• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 13
  • 13
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Marten Use of Subnivean Access Points in Yellowstone National Park, Wyoming

Sherburne, Stuart Scott 01 May 1992 (has links)
Subnivean prey appeared to be the primary reason for subnivean access point use by martens. A logistic regression was used to create a predictive model for differential access point use. Prey biomass in grams and percent ground cover of coarse woody debris (CWD) were used as variables in the model. Goodness of fit of the multivariate model was 0.216; biomass was significant al p = 0.0003, CWD was significant at p = 0.0718. Mean values for prey biomass at used and unused access points were 174.2 g and 81 g, respectively, while mean values of CWD were 24.7% and 18.5%, respectively. Both CWD and prey can be used to predict access point use by martens. CWD provides access to the subnivean zone. Martens appear lo key in on access points with higher levels of prey. Red squirrel middens were found at 33% of used and 16% of unused access points (p = 0.015, n = 90). There was no significant difference in prey biomass or CWD based upon the presence or absence of a squirrel midden. Prey biomass was significantly related to access point use (p = 0.0022) and the relationship was strengthened when squirrels were included in the biomass estimates (p = 0.0001). It is likely that red squirrel middens were used as access points by martens because of the opportunity to prey on red squirrels as a prey item. Seed boluses were used to estimate the relative prey abundance at subnivean access points. Use of seed boluses in winter was correlated with prey abundance values obtained by snap trapping after the snow melt (J2 = 0.0134, ¢2 = 0.435). A program for direct entry of raw telemetry data in a Geographic Information System (GIS) data base was developed. With this method telemetry data can be interpreted directly al a number of scales to determine habitat patterns using area rather than point data.
2

Bureaucratic access points

Sternemann, Daniel Thomas 24 July 2012 (has links)
This paper studies how organizational mission influences policy implementation. Interagency conflicts and bureaucratic challenges affecting implementation are largely due to different missions and different assessment measures. The focus of this investigation is the relationship between humanitarian assistance/disaster relief (HA/DR) agencies and associated Department of Defense (DOD) medical components. Access point theory is important to this study, for it helps us understand how successful policy implementation is enabled in the midst of bureaucratic conflicts and challenges. The notion of access points has traditionally involved lobbyists and interest groups accessing elected officials and their staffs. I ask what is the effect of lobbyists and interest groups accessing bureaucrats directly in the policy implementation process and its subsequent evaluation. More importantly, I argue that bureaucrats take advantage of access points to other bureaucrats during policy implementation proceedings. This study offers the novel perspective that access points for HA/DR bureaucrats, to include those in the DOD, are readily available during the punctuating event (i.e., the natural disaster itself) and may be evaluated through the notions of timing, efficiency, and the information and capabilities they possess and can leverage during these punctuations. Simply stated, bureaucratic access points theory helps us understand how policies are successfully implemented in the midst of bureaucratic conflicts and challenges. / text
3

Bureaucratic access points and leverage

Sternemann, Daniel Thomas 24 September 2013 (has links)
This project studies how bureaucratic behavior influences policy implementation. It presents a novel bureaucratic access points and leverage theory, which help us understand how policies are successfully implemented in the midst of bureaucratic challenges resulting from organizational roles and responsibilities and contrasting assessments. The concept of access points has traditionally involved lobbyists and interest groups accessing elected officials and their staffs. I ask what is the effect of bureaucrats accessing bureaucrats directly in the policy implementation process and its subsequent evaluation. I argue that bureaucrats leverage other bureaucrats during policy implementation proceedings, which adds the notion of power to access points theory. The focus of this investigation is the relationship between humanitarian assistance and disaster relief (HA/DR) agencies and associated Department of Defense (DOD) components, particularly DOD medical components providing wellness intervention. Bureaucratic access and leverage enables a more unified implementation of over-arching HA/DR policy by disparate agencies with unique missions, resources, capabilities, and assessment measures. The existing literature does not fully capture how such agency differences are mitigated and overcome in implementing policy that spans multiple entities. Bureaucratic access points and leverage theory offers bureaucrats the analytical capability to know who is controlling policy implementation. It also presents a tool they can use to maintain and increase their own influence and power within a policy domain. / text
4

Comparison of systems to detect rogue access points

Lennartsson, Alexander, Melander, Hilda January 2019 (has links)
A hacker might use a rogue access point to gain access to a network, this poses athreat to the individuals connected to it. The hacker might have the potential to leakcorporate data or steal private information. The detection of rogue access points istherefore of importance to prevent any damage to both businesses and individuals.Comparing different software that detects rogue access points increases the chanceof someone finding a solution that suits their network. The different type of softwarethat are compared are intrusion detection systems, wireless scanners and a Ciscowireless lan controller. The parameters that are being compared are; cost, compat-ibility, detection capability and implementation difficulty. In order to obtain resultssome of the parameters require testing. As there are three types of software, threeexperiment environments should be conducted. Our research indicates that alreadyexisting network equipment or the size of the network affects the results from theexperiments.
5

Appropriation de l'ordinateur et d'internet dans les points d'accès public : les cas comparés de Brest, de Saint-Denis de La Réunion et d'Antananarivo / Uses of computers and internet in public access points : a comparative study of Brest, Saint-Denis (La Réunion) and Antananarivo

Rakotomalala Harisoa, Ny aina 28 September 2012 (has links)
Les points d'accès public à internet ou au multimédia sont des dispositifs permettant aux usagers qui les fréquentent d'utiliser les équipements numériques et d'avoir un accès à internet. Selon les structures qui en sont à l'origine et selon le public cible, plusieurs dénominations existent pour désigner ces lieux : les espaces publics numériques (EPN), les Netpublics, les cyberbases, les cybercases, les espaces culturels multimédias (ECM), les Points-cyb, les cybercommunes, les points d'accès public internet (PAPI) et les cybercafés. En France, les points d'accès public ont un double objectif : permettre à toute personne qui n'a pas les moyens de s'équiper et de se connecter à internet d'avoir accès aux outils numériques et accompagner le public à l'apprentissage et à l'utilisation des TICs. A Madagascar, les points d'accès public proposent un libre accès au public sauf que contrairement aux précédents, leur stratégie est basée sur une logique marchande. L'objectif de cette thèse est de s'interroger sur les rôles des points d'accès public auprès du public qui les fréquente dans l'appropriation de l'ordinateur et d'internet. Du point de vue théorique, la notion d'appropriation des TICs est d'abord questionnée en ayant recours à trois approches : celle de la diffusion, celle de la traduction et celle de l'appropriation. Dans un second temps, une analyse comparée des usages de l'ordinateur et d'internet dans les points d'accès public brestois, réunionnais et tananariviens permet de souligner le rôle important que jouent les facteurs sociétaux, économiques et géographiques sur les trajectoires d'appropriation des TICs. Au-delà de la définition des pratiques effectuées dans ces espaces, ce travail de recherche tente d'identifier les usagers et d'évoquer les raisons pour lesquelles ces espaces sont fréquentés. Il s'appuie sur des observations, des enquêtes par questionnaires dans 18 points d'accès public brestois, réunionnais et tananariviens complétées par des entretiens auprès des usagers sur leurs pratiques de l'ordinateur et d'internet, leur apprentissage, les raisons qui les poussent à fréquenter les points d'accès public, leur dépendance aux TICs et leurs opinions sur ces technologies. / Internet access points are a place where users can access and use digital equipment and connect to internet. Various terms are used to indicate these places : « espaces publics numériques (EPN) », « Netpublics », «cyberbases », « cybercases », « espaces culturels multimédias (ECM) », « Points-cyb », « cybercommunes », « points d’accès public internet (PAPI) » and « cybercafés ». In France, internet access points help people without computer and internet access to use these technologies, to learn and to be assisted in their uses. In Madagascar, internet access points provide access to computer and internet networks but services are fee-based. The objective of this dissertation is to examine the roles of internet access points in ICTs appropriation process by public who visit these places. This research work analyses the theoretical concept of appropriation by using three approaches: the diffusion, the translation and the appropriation. This is followed by a comparative analysis of the uses of computer and internet in internet access points situated in Brest, Reunion Island and Antananarivo. The analysis shows the important role played by societal, economic and geographic contexts on ICTs appropriation. Beyond the uses of ICT in these places, this research attempts to identify users and discuss the reasons of their visits. The results are based on observations, questionnaire surveys and interviews with users in 18 internet access points in Brest, Reunion Island and Antananarivo.
6

802.11 Fingerprinting to Detect Wireless Stealth Attacks

Venkataraman, Aravind 20 November 2008 (has links)
We propose a simple, passive and deployable approach for fingerprinting traffic on the wired side as a solution for three critical stealth attacks in wireless networks. We focus on extracting traces of the 802.11 medium access control (MAC) protocol from the temporal arrival patterns of incoming traffic streams as seen on the wired side, to identify attacker behavior. Attacks addressed include unauthorized access points, selfish behavior at the MAC layer and MAC layer covert timing channels. We employ the Bayesian binning technique as a means of classifying between delay distributions. The scheme requires no change to the 802.11 nodes or protocol, exhibits minimal computational overhead and offers a single point of discovery. We evaluate our model using experiments and simulations.
7

Resource Allocation in Femtocells via Game Theory

Sankar, V Udaya January 2015 (has links) (PDF)
Most of the cellular tra c (voice and data) is generated indoors. Due to attenuation from walls, quality of service (QoS) of di erent applications degrades for indoor tra c. Thus in order to provide QoS for such users the Macro base station (MBS) has to transmit at high power. This increases recurring costs to the service provider and contributes to green house emissions. Hence, Femtocells (FC) are considered as an option. Femto Access Points (FAP) are low cost, low powered, small base stations deployed indoors by customers. A substantial part of indoor tra c is diverted from the Macrocell (MC) through the FAP. Since the FCs also use the same channels as the MC, deployment of FCs causes interference to not only its neighbouring FCs but also to the users in the MC. Thus, we need better interference management techniques for this system. In this thesis, we consider a system with multiple Femtocells operating in a Macrocell. FCs and MC use same set of multiple channels and support multiple users. Each user may have a minimum rate requirement. To limit interference to the MC, there is a peak power constraint on each channel. In the rst part of the thesis, we consider sparsely deployed FCs where the interference between the FCs is negligible. For this we formulate the problem of channel allocation and power control in each FC. We develop computationally e cient, suboptimal algorithms to satisfy QoS of each user in the FC. If QoS of each user is not satis ed, we provide solutions which are fair to all the users. In the second part of the thesis, we consider the case of densely deployed FCs where we formulate the problem of channel allocation and power control in each Femtocell as a noncooperative Game. We develop e cient decentralized algorithms to obtain a Nash equilibrium (NE) at which QoS of each user is satis ed. We also obtain e cient decentralized algorithms to obtain fair NE when it may not be feasible to satisfy the QoS of all the users in the FC. Finally, we extend our algorithms to the case where there may be voice and data users in the system. In the third part of the thesis, we continue to study the problem setup in the second part, where we develop algorithms which can simultaneously consider the cases where QoS of users can be satis ed or not. We provide algorithms to compute Coarse Correlated Equilibrium (CCE), Pareto optimal points and Nash bargaining solutions. In the nal part of the thesis, we consider interference limit at the MBS and model FCs as sel sh nodes. The MBS protects itself via pricing subchannels per usage. We obtain a Stackelberg equilibrium (SE) by considering MBS as a leader and FCs as followers.
8

Subject retrieval in web-based library catalogs / Predmetno pretraživanje u knjižnicnim katalozima s web-suceljem

Golub, Koraljka January 2003 (has links)
This thesis has been motivated by past research, problems and realizations that online library catalog users frequently perform subject searches – using keywords, subject headings and descriptors – and these searches have yielded unsatisfactory results. Web-based catalogs or WebPACs (Web-based Online Public Access Catalogs), belonging to the so-called third generation of online catalogs and providing a wide variety of search options, remain largely underutilized despite the continuous advancement of information retrieval systems. Users still encounter a number of problems, such as those related to translating their concepts to the language of the catalog’s system and cross-references prepared to this purpose. Subject access in online library catalogs can be provided through different access points. To that purpose natural and controlled indexing and retrieval languages are used, and each among them has its advantages and downsides. Natural language indexing is performed by the computer, in which process words from defined fields are automatically extracted. Controlled indexing languages are those in which selection of terms to be assigned to documents is manually performed. These are, for example, classification systems, subject heading languages and thesauri. During the 1970s, a consensus was reached that the best retrieval results are gained when using both types of indexing languages simultaneously. Apart from indexing languages, it is necessary to take into account user search behavior; and while designing user interface one has to allow for the users’ skills and knowledge - ensuring instruction, help and feedback information at every step of the retrieval process. The aim of the research was to determine the variety and quality of subject access to information in WebPACs of British university libraries, including searching by words or classification marks, natural and controlled languages, browsing options, and forming simple and complex queries in order to conclude about existing advancements, offered models and employed methods and compare them to WebPACs of Croatian university libraries.
9

Arquivos pessoais, arquivos de memória e o processo de indexação

Oliveira, Isabel Cristina Borges de 27 March 2009 (has links)
Submitted by Suemi Higuchi (suemi.higuchi@fgv.br) on 2009-07-31T15:19:56Z No. of bitstreams: 1 CPDOC2009IsabelCristinaBorgesdeOliveira.pdf: 2771599 bytes, checksum: fa47cb7d1597fd799e2c7c6c54877a93 (MD5) / Made available in DSpace on 2009-07-31T15:20:05Z (GMT). No. of bitstreams: 1 CPDOC2009IsabelCristinaBorgesdeOliveira.pdf: 2771599 bytes, checksum: fa47cb7d1597fd799e2c7c6c54877a93 (MD5) / This dissertation seek to discuss the personal archives indexing by analyzing the personal archive of Ubaldino do Amaral Fontoura index. Besides, the archival theoretical questions like normalization, standardization and controlled vocabulary construction in order to improve the answer to the user. The research also examines personal archives as memory archives and how the access point definition interferes in the issue of environment and erasing the memory / A presente dissertação busca discutir a questão da indexação em arquivos pessoais, tendo como campo de análise o arquivo pessoal de Ubaldino do Amaral Fontoura, além dos aspectos teóricos arquivísticos que devem ser considerados durante a normalização, padronização e construção de vocabulário controlado, a fim de melhor atender ao usuário. A pesquisa também analisa os arquivos pessoais enquanto arquivos de memória e como a definição dos pontos de acesso interfere na questão do enquadramento e apagamento da memória.
10

An improved selection algorithm for access points in wireless local area networks : An improved selection algorithm for wireless iopsys devices / En förbättrad urvalsalgoritm för accesspunkter i trådlösa lokala nätverk : En förbättrad urvalsalgoritm för trådlösa iopsys enheter

Axtelius, Mathias, Alsawadi, Rami January 2016 (has links)
Wireless devices search for access points when they want to connect to a network. A devicechooses an access point based on the received signal strength between the device and theaccess point. That method is good for staying connected in a local area network but it doesnot always offer the best performance, which can result in a slower connection. This is thestandard method of connection for wireless clients, which will be referred to as the standardprotocol. Larger networks commonly have a lot of access points in an area, which increasesthe coverage area and makes loss of signal a rare occurrence. Overlapping coverage zonesare also common, offering multiple choices for a client. The company Inteno wanted an alternativeconnection method for their gateways. The new method that was developed wouldforce the client to connect to an access point depending on the bitrate to the master, as wellas the received signal strength. These factors are affected by many different parameters.These parameters were noise, signal strength, link-rate, bandwidth usage and connectiontype. A new metric had to be introduced to make the decision process easier by unifying theavailable parameters. The new metric that was introduced is called score. A score system wascreated based on these metrics. The best suited access point would be the one with the highestscore. The developed protocol chose the gateway with the highest bitrate available, while thestandard protocol would invariably pick the closest gateway regardless. The developed protocolcould have been integrated to the standard protocol to gain the benefits of both. Thiscould not be accomplished since the information was not easily accessible on Inteno’s gatewaysand had to be neglected in this thesis. / Trådlösa enheter söker efter accesspunkt när de vill ansluta till ett nätverk. En enhet väljer enaccesspunkt beroende på den mottagna signalstyrkan mellan enheten och accesspunkten.Denna metod medför en stabil uppkoppling i ett lokalt nätverk, men medför inte alltid bästamöjliga prestanda, vilket kan resultera i en långsammare anslutning till Internet. Detta ärstandard uppkopplings metod för trådlösa klienter, vilket kommer refereras som standardprotokollen. Större nätverk har vanligtvis en mängd olika accesspunkter i ett område, vilketgör att signalstyrkan sällan förloras. Överlappande täckningsområden är också vanliga ochger en klient flera alternativa accesspunkter att välja mellan. Företaget Inteno ville tacklaproblemet genom att skapa en ny anslutningsmetod för deras nätverksnoder. Den nya metodenskulle tvinga klienter att ansluta sig till en accesspunkt beroende på bithastigheten mothuvudnoden, så väl som den mottagna signalstyrkan. Faktorerna påverkas av många olikaparametrar. Parametrarna var, brus, signalstyrka, länkhastighet, dataanvändning och anslutningstyp.Ett nytt mått behövde införas för att göra beslutsprocessen enklare, genom att förenade tillgängliga parametrarna. Det nya måttet som infördes var poäng. Ett poängsystemskapades och baserades på de önskade värdena. Den accesspunkten med högst poäng erbjödden bästa uppkopplingen till huvudnoden. Det utvecklade protokollet valde nätverksnodenmed den högsta överföringshastighet som var tillgänglig, medan standardprotokollet alltidvalde den närmaste nätverksnoden utan hänsyn till andra faktorer. Den utvecklade protokolletkunde ha integrerats med standardprotokollet för att utnyttja fördelarna av bägge protokollen.Detta var inte möjligt eftersom informationen inte var lättåtkomlig på Intenos nätverksnoderoch fick försummas i avhandlingen.

Page generated in 0.0471 seconds