map, along with information of how the trip is travelled. The real-time data, which is pushed to the application, will inform the user if vehicles are delayed and if the trip needs to be updated due to a missed bus or train. The trip planner for Itract developed in this project is using the graphical interface and some necessary Java classes from the open source application Open Trip Planner. The new trip planner, developed in this project, is compatible with the API of Itract, has some additional functionality and can subscribe to real-time information. To subscribe to real-time information, a database called Redis has been set up in connection to Itract. Another database, known as MongoDB, is used for persistant storage. / Itract
9

Protection des contenus des images médicales par camouflage d'informations secrètes pour l'aide à la télémédecine / Medical image content protection by secret information hiding to support telemedicine

Al-Shaikh, Mu'ath 22 April 2016 (has links)
La protection de l’image médicale numérique comporte au moins deux aspects principaux: la sécurité et l’authenticité. Afin d’assurer la sécurité, l’information doit être protégée vis-à-vis des utilisateurs non autorisés. L’authenticité permet quant à elle de s’assurer que la donnée reçue n’est pas modifiée, n’est pas altérée, et qu’elle est bien envoyée par l’expéditeur supposé. La « technique » cryptographique garantit la sécurité en faisant l’hypothèse que l’expéditeur et le destinataire ont des clés permettant respectivement de crypter et de décrypter le message. De cette manière, seule la personne possédant la bonne clé peut décrypter le message et accéder au contenu de la donnée médicale. Dans cette thèse, nous avons apporté plusieurs contributions. La principale contribution est la proposition de solutions de tatouage d'images médicales robustes et réversibles dans le domaine spatial basées respectivement sur l’analyse de concepts formels (FCA) et le diagramme de décision binaire par suppression des zéros (ZBDD). La seconde est une approche de tatouage d’image médicale semi-aveugle pour la détection de modifications malveillantes. Une autre contribution est la proposition d'un système de chiffrement symétrique sécurisé basé sur les N-grams. La dernière contribution est un système hybride de tatouage et de cryptographie d’image médicale qui s’appuie sur une nouvelle forme de carte chaotique (chaotic map) pour générer des clés ayant des propriétés spécifiques, et qui permet d'obtenir une meilleure efficacité, une grande robustesse et une faible complexité par rapport aux approches existantes. / The protection of digital medical image comprises at least two main aspects: security and authentication. In order to ensure the security, the information has to be protected from the unauthorized users while the authentication confirms that the received data is not affected or modified and is sent by the intended sender (watermarking). The cryptography technique proves the security issues by assuming the intended sender and intended receiver have some security aspects called keys. So, after encryption of the digital material from the sender side, the person who has the key (receiver) can decrypt and access the content of the digital material. In this thesis, we have brought several contributions. The main one is the provision of robust and reversible medical image watermarking solutions in the spatial domain based respectively on FCA and ZBDD. The second one is a semi-blind medical image watermarking approach for the tamper detection. Another contribution is the proposal of a secure symmetric encryption system based on N-gram. The last contribution is a hybrid watermarking and cryptography medical image system which focuses on a new form of chaotic map to generate keys with specific properties, and achieves better efficiency, high robustness and low complexity than the existing approaches.
10

Song-based interventions for navigating gains in occupational therapy (SING-OT)

Adams, Rose 25 August 2022 (has links)
The author examined current literature supporting the use of innovative, music-based interventions to support young children with autism spectrum disorder and other developmental disabilities engage in the things that they want, need, and desire to do. The author introduced Song-based Interventions for Navigating Gains in Occupational Therapy (SING-OT), as an innovative, music-based educational intervention program designed to support the engagement, participation, and performance needs of young children with disabilities. SING-OT uses an evidenced-supported, client-centered, and interests and strengths-driven approach. This proposed multi-phase program focuses on improving knowledge on the literature connecting evidence to song-based interventions and providing access to uniquely composed, occupation-inspired songs, that support children’s performance and participation needs. Additionally, conducting an initial feasibility study that assesses the effectiveness of task completion in a common personal hygiene and grooming task within the preschool setting was recommended. Future developments extend to improving caregiver health and wellness outcomes through training opportunities. The author provided a comprehensive program evaluation plan that highlights key stakeholders, a proposal for a single-subject study design, and implications of the program. The SING-OT program can be utilized as (1) an additional intervention tool for practicing occupational therapy practitioners and other professionals, (2) an avenue for interprofessional collaboration, and (3) a vehicle for improving the occupational performance outcomes among young children with disabilities.

Page generated in 0.0845 seconds