• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 508
  • 117
  • 68
  • 54
  • 36
  • 31
  • 19
  • 10
  • 10
  • 8
  • 7
  • 5
  • 4
  • 4
  • 4
  • Tagged with
  • 1045
  • 83
  • 79
  • 73
  • 68
  • 63
  • 58
  • 57
  • 51
  • 49
  • 49
  • 48
  • 48
  • 46
  • 45
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
401

End-to-end QoS Mapping and Traffic Forwarding in Converged TSN-5G Networks

Satka, Zenepe January 2023 (has links)
The advancement of technology has led to an increase in the demand for ultra-low end-to-end network latency in real-time applications with a target of below 10ms. The IEEE 802.1 Time-Sensitive Networking (TSN) is a set of standards that supports the required low-latency wired communication with ultra-low jitter for real-time applications. TSN is designed for fixed networks thus it misses the flexibility of wireless networks.To overcome this limitation and to increase its applicability in different applications, an integration of TSN with other wireless technologies is needed. The fifth generation of cellular networks (5G) supports real-time applications with its Ultra-Reliable Low Latency Communication (URLLC) service. 5G URLLC is designed to meet the stringent timing requirements of these applications, such as providing reliable communication with latencies as low as 1ms. Seamless integration of TSN and 5G is needed to fully utilize the potential of these technologies in contemporary and future industrial applications. However, to achieve the end-to-end Quality of Service (QoS) requirements of a TSN-5G network, a significant effort is required due to the large dissimilarity between these technologies. This thesis presents a comprehensive and well-structured snapshot of the existing research on TSN-5G integration that identifies gaps in the current research and highlights the opportunities for further research in the area of TSN-5G integration. In particular, the thesis identifies that the state of the art lacks an end-to-end mapping of QoS requirements and traffic forwarding mechanisms for a converged TSN-5G network. This lack of knowledge and tool support hampers the utilisation of ground-breaking technologies like TSN and 5G. Hence, the thesis develops novel techniques to support the end-to-end QoS mapping and traffic forwarding of a converged TSN-5G network for predictable communication.Furthermore, the thesis presents a translation technique between TSN and 5G with a proof-of-concept implementation in a well-known TSN network simulator. Moreover, a novel QoS mapping algorithm is proposed to support the systematic mapping of QoS characteristics and integration of traffic flows in a converged TSN-5G network. / PROVIDENT
402

Detecting access to sensitive data in software extensions through static analysis / Att upptäcka åtkomst till känslig information i mjukvarutillägg genom statisk analys

Hedlin, Johan, Kahlström, Joakim January 2019 (has links)
Static analysis is a technique to automatically audit code without having to execute or manually read through it. It is highly effective and can scan large amounts of code or text very quickly. This thesis uses static analysis to find potential threats within a software's extension modules. These extensions are developed by third parties and should not be allowed to access information belonging to other extensions. However, due to the structure of the software there is no easy way to restrict this and still keep the software's functionality intact. The use of a static analysis tool could detect such threats by analyzing the code of an extension before it is published online, and therefore keep all current functionality intact. As the software is based on a lesser known language and there is a specific threat by way of information disclosure, a new static analysis tool has to be developed. To achieve this, a combination of language specific functionality and features available in C++ are combined to create an extendable tool which has the capability to detect cross-extension data access.
403

Count-Techniken: Eine Lösung für heikle Fragen?

Junkermann, Justus 25 November 2022 (has links)
Verzerrungen durch sozial erwünschtes Antwortverhalten bei heiklen Fragen stellen ein großes Problem der empirischen Sozialforschung dar. Dies führt bei Umfragen zu Item- und Unit-Nonresponse sowie zu unehrlichen Antworten. Diese Verzerrung durch soziale Erwünschtheit (Social Desirability Bias, SD-Bias) führt oftmals dazu, dass Fragen zu sozial erwünschtem Verhalten oder Meinungen (z. B. Wahlteilnahme, Blutspenden oder soziales Engagement) überschätzt und zu sozial unerwünschtem Verhalten oder Einstellungen (z. B. Drogenkonsum, Rassismus oder Diebstahl) unterschätzt werden. In dieser Dissertation wird anhand eines Survey-Experiments überprüft ob die Item Count Technique (ICT) und ihr ähnliche Count-Techniken (z.B. Person Count Techique, Item Sum Technique etc.) bessere Ergebnisse bei heiklen Fragen erzielen als direktes Fragen. Dies wurde mit einem experimentellen Design anhand eines Online Access Panels (n = 3044) überprüft. Dabei wurden die gleichen heiklen Fragen in der Experimentalgruppe mit Count-Techniken gestellt (n =2527) und in der Kontrollgruppe (n = 517) direkt gestellt. Insgesamt konnten Count-Techniken keine besseren Ergebnisse erzielen als direktes Fragen.:1 Problemstellung 1.1 Auswirkungen heikler Fragen 2 Dimensionen heikler Fragen 2.1 Soziale Erwünschtheit 2.2 Eingriff in die Privatsphäre 2.3 Gefahr der Aufdeckung 2.4 Psychologische Kosten 2.5 Definition 3 Soziale Erwünschtheit 3.1 Social-Desirability-Neigung 3.1.1 Definition und Konstrukt 3.2 Messung sozialer Erwünschtheit 3.2.1 Die Crowne-Marlowe-Skala 3.2.2 Das Balanced Inventory of Desirable Responding (BIDR) 3.3 Social Desirability Belief und Trait Desirability 3.3.1 Messung des SD-Beliefs 3.3.2 Trait Desirability 4 Handlungstheorie und Befragtenverhalten 4.1 SEU-Theorie und heikle Fragen 4.2 Das Modell der Frame-Selection und heikle Fragen 5 Externe Effekte und heikle Fragen 5.1 Interviewereffekte und heikle Fragen 5.2 Bystander-Effekte und soziale Erwünschtheit 5.3 Modus-Effekte und heikle Fragen 6 Klassische Lösungen für heikle Fragen 6.1 Bogus Pipeline 6.2 Sealed Envelope 6.3 Forgiving Wording 7 Die Randomized Response Technique 7.1 Entstehung und Grundprinzip nach Warner (1965) 7.2 Die „Unrelated Question“ Technique 7.3 Die „Forced Response“ Technique 7.4 Takahasi’s Technique 7.5 Die „Two Step Procedure“ 7.6 Kuks Card Method 7.7 Multivariate Analyse mit der RRT 7.8 Empirische Tests der RRT 7.9 Handlungstheorie und RRT 7.10 Allgemeine Probleme der RRT 8 Das Crosswise-Model 8.1 Entstehung und Grundprinzip 8.2 Empirischer Test des Crosswise-Models mit Meta-Analyse 9 Die Item Count Technique 9.1 Probleme und Design der ICT-Fragen 9.2 Handlungstheorie und ICT 9.3 Kurze Geschichte der ICT 9.4 Das Double List Design 9.5 Die Person Count Technique 9.6 Die Fixed und Variable Person Count Technique 9.7 Die Item Sum Technique 9.8 Die Person Sum Technique 9.9 Multivariate Analyse von ICT-Daten 9.10 Bisherige empirische Tests der Item Count Technique mit Meta-Studie 10 Empirischer Test der Count-Techniken 10.1 Hypothesen 10.2 Grundlegendes Design 10.3 Datenerhebung 10.4 Operationalisierung 10.4.1 SD-Neigung (BIDR16) 10.4.2 SD-Belief und Trait Desirability 10.4.3 Modell der Frame Selection 10.5 Grundlegende Annahmen und Probleme der Hypothesenprüfung 10.6 Prüfung der Item Count Technique 10.7 Prüfung der Person Count Technique 10.8 Prüfung der Fixed Person Count Technique 10.9 Prüfung der Variable Person Count Technique 10.10Prüfung der Item Sum Technique 10.11Prüfung der Person Sum Technique 10.12Prüfung der Count-Techniken insgesamt 11 Prüfung der Theorien des Befragtenverhaltens 11.1 Test der SEU-Theorie 11.2 Test des Modells der Frame Selection 11.3 Prüfung der handlungstheoretischen Betrachtung der Count-Techniken 12 Fazit 13 Anhang 13.1 Deskriptive Statistiken 13.1.1 BIDR16 13.1.2 SD-Belief 13.1.3 Umfrageeinstellung Literatur
404

ULTRA HIGH RESOLUTION AND CONTRAST SENSITIVE OPTICAL COHERENCE TOMOGRAPHY

Wang, Hui 03 April 2008 (has links)
No description available.
405

The Roles of Auditory Brainstem Structures in Analysis of Complex Sounds

Yavuzoglu, Asuman 24 November 2010 (has links)
No description available.
406

Time-sensitive Information Communication, Sensing, and Computing in Cyber-Physical Systems

Li, Xinfeng 08 September 2014 (has links)
No description available.
407

An Open Source Platform for Controlling the MANOI AT01 Humanoid Robot and Estimating its Center of Mass

Al-Faisali, Nihad 06 June 2014 (has links)
No description available.
408

New Method of Scheduling to Enhance the Reliability and Efficiency of the High Tech and Sensitive Industries

Nojabaei, Seyedehfarzaneh January 2015 (has links)
No description available.
409

Hypersonic Experimental Aero-thermal Capability Study Through Multilevel Fidelity Computational Fluid Dynamics

Sagerman, Denton Gregory 24 August 2017 (has links)
No description available.
410

Culturally Sensitive Transgender Education for Health Care Providers

Couch, Teresa A. 25 April 2018 (has links)
No description available.

Page generated in 0.0709 seconds