• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 239
  • 57
  • 52
  • 31
  • 24
  • 13
  • 10
  • 6
  • 5
  • 5
  • 3
  • 3
  • 3
  • 2
  • 2
  • Tagged with
  • 525
  • 169
  • 139
  • 89
  • 86
  • 84
  • 83
  • 78
  • 77
  • 77
  • 74
  • 51
  • 51
  • 47
  • 46
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Pol?tica de prioriza??o de acesso de esta??es com taxas diferentes para redes 802.11 baseada na SNR / Policy of priority of access for stations with different rates in 802.11b networks based on SNR

Morales, Marcelo Aparecido 15 February 2008 (has links)
Made available in DSpace on 2016-04-04T18:31:21Z (GMT). No. of bitstreams: 1 Marcelo Aparecido Morales.pdf: 2213720 bytes, checksum: 6858d1301ee70451e07970bdb465607e (MD5) Previous issue date: 2008-02-15 / The IEEE 802.11 wireless local area network presents a MAC anomaly when stations with different bit rates are connected in the same Access Point. Stations with high SNR have worst performance than stations with low SNR. This condition is worse in PWLANs (Public Wireless Local Area Network) with users connecting with different bit rates. This paper proposes a policy that uses the SNR and the condition of propagation to control users Contention Window. With this policy it is possible to control the Bit Rate, which is not possible in the 802.11 networks. / Redes 802.11 apresentam uma anomalia quando existem esta??es com diferentes taxas conectadas a um mesmo ponto de acesso. Esta??es com boa SNR (Signal-to-Noise Rate) obt?m um desempenho pior que esta??es com pior SNR. Esta condi??o ? esperada de forma agravada em redes p?blicas com v?rios usu?rios se conectando a diferentes taxas. Neste trabalho ? proposta uma pol?tica atrav?s da varia??o da janela de conten??o, levando em considera??o a SNR e a condi??o de propaga??o do local. Com a pol?tica a ser apresentada ? poss?vel controlar a taxa de transmiss?o em fun??o da SNR, criando uma possibilidade n?o oferecida pela rede 802.11.
142

Réseaux de capteurs sans fil linéaires : impact de la connectivité et des interférences sur une méthode d'accès basée sur des jetons circulants / Linear Wireless Sensors  Networks : Impact of connectivity and interferences on an Token Based MAC Protocol

Ndoye, El Hadji Malick 21 December 2015 (has links)
Dans cette thèse, il s'agit de proposer un protocole MAC qui prend en compte certaines spécificités des réseaux de capteurs sans fil linéaires. Ce protocole MAC est basé sur des jetons circulants qui donnent aux noeuds le droit d’accès au canal de transmission. Nous évaluons à partir de ce protocole l’impact des interférences et de la connectivité sur un réseau linéaire. Cette évaluation nous permet de proposer des techniques de clustering dans un réseau de capteurs sans fil linéaire. Nous supposons d’abord un clustering basé sur une exploitation logique du voisinage des noeuds capteurs. Nous considérons dans ce cas, un modèle de propagation déterministe qui ne tient pas en compte la complexité du milieu. Ensuite, nous considérons une technique de clustering dans laquelle le modèle de propagation prend en compte les fluctuations qui rendent le milieu complexe. / In this thesis, we propose a MAC protocol that takes into account the specific characteristics of LSNs. This MAC protocol is based on tokens circulating that give the right to nodes to access to the transmission channel. We evaluate from this protocol the impact of interference and connectivity in the LSN. This evaluation allows us to propose clustering techniques in a LSN. We assume first a clustering based on a logical exploitation of the vicinity of the sensor nodes. In this case, we assume that a deterministic propagation model that does not take into account the complexity of the environment. Next, we consider a clustering technique wherein the propagation model takes into account the fluctuations that make complex the medium.
143

Contribution to the Intelligent Transportation System : security of Safety Applications in Vehicle Ad hoc Networks / Contribution aux systèmes de transport intelligents : sécurité des applications de sureté dans les réseaux de véhicules ad hoc

Nguyen-Minh, Huong 29 September 2016 (has links)
Le développement du transport partout dans le monde a fourni un grand nombre d'avantages pour de nombreux aspects de la vie humaine. Les systèmes de transport intelligents (ITS) sont des applications avancées qui visent à rendre les réseaux de transport plus sûrs, plus pratiques et plus intelligents. Selon leurs usages, ils peuvent être classés en deux types d'applications ITS, qui sont des applications de sûreté et des applications non-sûreté. Le réseau de véhicules ad hoc (VANET) est un élément clé des systèmes ITS, car il permet la communication entre les unités de transport. Ces communications prennent en charge différentes applications ITS avec différentes propriétés. Parmi les deux types d'applications, nous nous intéressons aux applications de sûreté qui ont des contraintes de qualité de service et des contraintes de sécurité plus strictes. Selon le scénario considéré et l'application de sûreté donnée, les informations échangées entre les véhicules doivent être diffusé localement dans une communication à un seul saut et / ou également notifiées aux véhicules à large dimension. L'objectif principal de cette thèse est d'améliorer les performances des applications de sûreté en termes de qualité de service et de sécurité, à la fois dans une communication à un saut et dans une communication multi-sauts. Nous nous intéressons à la fiabilité, la connectivité et le déni de service (DoS). Nous étudions et proposons des solutions techniques provenant de couches inférieures (Physique, Liaison et Réseaux) qui jouent un rôle fondamental dans l'atténuation des défis créés par la nature de l'environnement des véhicules. Tout d'abord, nous introduisons une nouvelle méthode efficace pour fiabiliser la radiodiffusion. Dans notre système, les messages de sécurité sont rediffusés lorsque l'expéditeur est sollicité. Cela augmente le pourcentage de véhicules qui reçoivent les messages alors que le nombre de messages dupliqués reste limité. En second lieu, en tenant compte de la fragmentation du réseau, nous étudions des solutions qui permettent de pallier la déconnexion temporaire du réseau pour apporter l'information de sécurité aux destinataires. Basé sur les propriétés sociales des réseaux de véhicules, nous proposons un protocole de transfert basé sur des relations sociales pour relayer la communication entre les véhicules et des points d'intérêt qui fournissent des services de sécurité avec des contraintes de temps plus souples, telles que la recherche et le sauvetage. Troisièmement, nous étudions l'attaque de brouillage, une sorte d'attaques DoS, qui est cruciale pour les applications de sûreté et qui et facilement réalisable au niveau des couches inférieures. Nous modélisons l'attaque de brouillage afin d'étudier la dégradation causée par l'attaque sur les performances du réseau. La dégradation à un certain niveau dans les performances du réseau est une indication de présence d'attaques de brouillage dans le réseau; donc les résultats de cette analyse nous permettent de déterminer les seuils de performance du réseau pour distinguer entre les scénarios normaux et les scénarios attaqués. Toutefois, selon cette analyse, le procédé utilisant la dégradation comme une indication pour détecter une attaque de brouillage est impossible pour des applications temps réel. Par conséquent, nous proposons des nouvelles méthodes afin de détecter les attaques de brouillage temps réel. Nos méthodes permettent la détection en temps réel avec une grande précision, non seulement chez le moniteur central mais aussi au niveau de chaque véhicule. Par conséquent, les véhicules sont avertis sur l'attaque assez tôt pour récupérer la communication et réagir à ces attaques. / The development of transportation all over the world has been providing a lot of benefits for many aspects of human life. Intelligent Transportation Systems (ITS) are advanced applications that aim to make the transport networks safer, more convenient and smarter. According to their usages, they can be classified into two types of ITS applications, which are safety applications and non-safety applications. Vehicular ad hoc network (VANET) is a key component of ITS since it enables communications among transportation units. These communications support different ITS applications with various properties. Between two types of applications, we are interested in safety applications which have tighter quality and security constraints. Depending on an applied scenario of a given safety application, the exchanged information among vehicles must be broadcast locally within one-hop communication and/or also be notified to vehicles in large range. The main objective of this thesis is to improve the performance of safety applications in term of the quality of service and security, in both one-hop communication and multi-hop communication. We focus on reliability, connectivity and Denial of Services (DoS) attack. We study and propose technical solutions coming from lower layers (Physical, MAC and network layers) which play a fundamental role in mitigation to challenges created by the nature of the vehicular environment. Firstly, we introduce a reliable scheme to achieve the reliability for broadcasting. In our scheme, the safety messages are rebroadcast when the sender is solicited. This increases the percentage of vehicles receiving the messages while duplicated messages are limited. Secondly, with consideration of the fragmentation of the network, we study solutions that overcome the temporary disconnection in the network to bring the safety information to the recipients. Based on the social properties of vehicular networks, we propose a social-based forwarding protocol to support the communication between vehicles to points of interest that provide safety services with looser time constraints, such as search and rescue. Thirdly, we investigate jamming attack, a kind of DoS attacks, which is crucial for safety applications because of the adequate condition of the attack at the lower layers. We model jamming attack on broadcasting in order to study the degradation caused by the attack on network performance. The degradation at a certain level in network performance is an indication of a jamming attack presence in the network; therefore results from this analysis will allow us to determine network performance thresholds to distinguish between normal and attacked scenarios. However, according to our analysis, the method using the degradation as an indication to detect a jamming attack is not feasible for real-time applications. Hence, we propose methods to detect jamming attacks in real-time. Our methods allow real-time detection with high accuracy, not only at the central monitor but also at each vehicle. Therefore, vehicles are noticed about the attack soon enough to recover the communication and react to these attacks.
144

Entre práticas artísticas e editoriais: as publicações coletivas no museu / Between artistic and editorial practices: the collective artists publications in the museum

Shoji, Eduardo Akio 26 September 2014 (has links)
As publicações de artistas são uma das principais formas de manifestação da arte do século 20: tanto por serem originárias da modernidade artística, quanto por marcarem aspectos próprios da linguagem contemporânea. Como formas operativas potencialmente acolhedoras do trabalho coletivo entre artistas e poetas, materializando um espírito de rede, analisamos algumas publicações de artistas brasileiras dos anos 1970 presentes no acervo do MAC USP. De livros de artistas a revistas literárias, as publicações coletivas são consideradas veículos de comunicação bem como da própria arte. Enquanto produtos do design gráfico, tais edições estabelecem relações entre ler e ver, palavras e imagens, propondo desafios críticos e museológicos. Após apresentar um estudo geral sobre as publicações de artistas, buscamos organizar nossa reflexão em dois grandes grupos, as relações entre Poesia e Visualidade e Poesia e Performatividade, como modos de se apropriar artisticamente dos objetos editáveis e publicáveis. No primeiro caso, ligados a uma tradição construtiva, os poetas e artistas estão interessados na construção visual de suas obras e em seus efeitos, criando uma poesia visual ou uma imagem visual poética. No segundo, aliados sobretudo ao tropicalismo e à poesia marginal, servem-se das publicações para atingir e interagir com o leitor ou o público, através do potencial imagético e performático da palavra e de imagens visuais poeticamente construídas enquanto enunciados discursivos e socialmente identificados na cultura de massa. / The artists publications are one of the main forms of art manifestation in the 20th century: both because they originate on the modernity period of art, and by bringing aspects inherent to the contemporary means of expression. We analyze some editions of Brazilian artists from the 1970s, as operative forms, potentially welcoming to collective work of artists and poets, which materialize a network impulse. They are all part of Museum of Contemporary Art at USP collection. From artistic books to literary journals, collective publications are considered means of communication as well as objects of art per se. As products of graphic design, such editions establish relations between reading and seeing, words and images, setting up some critical and museologic challenges. After introducing with a general study about the artists publications, we aim to organize our reflection in two larger groups: the relations between Poetry and Visuality and the one between Poetry and Performativity, as ways of appropriating artistically some editable and publishable materials. In the former, connected to a constructive tradition, poets and artists are interested in visual construction of their works and their effects, creating some kind of visual poetry or a visual poetic image. In the latter, aligned mostly to Tropicalism and marginal poetry, the artists use the publications to reach out and interact with a certain public or reader, through the imagetic and performatic potential of the words and poetically visual images constructed as discursive utterances that are socially identified in mass culture.
145

Ett permanent landmärke på den 38:ebreddgraden : en studie av Armistice Agreements uppkomst / A permanent landmark on the 38th parallel : a study of the Armistice Agreements origin

Larsson, Johan January 2009 (has links)
<p>Per definition så befinner sig Nordkorea och Sydkorea i krig med varandra sedan 25 juni 1950. Den aktiva delen av kriget varade endast i tre år och avlöstes av <em>Armistice </em><em>Agreement </em>27 juli 1953. Avtalet syftade till att möjliggöra för politiska företrädare att enas om ett fredsavtal – något man aldrig lyckades uppnå.</p><p>Denna uppsats analyserar tiden från Kairokonferensen 1943 intill <em>Armistice Day </em>1953 utifrån hur bakomliggande incitament – sett ur realistiska och liberalistiska perspektiv inom ramen för internationella relationer – kan förklara händelseutvecklingen på den koreanska halvön.</p><p>Resultatet visar på hur erfarenheter och efterbörd av VK II, politiska målsättningar, misstro mellan parterna och till FN, successivt bygger upp dagens delade Korea utifrån vad som främst återfinns inom den realistiska teoribildningen.</p> / <p>North Korea and South Korea has been at war with each other since June 25, 1950. The active part of the war lasted only three years, which resulted in the <em>Armistice Agreement </em>July 27, 1953. The main purpose of the agreement was to allow political representatives to open up for diplomatic negotiations and agree on a peace agreement – something they never managed to achieve. </p><p>This paper will analyze the time from the Cairo Conference in 1943 until <em>Armistice Day </em>in 1953, and investigate how realistic and liberalized political forces, in the context of International Relations theory, influenced the developments on the Korean Peninsula.</p><p>The conclusions will show how the post-war reconstructions of WW II, U.S. and Soviet foreign policy objectives and UN intervention gradually shaped a permanent landmark at the 38th parallel based on realistic values.</p>
146

Contribución al diseño de los niveles físico y MAC/LLC de redes de comunicaciones móviles orientadas a aplicaciones y servicios multimedia

Sanz Gil, Roberto 23 March 2001 (has links)
Esta tesis tiene como objetivo final la propuesta de un protocolo de acceso al medio imbricado con los parámetros de nivel físico que dan soporte a dicho protocolo. Puesto que la propuesta se basa en un esquema TDMA, se eligen como base del análisis los sistemas de segunda generación GSM, TETRA y DECT, a partir de los cuales se extrapolan determinados parámetros a fin de sintonizarlos con los sistemas de tercera generación en su especificación TDMA. Se evalúan dichos sistemas a nivel físico sobre diferentes modelos de canal de propagación y distintas técnicas de compensación implementadas en el receptor: ecualizadores implementados sobre filtros transversales y antenas adaptativas. Además, se implementan y evalúan algoritmos de ecualización sencillos como LMS o RLS y más complejos como algoritmos bidireccionales sobre ecualizadores DFE. La elección de una u otra opción condicionará fuertemente el diseño del protocolo de acceso propuesto en el subnivel MAC. / This thesis has as final aim the proposal of a medium access protocol (MAC) closely related to the physical layer parameters that support such protocol. As the proposal is based on a TDMA scheme, three representative systems belonging to the second generation of mobile communication systems have been chosen: GSM, TETRA and DECT, which are employed to extract some parameters in order to tune them with the third generation systems in its TDMA specification. Such systems are evaluated at physical layer over different propagation channel models with several compensation techniques implemented on the receiver. As well, equalizers based on digital filters and adaptive antennas are utilized. The equalization algorithms evaluated include from the simplest ones like LMS or RLS to bidirectional algorithms over DFE structure. Choosing one or another option will strongly condition the design of the proposed access protocol within the MAC sublayer.
147

Fast Feedback and Buffer Congestion Control Improvement for Real-Time Streaming over WiMAX Networks

MINH, Sophal 29 July 2008 (has links)
Wireless broadband technologies provide ubiquitous broadband access to wireless users, enabling services that were available only to wireline users. At the same time, with the steady growth of real-time streaming applications such as video on demand (VoD), voice over IP (VoIP), massive online gaming, and so forth, the IEEE 802.16 standard (commonly known as WiMAX) has emerged as one of the strongest contenders to provide such kind of broadband wireless access services. WiMAX has specified some advanced lard features at physical (PHY) layer techniques and media access control (MAC) layer protocols, which adopted many Quality of Service (QoS) scheduling algorithms, resource allocation, Hybrid ARQ and so on. Moreover, forward error correction (FEC) and automatic repeat request (ARQ) techniques have already specified in the standard and they are used to support real-time streaming services in all kind of channel conditions. Inside this thesis, we propose an efficient fast feedback algorithm and buffer congestion control improvement scheme for data streaming over WiMAX networks. Two reserved bits in Generic MAC header (GMH) of each MPDU in WiMAX systems are utilized. The first reserved bit is used as a trigger in fast feedback strategy to add more robust coding and choose better feedback channel when the feedback message does not arrive properly within its cycle time trip (CTT) or after timeout. The second reserved bit is used to inform the base station about the serving subscriber stations¡¦ buffers states when their buffers are above the predefine-threshold value. Increasing number of retrieval of the feedback message, which means we can increase restore-bit-error probabilities within each frame, and then the throughput performance shall increase as well. In addition, by having each subscriber stations or service station¡¦s buffer states knowledge, the BS will be able to provide extra bandwidth allocation to the SSs more efficiency and accuracy. Keywords: WiMAX, PHY, MAC, Hybrid ARQ, QoS, Generic MAC header, CTT, Fast Feedback, Buffer Congestion Control Improvement, Real-Time streaming.
148

Analysis of the Cost of Handover in a Mobile Wireless Sensor Network

Dong, Qian 06 March 2013 (has links) (PDF)
Handling mobility in wireless sensor networks can pose formidable challenges in protocol design, especially, at the link layer. Since most of the proposed Medium Access Control (MAC) protocols do not accommodate mobility, a node has two options to deal with a deteriorating link: (a) to continue data transmission until the link breaks and then establishes a new link with a new relay node; or (b) to seamlessly transfer the communication to a better link parallel to the data transmission over the existing link. Different from option (a) where a node can only search for a new link after the original link disrupts, option (b) enables a node to perceive the change in the quality of a link in advance. The link quality prediction is implemented by an adaptive handover mechanism. Both approaches will inevitably introduce latency. This thesis aims to quantify and compare such latency. Specifically, it investigates the latency of packet transmission in a mobile wireless sensor network with and without the support of a handover mechanism. To start with, the thesis elaborates the effect of mobility on the performance of the existing MAC protocols, and the need to maintain an unbroken link during data transmission. To implement the handover, a target MAC protocol is required to be selected first. Since the Receiver-Initiated MAC protocol (RI-MAC) uses only short beacon and data packets during communication that substantially reduce overhearing, collision probability and data recovery cost, it is chosen as the carrier for the latency evaluation. Even though RI-MAC performs well in many aspects, it has several demerits. To address the monotonous increment in the backoff window size and to reduce the occurrence frequency of the dwell time, a burst data transmission pattern is adopted to optimize RI-MAC. With the optimization, the protocol reduces the long idle listening time that a node has to wait before data transmission, and thus, works well in a static scenario. However, due to the high probability of link disconnection, the burst data transmission does not perform well in case of mobility. For the sake of accommodating mobility, an adaptive handover mechanism is developed on top of the optimized RI-MAC. Once a node evaluates that the data packets cannot be completely transmitted before the link terminates, it will search for a new relay node while keeping communicating with the original collaborator. It is implemented by embedding a neighbor discovery request in a data packet that will be transmitted in a broadcast channel. Neighbors of the node will participate in the handover process as long as they are in an active state and their distance to the transmitter does not exceed a pre-defined threshold. As a proof-of-concept for the handover mechanism, a mathematical model is established. The transmission rate, the moving speed of human beings, the duty cycle and the network density are all taken into consideration. The analytical result shows that the communication latency decreases with an increment in the network density and the duty cycle when the handover mechanism is used, whereas the latency exhibits a reverse trend when the handover mechanism is not used. To validate the mathematics-based evaluation, the NS2 network simulator is employed. The simulation result is found to perform in accordance with the analytical result. It is asserted that the latency of packet transmission with the handover support is much less than that without the handover support. The communication latency can be saved by at least 0.28s when the handover mechanism is applied. This figure can even grow as the duty cycle and the network density increase. From this perspective, the handover mechanism is verified to improve the latency of packet transmission as far as mobility is concerned.
149

A low power listening with wake up after transmissions MAC protocol for WSNs

Cano Bastidas, Cristina 04 March 2011 (has links)
In the last few years Wireless Sensor Networks (WSNs) have become an interesting field of research mainly due to the challenges and constraints of their design and the broad range of potential applications they can provide. One of the most important constraints is the limited energy resources of the sensor nodes that directly influences the design of the Medium Access Control (MAC) layer, as it is the responsible of controlling the transceiver that is the most consuming component of a sensor node. In this thesis the limitations of preamble sampling, one of the most well-known MAC protocols for WSNs, have been studied. Moreover, a new approach, called Low power listening with Wake up after Transmissions MAC (LWT-MAC), has been designed with the goal to overcome preamble sampling limitations while maintaining its reduced energy consumption and simplicity. The performance results obtained have shown that the LWT-MAC protocol is able to significantly improve the performance of WSNs. / Les xarxes de sensors sense fils han esdevingut una interessant àrea de recerca degut als reptes que presenta el seu disseny i a la gran quantitat d’aplicacions potencials que poden proporcionar. Un dels principals problemes d’aquestes xarxes és la limitació en els recursos energètics dels nodes sensors, cosa que afecta directament al disseny del nivell Medium Access Control (MAC), degut a què és el responsable de controlar la ràdio, el component de major consum energètic d’un node sensor. En aquesta tesi s’estudien les limitacions d'un dels protocols MAC per xarxes de sensors més conegut: preamble sampling. A més, s’ha dissenyat un nou protocol, anomenat Low power listening with Wake up after Transmissions MAC (LWT-MAC), amb l’objectiu de reduir les limitacions de preamble sampling però mantenint el seu baix consum energètic i la seva simplicitat. Els resultats obtinguts mostren que el protocol LWT-MAC és capaç de millorar de forma significativa el rendiment de la xarxa.
150

Hacia servicios públicos centrados en el ciudadano: Desafíos pendientes de la Estrategia “Mejor Atención al Ciudadano” – MAC / Hacia servicios públicos centrados en el ciudadano: Desafíos pendientes de la Estrategia “Mejor Atención al Ciudadano” – MAC

López Chávez, Brenda, Vega Paucar, Catherine 03 August 2018 (has links)
The “Better Citizen Attention” Strategy - MAC proposes the development of multiple attention channels so that citizens can realize their procedures in one place. This governmental initiative is aligned with the new trend of public management, which is focused on the citizen. That means a change in how organizations provide their services, which are the result of analysis and understanding of the needs of the citizens.This article describes and analyzes the MAC Strategy and identifies what factors should be promoted and/or strengthened in order to consolidate it as model service focused on the citizens. Although MAC has accomplishment important achievements by reducing the time and costs of the citizens, it is still pending to develop essential technical and political factors. / La Estrategia “Mejor Atención al Ciudadano” – MAC plantea el desarrollo de múltiples canales de atención para que los ciudadanos puedan realizar sus trámites en un solo lugar. Esta iniciativa del Estado está alineada con la nueva tendencia de gestión pública, la cual se centra en el ciudadano. Lo anterior significa un cambio en cómo las organizaciones brindan sus servicios, los cuales son fruto del análisis y comprensión de las necesidades de la población.El presente artículo describe y analiza la Estrategia MAC e identifica qué factores se deberían impulsar y/o fortalecer para que el modelo se consolide como un referente de servicios centrados en el ciudadano. Si bien MAC ha conseguido importantes logros reduciendo el tiempo y costos en la atención, aún queda pendiente desarrollar factores técnicos y políticos esenciales.

Page generated in 0.0715 seconds