• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 1
  • 1
  • Tagged with
  • 7
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Dynamic Partial Reconfigurable FPGA

Zhou, Ruoxing January 2011 (has links)
Partial Reconfigurable FPGA provides ability of reconfigure the FPGA duringrun-time. But the reconfigurable part is disabled while performing reconfiguration. In order to maintain the functionality of system, data stream should be hold for RP during that time. Due to this feature, the reconfiguration time becomes critical to designed system. Therefore this thesis aims to build a functional partial reconfigurable system and figure out how much time the reconfiguration takes. A XILINX ML605 evaluation board is used for implementing the system, which has one static part and two partial reconfigurable modules, ICMP and HTTP. A Web Client sends different packets to the system requesting different services. These packets’ type information are analyzed and the requests are held by a MicroBlaze core, which also triggers the system’s self-reconfiguration. The reconfiguration swaps the system between ICMP and HTTP modules to handle the requests. Therefore, the reconfiguration time is defined between detection of packet type and completion of reconfiguration. A counter is built in SP for measuring the reconfiguration time. Verification shows that this system works correctly. Analyze of test results indicates that reconfiguration takes 231ms and consumes 9274KB of storage, which saves 93% of time and 50% of storage compared with static FPGA configuration.
2

Le principe de normativité criminelle, reconfiguration du principe de légalité criminelle / The criminal normativity principel, reconfiguring of criminal law principle

Drago, Marie-Line 05 December 2016 (has links)
Le constat est aujourd’hui unanime. Le principe de légalité criminelle est affaibli par les évolutions du droit. En effet, la loi pénale n’est plus l’unique source du droit pénal, sa qualité est en déclin et le juge joue désormais un rôle incontestable en droit pénal. Ces évolutions sont ancrées dans le droit pénal, dont elles sont des paramètres. Il est impossible de revenir en arrière afin de retrouver un droit pénal conforme au principe de légalité criminelle, tel que proclamé par les révolutionnaires de 1789. Il convient alors de le faire évoluer. Ainsi, ces paramètres ont en commun d’être à l’origine de la norme pénale. Contrairement à la loi pénale, la norme pénale intègre toutes les évolutions du droit pénal. Cette norme pénale est au cœur du droit pénal dont elle en est la source. Le principe de légalité criminelle n’est donc plus configuré autour de la loi pénale, mais autour de la norme pénale. Par conséquent, il convient de parler de principe de normativité criminelle. Cette reconfiguration est ainsi la solution face à un principe de légalité criminelle et une loi pénale en déclin. Elle permet de garantir la protection des droits et liberté individuelle tout en tenant compte des évolutions du droit. Il convient dès lors d’affirmer « qu’il n’y a pas d’infraction sans norme pénale ». / The consensus today is unanimous. The principle of criminal legality has been weakened by developments in law. Statute law is no longer the sole source of criminal law ; its influence is declining and judges will play an indisputable role in criminal law. These developments are rooted in criminal law, of which they are parameters. It is impossible to find a criminal law in history that conforms to the principle of criminal legality such as that proclaimed by the revolutionaries of 1789. It is therefore appropriate that it should evolve. Therefore, these parameters are together the origin of the criminal standard. Contrary to statute law, this standard integrates all developments in common law. This standard is at the core of the common law for which it is the source. The principle of criminal legality is therefore no longer configured with reference to statute law but the criminal standard. As a consequence, we should speak of the principle of the standardisation of criminal law. This reconfiguration is therefore the solution to a principle of criminal legality and a statute law in decline. It allows for the guaranteed protection of individual rights and liberties taking into account developments of law. From now on, it shoudl be affirmed « that there is no crime without the criminal standard ».
3

Reconfiguring nation, race, and plantation culture in Freyre and Faulkner

Santos-Neves, Miguel Edward 13 November 2013 (has links)
Gilberto Freyre's Casa-grande & senzala (1933) (The Masters and the Slaves) and William Faulkner's Absalom, Absalom! (1936) revisit and reevaluate Romantic notions of history, especially national progress and attendant accounts of racial purity and whiteness of "the people." The plantation home emerges in their texts as the common locus of historical and cultural experiences and as the principle symbol and metaphor for the domination of colonial forces. This dissertation explores how Freyre and Faulkner both take up the contemporary issue of miscegenation as the primary theme in their respective works. They elaborate this theme and explore its ramifications through the central, grounding image of the plantation home, which they approach through a historical sensibility and from a historical perspective. Freyre and Faulkner work from within paradigms from Europe to rewrite them, as they re-think the legacies of colonialism and of the plantation organization in non-national, non-ethnic, non-Hegelian, generative, deterministic terms. Their works seek to offer viable and independent counter-discourses to the dominant European cultural models -- new, non-nationalist narratives of historical destiny based on culture and economics rather than on any overarching political-historical destiny, as the epics of Europe's nations had been told in the era. This dissertation hopes to contribute to the scholarship that questions the essentialist notions of race and nation, as they were conceived on the plantation in rural regions of the New World. This project recovers a transnational tradition of political opposition -- a tradition that roots itself in the anthropology of experience rather than in the determinism of origin and inheritance. It will also argue for disciplinary realignments in the literature of the Americas, by proposing that further efforts be made to study the New World plantation and its effective geography. On the basis of the discussion on Faulkner, Southern literature ought to observe a new division between the Upper South and the Lower South, demarcated by the border between North and South Carolina, on the basis of the demographics, economics, and, in turn, self-understanding of these respective regions. / text
4

Secure Self-Reconfiguring Services to Mitigate DoS Attacks

Zeller, Silvan January 2019 (has links)
Protecting web services from cyber attacks is a complex problem requiring many layers of defense and mitigation strategies. Out of the diverse range of attacks, denial of service (DoS) attacks on the business logic – or the domain – are poorly studied and no widely accepted general-purpose software product to prevent these attacks exists today. At the same time, in light of the growing importance of e-commerce, defense mechanisms should be designed in a way to be self-reconfiguring, as manual reconfiguration does not scale well. In this work, a rule-based intrusion detection system (IDS) is proposed which logs the behaviour of each user and decides upon a service level based on past behaviour. The implementation is achieved by applying runtime verification (RV), a lightweight formal method which can be utilized to observe traces of user behaviour in real time. The applicability of this approach is measured by means of conducting experiments on a web service, a mock-up hotel chain which grants three different service levels for users based on their individual trust rating. Synthetic traces of bookings and cancellations are issued to account for the detection rate of the IDS and the efficacy of its mitigation strategy. The results indicate that RV is a viable approach for creating a rule-based IDS. The IDS may be tuned to attain a high detection rate of more than 95% while preserving a low false positive rates of less than 3%. Furthermore, attacks are mitigated by changing the business rules for users who have been identified as being malicious, resulting in an increased occupancy of the hotel. Lastly, RV is shown to be significantly more scalable and expressive than regular formal methods, such as model checking. Even though the results seem promising, testing the system on real traces and possibly with varying thresholds remains future work. / Att skydda webbtjänster från cyberattacker är ett komplicerat problem som kräver många lager av försvarsoch lindringsstrategier. Av det olika utbudet av attacker, denial of service attacker (DoS) på affärslogiken – eller domänen – undersöks sällan och ingen allmän accepterad mjukvara för att förhindra dessa attacker finns idag. Samtidigt, mot bakgrund av den växande betydelsen av e-handel, bör förvarsmekanismer utformas för att vara självkonfigurerande, eftersom manuell omkonfigurering inte är skalbart. I detta arbete föreslås ett regelbaserat intrusion detection system (IDS) som loggar varje användares beteende och beslutar om en servicenivå baserad på tidigare beteenden. Implementeringen uppnås genom att använda runtime verification (RV), en lättviktig formell metod som kan användas för att observera spår av användarbeteende i realtid. Tillämpningen av denna metod mäts med hjälp av experiment på en webbtjänst, en mock-up hotellkedja som ger tre olika servicenivåer för användare baserat på deras individuella förtroendevärdering. Syntetiska spår av bokningar och avbokningar används för att redovisa IDS:s detektionsgrad och effektiviteten i dess lindringsstrategi. Resultaten indikerar att RV är ett genomförbart tillvägagångssätt för att skapa ett regelbaserat IDS. Systemet kan vara inställt för att uppnå en hög detektionsgrad på mer än 95% och bevarar samtidigt en låg falsk positiv nivå på mindre än 3%. Dessutom mildras attackerna genom att ändra affärsreglerna för användare som har identifierats som skadliga, vilket resulterar i en ökad beläggning hos hotellet. Slutligen visas RV vara betydligt mer skalbar och uttrycksfull än vanliga formella metoder, till exempel model checking. Även om resultaten verkar lovande, återstår testning av systemet på riktiga spår och eventuellt med olika trösklar som framtida arbete.
5

Control of Self-Organizing and Geometric Formations

Pruner, Elisha 24 January 2014 (has links)
Multi-vehicle systems offer many advantages in engineering applications such as increased efficiency and robustness. However, the disadvantage of multi-vehicle systems is that they require a high level of organization and coordination in order to successfully complete a task. Formation control is a field of engineering that addresses this issue, and provides coordination schemes to successfully implement multi-vehicle systems. Two approaches to group coordination were proposed in this work: geometric and self-organizing formations. A geometric reconfiguring formation was developed using the leader-follower method, and the self-organizing formation was developed using the velocity potential equations from fluid flow theory. Both formation controllers were first tested in simulation in MATLAB, and then implemented on the X80 mobile robot units. Various experiments were conducted to test the formations under difficult obstacle scenarios. The robots successfully navigated through the obstacles as a coordinated as a team using the self-organizing and geometric formation control approaches.
6

Control of Self-Organizing and Geometric Formations

Pruner, Elisha January 2014 (has links)
Multi-vehicle systems offer many advantages in engineering applications such as increased efficiency and robustness. However, the disadvantage of multi-vehicle systems is that they require a high level of organization and coordination in order to successfully complete a task. Formation control is a field of engineering that addresses this issue, and provides coordination schemes to successfully implement multi-vehicle systems. Two approaches to group coordination were proposed in this work: geometric and self-organizing formations. A geometric reconfiguring formation was developed using the leader-follower method, and the self-organizing formation was developed using the velocity potential equations from fluid flow theory. Both formation controllers were first tested in simulation in MATLAB, and then implemented on the X80 mobile robot units. Various experiments were conducted to test the formations under difficult obstacle scenarios. The robots successfully navigated through the obstacles as a coordinated as a team using the self-organizing and geometric formation control approaches.
7

Deconstructing the image of the African women: A study of selected works by Yvonne Vera

Mabuto, Ann Marevanhema 21 September 2018 (has links)
MA (English) / Department of English / The prevalence of patriarchal norms and the privileging of the African man in African literary works gradually led to an erasure of women‘s identities, thereby leaving them to hold peripheral positions. This has motivated African women critics to engage in linguistic and performative methodologies to restructure African women‘s status in postcolonial writings. Using feminist literary theory, Marxist literary criticism and postcolonial theory, among others, this study explores the changing images of women as depicted in a selection of Yvonne Vera‘s works, namely: Butterfly Burning (1998); Under the Tongue (1996); Without a Name (1994) and Nehanda (1993). Close reading and textual analysis are employed in examining the strategies devised by Vera to assess patriarchal attitudes that suppress women as well as reconfiguring their identities. This study is inspired by the desire to investigate the techniques employed by an African woman writer in speaking against marginalisation, exploitation and oppression of women in a postcolonial literary environment. Of primary concern to this study, is an examination of how Vera unleashes, re-writes and re-negotiates the potential of an African woman in her novels. This study distinctly shows that, as a subaltern writer, Vera reconfigures her female characters‘ identities through social and economic liberalisation. It is clear in this study that economic liberty has a great impact on the life of an African woman. This study contributes to the growing body of works that appreciates women writers‘ efforts in transforming, reifying and reinstating the image of African women in fictional works. / NRF

Page generated in 0.0813 seconds