• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 616
  • 319
  • 124
  • 105
  • 81
  • 41
  • 39
  • 35
  • 15
  • 10
  • 10
  • 9
  • 8
  • 8
  • 8
  • Tagged with
  • 2012
  • 522
  • 461
  • 459
  • 438
  • 436
  • 435
  • 435
  • 434
  • 302
  • 289
  • 210
  • 207
  • 198
  • 191
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

Energy Efficiency of Streaming over Mobile Ad-hoc Networks

Pattabiraman, Prashanth January 2010 (has links)
Hand held mobile devices are widely used today primarily due to their rich functionality and the ease of portability. However, the battery life of these devices is very limited and deploying resource hungry applications such as streaming on these mobile devices is a challenging task. It is extremely important to maximize the efficient use of the contained resources on these devices especially when they participate in a mobile ad hoc network. The optimization can occur in any layer of the OSI stack, however, this thesis work focuses only on the routing protocols used in the network layer. In this thesis work we have been able to evaluate the Energy Efficiency of the four most widely used MANET routing protocols (AODV, OLSR, DSDV and DSR) in terms of their energy consumption and performance. The initial phase of the work was carried out using the Network Simulator 2(NS2) tool and later the observations were done on a real world MANET testbed. The influence of several external factors on the performance and energy consumption are also taken into consideration while performing the simulations and experiments. The results obtained from our observations provide both qualitative and quantitative analysis of the routing protocols. Furthermore, it also highlights how the behaviour of the protocols are sometimes highly unpredictable, yielding results that we may not expect.
192

Secure data aggregation for wireless sensor network

Tran-Thi-Thuy, Trang January 2010 (has links)
Like conventional networks, security is also a big concern in wireless sensor networks. However, security in this type of networks faces not only typical but also new challenges. Constrained devices, changing topology or susceptibility to unprecedented security threats such as node capture and node compromise has refrained developers from applying conventional security solutions into wireless sensor networks. Hence, developing security solutions for wireless sensor networks not only requires well security analysis but also offers a low power and processing consuming.In this thesis, we implemented security solution targeting IRIS sensor motes. In our implementation, a public key-based key exchange is used to establish shared secret keys between sensor nodes. These secret keys are used to provide authenticity, integrity and freshness for transmission data. Our implementation ensures the flexibility in integrating our solution with available TinyOS operating system. Additionally, the thesis work also focuses on evaluating the performance in wireless sensor networks both in memory and energy consuming.
193

Employing Ethernet Multiple Spanning Tree Protocol in an OpMiGua network

Veisllari, Raimena January 2010 (has links)
Hybrid optical packet/circuit switched networking architectures are increasingly becoming an interesting research field. They integrate and combine the high resource utilization of statistically multiplexed packet switched networks with the low processing requirements and guaranteed quality of service provided by circuit switched networks. The aim of this thesis is to integrate the OpMiGua hybrid optical network with Ethernet. Specifically, the work is focused on the compatibility of the Ethernet’s loop-free topology protocols with the redundant multiple traffic service paths of OpMiGua. We analyse the problems and limitations imposed on the network architecture and propose our topology solution called the SM chain-connectivity. The analysis and the proposed schemes are verified based on results obtained from simulations. Furthermore, we design an integrated logical OpMiGua node that relies on an Ethernet switch instead of the Optical Packet Switch for the Statistically Multiplexed traffic. To date, to our knowledge there are no studies analysing the compatibility of Ethernet and its protection mechanisms in a hybrid optical network. This is the first work addressing the use of Ethernet in OpMiGua.
194

Automated Security Analysis of Infrastructure Clouds

Bleikertz, Sören January 2010 (has links)
Cloud computing has gained remarkable popularity in the recent years by a wide spectrum of consumers, ranging from small start-ups to governments. However, its benefits in terms of flexibility, scalability, and low upfront investments, are shadowed by security challenges which inhibit its adoption. In particular, these highly flexible but complex cloud computing environments are prone to misconfigurations leading to security incidents, eg, erroneous exposure of services due to faulty network security configurations. In this thesis we present a novel approach in the security assessment of multi-tier architectures deployed on infrastructure clouds such as Amazon EC2. In order to perform this assessment for the currently deployed configuration, we automated the process of extracting the configuration using the Amazon API and translating it into a generic data model for later analysis. In the assessment we focused on the reachability and vulnerability of services in the virtual infrastructure, and presented a way for the visualization andautomated analysis based on reachability and attack graphs. We proposed a query and policy language for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. We have implemented the security assessment in a prototype and evaluated it for practical andtheoretical scenarios. Furthermore, a framework is presented which allows the evaluation of configuration changes in the agile and dynamic cloud environments with regard to properties like vulnerabilities or expected availability. In case of a vulnerability perspective, this evaluation can be used to monitor the securitylevels of the configuration over its lifetime and to indicate degradations.
195

Specification of security properties by JML

Dulaj, Ilir January 2010 (has links)
Nowadays, verification of programs is gaining increased importance. The software industry appears more and more interested in methods and tools to ensure security in their applications. Java Modeling Language has been successfully used in the past by programmers to express their intentions in the Design by Contract fashion in sequential programming. One of the design goals of JML was to improve the functional software correctness of Java applications. Regarding the verification of security properties, JML was mostly successful in Java Smart Card applets due to the specifics of these applications. In this thesis work we investigate the feasibility of JML to express high-level security properties in Java applications that have more realistic requirements and are implemented in the object oriented technology. We do a threat analysis of a case study regarding a medical clinic and derive the required security properties to secure the application. We develop a prototype application where we specify high-level security properties with JML and use a runtime assertion checking tool to verify the code. We model the functional behavior of the prototype that establishes the security proper-ties as a finite state automaton. Our prototype is developed based on this automaton. States and state transitions modeled in the automaton are expressed in the prototype with JML annotations and verified during runtime. We observe that currently available features in JML are not very feasible to capture the security related behavior of Java programs on the level of the entire application.
196

Ukontrollerte pendlinger i polhjulsvinkel på generatorer i regionalnettet / Rotor angle stability problems for synchronous generators connected to a regional grid during open conductor fault

Sjøholt, Kenneth January 2010 (has links)
<p>I denne rapporten er synkrongeneratorens dynamiske oppførsel studert ved direkte faseavbrudd på tre-fase overføringslinjer i regionalnettet, via datamaskinbasert modellering og simulering. Ved feil studeres virkningen av spenningsregulator basert på statisk magnetisering, ulike typer turbinregulatorer, forskjellige koplingsgrupper for transformatorer og tiltak som dempetilsats (PSS). Bakgrunnen for denne oppgaven baserer seg på et reelt tilfelle med faseavbrudd som oppstod i regionalnettet til NTE den 7. mars 2008. Dette førte til at synkrongeneratorene tilknyttet 66 kV nettet fikk ukontrollerte effektpendlinger. Utfordringer ved faseavbrudd i kraftsystemer, uavhengig av om det er på overføringslinjene eller i elektriske komponenter, er kjent innenfor drift av kraftsystemet. Statistikk fra *FASIT for hele Norge i perioden 2001-2004 viser at av 37163 driftsforstyrrelser var 2073 faseavbrudd. Til tross for dette har det ikke vært mulig å finne relevant litteratur som detaljert beskriver den elektromekaniske oppførselen til synkrongenerator ved direkte faseavbrudd på en av fasene ved tre-fase kraftoverføring. Som en del av arbeidet er det etablert en simuleringsmodell av R-nettet til NTE i tillegg til et antall forenklete modeller. Det er foretatt simuleringer som viser endringene som funksjon av tiden i aktiv effekt, polhjulsvinkel, spenning og strøm på synkrongeneratorer ved faseavbrudd. Resultater fra simuleringene i de forenklete modellene viser at et faseavbrudd ikke nødvendigvis medfører ukontrollerte effektpendlinger. Det viser seg at synkrongeneratoren kan svinge seg inn mot et nytt arbeidspunkt i en driftssituasjon med varig faseavbrudd. Ulike regulatorer sammen med total systemimpedans, koplingsgruppe for transformatorer og lastforbruk avgjør hvor stabilt systemet blir. Resultater for simuleringene av R-nettet viser at faseavbrudd, tilsvarende det som oppstod i 2008, gir ukontrollerte effektpendlinger. Dempetilsats (PSS) er innført som tiltak, og det er vist at denne kan være i stand til å dempe pendlingene i startfasen slik at de ikke utarter seg til udempete svingninger. *FASIT – Feil og AvbruddsStatistikk I Totalnettet – Referansegruppe for feil og avbrudd ble opprettet 13.03.1996 og består av representanter fra NVE, Statnett og EnergiAkademiet (EBL). I tillegg er Lier Everk, Troms Kraft Nett AS, Istad Nett AS og Sintef Energiforskning for tiden representert. www.fasit.no</p>
197

On Modern IGBT Modules: Characterization, Reliability and Failure Mechanisms

Xiao, Di January 2010 (has links)
<p>The increased demand of offshore power conversion systems is driven by newly initiated offshore projects for wind farms and oil production. Because of long distances to shore and inaccessibility of the equipment long repair times must be expected. At the same time the offshore environment is extremely harsh. Thus, high reliability is required for the converters and it is important to have good knowledge of the switching devices. This thesis investigates switching characteristics and losses of commercially available IGBT modules to be used for this application. It focuses on switching time and switching energy losses depending on gate resistance, current and voltage levels, operation temperatures, and show differences between several devices of the same type. Some test show how device characteristics and losses when the device has been exposed to stress over a certain period.</p>
198

Genus och informationsteknologi / Gender and information technology

Andersson, Helena January 2004 (has links)
<p>This thesis discusses how the education in the Master of Engineering program can change to become more into line for the students needs, especially for the women, both directly in the education situation and later in their occupational roles. This is done using a gender perspective. Both the education and the occupation today is characterised by masculine norms and values. The education lacks gender perspective and is created by men, for men. The thesis gives concrete proposals on how to change two existing courses to better fit the students. Some of the most important changes are to make the goals of the courses more accessible and visible for the students, make sure that both men and women occurs in teaching positions and have course literature written by women as well as men.</p>
199

spelaspel.nu : utveckling av webbplats i ASP.NET

Koistinaho, Tony, Larsson, John January 2006 (has links)
<p>Webbspel blir allt populärare. Gävleföretaget Extrude Interactive</p><p>AB hade sedan en tid tillbaka planer på att lansera en spelsajt i</p><p>nöjessyfte men även i syfte att marknadsföra företagets</p><p>egenproducerade webbspel. Företaget hade redan en registrerad</p><p>domän: spelaspel.nu. I denna rapport redovisas utvecklingsarbetet</p><p>som ledde fram till den färdiga produkten som blev en färdigställd</p><p>webbplats tänkt att publiceras under domänen spelaspel.nu.</p><p>Webbplatsen använder sig av en SQL-databas och har utvecklats på</p><p>Microsofts ramverk .NET Framework 2.0. Webbplatsen</p><p>programmerades i C#, HTML och JavaScipt.</p>
200

Online Task Scheduling on Heterogeneous Clusters : An Experimental Study

Rosenvinge, Einar Magnus January 2004 (has links)
<p>We study the problem of scheduling applications composed of a large number of tasks on heterogeneous clusters. Tasks are identical, independent from each other, and can hence be computed in any order. The goal is to execute all the tasks as quickly as possible. We use the Master-Worker paradigm, where tasks are maintained by the master which will hand out batches of a variable amount of tasks to requesting workers. We introduce a new scheduling strategy, the Monitor strategy, and compare it to other strategies suggested in the literature. An image filtering application, known as matched filtering, has been used to compare the different strategies. Our implementation involves datastaging techniques in order to circumvent the possible bottleneck incurred by the master, and multi-threading to prevent possible processor idleness.</p>

Page generated in 0.3289 seconds