• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 60
  • 13
  • 12
  • 6
  • 5
  • 4
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 157
  • 16
  • 15
  • 14
  • 14
  • 12
  • 11
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

The Worm Creek Quartzite Member of the St. Charles Formation, Utah-Idaho

Haynie, Anthon V., Jr. 01 May 1957 (has links)
This report presents the results of a stratigraphic study of the Worm Creek quartzite, the basal member of the St. Charles formation of Upper Cambrian age. The member is present in the Bear River Range, the Malad Range, and the Promontory Range of Northern Utah and southeastern Idaho. The Worm Creek quartzite was differential as the basal unit of the St. Charles formation by Richardson (1913) and named for its occurrence in Worm Creek Canyon in the Bear River Range, Bear Lake County, Idaho.
52

Modeling Network Worm Outbreaks

Foley, Evan 01 January 2015 (has links)
Due to their convenience, computers have become a standard in society and therefore, need the utmost care. It is convenient and useful to model the behavior of digital virus outbreaks that occur, globally or locally. Compartmental models will be used to analyze the mannerisms and behaviors of computer malware. This paper will focus on a computer worm, a type of malware, spread within a business network. A mathematical model is proposed consisting of four compartments labeled as Susceptible, Infectious, Treatment, and Antidotal. We shall show that allocating resources into treating infectious computers leads to a reduced peak of infections across the infection period, while pouring resources into treating susceptible computers decreases the total amount of infections throughout the infection period. This is assuming both methods are receiving resources without loss. This result reveals an interesting notion of balance between protecting computers and removing computers from infections, ultimately depending on the business executives' goals and/or preferences.
53

En beräkningsmetodik för dimensionering av snäckväxlar – Anpassad för tiltrotatorer / A Calculation Methodology for Dimensioning of Worm Gears - Adapted for Tiltrotators

Krig, Marcus, Larsson, Herman January 2023 (has links)
Denna rapport behandlar utvecklingen av en lämplig beräkningsmetodik för att dimensionera snäckväxlar anpassade för företaget SMP Parts AB:s tiltrotatorer. Syftet med examensarbetet var att underlätta för SMP att dimensionera nya snäckväxlar för kommande produkter samt att genom en utformad metodik bistå med underlag för deras standardiseringsprocess. Utformningen av beräkningsmetodiken har skett iterativt mellan faktainsamling, beräkning och verifieringsfaser för att uppnå tillräcklig precision för applikationen. Majoriteten av de formler som använts härstammar från ISO standarden 10828 som behandlar geometriska förhållanden för snäckväxlar samt standarden 14521 som behandlar hållfasthetsmässiga egenskaper. Beräkningsmetodiken verifierades gentemot ritningsunderlag för företagets existerande tiltrotatormodeller vilket medför att den kan användas för att ta fram underlag för nya modeller. De hållfasthetsmässiga beräkningarna har inte kunnat verifieras då fullständigt underlag saknas. Trots detta ges en god approximation av hållfastheten då jämförelser av säkerhetsfaktorer mellan de existerande modellerna har utförts. Dessutom har geometrin hos de existerande modellerna verifierats. Arbetet resulterade i en Excelfil som baseras på beräkningsmetodiken vilken täcker in de uppsatta målen för examensarbetet samt tar hänsyn till företagets kravspecifikation. Slutligen tas en diskussion upp angående de approximationer och antaganden som har behövts för att utföra examensarbetet. Detta har ansetts vara viktigt eftersom all nuvarande litteratur om snäckväxlar bygger på en jämn och kontinuerlig drift, vilket inte överensstämmer med användningen av tiltrotatorer som används intermittent. Rapporten innehåller även förslag gällande fortsatt arbete för att uppnå bättre träffsäkerhet i beräkningarna samt utvecklingsmöjligheter för beräkningsmetodiken. / This report covers the development of a calculation methodology for dimensioning of worm gear drives adapted for SMP Parts AB's tiltrotators. The purpose of the thesis was to facilitate SMP in dimensioning new worm gears for future products and to provide support for their standardization process through a designed methodology. The design of the calculation methodology has been done iteratively between data collection, calculation, and verification phases to achieve sufficient precision for the application. The majority of the formulas used originate from ISO standard 10828, which addresses the geometric calculations of worm gears, and standard 14521, which addresses strength properties. The calculation methodology was verified against drawings for the company's existing tiltrotator models, which allows the calculation methodology to be used to provide information for new models. The strength calculations have not been possible to verify due to the lack of complete documentation. However, a good approximation of strength is provided as comparisons of safety factors between the existing models have been performed. Additionally, the geometry of the existing models has been verified. The thesis resulted in an Excel file based on the calculation methodology, which covers the set objectives of the work and considers the company's specification requirements. Finally, a discussion is presented regarding the approximations and assumptions that were necessary to carry out the thesis. This has been considered important because all current literature on worm gears is based on smooth and continuous operation, which does not align with the intermittent use of tiltrotators. The report also includes suggestions for further work to achieve better accuracy in the calculations and development opportunities for the calculation methodology.
54

A new model for worm detection and response. Development and evaluation of a new model based on knowledge discovery and data mining techniques to detect and respond to worm infection by integrating incident response, security metrics and apoptosis.

Mohd Saudi, Madihah January 2011 (has links)
Worms have been improved and a range of sophisticated techniques have been integrated, which make the detection and response processes much harder and longer than in the past. Therefore, in this thesis, a STAKCERT (Starter Kit for Computer Emergency Response Team) model is built to detect worms attack in order to respond to worms more efficiently. The novelty and the strengths of the STAKCERT model lies in the method implemented which consists of STAKCERT KDD processes and the development of STAKCERT worm classification, STAKCERT relational model and STAKCERT worm apoptosis algorithm. The new concept introduced in this model which is named apoptosis, is borrowed from the human immunology system has been mapped in terms of a security perspective. Furthermore, the encouraging results achieved by this research are validated by applying the security metrics for assigning the weight and severity values to trigger the apoptosis. In order to optimise the performance result, the standard operating procedures (SOP) for worm incident response which involve static and dynamic analyses, the knowledge discovery techniques (KDD) in modeling the STAKCERT model and the data mining algorithms were used. This STAKCERT model has produced encouraging results and outperformed comparative existing work for worm detection. It produces an overall accuracy rate of 98.75% with 0.2% for false positive rate and 1.45% is false negative rate. Worm response has resulted in an accuracy rate of 98.08% which later can be used by other researchers as a comparison with their works in future. / Ministry of Higher Education, Malaysia and Universiti Sains Islam Malaysia (USIM)
55

FabricWorm: A Biologically-Inspired Robot That Demonstrates Structural Advantages of a Soft Exterior for Peristaltic Locomotion

Mehringer, Anna G. 02 June 2017 (has links)
No description available.
56

A Nitinol Actuated Worm-Inspired Robot Capable of Forward Motion, Turning, and Climbing Obstacles

Andersen, Kayla B., Andersen 30 August 2017 (has links)
No description available.
57

Zařízení na výrobu vlákna z termoplastu PET pro použití k 3D tisku metodou FDM / An equipment for PET filament producing for 3D printing usage

Kotačka, Petr January 2016 (has links)
This thesis deals with design of equipment for the production of PET termoplastic fibre to be used in 3D printing by means of FDM method. Concise survey of plastics processing methods is presented herein, furthermore, structural design of equipment with necessary engineering calculations is included as well. Drawing documents with the total economic evaluation is a part of this thesis too.
58

Blockchain-based containment of computer worms

Elsayed, Mohamed Ahmed Seifeldin Mohamed 22 December 2020 (has links)
Information technology systems are essential for most businesses as they facilitate the handling and sharing of data and the execution of tasks. Due to connectivity to the internet and other internal networks, these systems are susceptible to cyberattacks. Computer worms are one of the most significant threats to computer systems because of their fast self-propagation to multiple systems and malicious payloads. Modern worms employ obfuscation techniques to avoid detection using patterns from previous attacks. Although the best defense is to eliminate (patch) the software vulnerabilities being exploited by computer worms, this requires a substantial amount of time to create, test, and deploy the patches. Worm containment techniques are used to reduce or stop the spread of worm infections to allow time for software patches to be developed and deployed. In this dissertation, a novel blockchain-based collaborative intrusion prevention system model is introduced. This model is designed to proactively contain zero-day and obfuscated computer worms. In this model, containment is achieved by creating and distributing signatures for the exploited vulnerabilities. Blockchain technology is employed to provide liveness, maintain an immutable record of vulnerability-based signatures to update peers, accomplish trust in confirming the occurrence of a malicious event and the corresponding signature, and allow a decentralized defensive environment. A consensus algorithm based on the Practical Byzantine Fault Tolerance (PBFT) algorithm is employed in the model. The TLA+ formal method is utilized to check the correctness, liveness, and safety properties of the model as well as to assert that it has no behavioral errors. A blockchain-based automatic worm containment system is implemented. A synthetic worm is created to exploit a network-deployed vulnerable program. This is used to evaluate the effectiveness of the containment system. It is shown that the system can contain the worm and has good performance. The system can contain 100 worm attacks a second by generating and distributing the corresponding vulnerability-based signatures. The system latency to contain these attacks is less than 10 ms. In addition, the system has low resource requirements with respect to memory, CPU, and network traffic. / Graduate
59

Beitrag zur Entwicklung einer verbesserten Berechnungsmethode für die Zahnfußtragfähigkeit von Zylinderschneckengetrieben / Contribution to the development of a better calculation method for the tooth root strength of worm gears

Reißmann, Jan 16 September 2016 (has links) (PDF)
Schneckenradgetriebe sind aufgrund ihrer Verzahnungsgeometrie prädestiniert für Getriebeanwendungen mit diskontinuierlichem und schwingungsbehaftetem Betrieb. Bei hohen Momenten und geringen Drehzahlen stellt dabei die Zahnfußtragfähigkeit die primäre Auslegungsgrenze dar. Das Ziel der vorliegenden Arbeit lag in der Erhöhung der Genauigkeit der Berechnungsmethoden für die Zahnfußtragfähigkeit von Schneckenrädern, auch zur Steigerung des Volumennutzwertes dieser Getriebe. Hierzu wurden alle die Tragfähigkeit des Zahnfußes beeinflussenden Parameter durch eine Vielzahl von Experimenten und FE Simulationen untersucht. Dies schließt eine genaue Analyse der Geometrie von Schneckengetrieben, deren Fertigung und Einbausituation, die verwendeten Werkstoffe und deren Beanspruchung mit ein. Auf dieser Basis gelang neben der Entwicklung eines vergleichsspannungsbasierten analytischen Berechnungsverfahrens die Erstellung eines örtlichen Berechnungskonzeptes nach dem Kerbspannungskonzept. Hiermit konnte die Einschätzung der Zahnfußtragfähigkeit bei der Neuentwicklung und die Optimierung von Getrieben verbessert werden. / Worm gears are well suited for gearbox applications in environments with discontinuous conditions and mechanical vibrations. In the case of high torque and low speed, the tooth root strength is the primary design limit. The aim of the present paper is to improve the accuracy of the calculation methods for the tooth root strength of worm wheels. To reach this, all parameters which affects the strength of the tooth root were examined. This includes the geometry, the manufacturing, the materials and the stresses of worm wheels. Through this investigation, the development of a new analytical calculation method based on the equivalent stress concept could be done. Furthermore, a local calculation method based on the notch stress concept was developed. Thus, the forecast of the tooth root strength of worm wheels for redevelopment and optimization could be improved.
60

Topology-aware vulnerability mitigation worms

Al-Salloum, Ziyad January 2011 (has links)
In very dynamic Information and Communication Technology (ICT) infrastructures, with rapidly growing applications, malicious intrusions have become very sophisticated, effective, and fast. Industries have suffered billions of US dollars losses due only to malicious worm outbreaks. Several calls have been issued by governments and industries to the research community to propose innovative solutions that would help prevent malicious breaches, especially with enterprise networks becoming more complex, large, and volatile. In this thesis we approach self-replicating, self-propagating, and self-contained network programs (i.e. worms) as vulnerability mitigation mechanisms to eliminate threats to networks. These programs provide distinctive features, including: Short distance communication with network nodes, intermittent network node vulnerability probing, and network topology discovery. Such features become necessary, especially for networks with frequent node association and disassociation, dynamically connected links, and where hosts concurrently run multiple operating systems. We propose -- to the best of our knowledge -- the first computer worm that utilize the second layer of the OSI model (Data Link Layer) as its main propagation medium. We name our defensive worm Seawave, a controlled interactive, self-replicating, self-propagating, and self-contained vulnerability mitigation mechanism. We develop, experiment, and evaluate Seawave under different simulation environments that mimic to a large extent enterprise networks. We also propose a threat analysis model to help identify weaknesses, strengths, and threats within and towards our vulnerability mitigation mechanism, followed by a mathematical propagation model to observe Seawave's performance under large scale enterprise networks. We also preliminary propose another vulnerability mitigation worm that utilizes the Link Layer Discovery Protocol (LLDP) for its propagation, along with an evaluation of its performance. In addition, we describe a preliminary taxonomy that rediscovers the relationship between different types of self-replicating programs (i.e. viruses, worms, and botnets) and redefines these programs based on their properties. The taxonomy provides a classification that can be easily applied within the industry and the research community and paves the way for a promising research direction that would consider the defensive side of self-replicating programs.

Page generated in 0.058 seconds