• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 106
  • 62
  • 32
  • 24
  • 9
  • 8
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 293
  • 293
  • 77
  • 50
  • 42
  • 42
  • 39
  • 37
  • 36
  • 35
  • 32
  • 31
  • 29
  • 26
  • 26
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Implementace triple-play služeb v heterogenní síti / Implementation of triple-play in heterogeneous network

Obršlík, Lukáš January 2014 (has links)
This master thesis deals with implementing triple-play services and providing it’s quality of services in heterogenous comunnication networks. The aim of thesis is to apply the- oretical methods in real case and existing network infrastructure. Practical part aims to create technical solution to prioritize network traffic based on classification of required services. The technical solution is created with conditions of being possible to add more functions and to provide scalability.
152

Bezpečnost lokálních počítačových sítí / Solving of Security Problems in Local Networks

Marek, Martin January 2010 (has links)
The diploma thesis is concerned with solving security problems in local computer networks. The main part deals with the solution of authorization of wireless clients against the RADIUS server and with the proposal of domain controller using open-source products and the tools of operating system GNU/Linux.
153

Systém autonomního řízení závodního autíčka / Autonomous Race Car Control System

Knop, Petr January 2014 (has links)
This master's thesis describes the hardware and software implementation of autonomous control system for RC toy car. This autonomous car had the task to follow a black line drawn on a white background. Car was enriched with wi-fi for data transfer to computers and the black line is detected by the camera. The main control module was implemented using a single board computer Raspberry Pi.
154

Rozšíření laboratorního výukového kitu PIC Edu Kit o sadu bezdrátových senzorů / Extending the Laboratory Educational Kit PIC Edu Kit with a Set of Wireless Sensors

Hanuš, Tomáš January 2016 (has links)
This thesis describes the design and implementation of extension of laboratory training model PIC Edu Kit. It is about set of wireless sensors. These sonsors have to measure temperature and deformation. Mesure of temperature was realized by temperature resistive sensor Pt100 and deformation by resistive tenzometr. These wireless moduls comunication on protocol Wi-Fi. In this work is introduced propose of measuring dictucts for measure of temperautre and deformation. There is evidenced their realization, showed software for receiving dates on PC and programme for the microcontroler.
155

Analýza útoků s využitím mobilního zařízení Pwn Phone / Analysis of Attacks with Mobile Device Pwn Phone

Holubec, Petr January 2016 (has links)
This thesis deals with the safety of wireless networks and used protocols. The aim is to describe chosen network attacks and demonstrate the feasibility of using the device Pwn Phone. It will also be implemented a system consisting of a mobile application and a server component allowing execution of NFC relay attack on contactless credit cards. System will be tested in real world and evaluation of the success in different conditions will also be part of the thesis.
156

Quality-of-Service Provisioning and Resource Reservation Mechanisms for Mobile Wireless Networks

Jayaram, Rajeev, 1971- 08 1900 (has links)
In this thesis, a framework for Quality of Service provisioning in next generation wireless access networks is proposed. The framework aims at providing a differentiated service treatment to real-time (delay-sensitive) and non-real-time (delay-tolerant) multimedia traffic flows at the link layer. Novel techniques such as bandwidth compaction, channel reservation, and channel degradation are proposed. Using these techniques, we develop a call admission control algorithm and a call control block as part of the QoS framework. The performance of the framework is captured through analytical modeling and simulation experiments. By analytical modeling, the average carried traffic and the worst case buffer requirements for real-time and non-real-time calls are estimated. Simulation results show a 21% improvement in call admission probability of real-time calls, and a 17% improvement for non-real-time calls, when bandwidth compaction is employed. The channel reservation technique shows a 12% improvement in call admission probability in comparison with another proposed scheme in the literature.
157

Visualisering av dörröppningar : En trådlös prototyp / Visualization of door openings : A wireless prototype

Svensson, Sofia, Nordström, Anna January 2015 (has links)
Dörröppningar till en operationssal under en pågående operation ökar infektionsrisken. På Centraloperation, Karolinska Universitetssjukhuset Solna, öppnas dörrarna till operationssalen fler gånger än nödvändigt. Muntlig information till personalen har inte minskat antalet dörröppningar på lång sikt. En trådlös tekniklösning som räknar och visualiserar antalet dörröppningar tros ha en mer långvarig effekt, därför skulle en prototyp tas fram. En litteraturstudie gjordes för att hitta komponenter och för att med dessa skapa prototypen.   Prototypen kan räkna och visualisera antalet dörröppningar från en dörr. Då en operationssal oftast har tre dörrar är visualiseringen förberedd för att kunna visa antalet för dessa. Prototypen behöver vidareutvecklas för att kunna användas på under en operation. / Door openings to an operating theatre, during an ongoing operation, increases the risk of infection. At the Central operation department, Karolinska University Hospital Solna, the doors open more frequently than necessary. Oral information to the staff has not reduced the number of door openings for a longer time. A wireless solution that counts and visualizes is believed to have a more longlasting effect, therefore a prototype would be created. A literature study was performed in order to find components and with those build the prototype. The prototype is able to count and visualize the number of door openings from one door. However, since many operating theatres have three doors, the visualization is prepared for this. To be able to use this system during an operation the prototype needs to be further developed.
158

A Study of the Next WLAN Standard IEEE 802.11ac Physical Layer

Al-Ghazu, Nader January 2013 (has links)
This thesis studies the Physical Layer (PHY) of the new IEEE 802.11acWireless Local Access Network (WLAN) standard. The 11ac is built basedon the 11n successful standard. The standard is expected to be completedby the end of 2013. And it promises a Very High Throughput (VHT),and robust communication. In order to achieve that, the 11ac uses morebandwidth, it employs higher numbers of Multiple-Input Multiple-Output(MIMO) spatial streams, and higher orders of modulations. The 11ac PHYframe structure is studied in details. The transmitter and receiver blocks areexplained and implemented by MATLAB. Bit Error Rate (BER) and ErrorVector Magnitude (EVM) simulations of the PHY were run. The effectof different Modulation and Coding Scheme (MCS), and bandwidths werestudied. The performance of MIMO and Space-Time Block Coding (STBC)was investigated. The simulation results shows how the 11ac benefits fromthe new employed features. The created MATLAB simulation program canbe used for further tests and research.
159

Survey of microcontrollers and short-range radio transceivers for wireless sensors

Zewdu Yesitla, Ephrem January 2020 (has links)
A significant growth was witnessed in the field of Wireless Sensor Networks (WSNs), in the previous decade. The objective of this study has been Survey of micro controllers and short-range radio transceivers for wireless sensors and provide an extensive overview of micro controllers and RF-transceivers in the Market and compare the relevant properties for designing wireless sensor nodes. In the survey, RF-transvers from Nordic semiconductors is extensively presented for short-rang wireless protocols some of the protocols are RF-Communication Module, Bluetooth Low Energy Module, ZigBee module and Wi-Fi module.          In WSNs node design Power consumption is one the most important design issue, this thesis work present the different type of WSN protocols energy consumption efficiency and power consumption, compared and conclude graphically.        Microcontrollers are the main part of WSNs node for processing and gathering sensor data. There is different microcontroller’s products in the market however the WSN protocols presented in this thesis uses Cortex-M4 processor which is one of ARM product, the specification and comparison of this product with other products is presented.
160

Bezpečnostní analýza WiFi sítí / Security Analysis of WiFi Networks

Butela, Michal Unknown Date (has links)
This document provides overview of commonly used standards and mechanisms for securing the wireless network based on Wi-Fi protocol. It is covering all important security areas including confidentiality, integrity and authentication. We can find here also detailed analysis and description of functionality of listed mechanisms. Description of possible attacks against listed security mechanisms. There is a measurement of influence of encryption to transfer speed in the another section. It's followed by attacks against particular security mechanisms. And finally, description of deployment of central authentication system.

Page generated in 0.0351 seconds