• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 2
  • 1
  • 1
  • Tagged with
  • 16
  • 16
  • 9
  • 9
  • 8
  • 8
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

STUDY OF A PROTOCOL AND A PRIORITY PARADIGM FOR DEEP SPACE DATA COMMUNICATION

Ramadas, Manikantan 09 August 2007 (has links)
No description available.
12

CASM: A Content-Aware Protocol for Secure Video Multicast

Yin, H., Lin, C., Qiu, F., Liu, J., Min, Geyong, Li, B. January 2006 (has links)
No / Information security has been a critical issue in the design and development of reliable distributed communication systems and has attracted significant research efforts. A challenging task is how to maintain information security at a high level for multiple-destination video applications with the huge volume of data and dynamic property of clients. This paper proposes a novel Content-Aware Secure Multicast (CASM) protocol for video distribution that seamlessly integrates three important modules: 1) a scalable light-weight algorithm for group key management; 2) a content-aware key embedding algorithm that can make video quality distortion imperceptible and is reliable for clients to detect embedded keys; and 3) a smart two-level video encryption algorithm that can selectively encrypt a small set of video data only, and yet ensure the video as well as the embedded keys unrecognizable without a genuine key. The implementation of the CASM protocol is independent of the underlying multicast mechanism and is fully compatible with existing coding standards. Performance evaluation studies built upon a CASM prototype have demonstrated that CASM is highly robust and scalable in dynamic multicast environments. Moreover, it ensures secure distribution of key and video data with minimized communication and computation overheads. The proposed content-aware key embedding and encryption algorithms are fast enough to support real-time video multicasting.
13

Seamless handover between CDMA2000 and 802.11 WLAN using mSCTP : a thesis submitted in partial fulfilment of the requirements for the degree of Master of Engineering in Electrical and Computer Engineering, Department of Electrical and Computer Engineering, University of Canterbury, Christchurch, New Zealand /

Deng, Feng, January 1900 (has links)
Thesis (M.E.)--University of Canterbury, 2006. / Typescript (photocopy). "December 2006." Includes bibliographical references (p. 83-86). Also available via the World Wide Web.
14

Study of wireless transmission protocol technology for use in flight line environment to assist the data uploading and downloading on aircraft

Meng, Ow Keong 03 1900 (has links)
Approved for public release, distribution is unlimited / Presently, the required data file to be loaded onto the Radar Warning Receiver (RWR) onboard the F-16 aircraft is done manually by the aircraft technicians, two to three hours prior to the actual flight time. This process should be automated. As such there is a need to look into the use of wireless transmission technology to complement or replace the manual method of loading the critical data file from the command station onto every F-16 aircraft. The present wireless technology is relatively mature and stable. In this thesis, the feasibility of incorporating and adapting this technology for use in the flight line environment is examined. The propagation effect in wireless transmission is also studied and recommendations proposed with regards to the installation of wireless facilities in the flight line. In addition, the EDNA, a portable maintenance aid that comes with the F-16 aircraft for loading the data file, has to be upgraded. Hence, a system feasibility study is carried out to adapt or upgrade the present equipment to wireless transmission capability. / Major, Republic of Singapore Air Force
15

Diseño de migración de nodos B aplicado para una RNC caida de una red movil

Mallqui Morales, Nayda Isabel January 2015 (has links)
La presente tesina consiste en el diseño de migración de nodos B aplicado para una RNC caída de una red móvil, con la finalidad de solucionar los problemas que se presenten ante un incidente que afecte los servicios de voz y datos de los usurarios de una red móvil. En el desarrollo de la tesina, se describe el planteamiento del problema, el marco teórico de la tecnología UMTS y posteriormente nos centramos en los elementos principales de esta tecnología. También describimos los equipos importantes a utilizar en desarrollo del proyecto, en este caso nos enfocamos en la descripción de la RNC. Y finalmente describimos el desarrollo del proyecto, el diseño de la solución e implementación de la misma, y en donde se presentan los resultados del diseño. This thesis is the design of migration of nodes B and its a applied when RNC fall for a mobile network, in order to solve the problems that arise before an incident affecting voice and data services from a mobile network. In developing the thesis, we describe the theoretical framework of UMTS technology and then we focus on the main elements of this technology. We also describe the important equipment used in project development; in this case we focus on the description of the RNC. And finally we describe the solution of design and implementation .Also, the results of this project.
16

Optimalizace predikce pozice v síti / Optimization of network position prediction

Pospíšil, Petr January 2008 (has links)
This work is about position prediction in network, it is focused to find Landmark closest to the Host in the network (with lowest distance vector). The algorithm is based on GNP system. In terms of GNP system simulation was selected method for mathematical part of position prediction. The method was Simplex Downhill. The designed algorithm was implemented in Java. In the first step chose Host continent by meassuring the distance vector. In next step is selected nearest part in the continent. In conclusion estimate Host its position and then closest Landmark. Results from this work is important for designing TTP protocol. The verdict is that the GNP can be used for TTP, but Landmarks must be located in uniform density.

Page generated in 0.099 seconds