• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2063
  • 1095
  • 1
  • Tagged with
  • 3159
  • 3159
  • 3112
  • 3096
  • 3096
  • 3096
  • 3096
  • 3096
  • 3096
  • 3096
  • 3096
  • 62
  • 36
  • 36
  • 36
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

IoT BattleBrokers: The Best Device Broker Wins

Andre Fontoura Aguiar Pinto 21 May 2019 (has links)
No description available.
72

Cybersecurity analysis of a SCADA system under current standards, client requisites, and penetration testing

Filipe Pestana Duarte Rocha 25 February 2019 (has links)
Supervisory Control and Data Acquisition (SCADA) systems are essential for monitoring and controlling a country's Critical Infrastructures (CI) such as electrical power grids, gas, water supply, and transportation services. These systems used to be mostly isolated and secure, but this is no longer true due to the use of wider and interconnected communication networks to reap benefits such as scalability, reliability, usability, and integration. This architectural change together with the critical importance of these systems made them desirable cyber-attack targets. Just as in other Information Technology (IT) systems, standards and best practices have been developed to provide guidance for SCADA developers to increase the security of their systems against cyber-attacks.With the assistance of EFACEC, this work provides an analysis of a SCADA system under current standards, client requisites, and testing of vulnerabilities in an actual prototype system. Our aim is to provide guidance by example on how to evaluate and improve the security of SCADA systems, using a basic prototype of EFACEC's ScateX# SCADA system, following both a theoretical and practical approach. For the theoretical approach, a list of the most commonly adopted ICS (Industrial Control Systems) and IT standards is compiled, and then sets of a generic client's cybersecurity requisites are analyzed and confronted with the prototype's specifications. A study of the system's architecture is also performed to identify vulnerabilities and non-compliances with both the client's requisites and the standards and, for the identified vulnerabilities, corrective and mitigation measures are suggested. For the practical approach, a threat model was developed to help identify desirable assets on SCADA systems and possible attack vectors that could allow access to such assets. Penetration tests were performed on the prototype in order to validate the attack vectors, to evaluate compliance, and to provide evidence of the effectiveness of the corrective measures.
73

Study on recognition of facial expressions of affect

Beatriz Peneda Coelho 19 March 2019 (has links)
Facial expression recognition is a particularly interesting field of computer vision since it brings innumerable benefits to our society. Benefits that can be translated into a large number of applications in subjects such as, neuroscience, psychology or computer science. The relevance of the topic is reflected in the vast literature already produced describing notable signs of progress. However, the development and the advancement of new approaches is still facing multiple challenges. Challenges including head-pose variations, illumination variations, identity bias, occlusions, and registration errors. One of the focus in this field is to achieve similar results when moving from a controlled environment to a more naturalistic scenario. Though facial expression recognition has been addressed in considerable different projects, it is feasible to emphasize the call for attention to the design of an interface that simulates addressing patient engagement in healthcare. Since it has been noticed a rising tendency in engaging patients in their healthcare. There are still some open questions need to be answered to make a significant impact on health care.
74

Sistema de resposta dinâmica distribuída para consumos domésticos de eletricidade, em habitações com autoprodução e armazenamento elétrico

Beatriz Traila Pires 27 February 2019 (has links)
este protejo integra um sistema de optimização de consumo de energia domésticos de electricidade com integração de um sistema de resposta dinâmica distribuída. começamos por optimizar uma habitação independente, tendo sempre em conta a preferência do utilizador. depois é alargada e aplicada a uma produção distribuída.
75

Carotid Lumen Segmentation using a Neural Network Approach

Alexandre Saraiva Moreira 20 March 2019 (has links)
No description available.
76

Automatic switching between video and audio according to user's context

Paulo Jorge Silva Ferreira 20 March 2019 (has links)
No description available.
77

Modeling and Performance Evaluation of Bicycle-to-X Communication Networks

José Bastos Pintor 11 March 2019 (has links)
The growing connectivity of vehicles and Vulnerable Road Users, i.e., pedestrians and cyclists, allows to explore solutions based on wireless communication to support safety, efficiency and infotainment applications.However, there are few communication technologies that enjoy similar penetration ratios on cars, bicycles and pedestrians.WiFi is one of such technologies, as can be found in smart phones and in on-board hotspots.This thesis aims to characterize experimentally the wireless link performance and develop a model to estimate the received signal strength (RSS) between WiFi devices installed on bicycles and cars equipped with built-in WiFi APs.The RSS estimation model extends existing empirical models (e.g., the Log-Distance Path Loss model) by including the shadowing of the bicycle-and-cyclist system and of a vehicle.We first characterize the radiation pattern of antennas installed in several mounting points of a bicycle, in order to reduce the set of mounting points to be explored in future measurements.We then measured the radiation pattern of the bicycle and cyclist system, and the radiation pattern of a car with built-in and dedicated WiFi access points.Finally, we evaluate the performance of the model by comparing RSS estimates and measurements collected in selected interaction scenarios between bicycles and car: (i) bicycle overtaking a parked car, (ii) perpendicular crossing with LOS, and (iii) without LOS. We observed that 50% of the RSS estimates our model underestimates by less than are within 10 dBs of measured values about 50% of the RSSI values for the scenarios in LOS, and overestimates the RSSI values by more than 5 DBs about 75% of the RSSI values for the scenario containing obstructions.
78

Experiment in Human-Computer Interaction - Evaluation of a Shamanic Interface for Interacion with Cultural Gestures in Virtual Enviroments

Pedro Pais de Sousa da Costa Carvalho 05 February 2020 (has links)
No description available.
79

Introdução de painéis fotovoltaicos num sistema off-grid

Jorge André Madeiras dos Santos 20 February 2019 (has links)
Estudar sistemas off-grid;Estudo dos vários componentes dum sistema off-grid;Criar casos de estudo para realizar uma analise geral de sistemas off-grid;Utilizando os casos criados realizar vários testes de modo a analisar o funcionamento dos sistemas em várias circunstâncias.Analisar sistemas específicos de modo mais detalhado;Demonstrar um possível sistema de controlo de cargas.
80

Airport Slot Allocation Processes. A heuristic approach

Rafael Filipe dos Santos 27 February 2018 (has links)
No description available.

Page generated in 0.1086 seconds