• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 24
  • 5
  • 5
  • 5
  • 3
  • Tagged with
  • 58
  • 12
  • 10
  • 10
  • 8
  • 8
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Aspects of wave dynamics and statistics on the open ocean

Adcock, Thomas A. A. January 2009 (has links)
Water waves are an important design consideration for engineers wishing to design structures in the offshore environment. Designers need to know the size and shape of the waves which any structure is likely to encounter. Engineers have developed approaches to predict these, based on a combination of field and laboratory measurements, as well theoretical analysis. However some aspects of this are still poorly understood; in particular there is growing evidence that there are rare "freak" waves which do not fit with our current understanding of wave physics or statistics. In the first part of this thesis a new approach is developed for measuring the directional spreading of a sea-state, when the free surface time-history at a single point is the only available information. We use the magnitude of the second order "bound" waves to infer this information. This is validated using fully non-linear simulations, for random waves in a wave-basin, and for field data recorded in the North Sea. We also apply this to the famous Draupner wave, which our analysis suggests was caused by two wave systems, propagating at approximate 120 degrees to each other. The second part of the thesis looks at the non-linear evolution of Gaussian wave-groups. Whilst much work has previously been done to investigate these numerically, we instead derive an approximate analytical model for describing the non-linear changes to the group, based on the conserved quantities of the non-linear Schrodinger equation. These are validated using a numerical model. There is excellent agreement for uni-directional waves. The analytical model is generally good for predicting change in shape of directionally spread groups, but less good for predicting peak elevation. Nevertheless, it is still useful for typical sea-state parameters. Finally we consider the effect of wind on the local modeling of extreme waves. We insert a negative damping term into the non-linear Schrodinger equation, and consider the evolution of "NewWave" type wave-groups. We find that energy input accentuates the non-linear dynamics of wave-group evolution which suggests it may be important in the formation of "freak" waves.
22

Rogue Signal Threat on Trust-based Cooperative Spectrum Sensing in Cognitive Radio Networks

Jackson, David S 01 January 2015 (has links)
Cognitive Radio Networks (CRNs) are a next generation network that is expected to solve the wireless spectrum shortage problem, which is the shrinking of available wireless spectrum resources needed to facilitate future wireless applications. The first CRN standard, the IEEE 802.22, addresses this particular problem by allowing CRNs to share geographically unused TV spectrum to mitigate the spectrum shortage. Equipped with reasoning and learning engines, cognitive radios operate autonomously to locate unused channels to maximize its own bandwidth and Quality-of-Service (QoS). However, their increased capabilities over traditional radios introduce a new dimension of security threats. In an NSF 2009 workshop, the FCC raised the question, “What authentication mechanisms are needed to support cooperative cognitive radio networks? Are reputation-based schemes useful supplements to conventional Public Key Infrastructure (PKI) authentication protocols?” Reputation-based schemes in cognitive radio networks are a popular technique for performing robust and accurate spectrum sensing without any inter-communication with licensed networks, but the question remains on how effective they are at satisfying the FCC security requirements. Our work demonstrates that trust-based Cooperative Spectrum Sensing (CSS) protocols are vulnerable to rogue signals, which creates the illusion of inside attackers and raises the concern that such schemes are overly sensitive Intrusion Detection Systems (IDS). The erosion of the sensor reputations in trust-based CSS protocols makes CRNs vulnerable to future attacks. To counter this new threat, we introduce community detection and cluster analytics to detect and negate the impact of rogue signals on sensor reputations.
23

Comparison of systems to detect rogue access points

Lennartsson, Alexander, Melander, Hilda January 2019 (has links)
A hacker might use a rogue access point to gain access to a network, this poses athreat to the individuals connected to it. The hacker might have the potential to leakcorporate data or steal private information. The detection of rogue access points istherefore of importance to prevent any damage to both businesses and individuals.Comparing different software that detects rogue access points increases the chanceof someone finding a solution that suits their network. The different type of softwarethat are compared are intrusion detection systems, wireless scanners and a Ciscowireless lan controller. The parameters that are being compared are; cost, compat-ibility, detection capability and implementation difficulty. In order to obtain resultssome of the parameters require testing. As there are three types of software, threeexperiment environments should be conducted. Our research indicates that alreadyexisting network equipment or the size of the network affects the results from theexperiments.
24

Acts of Rebellion: The Rhetoric of Rogue Cinema

Breckenridge, Adam 09 May 2014 (has links)
The purpose of this project was to articulate a definition and understanding of the emerging genre of rogue cinema through the lens of rhetorical theory. To this end, I lay out a theoretical groundwork based principally on the works of Kenneth Burke and Slavoj Zizek to build a definition and to analyze the works of four filmmakers whose work could be considered rogue: Alejandro Jodorowsky, Dusan Makavejev, Lars von Trier and Werner Herzog. The first chapter is dedicated to articulating the theorists I use and showing how they can be used to examine rogue films. The second chapter is dedicated to the films of Jodorowsky, focusing in particular on his films Fando y Lis, El Topo and The Holy Mountain, looking at how these films form a critique of our conventional views of religion and spirituatity. Chapter three looks at Makavejev's films WR: Mysteries of the Organism and Sweet Movie and discusses how they undermine the capitalist/communist dichotomy that has defined most of 20th century politics. Chapter four examines Lars von Trier's films Europa and Dancer in the Dark, framing them in particular with the Dogme movement and looking at how von Trier rebels against cinematic convention. The last chapter looks at Herzog's films Aguirre: Wrath of God and Stroszek and discusses how Herzog blends fiction and reality in ways that question our cultural and moral values. Since little has been written on rogue cinema to date my aim here has been to help develop rogue cinema as a concept and begin the work of building a theoretical basis for the idea of this as a genre. In my conclusion I suggest avenues for future scholars to expand on this idea and discuss what further work needs to be done for rogue cinema to become an accepted idea.
25

Conflict And Cooperation: Syria-united States Relations Through 1970-2011

Tigrak, Fatih 01 October 2012 (has links) (PDF)
This thesis analyzes the dynamics of bilateral relationship between the United States of America and Syrian Arab Republic from Hafez Asad&rsquo / s grasp of power in 1970 to the latest domestic uprising of 2011. The relationship will be considered under three main vectors / struggle over Lebanon, tensions regarding peace process and Israel, and rogue statehood of Syria attributed by the United States.
26

802.11 Fingerprinting to Detect Wireless Stealth Attacks

Venkataraman, Aravind 20 November 2008 (has links)
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as a solution for three critical stealth attacks in wireless networks. We focus on extracting traces of the 802.11 medium access control (MAC) protocol from the temporal arrival patterns of incoming traffic streams as seen on the wired side, to identify attacker behavior. Attacks addressed include unauthorized access points, selfish behavior at the MAC layer and MAC layer covert timing channels. We employ the Bayesian binning technique as a means of classifying between delay distributions. The scheme requires no change to the 802.11 nodes or protocol, exhibits minimal computational overhead and offers a single point of discovery. We evaluate our model using experiments and simulations.
27

Defining The Different: A Critical Analysis Of The Rentier, Failed And Rogue State Theories

Sune, Engin 01 July 2012 (has links) (PDF)
This thesis focuses on three state theories that aim to define the structures of the Third World states by the West. The terms of the &lsquo / rentier&rsquo / , &lsquo / failed&rsquo / and &lsquo / rogue&rsquo / states are critically examined in an attempt to understand how they define the difference, how they negate the different, and how they legitimize certain policies towards the different. By concentrating on the liberal theorizing that analyzes the state on the basis of the claimed civil society-state divide, and from an orientalist perspective, this study aims to demonstrate that these state theories refuse the possibility of transformation of those states by their own internal dynamics. It is argued that with the help of such discourses, rather than being simple theoretical constructs these state theories have become functional means to legitimize certain historical practices.
28

Modeling Rogue Waves with the Kadomtsev-Petviashvili Equation

Wanye, Randy Kanyiri Unknown Date
No description available.
29

Proving up and pulling out : archaeology and history of early 20th century homesteading in southwestern Oregon /

Lundgren, Stacy. January 1900 (has links)
Thesis (M.A.)--Oregon State University, 2007. / Printout. Includes bibliographical references (leaves 156-167).
30

The Tlegetlinten Site (35CU59) and its place in southwest Oregon prehistory /

Tisdale, Lucille. January 1986 (has links)
Thesis (M.A.)--Oregon State University, 1987. / Typescript (photocopy). Includes bibliographical references (leaves 113-128). Also available online.

Page generated in 0.0197 seconds