• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 149
  • 62
  • 32
  • 26
  • 21
  • 12
  • 8
  • 7
  • 5
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 415
  • 293
  • 80
  • 67
  • 62
  • 48
  • 47
  • 46
  • 40
  • 39
  • 38
  • 37
  • 37
  • 36
  • 34
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
201

Efficient Bi-Directional Communications for Low-Power Wireless Mesh Network / 低消費電力無線メッシュネットワークにおける高能率双方向通信

Okumura, Ryota 23 March 2021 (has links)
京都大学 / 新制・課程博士 / 博士(情報学) / 甲第23328号 / 情博第764号 / 新制||情||130(附属図書館) / 京都大学大学院情報学研究科通信情報システム専攻 / (主査)教授 原田 博司, 教授 守倉 正博, 教授 大木 英司 / 学位規則第4条第1項該当 / Doctor of Informatics / Kyoto University / DFAM
202

Zabezpečení bezdrátových sítí IEEE 802.11 / Security of wireless computer networks IEEE 802.11

Škodák, Jaroslav January 2008 (has links)
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.
203

Optimalizace vedení logistiky skladového hospodářství ve velké firmě / Logistic process leadership optimization in big enterprise

Přichystal, Tomáš January 2008 (has links)
The Master’s thesis deals with logistics and resources monitoring area, which is inseparable part of every production oriented economic activity. It uses electronic monitoring systems for more effective dealing with stock records in a production company that has many stores. The monitoring utilizes modern technologies, that are burgeoning and finding its use in all branches of market.
204

Ochrana bezdrátových sítí poskytovatelů internetu / Security protection techniques of wireless networks of internet providers

Žiško, Róbert January 2009 (has links)
This master’s thesis can be used as the guidebook for Wi-Fi networks provider in non-licensed zones 2,4GHz and 5GHz. It is good tool to understand wireless technology area and its protection. Reader can follow network design and avoid mistakes that are mentioned in work. This text shouldn’t be a tool or a guide for possible attackers, but an impulse for small providers who provide their networks in unsecured form. In the opening chapter of my work, matters of Wi-Fi networks are thoroughly analyzed. As they are able to get internet connection in a lot of inaccessible places, they are considered to be crucial for the present times. The basic procedure describing Wi-Fi planning is written in thesis and also its legislative that has to be strictly observed. The big disadvantage is riskiness of the wireless connection that allows attackers to attack network in many ways. For mentioned reason it is very important to take utmost account of Wi-Fi network’s security and attack resistance. Unfortunately a lot of networks are either secured partially or unsecured at all. These types of networks are frequently attacked in order to get “free” Internet access or because of competitors fight. In the text below we can find possible Wi-Fi attack forms using by attackers to get Internet access or destroy network hardware what can cause big financial loss to providers. I described design and realization of little-town network using safety tools implementation based on my experience. For that purpose I implemented benchmark tests in graphics as well as practical format.
205

Zabezpečení standardu 802.11 a jeho možnosti / 802.11 standard security techniques and their features

Endrle, Pavel January 2009 (has links)
This master´s thesis is about 802.11 standard security techniques and their features. Particular types of this standard and its features are shown in the introduction. Wireless network security cypher alghoritm types, their features, weaknesses and principles of functions are closely described in next few chapters. Realized attacks on these security alghoritms with their principles are described and shown in the practical part of thesis. One chapter is about effectivity, accessibility and practicability valorization of these attacks in practice.
206

Datová síť pro smart grid v energetice / Data network for smart grid energy

Durkoš, Michal January 2013 (has links)
Electric grid as we now it has been without significant change for a long time. Along with the human population grows demand for electricity, which leads to need to create more energy. Bigger interest is in ecology and use of renewable sources, although these do not have constant output which often stresses the grid. These problems are to be solved by smart grids. Smart grids are capable of adjusting energy generation to immediate demand including renewable sources to compensate energy fluctuations in grid. They provide demand response and other applications interesting for end users. Smart grids are combination of achievements in energy, informatics and communication technology. Communication, which is key part of smart grids, has to met certain requirements and can be executed by various technologies. There are described various communication technologies and a design concept of data communication in this paper.
207

Měření v bezdrátové síti 802.11n se skrytými uzly / Measurements in an 802.11n radio network with hidden nodes

Vágner, Adam January 2013 (has links)
The current large concentration of wireless networks brings new horizons, but also new concerns. Failure to follow basic rules may produce far-reaching problems that could make more wrinkles to all affected managers and administrators. The aim of this thesis was to measure and compare the radio parameters of selected products and how they behave in neighboring interference and the speed they have while there are hidden nodes. The resulting values were measured in the laboratory network Wificolab and compared with the various support protocols. Possible effects on the specific situation are also analyzed in this thesis.
208

Implementace triple-play služeb v heterogenní síti / Implementation of triple-play in heterogeneous network

Obršlík, Lukáš January 2014 (has links)
This master thesis deals with implementing triple-play services and providing it’s quality of services in heterogenous comunnication networks. The aim of thesis is to apply the- oretical methods in real case and existing network infrastructure. Practical part aims to create technical solution to prioritize network traffic based on classification of required services. The technical solution is created with conditions of being possible to add more functions and to provide scalability.
209

Bezpečnost lokálních počítačových sítí / Solving of Security Problems in Local Networks

Marek, Martin January 2010 (has links)
The diploma thesis is concerned with solving security problems in local computer networks. The main part deals with the solution of authorization of wireless clients against the RADIUS server and with the proposal of domain controller using open-source products and the tools of operating system GNU/Linux.
210

Systém autonomního řízení závodního autíčka / Autonomous Race Car Control System

Knop, Petr January 2014 (has links)
This master's thesis describes the hardware and software implementation of autonomous control system for RC toy car. This autonomous car had the task to follow a black line drawn on a white background. Car was enriched with wi-fi for data transfer to computers and the black line is detected by the camera. The main control module was implemented using a single board computer Raspberry Pi.

Page generated in 0.0273 seconds