• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 45
  • 23
  • 9
  • 8
  • 8
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 114
  • 17
  • 11
  • 11
  • 11
  • 9
  • 9
  • 8
  • 7
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Towards nanoscale interconnect for system-on-chip / Approches de mise en oeuvre des nanocommunication pour les réseaux nanocapteurs sans fil et les systèmes sur puce.

Yalgashev, Olimjon 29 October 2015 (has links)
La nanocommunication est un nouveau paradigme qui permet de communiquer à l'échelle nanométrique, via des mécanismes moléculaires, électromagnétiques, acoustiques, ou nano-mécaniques. Le cadre général de cette thèse concerne les réseaux de nanocapteurs sans fil et les nanoréseaux sur puce. Plus précisément, il s'agit des architectures d'interconnexion et des protocoles de communication dans la bande de fréquence des Térahertz. En effet, les architectures réseaux et les protocoles de communication existants doivent être repensés en tenant compte des mécanismes de communication à l'échelle nanométrique.En premier lieu, nous nous sommes focalisés sur la nécessité de développer des approches de diffusion efficaces dans le contexte des réseaux de nanocapteurs sans fil. Une approche de diffusion efficace, issue d'une adaptation d'un protocole de la famille des protocoles d'inondation probabilistes, est présenté et son efficacité et validée par simulations à l'aide de Nano-Sim et NS3.En second lieu, une étude approfondie de l'impact des portées de transmission sur les performances du mécanisme de diffusion basé sur les ondes électromagnétiques à l'échelle nanométrique a été effectuée. Les résultats des simulations montrent que l'adaptation des portées des nano-noeuds permet de contrôler le mécanisme d'inondation et de réduire les redondances des paquets tout en augmentant les débits. Une approche adaptative de sélection de portées de transmission contrôlée au niveau des nano-noeuds est proposée. En dernier lieu, nous nous sommes attaqués à un troisième défi en examinant ce nouveau paradigme de nanocommunication dans le contexte de la conception des nanoréseaux sur puce (Network on Chip, NoC). / Nanocommunication is a new paradigm that enables connectivity at the nanoscale through molecular, electromagnetic, acoustic, or nanomechanical mechanisms. The general context of this thesis concerns wireless nanosensor networks and nanonetworks on chips. More precisely, the thesis deals with interconnection architectures and communication protocols in the terahertz band. The existing network architectures and communication protocols should be revisited taking into account the communication mechanisms at the nanoscale.First, dissemination approaches in the context of wireless nanosensor networks are addressed. An efficient broadcasting approach is presented and the simulation performance results with Nano-Sim and NS3 show that the proposed scheme is superior to flooding, especially in the cases of excessive broadcasts.Second, we investigated the impact of transmission ranges on the performance of broadcast mechanisms based on electromagnetic waves at the nanoscale. Adaptive transmission range of electromagnetic-based communication approaches are proposed. Simulations are conducted with fixed and adaptive transmission ranges to show the efficiency of the proposed approaches in terms of throughput and latency according to the network density.The third part addresses the hypothesis of using EM-based nanonetwok as an on-chip interconnect for SoCs.
22

Desenvolvimento e validação de método multirresidual para determinação de pesticidas em café verde utilizando GC-MS (NCI-SIM) / Development and validation a multi-residue method for pesticides determination in green coffee usin GC-MS (NCI-SIM)

Reichert, Bárbara 16 January 2012 (has links)
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior / In this study, was developed and validated a multi-residue method for the determination of 40 pesticides in green coffee beans. To obtain a very homogeneous sample, the coffee beans were first milled, followed by a slurry preparation of coffee and water (ratio 1:4, w/w). For the extraction procedure modifications of the QuEChERS method were developed. Acetonitrile containing 1% acetic acid and the procedure internal standard (P.I.S.) was used as extraction solvent. After the acetonitrile addition, 3 g of anhydrous magnesium sulfate were added, to promote phase separation between the organic phase (acetonitrile) and the aqueous phase. For the dispersive solid-phase extraction (dSPE) clean-up step, two sorbents were tested in separate and in different amounts and were also tested mixtures of them. Ergo the best results were obtained using 500 mg C18-bonded silica together with 600 mg of magnesium sulfate, for drying. The pesticides were determined by gas chromatography tandem mass spectrometry (GC-MS). Considering the characteristics of the pesticides and the complexity of the coffee matrix the GC-MS had to be operated in negative chemical ionization mode (NCI) and single ion monitoring mode (SIM) which provided high sensitivity and selectivity to pesticide detection. The validation was performed by analyzing spiked samples at three different concentrations (10, 20 and 50 μg kg-1), with 6 replicates (n=6) at each spike concentration. For each one of the 51 pesticides determined by GC-MS (NCI-SIM), the linearity (r) of calibration curves, accuracy (as recovery percent), instrument and method limits of detection and quantification (LOD and LOQ), precision (as RSD percent) and matrix effects (percent) were determined. From the 51 pesticides studied, approximately 76% showed average recoveries between 70-120% and 75% RSD ≤ 20% for the spike concentration of 10 μg kg-1. For the spike concentrations of 20 and 50 μg kg-1, the recoveries (%) and RSD (%) values were even better. The method LOQ was 10, 20 and 50 μg kg-1, for respectively 33, 3 and 6 pesticides, 4 pesticides could only be detected via their degradation products and 5 compounds did not presented recoveries between 70-120% and RSD ≤ 20% thus the method LOQ could not be determined for those pesticides. The matrix effect was present for all the pesticides even with the use of a clean-up step, requiring therefore matrixmatched calibration standards for application in routine analysis. / Neste estudo, foi desenvolvido e validado um método multirresidual para determinação de 40 pesticidas em grãos de café verde. Para se obter uma amostra bem homogênea, os grãos de café verde foram previamente moídos e em seguida preparou-se um slurry de café e água (razão 1:4, m/m). Para o procedimento de extração utilizou-se o método QuEChERS, no qual foram introduzidas algumas modificações. Como solvente extrator, utilizou-se acetonitrila contendo 1% de ácido acético e padrão interno do procedimento (P.I.P.). Após a adição da acetonitrila, para promover o particionamento entre as fases orgânica e aquosa, adicionou-se 3 g de sulfato de magnésio anidro. Para a purificação do extrato de café, foram testados dois adsorventes, separadamente e em diferentes quantidades e também misturas entre os dois adsorventes, em uma etapa de extração em fase sólida dispersiva (dSPE), sendo que os melhores resultados foram obtidos com a utilização de 500 mg de C18 juntamente com 600 mg de sulfato de magnésio, para remoção de água. A determinação dos pesticidas foi feita em um sistema de cromatografia gasosa acoplado a um espectrômetro de massas (GC-MS). Em função das características dos pesticidas e da complexidade da matriz, o GC-MS foi operado no modo de ionização química negativa (NCI) e monitoramento seletivo de íons (SIM), que forneceu grande sensibilidade e seletividade na determinação dos pesticidas. A validação foi realizada pela análise de amostras de café fortificado em três diferentes concentrações (10, 20 e 50 μg kg-1), com 6 replicatas (n=6) para cada concentração. Para cada um dos pesticidas, avaliou-se a linearidade da curva analítica (r), exatidão (recuperação%), limite de detecção e quantificação (LOD e LOQ) do instrumento e do método, precisão (RSD%) e efeito matriz (%). Dos 51 pesticidas estudados, aproximadamente 76% obtiveram recuperações médias entre 70-120% e 75% apresentaram RSD ≤ 20% para amostras fortificadas na concentração de 10 μg kg-1. Para as fortificações de 20 e 50 μg kg-1 os resultados foram ainda melhores. O LOQ do método foi estabelecido em 10, 20 e 50 μg kg-1, respectivamente para 33, 3 e 6 pesticidas, 4 pesticidas somente puderam ser detectados via seus produtos de degradação e 5 compostos não apresentaram recuperações entre 70-120% e RSD≤ 20%, assim o LOQ do método não pode ser estabelecido para esses pesticidas. Mesmo com a utilização de uma etapa de purificação do extrato de café o efeito matriz manteve-se presente para todos os pesticidas, dessa forma, para que o método possa ser implantado em análises de rotina, a confecção das curvas analíticas deve ser feita em matriz (matrix-matched calibration).
23

Etude du rôle des inhibiteurs de kinases-cycline-dépendantes (CKI) de la classe des SIM/SMR en réponse au stress abiotique chez Arabidopsis thaliana / Study of the role of cyclin-dependant kinase inhibitor (CKI) of the class of SIM/SMR in response to abiotic stress in Arabidopsis thaliana

Lamy, Geneviève 29 May 2013 (has links)
Chez Arabidopsis thaliana, les protéines SIAMESE-RELATED (SIM/SMR1 à 13) forment une famille plante-spécifique d’Inhibiteurs de Kinase Cycline-dépendante (CKI), homologue des Kip-Related Proteins. SIM et SMR1 sont des régulateurs positifs de la transition du cycle mitotique vers l’endoréplication. L’expression des gènes SIM/SMR est induite en réponse àdes stress. L’un des stress abiotiques majeurs pour les plantes est la sécheresse. Les SIM/SMR pourraient être dégradées par la voie de la protéolyse spécifique de l’Ubiquitin Proteasome System (UPS). Les SIM/SMR sont de bons candidats pour relier l'activité du cycle cellulaire aux stimuli de l'environnement. Ce travail a démontré l’implication de la protéolyse UPS dans le contrôle posttraductionnel de tous membres SIM/SMR testés. Il démontre que SIM, SMR2 et SMR1 sont nécessaires à l’endoréplication des cellules foliaires. Lors d’un stress hydrique, l’expression des gènes SIM, SMR1, SMR3 et SMR5 est induite. Le profil spatio-temporel de ces inductions a mis en évidence deux groupes de gènes avec des fonctions distinctes. Les mutants sim, smr5 et sim.smr1.smr2 sont hypersensibles au stress hydrique. / In Arabidopsis thaliana, the SIAMESE-RELATED proteins (SIM/SMR1 to 13) are a plantspecific family of Cyclin-dependent Kinase Inhibitors (CKIs), homologous to the Kip-Related Proteins. SIM and SMR1 are positive regulators of the switch from mitotic cycle to endoreplication. The expression of SIM/SMRs genes is induced in response to stress. One of the major abiotic stress for plants is the drought stress. The SIM/SMRs could be degraded through the specific proteolysis of Ubiquitin Proteasome System (UPS). The SIM/SMRs proteins are good candidates to link cell cycle activity with environmental stimuli.This research work has shown the involvement of the UPS proteolysis in the posttranslational control of all the tested members of the SIM/SMR family. It also shows that SIM, SMR2 and mostly SMR1 are required in endoreplication of leaf cells. During drought stress, the expression of SIM, SMR1, SMR3 and SMR5 genes is induced. The spaciotemporal pattern of those inductions revealed two groups of genes with distinct functions. In addition, the sim, smr5 and sim.smr1.smr2 loss-of-function mutants tested are hypersensitive to drought stress.
24

SIM cards for cellular networks : An introduction to SIM card application development

Edsbäcker, Peter January 2011 (has links)
A SIM, Subscriber Identity Module, is the removable circuit board found in a modern cellular phone. It carries the network identity information and is a type of smart card which can also be found on payment cards (EMV), ID cards and so on. A smart card is basically a small computer, providing a safe and controlled execution environment. Historically smart card software was very hardware dependent and mostly developed by the manufacturers themselves. With the introduction of the open Java Card standard created by Sun Microsystems (Oracle) this was meant to change. However, information still remains scattered and is hard to obtain. This paper is meant to serve both as an introduction to the field and also as a good foundation for future studies. It begins with a theoretical discussion about smart card hardware and software architectures, network standards in the context of SIM cards, typical applications, coming trends and technologies and ends off with an overview of the Java Card standard. The following section discusses the supplied example SIM card application coupled with an introduction how to use the Gemalto Developer Suite for application development and testing. The paper ends with an extensive appendix section going in depth about some of the more important subjects.
25

How Quicksave and Quickload Affects Immersion Within Immersive Simulation Games

Bugnar, Alexandru, Persson, Jesper January 2021 (has links)
Immersive sims are all about being immersed and acting in a believable world, despite this,we believe that how their save systems affect player experience has not been exploredenough. In this paper we examined the relationship between save systems, save scumming,and player immersion using the scales tested by Weibel and Wissmath (2012) in their studyabout presence and flow and how they constitute immersion. In order to test how much savescumming influences immersion, we had two groups of players play Deus Ex: HumanRevolution: one that played using only the autosave system, and the other one exclusivelyusing quicksaves. After playing the game for two hours, they then answered twoquestionnaires that allowed us to gauge their presence and flow respectively. Our test foundwhat looks to be a trend of quicksave negatively affecting flow, but our results are notstatistically relevant (P = .11), this might be due to our small sample size (N = 10). / Immersive sims handlar helt och hållet om att känna inlevelse och agera i en trovärdig värld,fastän detta, så tror vi att hur dessa spels sparsystem effektuerar spelarens upplevelse inte harblivit undersökt nog. I detta uppsatsarbete så undersökte vi relationen mellan sparsystem,“save scumming” (tendensen att överanvända ett spårsystem för att lättare klara utmaningar),och en spelares inlevelse med hjälp av skalor skapade av Webel och Wissmath (2012) i derasstudie på flöde och närvaro när det kommer till spel och hur det inrättar inlevelse. För att testahur stor effekt save scumming har på en spelares inlevelse så hade vi två grupper av spelaretill att spela Deus Ex: Human Revolution: den ena gruppen fick endast ta användning avspelets automatiska sparsystem, medans den andra gruppen fick endast använda det manuellasnabbsparsystemet. Efter var spelare är färdig så hade vi dem till att svara på två enkäter somlåter oss beräkna deras nivå av både flöde och närvaro. Våra tester hittade vad som kan sessom en trend till att snabbsparsystemet har en negativ inverkan på flöde, men våra resultat ärinte statistiskt betydelsefulla (P = .11), detta kan bero på att vi hade en liten provstorlek (N =10).
26

Útoky postranními kanály na čipové karty / Side channel attacks on chip cards

Matějka, Jiří January 2010 (has links)
This master thesis deals about the issues of chip cards’ side channels. Side channels are new method in cryptanalysis. Unlike classical cryptanalysis, which looks for weaknesses of mathematical structure of algorithms, side channel’s analysis use weaknesses of physical implementation of these algorithms. First part describes chip cards, their usage a security. There is mentioned the issue of cryptographic algorithms and their implementation on smart cards. There are described well-known side channels and examples of their abuse. Practical part of this thesis is focused on a proposal of a laboratory task, which demonstrates power-based side channel attack on smart card. There is designed laboratory workplace for this task, software for measurement and analysis is implemented in development tool LabVIEW. In the last part is this attack realized, the target of this attack is a standard SIM card.
27

Proactive Command Proxy : Simplifying the use of Proactive Commands / Proxy för Proaktiva Anrop : Ett förenklande av användningen av Proaktiva Anrop

Nee, Amanda January 2023 (has links)
With phones becoming more and more advanced telecom operators findthemselves in need of interacting with the operating system of the customersphone more and more. They also prefer to do this with their own infrastructureinstead of through an app that relies on the operating system developer. Thesolution is called proactive commands which is a way for the SIM card to talkto the operating system among other things. This project explores two ways tomake it possible for an operator to through SMS secured by Secure Protocol80 send arbitrary proactive commands to the operating system of a device.Resulting in a JavaCard applet with a two command interface able to run andpoll the result of a proactive command. / Med med den snabba utvecklingen av telefoner finner mobiltelefonoperatörernaett ökande behov av att prata med operativsystemet på kundens enhet. Devill också hålla sig inom sina egna nät för att göra detta och inte vara beroendeav andra parter vilket skulle vara fallet med en app. Lösningen heter proaktivaanrop vilket är ett sätt för SIMkortet att prata med operativsystemet med mera.Projektet utforskar två sätt för operatören att genom SMS skyddade med SäkertKanalprotokoll 80 skicka arbiträra proaktiva anrop till en enhet. Resultatet ären JavaCard applet med ett API bestående av två anrop som kan köra anroprespektive hämta resultatet av sagda anrop.
28

Modeling a Security Operations Center / Modellering av ett Security Operations Center

Tannous, Mario, Ayhan, Emre January 2022 (has links)
Security breaches caused by hackers are a significant issue for businesses. This illustrates the need for protection against these attacks. Using a Security Operations Center (SOC) solution to detect attacks against ones corporation is an essential step in doing that. How should businesses deploy their SOC? This thesis compares traditional and modern SOC both by means of a literature study and hands-on experimentation, to evaluate which approach is appropriate for the current situation. The SOC solutions were set up to monitor a simulated office environment, using only free, open-source software. This thesis sheds light on both subtle and significant differences betweenthe two solutions. This thesis also concludes that the time for establishing a traditional SOC has passed. The advantages of utilizing a virtual SOC and its accompanying tool sare too significant to ignore. / Dataintrång orsakade av hackare är ett stort problem för företag. Detta belyser vikten av att ha skydd mot attacker. Användning av en SOC (Security Operations Center) lösning för att upptäcka attacker är ett viktigt steg i denna process. Hur bör företag implementera sin SOC lösning? Denna rapport jämför traditionella och moderna lösningar genom delvis litteraturstudie och sedan ett laborativt moment, för att slutligen komma fram till vilken lösning som passar dagens företag. SOC lösningarna implementerades i syfte att övervaka en simulerad kontorsmiljö. Endast gratis programvara medöppen källkod användes. Rapporten belyser både subtila och större skillnader mellan de två lösningarna. I rapporten framgår slutsatsen att det traditionella sättet att ta fram en SOC lösning på är förlegat. Fördelarna med moderna lösningar och dess tillhörandeverktyg är för omfattande för att inte dra nytta av.
29

Moving beyond connecting things : What are the factors telecommunication service providers need to consider when developing a Data-as-a-Service offering? / Steget vidare från uppkoppling av produkter: : Vilka faktorer bör IoT-operatörer ta hänsyn till vid utveckling av Data-as-a-Service tjänster?

GOHARI MOGHADAM, SHERVIN, ÅHLGREN, THOR January 2020 (has links)
The Internet of Things and connected devices has been getting more and more recognition in multiple industries the last few years. At the same time, the gathering of data is withholding a more central role for both companies and civilians. One type of Internet of Things is enabled by telecommunication Service Providers(TSP)providing SIMcards in devices, functioning by an advanced telecommunication infrastructure. This study aims to examine how these TSPs can leverage data generated by the communication infrastructure, by providing an additional data-as-a-service (DaaS) to current customers. The study was done at a global TSP within the area of SIM-fleet management/IoT enablement. The number of industries that are starting to connect devices are growing extensively, to get all types of information regarding the devices ranging from electricity-usage & geocoordinates to performance or other useful information. The data that is sent by the SIM-card belongs to the customer, and the TSPs does not access it. However, the telecommunication infrastructure generates data created by the communication of the devices, which is gathered by the TSP. Since a huge amount of data is attained by the TSP offering the infrastructure, the aim for this study is to examine eventual obstacles and opportunities of a DaaSoffering. How the data is to be delivered, customers connectivity-needs and how current insights streams are delivered are examples of subjects the study will examine. The work has its foundation in a theoretical reference frame and a qualitative empirical study. The theoretical reference provides a theoretical overview of the industry's development and earlier research within the area. It was created by conducting a literature study combined with reports provided by trade organizations and other stakeholders. The empirical study contains 6 interviews with employees at a global TSP, with an extensive history of connected devices. The two parts were then compiled in order to compare the result with the theoretical background. It appeared that a lot of the challenges of developing a DaaS from the result agreed with the theoretical reference frame. The customers' differences in connectivity-maturity was shown to pose a great challenge to standardize a DaaS-offering, and the clients analytical needs were dependent on the same premises. Furthermore DaaS is considered to have a great effect on the industry's future development, / Internet of Things och uppkopplade produkter har blivit ett allt vanligare begrepp inom flertalet branscher. Samtidigt har datainsamling blivit en mer central del av alltifrån affärsmodeller till något vanliga konsumenter har i åtanke. En variant av Internet of Things tillhandahålls genom SIM-kort i produkter, som tillhandahålls av operatörer, och funktionerar genom kommunikationsnätverk. Denna studie är en akademisk utredning kring hur dessa operatörer kan utnyttja data genererat från telekommunikations-infrastruktur till en tjänst för nuvarande kunder. Studien är utförd hos en global operatör inom området av SIM-fleet Management/IoT-enablement. Fler och fler industrier går mot att koppla upp produkter för att få information kring alltifrån prestanda, elanvändning hos produkten, geografisk position eller annan information som önskas. Den data som skickas tillhandahålls av kund, vilket operatören inte har någon tillgång till. Dock så genererar kommunikationen i sig data genom kommunikationsnätverket, som operatören samlar in. I och med att mängder av data blir tillgänglig för operatörerna som tillhandahåller infrastrukturen, är syftet med denna rapport att undersöka eventuella hinder och möjligheter att erbjuda kunder ytterligare data som en tjänst i sig. Hur datan ska levereras, kundernas analysbehov och hur nuvarande insikter levereras är några exempel på det studien utreder. Arbetet grundar sig i en litteraturstudie och en kvalitativ empirisk studie. Litteraturstudien ger en bakgrund och teoretisk överblick kring branschens utveckling och litteraturens syn på området. Detta gjordes genom vetenskapliga publikationer samt diverse rapporter från branschorganisationer och intressenter. Den empiriska studien genomfördes genom 6 intervjuer med anställda på en global operatör med lång historisk inom uppkopplade produkter. De två delarna sammanställdes sedan för att jämföra resultatet med den teoretiska bakgrunden. Det visades sig vara mycket i resultat som stämde överens med de teoretiska aspekterna kring utmaningar med att erbjuda Data-as-aService (DaaS). Kundernas olika mognadsgrad i sin uppkoppling visades sig vara en stor utmaning i att standardisera en DaaS, och kundernas analysbehov gick ofta isär på samma premisser. Vidare anses DaaS ha stor påverkan på hur branschen fortsätter utvecklas i framtiden, och konsensus är tjänsten i framtiden kommer bli mer och mer datadriven.
30

Simulation of the IBM System/7

Lewis, Ted C. 05 1900 (has links)
This thesis describes the simulation of the IBM SYSTEM/7. The research leading to this thesis involved the development of a PL/I computer program that runs on an IBM 360/50 computer and simulates the IBM SYSTEM/7. Various methods of simulation are examined and guidelines for computer simulation of another computer are established. The SYSTEM/7 simulator (SIM/7) is the heart of this thesis. SIM/7 simulates the IBM SYSTEM/7 entirely with software as opposed to an emulator which involves the combined use of hardware and software to perform the simulation process. This thesis contains a general introduction to computer simulation, reason for simulation, a user's guide for SIM/7 and a definition of the SYSTEM/7 processor using the Vienna Definition Language.

Page generated in 0.0433 seconds