• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 353
  • 69
  • 41
  • 36
  • 35
  • 25
  • 21
  • 18
  • 13
  • 11
  • 9
  • 5
  • 4
  • 4
  • 3
  • Tagged with
  • 772
  • 149
  • 139
  • 107
  • 70
  • 68
  • 61
  • 60
  • 55
  • 52
  • 52
  • 51
  • 50
  • 50
  • 48
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Message brokers in a microservice architecture / Meddelandemäklare i en mikrotjänstarkitektur

Antonio, Christian, Fredriksson, Björn January 2021 (has links)
The microservice architectural pattern refers to a system consisting of independently deployable services that communicate across networks. RabbitMQ is a popular message broker that can be used to make this communication possible. An alternative to this is Amazon Simple Queuing Service (SQS), which is a fully managed queuing service. By performing a literature- and case study, two systems with a microservice architecture are developed. One using RabbitMQ to communicate between the services, and the other using Amazon SQS. The systems are compared, with regards to message latency, ease of use and maintainability. The results show that RabbitMQ provides much lower message latency than Amazon SQS. Amazon SQS is however both easier to maintain and to use than RabbitMQ. / En mikrotjänstarkitektur syftar till ett system bestående av tjänster som kan driftsättas oberoende av varandra och som kommunicerar över nätverk. RabbitMQ är en populär meddelandemäklare som nyttjas för att möjliggöra ovan nämnd kommunikation. Ett alternativ till detta är Amazon Simple Queueing Service (SQS), vilket är en meddelandetjänst som helt och hållet förvaltas av Amazon. Genom att utföra en litteratur- och fallstudie utvecklas två system med en mikrotjänstarkitektur. Det ena nyttjar RabbitMQ för kommunikation mellan tjänster, medan det andra använder Amazon SQS. Båda systemen jämförs därefter med hänsyn till meddelandens fördröjning, användarvänlighet samt enkelhet att underhålla. Resultaten visar att meddelanden skickade genom RabbitMQ har mycket lägre fördröjning än de skickade genom Amazon SQS. Ur perspektiven användarvänlighet och enkelhet att underhålla är Amazon SQS ett mer fördelaktigt akternativ än RabbitMQ.
132

Quantifying the Impact of Message Framing on Consumer Attitudes Towards the Consumption of Meat Products in Cape Town: A Consumer Neuroscience Approach

Zunckel, Caitlin 29 March 2022 (has links)
Is it more effective to evoke negative emotions in social advertisements than positive emotions? This study compared positive and negative message framing strategies in social marketing advertisements that aimed to encourage a reduction in meat consumption. This project explored how each strategy influences consumers' attitudes toward the recommended behaviour and investigated the role of emotional and attentional responses to each message framing strategy. The purpose of this research was to determine whether negatively framed messages are more effective than positively framed messages in influencing consumers' attitudes, emotions, and attention. The motivation of the study was to provide formative research for the design of social marketing interventions to effectively influence consumers' attitudes towards advertised causes with the use of message framing, and to advance theoretical understanding of how consumers respond to social marketing interventions. Furthermore, this research attempted to resolve differences between results obtained in previous framing research in the social marketing context. This study uniquely proposed the use of cutting-edge consumer neuroscience techniques to develop a clearer understanding of consumers' emotional and attentional responses to social marketing advertisements. The results were presented from a mixed-method approach, which combined quantitative and qualitative research methods. An experiment was conducted by using two social marketing print advertisements aimed at encouraging a reduction in meat consumption, by highlighting the impact of consuming meat products on animal welfare. Respondents involved in the experiment viewed an advertisement that was either positively framed or negatively framed. The research applied self-reporting methods, as well as consumer neuroscience methods, including facial coding, galvanic skin response (GSR), and eye-tracking, to explore the proposed research framework. The combination of these methods allowed the collection of data on attitudinal, emotional, and attentional responses. The results of this research demonstrated that negatively framed advertisements are more effective in changing consumers' attitudes towards reducing meat consumption than positively framed advertisements. Thus, messages aimed at encouraging a reduction in consumption should highlight the negative consequences of participating in certain behaviours. Neither emotion nor attention were found to mediate the relationship between message framing and attitude. However, positively framed advertisements elicit significantly higher levels of emotional valence; and negatively framed advertisements elicit significantly higher levels of disgust and attention. Social marketers should, therefore, leverage these feelings of disgust; and they should implement negative framing strategies to increase the attention paid to an advertisement. However, educational social marketing interventions should be considered, in combination with negative message framing, to effectively influence consumers' attitudes towards social issues. These findings have provided research for better developing message framing strategies for the communication of sustainable consumption. Furthermore, these strategies contributed to the existing social marketing literature by addressing the lack of information on marketing efforts aimed at reducing meat consumption. This research also filled important gaps in the literature regarding positive versus negative message framing strategies, and social marketing interventions can now be implemented with an increased understanding of how consumers respond to different message framing strategies.
133

The Messages of the Restoration: A Study of the Doctrinal Development of the Missionary Message of The Church of Jesus Christ of Latter-day Saints

Nixon, Sheldon 07 July 2010 (has links) (PDF)
Proselyting has always been an important part of The Church of Jesus Christ of Latter-day Saints and in recent history the proselyting message has remained primarily the same. But that was not the case in the earliest days of the Church. When Joseph Smith received his First Vision and started to share that experience to others, the proselyting message of the Church was born. But that message, the message of the Restoration, did not linger on that event for too long. In fact the message of the Restoration underwent a series of evolutions and modifications as the Lord continued to reveal His will to the Church. At times these changes were small and seemed to be the next natural step in the development of the Church and its teaching, and at other times the change was more dramatic. But with every change the Lord was directing the work and had a purpose for the change. The members of the Church did not always understand the reason for the change, but God did and because of His careful crafting of the messages of the Restoration, the Church and its message grew in strength and number.
134

Message-Oriented Middleware as a Queue Management Solution to Improve Job Handling within an E-Commerce System

Johansson, Tobias January 2018 (has links)
Today’s applications are required to continuously adapt and adjust, to be able to meet a constant change in demand. As result of an increasing amount of data, choosing the right communication method becomes a vital step. A solution that have been functional for a long time, may at any point in time be unable to reach the level it requires and instead turns into bottlenecks and inefficient solutions.Using a database as a communication method between system entities, does not have to be a bad solution. A database has it perks with being a simple solution and efficient query operations. However, using it as a queue management system, requires entities to continuously poll new table entries. This solution may not be the most suitable nor best available option. There exists communication system developed for the specific purpose of efficiently distributing messages to available parties.Implementing a message-oriented middleware enables for asynchronous communication which promotes applications to be more loosely coupled. As a result, available resources could be better utilised and improve the system performance. This degree project investigates the development and integration of two message-oriented middlewares, RabbitMQ and AcviteMQ, within an e-commerce system. The purpose is to explore the potentials of changing queue management system from a database to a message broker. The expected outcome is a more flexible job handling and, perhaps, an improvement of job processing by using a more efficient distribution.The results show that changing queue management system from the database to a message-oriented middleware could improve the performance of handling of invoice jobs. Testing the application servers of the Proceedo system, with a batch of invoice jobs, showed a potential of up to 17 percent faster process time using a message broker. This corresponds to a reduced process time of around 11 minutes for one application server and 6 minutes using two. Additionally, both brokers provide flexible message handling through functionality to priorities messages. / Dagens applikationer måste kontinuerligt anpassa och justera sig för att kunna möta en ständig förändring i efterfrågan. Resultat som blir av den ökande mängd data som behöver kunna hanteras, är kravet på att välja rätt kommunikationsmetod. En lösning som varit funktionell under lång tid, kan när som helst bli oförmögen att nå den nivå som krävs. Istället förvandlas den till en flaskhals och på så sätt bli en ineffektiv lösning.Att använda en databas som en kommunikationsmetod mellan systemenheter behöver inte vara en dålig lösning. En databas har förmåner som att att vara en enkel lösning och effektivt kunna hantera förfrågningar. När det appliceras som ett köhanteringssystem, krävs det att alla enheter kontinuerligt skickar nya förfrågningar för att hämta nya tabelluppdateringar. Denna lösning kanske inte är det mest lämpliga eller bästa tillgängliga alternativet. Det finns kommunikationssystem utvecklade för det här specifika syftet, att effektivt distribuera meddelanden till tillgängliga parter.Införandet av ett meddelandeorienterad middlewares gör det möjligt för asynkron kommunikation som främjar applikationer till att kunna vara mer löst kopplade. Som ett resultat kan tillgängliga resurser utnyttjas bättre och förbättra systemets prestanda. Detta examensprojekt undersöker utvecklingen och integrationen av två meddelandeorienterade middlewares, RabbitMQ och AcviteMQ, inom ett e-handelssystem. Syftet är att undersöka de positiva möjligheterna som finns av att by-ta köhanteringssystem från en databas till en meddelandeorienterad middleware. Det förväntade resultatet är en mer flexibel jobbhantering och kanske en förbättring av jobbearbetningen, genom att använda en effektivare meddelande distribution.Resultaten visar att bytet av köhanteringssystem, från databasen till en meddelandeorienterad middleware, kan förbättra hanteringen av fakturahandlingar. Testningen av Proceedo-systemets applikationsservrar visade potential på upp till 17 procent snabbare processtid med hjälp av en meddelande broker. Det motsvarar en hanteringstid på 11 minuter snabbare vid användande av en applikationserver och 6 minuter vid använding av två. Dessutom ger båda middlewares en mer flexibel meddelandehantering, i form av, funktionalitet att kunna prioritera meddelanden
135

Lightweight Message Authentication for the Internet of Things

Höglund, Rikard January 2014 (has links)
During the last decade, the number of devices capable of connecting to the Internet has grown enormously. The Internet of Things describes a scenario where Internet connected devices are ubiquitous and even the smallest device has a connection to the Internet. Many of these devices will be running on constrained platforms with limited power and computing resources. Implementing protocols that are both secure and resource efficient is challenging. Current protocols have generally been designed for mains powered devices; hence, they are not optimized for running on constrained devices. The Constrained Application Protocol (CoAP) is a protocol for network communication specifically designed for constrained devices. This thesis project examines CoAP and presents an extension that adds authentication in a way that is suitable for constrained devices, with respect to minimizing resource use. The proposed solution has been compared and contrasted with other alternatives for authentication, particularly those alternatives used with CoAP. It has also been implemented in code and experimentally evaluated with regards to performance versus vanilla CoAP. The main goal of this project is to implement a lightweight authentication extension for CoAP to be deployed and evaluated on constrained devices. This extension, called Short Message Authentication ChecK (SMACK), can be used on devices that require a method for secure authentication of messages while using only limited power. The main goal of the extension is to protect against battery exhaustion and denial of sleep attacks. Other benefits are that the extension adds no additional overhead when compared with the packet structure described in the latest CoAP specification. Minimizing overhead is important since some constrained networks may only support low bandwidth communication. / Under det senaste århundradet har antalet enheter som kan ansluta sig till Internet ökat enormt. ”The Internet of Things” beskriver ett scenario där Internet-anslutna enheter är närvarande överallt och även den minsta enhet har en uppkoppling till Internet. Många av dessa enheter kommer att vara begränsade plattformar med restriktioner på både kraft- och beräkningsresurser. Att implementera protokoll som både är säkra och resurseffektiva är en utmaning. Tillgängliga protokoll har i regel varit designade för enheter med anslutning till det fasta kraftnätet; på grund av detta är de inte optimerade för att köras på begränsade plattformar. Constrained Application Protocol (CoAP) är ett protokoll för nätverkskommunikation speciellt framtaget för begränsade plattformar. Denna uppsats undersöker CoAP protokollet och presenterar ett tillägg som erbjuder autentisering på ett sätt som passar begränsade plattformar, med avseende på att minimera resursanvändning. Den föreslagna lösningen har blivit beskriven och jämförd med andra alternativ för autentisering, speciellt de alternativ som används med CoAP. Lösningen har också implementerats i kod och blivit experimentellt utvärderad när det gäller prestanda jämfört med standardversionen av CoAP. Det huvudsakliga målet för detta projekt är att implementera en lättviktslösning för autentisering till CoAP som ska installeras och utvärderas på begränsade plattformar. Detta tillägg, Short Message Authentication checK (SMACK), kan användas på enheter som behöver en metod för säker autentisering av meddelanden samtidigt som kraftåtgången hålls låg. Huvudmålet för detta tillägg är att skydda mot batteridräneringsattacker och attacker som hindrar en enhet från att gå i viloläge. Andra fördelar är att tillägget inte kräver någon extra dataanvändning jämfört med paketstrukturen som beskrivs i den senaste CoAP-specifikationen. Att minimera overhead i kommunikationsprotokoll är viktigt eftersom vissa begränsade nätverk endast stödjer kommunikation över låg bandbredd.
136

Compliance of Web services over a high level specification / Conformité de services Web par rapport à des spécifications de haut niveau

Elabd, Emad 13 July 2011 (has links)
Actuellement, la technologie des services Web évolue rapidement, en étant soutenue par les grands acteurs du domaine des systèmes d'information. Les applications basés sur services Web sont faiblement couplées et utilisables de façon automatique via l'utilisation d'un ensemble de normes basées sur XML. Hormis la description syntaxique des messages, il est nécessaire d’avoir une description sémantique du comportement des services. En effet, lors de la conception d'un service ou lors d'une composition de services, il est important de vérifier la conformité avec un cahier des charges. L’enrichissement des descriptions des services par l’inclusion de leurs comportements est de plus en plus important. Ce comportement peut être décrit par des protocoles métier représentant les séquences possibles d'échanges de messages. Les services Web utilisent des politiques de contrôle d'accès (ACP) pour restreindre l'accès à des consommateurs autorisés. Ces politiques doivent faire partie de la description du service. Dans cette thèse, l'analyse d'interopérabilité en termes de contrôle d’accès après la formalisation des services Web annotés avec les politiques de contrôle d’accès est réalisée. Nous présentons une approche pour intégrer les outils de vérification dans l'architecture de contrôle d’accès de façon à garantir une interaction sans erreurs. Les politiques et les crédits sont présentés comme une ontologie afin de bénéficier de la flexibilité offerte par subsomption sur des concepts. La chorégraphie des services Web est utilisée dans la phase de conception d’applications pair à pair complexes dans lesquelles chaque pair peut être implémenté par un service Web. Par conséquent, la sélection des services Web pour l’implémentation de chorégraphie en utilisant l’approche de vérification de compatibilité avec contrôle d'accès est l'un des objectifs de notre recherche. Dans ce travail, les modèles de protocole métier du service Web sont étendus en ajoutant des informations au message sur chaque transition du service dans lequel ce message sera envoyé ou reçu. Nous définissons et vérifions la compatibilité des services Web afin de voir si (et comment) plusieurs services peuvent avoir des interactions en fonction de leurs protocoles. Cette approche aidera les concepteurs à choisir des services Web de manière simple et à vérifier s’ils peuvent mettre en œuvre la chorégraphie nécessaire en vérifiant la compatibilité avec notre approche / Currently, Web services technology is rapidly move forward supported by major players in the field of information systems. Web services applications are loosely coupled and usable in an automatic way via the use of a set of standards based on XML. Beside the syntactic description of messages, there is a need for the semantic description of the behavior of services. Indeed, whether in the design of a service or composition of services, it is important to check compliance with a set of specifications. Enriching services descriptions by including their behaviors is becoming more and more important. This behavior can be described by business protocols representing the possible sequences of message exchanges. Web services use access control policies (ACP) to restrict the access to authorized consumer. These policies should be a part of the service description. In this thesis, the interoperability analysis in terms of AC after the formalization of the Web services annotated with the access control (AC) is performed. In addition, we present an approach for embedding the checking tools in the AC enforcement architecture to guarantee the errors free interaction. The ACP and the credentials are presented as ontology in order to benefit from the flexibility offered by subsumption on concepts. Web services choreography is used in the design phase of complex peer-to-peer applications in which each peer can be implemented by a Web service. Therefore, selecting Web services for choreography implementation using the compatibility checking approach with access control is one of the objectives of our research. In this work, the business protocol models of the Web service are extended by adding information to the message on each transition about the service in which this message will sent to or received from. We define and verify Web service compatibility in order to see if (and how) several services can have interactions based on their protocols. This approach will help the designers to select Web services in an easy way and verify if they can implement the required choreography or not by checking the compatibly using our approach
137

”Ska vi ha sex?” : En kvalitativ studie om mottagandet av Brottsoffermyndighetens kampanj “Av fri vilja”

Nilsson, Emma, Forsberg, Amanda January 2019 (has links)
Titel: “Ska vi ha sex?” - En kvalitativ studie om mottagandet av Brottsoffermyndighetens kampanj “Av fri vilja”     Författare: Emma Nilsson & Amanda Forsberg   Kurs, termin och år: Examensarbete C-uppsats MK094G, VT19   Antal ord i uppsatsen: 14 241   Problemformulering och syfte: I juli 2018 ändrades sexualbrottslagsstiftningen i Sverige och arbetet med att implementera den så kallade “samtyckeslagen” påbörjades. Brottsoffermyndigheten har fått i uppdrag att implementera lagändringen och gör detta i form av kampanjen “Av fri vilja”. Idag kämpar olika slags organisationer med att nå fram genom det oändliga kommunikationsbruset där allt fler kanaler och budskap tävlar om människors uppmärksamhet. För att lyckas förändra människors attityder gentemot utvalda fenomen är det avgörande för organisationer att skapa budskap som går igenom bruset, fastnar hos mottagaren, blir ihågkommet och slutligen förändrar mottagarens attityd enligt sändarens önskemål. Studien undersöker hur genus påverkar mottagandet av Brottsoffermyndighetens kampanj “Av fri vilja”.   Metod och material: För att effektivt kunna besvara studiens syfte och frågeställningar har det konstruerats fokusgrupper för att undersöka attityder gentemot samtycke före och efter ett stimuli i form av Brottsoffermyndighetens kampanjfilmer “Av fri vilja”. Urvalet bestod av unga vuxna mellan 18-25 år. Deltagarna i fokusgrupperna har sedan fått ta del av en enkät som har undersökt relationen till kampanjens ambassadörer samt i vilken grad budskapet fastnar och blir ihågkommet av mottagarna.   Huvudresultat: Resultatet visade att det finns indikationer för vissa skillnader i hur män respektive kvinnor påverkas av kampanjen. Även om det finns vissa motsägelser gentemot de teoretiska resonemangen så visar resultatet i huvudsak att tidigare medvetenhet om och engagemang för samtycke kan avgöra hur kampanjen tas emot. Detta beror i stor grad på genus då de kvinnliga deltagarna har haft ett större intresse för samtycke än de manliga deltagarna.
138

Uso do padrão AMQP para transporte de mensagens entre atores remotos / Usage of the AMQP standard to transport messages among remote actors

Carmo, Thadeu de Russo e 08 May 2012 (has links)
O modelo de atores tem sido visto como uma abordagem alternativa à programação concorrente convencional, baseada em travas e variáveis de condição. Atores são agentes computacionais que se comunicam por troca de mensagens e que possuem uma caixa de correio e um comportamento. As mensagens destinadas a um ator são armazenadas na caixa de correio do ator e processadas de maneira assíncrona. Sistemas de middleware orientados a mensagens trabalham com troca assíncrona de mensagens e formam uma base que simplifica o desenvolvimento de aplicações distribuídas. Tais sistemas permitem interoperabilidade com baixo acoplamento e provêm suporte para tratamento robusto de erros em caso de falhas. Message brokers são frequentemente apresentados como uma tecnologia que pode mudar a maneira com que sistemas distribuídos são construídos. A especificação AMQP é uma proposta recente de padronização de um protocolo para message brokers. Neste trabalho exploramos a potencial sinergia entre um message broker e uma implementação do modelo de atores. Criamos uma versão modificada da implementação do modelo de atores do projeto Akka que utiliza um message broker AMQP como mecanismo de transporte de mensagens para atores remotos. / The actor model has been seen as an alternative for conventional concurrent programming based on locks and condition variables. Actors are computational agents that communicate by sending messages and have a mailbox and a behavior. The messages sent to an actor are stored in its mailbox and are asynchronously processed. Message oriented middleware systems work with asynchronous message exchange and create a base that simplifies the development of distributed applications. These systems have interoperability with low coupling and provide support for robust error handling in case of failures. Message brokers are often presented as a technology that can change the way distributed systems are built. The AMQP specification is a recent proposal of a standard protocol for message brokers. In this document we explore the potential synergy between a message broker and an implementation of the actor model. We created a modified version of the actor model implementation provided by the Akka project. Our modified implementation uses an AMQP message broker as the transport engine for messages to remote actors.
139

Reliability approaches in networked systems : Application on Unmanned Aerial Vehicles / Approches de fiabilité dans les systèmes communicants : Application aux drones

Abdallah, Rana 29 May 2019 (has links)
Les véhicules aériens sans pilote (UAVs), utilisés et développés pour la première fois dans le domaine militaire, ont connu de profonds changements ces dernières années et sont de plus en plus utilisés dans le domaine civil. Etant plus connus sous le nom des drones, ils sont le plus souvent utilisés dans les domaines civiles et militaires. Ils sont employés pour : la lutte contre les incendies, le sauvetage ainsi que dans des applications spécifiques comme la surveillance et l’attaque. Le vol en formation est de loin le plus utilisé car il permet une répartition judicieuse des tâches et améliore grandement l’efficacité des drones (principe de l’attaque en meute, des animaux carnassiers). Cela pose alors la problématique de la coordination et de la stratégie, ainsi que du type de fonctionnement (maitre/esclave,…).Le type et la qualité d’informations optimums restent aussi à définir.L'utilisation accrue de ces systèmes coopératifs dans des environnements dangereux rend leur fiabilité essentielle pour prévenir tout événement catastrophique. Une performance globale de la flotte des drones doit être garantie, malgré une possible dégradation des composants ou de toute modification du réseau et de l'environnement. Il est nécessaire de détecter les comportements anormaux pouvant contribuer aux collisions et ainsi affecter la mission. Compte tenu des performances et du coût, les systèmes à tolérance de pannes et à redondance ne représentent pas toujours la solution la plus efficace pour ce type de vol de flotte en formation. Différentes méthodes telles que l'analyse par arbre de défaillance (ADD), l'analyse des modes de défaillance, de leurs effets et de leurs criticités (AMDEC) ont été utilisées dans le monde des hélicoptères.Dans une première partie, une méthode statique basée sur l’ADD est proposée, pour assurer la fiabilité de la communication entre les drones d’un côté et entre les drones et la station de base de l’autre côté en accentuant l’échange de flux d’informations. Nous utilisons des arbres de défaillance pour représenter les différentes conditions d’erreur de ce système complexe.Dans une deuxième partie, nous analysons les différents états de défaillance des communications et leurs probabilités. Ce processus étant stochastique, une approche par chaîne de Markov absorbante est développée. L’approche proposée peut être utilisée pour trouver les scenarios les plus risqués et les éléments à prendre en compte pour améliorer la fiabilité.Enfin, dans une troisième partie, nous étudions le problème de réception des messages d’un drone en proposant un protocole basé sur le nombre de retransmissions. La réception est assurée avec une certaine probabilité de fiabilité, en fonction de plusieurs attributs tels que la modulation, le taux d’erreur des bits (BER) caractérisant les drones. / Unmanned aerial vehicles, used and developed initially in the military field, have experienced profound changes in recent years and are increasingly used in the civilian field. Recognized as drones, they are most often used in the civil and military domains. They are used for firefighting, rescue as well as in specific applications such as surveillance and attack. The formation flight is the most used because it allows a judicious distribution of the tasks and greatly improves the efficiency of the drones (principle of the attack in pack, carnivorous animals). This will raise the issue of coordination and strategy, as well as the type of operation (master /slave, ...). The type and quality of optimal information also remain to be defined.The increased use of these cooperative systems in hazardous environments makes their reliability essential to prevent any catastrophic event. Overall performance of the drone fleet should be ensured, despite possible degradation of components or any changes that occur to the network and the environment. It is necessary to detect the anomalous behaviors that might contribute to collisions and thus affect the mission. Taking into consideration performance and cost, the fault-tolerant system and redundant systems are not always the most efficient solution for the formation fleet flight. Different methods like the fault tree analysis (FTA), Failure Modes and Effects Analysis (FMEA) have been used in the helicopter field.In the first part, we propose a static method based on FTA, to ensure a successful communication between the drones from one side, and between the drones and the ground station from the other side by emphasizing on the exchange of information flows. It uses various fault trees to represent the different error conditions of this complex system.In the second part, we analyze the different fault states and their probabilities. As this process is stochastic, an absorbing Markov chain approach is developed. The proposed approach can be used to find the most risky scenarios and considerations for improving reliability.Finally, in the third part, we put the emphasis on the message receipt problem in a drone’s communication network by proposing a protocol based on number of retransmissions. The reception of a message is provided with a certain probability of reliability depending on several attributes such as modulation and bit error rate (BER) characterizing the UAVs.
140

A Planning Model for Optimizing Locations of Changeable Message Signs

Henderson, Jeffrey January 2004 (has links)
Changeable Message Signs (CMS) are commonly utilized by transportation agencies to inform motorists of traffic, roadway, and environmental conditions. They may be used to provide information, such as delay and alternate route guidance, in the event of an incident, construction or a roadway closure. The effectiveness of CMS in managing freeway traffic, however, is a function of many factors including the number of CMS installations, the location of CMS, the messages displayed, varied traffic network characteristics, and drivers' response to incident conditions and CMS information. The objective of this thesis is to develop a CMS location planning model that can be used by transportation agencies to develop a CMS location plan that could achieve the largest long-term benefit to the system. This research is mainly motivated by the lack of systematic, robust and practical methods for locating CMS. State-of-practice methods rely mostly on the practitioner's experience and judgement. Other methods fail to incorporate reasonable driver behaviour models, consider time-varying demand, allow for computational efficiency on large networks, or consider the spatial variation of incidents on a traffic network. A new CMS location optimization model has been developed that is unique in both model realism and computational efficiency. The model incorporates several components to estimate incident delay, predict driver response, estimate network-wide benefit, and choose those CMS locations that would provide the most benefit. Deterministic queuing methods are used in conjunction with historic incident characteristics to approximate the delay impact of an incident with and without CMS. A discrete choice model is used to predict the rate at which drivers would switch from the incident route to a less congested alternative under CMS information. A network traffic assignment model is then incorporated in an attempt to estimate the resulting traffic induced by incidents. Genetic algorithms are utilized as an optimization technique to choose a set of CMS that would provide the most benefit. An extensive computational analysis was performed on both a hypothetical network and a segment of Highway 401 through Toronto. A sensitivity analysis was performed to test the model's response to parameter and data estimation errors. The model was found to be most sensitive to the diversion model parameters. The model produced reasonable results with locations selected upstream of major freeway interchange diversion points. Considering the additional components included in the proposed model, and its ability to consider more location schemes, the proposed model may be considered superior to previous CMS location models.

Page generated in 0.0541 seconds