• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 42
  • 6
  • 5
  • 4
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 75
  • 30
  • 22
  • 18
  • 16
  • 12
  • 11
  • 10
  • 9
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Design and Modularization of a Hybrid Vehicle Control System

Fella Pellegrino, Augustino January 2021 (has links)
The complexity of automotive software has increased dramatically in recent years. New technological advances as well as increasing market competitiveness create a high cost-pressure environment. This thesis seeks to apply established modular principles to a Simulink Model to increase information hiding to improve the maintainability of controls software. A Hybrid Supervisory Controller (HSC) model, developed as part of the McMaster EcoCAR Competition, is used throughout this thesis. The software design process followed during the HSC model development is detailed, as well as providing an example of the application of the Simulink Module Tool, a Simulink add-on developed by Jaskolka et. al. The HSC System decomposition was restructured based on an analysis of the likely changes to the vehicle software, as well the system secrets contained within the model. This thesis also presents an analysis of the original and modular system decompositions, comparing several common software indicators of information hiding, coupling, cohesion, complexity, and testability. The modular decomposition led to a significant improvement in information hiding, both in system changeability and internal implementation. Likely changes to the system propagate to fewer modules and components within the new decomposition, with hardware data separated from behavioral algorithms, and all modules grouped based on shared secrets. The redistribution of algorithms based on separation of concern also led to improvements in coupling, cohesion, and interface complexity. The resulting software design process and modular system decomposition provides a framework for future EcoCAR students to focus on correct design and implementation of hybrid vehicle software. The benefits provided by the application of the Simulink Module Tool also contributes additional data and supporting evidence to the improvements that can be realized within Simulink Models by introducing the concepts of information hiding and modularity. / Thesis / Master of Applied Science (MASc) / The complexity of automotive software has increased dramatically in recent years. New technological advances as well as increasing market competitiveness create a high cost-pressure environment. As a result, improving the development of automotive software and its maintainability has become an increasingly critical issue to solve. This thesis uses a Hybrid Vehicle Controller Model developed within MATLAB Simulink to investigate the possible improvements that can be made to software modularity. The system decomposition is modified using the Simulink Module Tool, and is analyzed regarding improvements to information hiding, interface complexity, and specifically minimizing change propagation. The modular improvements made to the Simulink Model resulted in significant improvements in system changeability and information hiding, providing a useful framework for future EcoCAR students.
12

Frequent Itemset Hiding Algorithm Using Frequent Pattern Tree Approach

Alnatsheh, Rami H. 01 January 2012 (has links)
A problem that has been the focus of much recent research in privacy preserving data-mining is the frequent itemset hiding (FIH) problem. Identifying itemsets that appear together frequently in customer transactions is a common task in association rule mining. Organizations that share data with business partners may consider some of the frequent itemsets sensitive and aim to hide such sensitive itemsets by removing items from certain transactions. Since such modifications adversely affect the utility of the database for data mining applications, the goal is to remove as few items as possible. Since the frequent itemset hiding problem is NP-hard and practical instances of this problem are too large to be solved optimally, there is a need for heuristic methods that provide good solutions. This dissertation developed a new method called Min_Items_Removed, using the Frequent Pattern Tree (FP-Tree) that outperforms extant methods for the FIH problem. The FP-Tree enables the compression of large databases into significantly smaller data structures. As a result of this compression, a search may be performed with increased speed and efficiency. To evaluate the effectiveness and performance of the Min_Items_Removed algorithm, eight experiments were conducted. The results showed that the Min_Items_Removed algorithm yields better quality solutions than extant methods in terms of minimizing the number of removed items. In addition, the results showed that the newly introduced metric (normalized number of leaves) is a very good indicator of the problem size or difficulty of the problem instance that is independent of the number of sensitive itemsets.
13

”Du kan, jag ser, jag vet att du klarar detta” : En studie om lärares bemötande av inaktiva elever och deras strategier för att öka det aktiva deltagandet i idrott och hälsa

Kindblad, Ronja, Asllani, Kreshnik January 2017 (has links)
Syftet med studien är att undersöka hur lärare i grundskolans årskurs 4-6 bemöter elever som är ombytta, men inte deltar aktivt på lektionerna i idrott och hälsa. Syftet är även att undersöka hur lärare arbetar för att öka det aktiva deltagandet under lektionerna. Studien är baserad på både observationer av och intervjuer med tre lärare vid två olika tillfällen. Resultatet av undersökningen visar att lärarnas bemötande varierar, men att de ofta har en medvetenhet som grund för sitt agerande. Däremot visar studien att lärarna inte noterade samtliga elever som var inaktiva. Gemensamt för samtliga lärare är att de försöker planera undervisningen utifrån elevernas intressen och att de försöker anpassa aktiviteterna till eleverna på olika sätt. Resultatet har analyserat utifrån läroplansteorin.
14

Review of Hiding Ezra, by Rita Sims Quillen

Slagle, Judith Bailey 01 January 2014 (has links)
No description available.
15

Towards a Theory of Visual Concealment

Malcolmson, Kelly January 2010 (has links)
The goal of this dissertation is to take initial steps towards understanding concealment behaviour and ultimately developing a theory of visual concealment. Since there are relatively few studies of concealment in the literature and given the natural relationship between search and concealment, five strategies used in the development of traditional visual search theory and scene-based search theory were applied to the study of concealment. These strategies are: 1) establish a methodology, 2) identify dimensions, 3) categorize dimensions, 4) prioritize dimensions, and 5) integrate results into a theoretical framework that may involve inferences about the mechanisms involved. In Chapter 2, participants placed target objects within luggage in locations that were easy or hard to find (i.e., the placement task). Participants’ subjective reports of their thought processes and strategies were analyzed to identify dimensions that are important during concealment in real-world settings. Once a list of dimensions was generated, the dimensions were then categorized into three categories: Stimulus Properties dimensions such as visual similarity, Embodiment dimensions such as confrontation, and Higher Order dimensions such as schema. In Chapter 3, the dimensions uncovered in Chapter 2 were used in a forced-choice task, and participants’ choices were evaluated to determine whether the dimensions affected hiding behaviour. To further develop the methodological techniques available to study concealment behaviour and to examine the generalizability of previous findings, in Chapter 4, the placement task was used in another context – an office environment – and the locations chosen by participants to make objects easy or hard to find were coded on relevant dimensions. In Chapter 5, an initial attempt was made to prioritize the dimensions. The forced-choice task was used in a new way to explore the relative importance of the dimensions by examining which dimensions participants chose to use over other dimensions. Finally in the General Discussion in Chapter 6, an attempt was made to integrate available results and previous theories and to make inferences about the mechanisms involved in visual concealment. Methodological considerations and future directions for the study of visual concealment are also discussed.
16

Towards a Theory of Visual Concealment

Malcolmson, Kelly January 2010 (has links)
The goal of this dissertation is to take initial steps towards understanding concealment behaviour and ultimately developing a theory of visual concealment. Since there are relatively few studies of concealment in the literature and given the natural relationship between search and concealment, five strategies used in the development of traditional visual search theory and scene-based search theory were applied to the study of concealment. These strategies are: 1) establish a methodology, 2) identify dimensions, 3) categorize dimensions, 4) prioritize dimensions, and 5) integrate results into a theoretical framework that may involve inferences about the mechanisms involved. In Chapter 2, participants placed target objects within luggage in locations that were easy or hard to find (i.e., the placement task). Participants’ subjective reports of their thought processes and strategies were analyzed to identify dimensions that are important during concealment in real-world settings. Once a list of dimensions was generated, the dimensions were then categorized into three categories: Stimulus Properties dimensions such as visual similarity, Embodiment dimensions such as confrontation, and Higher Order dimensions such as schema. In Chapter 3, the dimensions uncovered in Chapter 2 were used in a forced-choice task, and participants’ choices were evaluated to determine whether the dimensions affected hiding behaviour. To further develop the methodological techniques available to study concealment behaviour and to examine the generalizability of previous findings, in Chapter 4, the placement task was used in another context – an office environment – and the locations chosen by participants to make objects easy or hard to find were coded on relevant dimensions. In Chapter 5, an initial attempt was made to prioritize the dimensions. The forced-choice task was used in a new way to explore the relative importance of the dimensions by examining which dimensions participants chose to use over other dimensions. Finally in the General Discussion in Chapter 6, an attempt was made to integrate available results and previous theories and to make inferences about the mechanisms involved in visual concealment. Methodological considerations and future directions for the study of visual concealment are also discussed.
17

Hybrid Digital-Analog Source-Channel Coding and Information Hiding: Information-Theoretic Perspectives

Wang, Yadong 02 October 2007 (has links)
Joint source-channel coding (JSCC) has been acknowledged to have superior performance over separate source-channel coding in terms of coding efficiency, delay and complexity. In the first part of this thesis, we study a hybrid digital-analog (HDA) JSCC system to transmit a memoryless Gaussian source over a memoryless Gaussian channel under bandwidth compression. Information-theoretic upper bounds on the asymptotically optimal mean squared error distortion of the system are obtained. An allocation scheme for distributing the channel input power between the analog and the digital signals is derived for the HDA system with mismatched channel conditions. A low-complexity and low-delay version of the system is next designed and implemented. We then propose an image communication application demonstrating the effectiveness of HDA coding. In the second part of this thesis, we consider problems in information hiding. We begin by considering a single-user joint compression and private watermarking (JCPW) problem. For memoryless Gaussian sources and memoryless Gaussian attacks, an exponential upper bound on the probability of error in decoding the watermark is derived. Numerical examples show that the error exponent is positive over a (large) subset of the entire achievable region derived by Karakos and Papamarcou (2003). We then extend the JCPW problem to a multi-user setting. Two encoders independently embed two secret information messages into two correlated host sources subject to a pair of tolerable distortion levels. The (compressed) outputs are subject to multiple access attacks. The tradeoff between the achievable watermarking rates and the compression rates is studied for discrete memoryless host sources and discrete memoryless multiple access channels. We derive an inner bound and an outer bound with single-letter characterization for the achievable compression and watermarking rate region. We next consider a problem where two correlated sources are separately embedded into a common host source. A single-letter sufficient condition is established under which the sources can be successfully embedded into the host source under multiple access attacks. Finally, we investigate a public two-user information hiding problem under multiple access attacks. Inner and outer bounds for the embedding capacity region are obtained with single-letter characterization. / Thesis (Ph.D, Mathematics & Statistics) -- Queen's University, 2007-09-28 23:11:21.398
18

Steganography-based secret and reliable communications : improving steganographic capacity and imperceptibility

Almohammad, Adel January 2010 (has links)
Unlike encryption, steganography hides the very existence of secret information rather than hiding its meaning only. Image based steganography is the most common system used since digital images are widely used over the Internet and Web. However, the capacity is mostly limited and restricted by the size of cover images. In addition, there is a tradeoff between both steganographic capacity and stego image quality. Therefore, increasing steganographic capacity and enhancing stego image quality are still challenges, and this is exactly our research main aim. Related to this, we also investigate hiding secret information in communication protocols, namely Simple Object Access Protocol (SOAP) message, rather than in conventional digital files. To get a high steganographic capacity, two novel steganography methods were proposed. The first method was based on using 16x16 non-overlapping blocks and quantisation table for Joint Photographic Experts Group (JPEG) compression instead of 8x8. Then, the quality of JPEG stego images was enhanced by using optimised quantisation tables instead of the default tables. The second method, the hybrid method, was based on using optimised quantisation tables and two hiding techniques: JSteg along with our first proposed method. To increase the steganographic capacity, the impact of hiding data within image chrominance was investigated and explained. Since peak signal-to-noise ratio (PSNR) is extensively used as a quality measure of stego images, the reliability of PSNR for stego images was also evaluated in the work described in this thesis. Finally, to eliminate any detectable traces that traditional steganography may leave in stego files, a novel and undetectable steganography method based on SOAP messages was proposed. All methods proposed have been empirically validated as to indicate their utility and value. The results revealed that our methods and suggestions improved the main aspects of image steganography. Nevertheless, PSNR was found not to be a reliable quality evaluation measure to be used with stego image. On the other hand, information hiding in SOAP messages represented a distinctive way for undetectable and secret communication.
19

Algorithms for audio watermarking and steganography

Cvejic, N. (Nedeljko) 29 June 2004 (has links)
Abstract Broadband communication networks and multimedia data available in a digital format opened many challenges and opportunities for innovation. Versatile and simple-to-use software and decreasing prices of digital devices have made it possible for consumers from all around the world to create and exchange multimedia data. Broadband Internet connections and near error-free transmission of data facilitate people to distribute large multimedia files and make identical digital copies of them. A perfect reproduction in digital domain have promoted the protection of intellectual ownership and the prevention of unauthorized tampering of multimedia data to become an important technological and research issue. Digital watermarking has been proposed as a new, alternative method to enforce intellectual property rights and protect digital media from tampering. Digital watermarking is defined as imperceptible, robust and secure communication of data related to the host signal, which includes embedding into and extraction from the host signal. The main challenge in digital audio watermarking and steganography is that if the perceptual transparency parameter is fixed, the design of a watermark system cannot obtain high robustness and a high watermark data rate at the same time. In this thesis, we address three research problems on audio watermarking: First, what is the highest watermark bit rate obtainable, under the perceptual transparency constraint, and how to approach the limit? Second, how can the detection performance of a watermarking system be improved using algorithms based on communications models for that system? Third, how can overall robustness to attacks to a watermark system be increased using attack characterization at the embedding side? An approach that combined theoretical consideration and experimental validation, including digital signal processing, psychoacoustic modeling and communications theory, is used in developing algorithms for audio watermarking and steganography. The main results of this study are the development of novel audio watermarking algorithms, with the state-of-the-art performance and an acceptable increase in computational complexity. The algorithms' performance is validated in the presence of the standard watermarking attacks. The main technical solutions include algorithms for embedding high data rate watermarks into the host audio signal, using channel models derived from communications theory for watermark transmission and the detection and modeling of attacks using attack characterization procedure. The thesis also includes a thorough review of the state-of-the-art literature in the digital audio watermarking.
20

What's the Deal with Stegomalware? : The Techniques, Challenges, Defence and Landscape / Vad händer med Stegomalware? : Teknikerna, utmaningarna, skyddet och landskapet

Björklund, Kristoffer January 2021 (has links)
Stegomalware is the art of hiding malicious software with steganography. Steganography is the technique of hiding data in a seemingly innocuous carrier. The occurrence of stegomalware is increasing, with attackers using ingenious techniques to avoid detection. Through a literature review, this thesis explores prevalent techniques used by attackers and their efficacy. Furthermore, it investigates detection techniques and defensive measures against stegomalware. The results show that embedding information in images is common for exfiltrating data or sending smaller files to an infected host. Word, Excel, and PDF documents are common with phishing emails as the entry vector for attacks. Most of the common Internet protocols are used to exfiltrate data with HTTP, ICMP and DNS showed to be the most prevalent in recent attacks. Machine learning anomaly-based detection techniques show promising results for detecting unknown malware, however, a combination of several techniques seems preferable. Employee knowledge, Content Threat Removal, and traffic normalization are all effective defenses against stegomalware. The stegomalware landscape shows an increase of attacks utilizing obfuscation techniques, such as steganography, to bypass security and it is most likely to increase in the near future.

Page generated in 0.0573 seconds