21 |
En applikation som analyserar loggfiler genererade av en brandvägg / An application that analyzes logfiles that areFondelius, Henric January 2006 (has links)
<p>Målet med projektet var att skapa en applikation för Ericsson AB R&D som kan hjälpa till att analysera datatrafiken i deras nätverk (ECN). Det finns tre stycken accesspunkter till ECN som skyddas av brandväggar. Alla datauppkopplingar genom brandväggarna lagras dygnvis i loggar. Genom loggarna kan obehörig trafik upptäckas. Ett verktyg som analyserar brandväggsloggarna underlättar arbetet.</p><p>Resultatet av mitt examensarbete är en applikation som är skriven i Perl. Programmeringsspråket Perl valdes för dess effektiva texthantering. Programmet exekveras genom terminalen (Solaris) / kommandoraden (Windows). De två viktigaste funktionerna är Searchlog och Check. Searchlog hanterar sökning av IP-adresser och Check kontrollerar att det inte finns några säkerhetsöverträdelser i brandväggsloggarna. Funktionerna har konstruerats så att största vikt är lagd på exekveringstiden och korrekt utdata.</p><p>Slutsatsen av arbetet med brandväggsloggar är att det kräver testning för att få programmet att uppnå optimalt resultat. Perls reguljära uttryck var till stor hjälp i mitt arbete. De är bra vid behandling av stora mängder text. Minnesanvändningen kanske kan göras effektivare. Eftersom att exekveringstiden prioriterades kom det i andra hand.</p> / <p>The goal of this project was to construct an application that can analyze the traffic through the network (ECN) at Ericsson. There are three accesspoints to ECN protected by firewalls. The connections through the firewalls are logged daily. With the help from firewall logs unauthorized access can be found. A tool which analyzes the logs is therefore needed.</p><p>The program is made in the computer language Perl. Perl was chosen because of its superior text handling capabilities. The application is executed through the terminal/command line. The two most important functions are Searchlog and Check. Searchlog handles the IP-searching and the Check function searches for unauthorized connections in the firewall logs. Execution time and data integrity were the main goals that were strived for.</p><p>My conclusion is that working with firewall logs requires a lot of testing to achieve the best result. I realized that regular expressions is the easiest and most powerful tool to use when working with large amounts of text. Since the speed was prioritized and not memory usage there is room for memory improvement.</p>
|
22 |
Development of interactive web-based tutorials for chemical engineering undergraduatesCular, Stefan 01 June 2005 (has links)
This thesis presents the design, creation, and testing of a web-based tool for generating interactive web-based problem set assignments. In prior research (Stetka, 2001) it was shown that students enjoyed interactive problems. In this research, multiple programming languages were used to provide a web-based, fully interactive, problem solving environment for the students.Sample problem sets were written by the author and a few chemical engineering students. These web pages were then used as a basis to test the effectiveness of the web-based interactive problem sets for two engineering courses. Initial findings are presented illustrating the students results along with results of student feedback surveys. Additionally, an analysis of the feedback from the two levels of users, students and instructors are reported and some suggestions for further development are given.
|
23 |
Awlp: Building A Custom Wireless Access Point Using Open Source SoftwareCakircali, Alptekin 01 September 2005 (has links) (PDF)
Almost all commercially available wireless access devices are special embedded systems with proprietary software that do not allow any modifications. Modifications to these systems are only possible by firmware upgrades released by manufacturers. However, release times of these firmware upgrades are unpredictable, and they are usually for bug-fix purposes rather than being feature and capability improvements. Thus, these devices fail to provide the needed flexibility. Ability to provide timely custom solution that is well integrated into existing network infrastructure is the key factor for a successful wireless access service implementation. In this thesis work, the open source software called AWLP is designed, coded, tested,
and released to public as a viable alternative for creating custom wireless access device.
|
24 |
A beginner's guide to designing web pages /Fillinger, Michael. January 1997 (has links)
Thesis (M.S.)--Rockefeller College of Public Affairs and Policy, School of Information Science and Policy, 1997.
|
25 |
The role of competition, community, and priority in the discovery of the tau lepton /Swanner, Leandra. January 1900 (has links)
Thesis (M.A.)--Oregon State University, 2007. / Printout. Includes bibliographical references (leaves 116-123). Also available on the World Wide Web.
|
26 |
Kooperativní práce na dokumentech v aplikaci TeXonWebTelenský, Václav January 2015 (has links)
The diploma thesis deals with design and implementation of cooperative work on documents in the application TEXonWeb. The diploma theses includes the analysis of competitive solutions and key technologies for implementation. The cooperative work on documents is a functionality which allows users to cooperate simply on one document in real-time. Text of the thesis describes the process of implementation using the technology which is described in the initial analysis. The diploma theses also includes some ideas for next possible development.
|
27 |
Investigação de processo de conversão automática de textos estruturados para hiperdocumentos. / Investigation of an automatic conversion process from structured texts to hipertexts.Alessandra Dorante 28 November 1997 (has links)
Esta dissertação investiga o processo de conversão automática de textos estruturados para hiperdocumentos. Analisa vantagens e desvantagens da utilização de um processo automático. Faz um levantamento detalhado das etapas envolvidas nesta conversão. Como resultado da pesquisa propõe um processo de conversão baseado em definições formais da estrutura dos documentos e das citações. O domínio de aplicação do processo de conversão é o conjunto de normas estatutárias jurídicas brasileiras. Outro resultado deste trabalho é a ferramenta WebifyLaw que implementa o processo de conversão automática para o conjunto das normas estatutárias jurídicas brasileiras. Os resultados da aplicação da WebifyLaw na Constituição Federal, no Código Civil e no Código de Processo Civil e em outras 42 normas são apresentados e discutidos. / This work centered in the research of the automatic conversion of structured texts into hyperdocuments. It presents an analysis concerning the advantages and disadvantages of such automatic process. It also details the steps involved in this conversion. As one of the results it proposes an automatic conversion process, which is based on document structure and citations´ formal definitions. The application domain is set as Brazilian statutory norms. Another contribution from this work is a tool called WebifyLaw, which implements the automatic conversion process for the chosen domain. The tool was applied to the Brazilian Constitution, the Civil Code among other 42 norms. The results obtained in using this application are also presented and discussed.
|
28 |
En applikation som analyserar loggfiler genererade av en brandvägg / An application that analyzes logfiles that areFondelius, Henric January 2006 (has links)
Målet med projektet var att skapa en applikation för Ericsson AB R&D som kan hjälpa till att analysera datatrafiken i deras nätverk (ECN). Det finns tre stycken accesspunkter till ECN som skyddas av brandväggar. Alla datauppkopplingar genom brandväggarna lagras dygnvis i loggar. Genom loggarna kan obehörig trafik upptäckas. Ett verktyg som analyserar brandväggsloggarna underlättar arbetet. Resultatet av mitt examensarbete är en applikation som är skriven i Perl. Programmeringsspråket Perl valdes för dess effektiva texthantering. Programmet exekveras genom terminalen (Solaris) / kommandoraden (Windows). De två viktigaste funktionerna är Searchlog och Check. Searchlog hanterar sökning av IP-adresser och Check kontrollerar att det inte finns några säkerhetsöverträdelser i brandväggsloggarna. Funktionerna har konstruerats så att största vikt är lagd på exekveringstiden och korrekt utdata. Slutsatsen av arbetet med brandväggsloggar är att det kräver testning för att få programmet att uppnå optimalt resultat. Perls reguljära uttryck var till stor hjälp i mitt arbete. De är bra vid behandling av stora mängder text. Minnesanvändningen kanske kan göras effektivare. Eftersom att exekveringstiden prioriterades kom det i andra hand. / The goal of this project was to construct an application that can analyze the traffic through the network (ECN) at Ericsson. There are three accesspoints to ECN protected by firewalls. The connections through the firewalls are logged daily. With the help from firewall logs unauthorized access can be found. A tool which analyzes the logs is therefore needed. The program is made in the computer language Perl. Perl was chosen because of its superior text handling capabilities. The application is executed through the terminal/command line. The two most important functions are Searchlog and Check. Searchlog handles the IP-searching and the Check function searches for unauthorized connections in the firewall logs. Execution time and data integrity were the main goals that were strived for. My conclusion is that working with firewall logs requires a lot of testing to achieve the best result. I realized that regular expressions is the easiest and most powerful tool to use when working with large amounts of text. Since the speed was prioritized and not memory usage there is room for memory improvement.
|
29 |
Implementace triple-play služeb v heterogenní síti / Implementation of triple-play in heterogeneous networkObršlík, Lukáš January 2014 (has links)
This master thesis deals with implementing triple-play services and providing it’s quality of services in heterogenous comunnication networks. The aim of thesis is to apply the- oretical methods in real case and existing network infrastructure. Practical part aims to create technical solution to prioritize network traffic based on classification of required services. The technical solution is created with conditions of being possible to add more functions and to provide scalability.
|
30 |
Vizualizace polohy senzorových jednotek / Location visualization of sensor unitsHulanský, Jozef January 2014 (has links)
This master thesis deals with wireless sensor network with protocol IPv6. In the begining there are explained the priciples of communication in wireless sensor network, and based on this teories are configured a wireles network with predefined development kit. Furthermore, by using geographic coordinates, positions of the nodes are displayed on a website, what is a part of this thesis. On this website are also presented the measured values from sensors. For saving all informations and measured values about each nodes was used remote MySQL server. Communication between this server and 6LoWPAN network provide Perl script which is runs at periodical intervals. With this method automatization of the whole system are ensured.
|
Page generated in 0.0291 seconds