• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 9
  • 4
  • 4
  • 4
  • 3
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 67
  • 29
  • 11
  • 11
  • 9
  • 7
  • 6
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Propagation non-linéaire de paquets d'onde. / Nonlinear propagation of wave packets.

Hari, Lysianne 25 September 2014 (has links)
Les résultats présentés dans cette thèse concernent l'étude, dans la limite semi-classique, de systèmes d'équations de Schrödinger non-linéaires couplées. Selon le potentiel considéré, le système peut, ou non, présenterun couplage linéaire, en plus de celui induit par le terme non-linéaire. Dans ce manuscrit, c'est la propagation d'états cohérents -états localisés dans l'espace des phases, et que l'on va faire vivre dans un niveau d'énergie donné - qui va nous intéresser.Dans le cadre linéaire, plusieurs situations ont été étudiées, certaines préservant l'adiabaticité,et d'autres la brisant, faisant apparaître des transitions entre les niveaux d'énergie.Le rôle de la non-linéarité et l'interaction de ses effets avec un éventuel couplage linéaire sur ces phénomènes est une questionimportante pour comprendre des systèmes qui entrent en jeu dans des problèmes très actuels en physique quantique.Dans un premier temps, le potentiel pris en compte aura des valeurs propres bien séparées par un trou spectral,et nous montrerons un théorème adiabatique pour une non-linéarité qui présente un exposant critique pour le paramètre semi-classique devant la non-linéarité. Un point de vue équivalent est de considérer des données petites de l'ordre d'une puissance positive du paramètre semi-classique.Il s'agit d'un résultat analogue à celui de Carles et Fermanian-Kammerer mais dans un cadre sur-critique L^2.Dans un deuxième temps, nous considèrerons, pour le cas unidimensionnel, un potentiel explicite de taille 2 X 2,qui présente un croisement évité :les deux valeurs propres sont séparées par un paramètre delta - paramètre adiabatique -qui va tendre vers zéro lorsque le paramètre semi-classique va tendre vers zéro. Nous montrerons alors que des transitions entre les modes ont lieu.Il s'agit ici d'une version non-linéaire des travaux d'Hagedorn et Joyeoù une telle transition est démontrée pour des systèmes linéaires. / This thesis is devoted to the study of coupled nonlinear Schrödinger equations in the semi-classical limit.Depending on the potential we consider, the system can present a linear coupling, in addition to the nonlinear one.We will focus on the propagation of coherent states that will be polarized along a given eigenvector of the potential.In the linear setting, several situations have been analyzed; some of them lead to adiabatic theorems whereas the others implytransitions between energy levels. When one adds a nonlinearity, understanding nonlinear effects onthe propagation and the competition between them and the linear coupling becomes a very interesting issue.We first consider a potential with eigenvalues that present a spectral gap and will prove an adiabatic theoremfor a critical nonlinearity in the semi-classical sense. This is a L^2-supercritical result,similar to the one proved by Carles and Fermanian-Kammerer for the one-dimensional case, which is L^2-subcritical.The second part of the thesis deals with an explicit 2 X 2 potential that presents an avoided crossing point :the minimal gap between its eigenvalues becomes smaller as the semiclassical parameter tends to zero. We will prove that this system exhibits transitions between the modes. This result is a nonlinear version of the study performed by Hagedorn and Joye in the linear case.
52

Uma arquitetura hierárquica baseada em sistema de arquivos para monitoramento de pacotes de rede no sistema operacional GNU/Linux / A hierarchical architecture based on the file system for monitoring network packets on GNU / Linuxoperating system

Beraldo Costa Leal 14 October 2013 (has links)
Capturar e analisar pacotes de dados que trafegam pelas redes são tarefas essenciais para os administradores de redes. Estas tarefas ajudam na detecção de anomalias nos sistemas e na verificação do estado atual da rede. Existem várias aplicações que desempenham este papel para o sistema operacional GNU/Linux. Estes programas também exportam informações para os usuários e outras aplicações de várias maneiras. Entretanto, não exportam estas informações de forma hierárquica. Esta pesquisa propõe uma arquitetura alternativa aos sistemas atuais. Nossa arquitetura exporta pacotes de dados em uma estrutura hierárquica de arquivos e diretórios. Além disso, por se tratar de uma arquitetura modular, filtros adicionais, desenvolvidos por terceiros, podem ser adicionados ao sistema. A arquitetura proposta acompanha uma implementação de referência: o sistema de arquivos virtuais netsfs (Network Statistics File System), que funciona em espaço de núcleo (kernel space). A arquitetura e o sistema de arquivos netsfs, propostos nesta pesquisa, apresentam um método alternativo para exibir os pacotes de redes. Os resultados mostraram uma aparente melhoria no que diz respeito à vazão da rede. / Capturing and analyzing data packets flowing across networks are essential tasks for network administrators. These tasks help to detect anomalies in the systems and check the current status of a network. There are software applications for the GNU/Linux operating system which perform such tasks. These tools also export their information to users and other applications in different ways. However, current systems do not export this information in a hierarchical manner. This research introduces an alternative architecture to current systems. Our architecture exports data packets in a hierarchical structure of directories and files. Furthermore, since this is a modular architecture, additional third-party filters can be developed and loaded into the system. The proposed architecture comes with a reference implementation: the pseudo file system netsfs (Network Statistics File System), in kernel space. The architecture and the pseudo file system netsfs, developed in this research, introduce an alternative method to display data packets. Results show an apparent improvement regarding network throughput
53

Návrh a implementace síťového kolektoru / Design and implementation of network collector

Bošeľa, Jaroslav January 2020 (has links)
This master’s thesis deals with description of information protocol of network flow, mainly definition of Cisco NetFlow version 9. Describes it’s features, message format and attributes of transmitted data. The thesis is primarly focused onto NetFlow v9 transmitted template, which defines fileds and data in consecutive data flow. The essence of the thesis consists in implementation of simple NetFlow v9 parser, which has been programmed in Python prog.language, it’s tests of captured UDP data from file and port capture testing on development server in lab. There is a possibility of saving captured and parsed data into prepared database within implementation as output from capturing.
54

Intrusion Detection systems : A comparison in configuration and implementation between OSSEC and Snort

Stegeby, Peter January 2023 (has links)
Hackare fortsätter att bli bättre på att få otillåten tillgång till våra datorer och kan undvika de mest grundläggande intrångsskyddade system och brandväggar på en standarddator. Då numren av intrång växer varje år och kostar företag miljoner av dollar, så verkar gapet mellan attackerare och försvarare att bli större. Frågan som då kan uppstå är, hur kan vi skydda oss själva? Kunskapen som blivit insamlad i detta arbete pekar tydligt på att det finns saker vi kan göra vilket svarar på frågan, hur kan vi upptäcka intrång? Studien visar att mer avancerade Intrusion Detection System (IDS) kan bli implementerad på hemdatorer (och i företag). Det finns många alternativ att välja mellan, men de valda IDSer – OSSEC och Snort – kan upptäcka säkerhetsbrister på enskilda host-maskiner (eller på nätverket) i realtid tack vare avancerad loggningshanterings och övervakning. Svårighetsgraden av att använda och implementera dessa IDSer var utmanande men tillfredställande och konfigurationen var flexibel vilket tillåter IDSerna att bli installerade på en ensam host-dator eller i ett nätverk. Om ett enkelt-att-följa grafiskt översikt av felmeddelanden är vad man önskar så har OSSEC IDS, tillsammans med att skicka e-mail över felmeddelandet, den funktionaliteten. Snort, på andra sidan, har en enkel konfiguration och flexibilitet i att skriva regler. Det borde framgå tydligt att implementera en IDS på ert system inte gör det ogenomträngligt, inte heller löser det alla säkerhetsrelaterade problem, men det som kommer att hända är att vi får en bättre förståelse av de hot som uppstår i våra system. / Hackers keeps getting better at gaining unauthorized access to our computers and can avoid some of the most basic intrusion detection systems and firewalls on a standard computer. The gap between attackers and defenders seem to grow as intrusions increase in numbers every year, costing companies millions of dollars, so the question is posed, how can we protect ourselves? The research done in this work clearly points to that there are things that can be done which answers the question, how can we detect intrusions? The study has shown that a more advanced intrusion detection system (IDS) can be implemented on home computers (and in businesses). There are many options to choose from but the chosen IDSs – OSSEC and Snort – can detect security issues on the host computer (or on the network) in real-time by advanced logging management and monitoring. The implementation and usage difficulties of these IDSs are challenging but satisfying and the configurations are flexible allowing the IDSs to be installed on a single host or in a larger network. If an easy-to-follow graphical overview of the alerts on your system is what you are looking for then that, and sending e-mails of the alert, is found in the OSSEC IDS. Snort, on the other hand, has easy configurations and flexible rule-writing and the options of sniffing packets on the network. It should be clear that implementing an IDS on your system does not make it impenetrable nor solve all the security issues but what it will do is to give you a better understanding of the threats on your system.
55

Performance Modelling of GPRS with Bursty Multi-class Traffic.

Kouvatsos, Demetres D., Awan, Irfan U., Al-Begain, Khalid January 2003 (has links)
No / An analytic framework is devised, based on the principle of maximum entropy (ME), for the performance modelling and evaluation of a wireless GSM/GPRS cell supporting bursty multiple class traffic of voice calls and data packets under complete partitioning (CPS), partial sharing (PSS) and aggregate sharing (ASS) traffic handling schemes. Three distinct open queueing network models (QNMS) under CPS, PSS and ASS, respectively, are described, subject to external compound Poisson traffic processes and generalised exponential (GE) transmission times under a repetitive service blocking mechanism and a complete buffer sharing management rule. Each QNM generally consists of three building block stations, namely a loss system with GSM/GPRS traffic and a system of access and transfer finite capacity queues in tandem dealing with GPRS traffic under head-of-line and discriminatory processor sharing scheduling disciplines, respectively. The analytic methodology is illustrated by focusing on the performance study of the GE-type tandem queueing system for GPRS under a CPS. An ME product-form approximation is characterised leading into a decomposition of the tandem system into individual queues and closed-form ME expressions for state and blocking probabilities are presented. Typical numerical examples are included to validate the ME solutions against simulation and study the effect of external GPRS bursty traffic upon the performance of the cell. Moreover, an overview of recent extensions of the work towards the analysis of a GE-type multiple server finite capacity queue with preemptive resume priorities and its implications towards the performance modelling and evaluation of GSM/GPRS cells with PSS and ASS are included. / ,
56

Pcapng Analysator : Utveckling av Pcapng analysator med inriktning på skräddarsydda nätverkspaket / Pcapng Analyzer : Development of a Pcapng analyzer with focus on custom network packets

Larsson, Magnus January 2024 (has links)
I ett modernt industrisammanhang spelar kommunikation mellan inbyggda komponenter en viktig roll. Svetsmaskins företaget ESAB (Elektriska Svetsar AB) producerar och utvecklar svetsmaskiner med ett flertal olika inbyggda komponenter som kommunicerar sinsemellan för att konfigurera operationen för svetsning. Inom ramen för projektet på ESAB analyseras nätverkspaketen som skickas inom svetsmaskiner och som hämtas ut med hjälp av Wireshark. Nätverkspaketen används för systemkommunikations analys och hämtas ut i Pcapng-filformatet. Pcapng-filernagranskats manuellt med hjälp av Wireshark och deras skräddarsydda plugin, vilket kräver att varje paket inspekteras för att identifiera innehåll och potentiella felmeddelanden. Pcapng Analysatorn är ett program för att automatisera denna process och framhäva enbart de meddelanden och data som är av relevans för företaget. Denna rapport fokuserar på tekniker för manipulering och hantering av Pcapng-filer, samt metoder för extrahering av felmeddelanden från specialanpassade Pcapng-filer. Projektet representerar ett viktigt steg mot att effektivisera analysen av Pcapng-filer och att förse ESAB med en mer automatiserad och produktiv lösning för dataanalys inom sina verksamheter. / In a modern industrial context, communication between embedded components plays a crucial role. The welding machine company ESAB (Electric Welders AB) produces and develops welding machines with various embedded components that communicate with each other to configure the welding operation. Within the framework of the project at ESAB, network packets sent within welding machines are analysed and retrieved using Wireshark. These network packets are used for system communication analysis and extracted in Pcapng file format. The Pcapng files have been manually reviewed using Wireshark and a custom-built plugin, requiring each packet to be inspected to identify content and potential error messages. The Pcapng Analyzer is a program designed to automate this process and highlight only the messages and data relevant to the company. This report focuses on techniques for manipulating and managing Pcapng files, as well as methods for extracting error messages from customized Pcapng files. The project represents a significant step towards streamlining the analysis of Pcapng files and providing ESAB with a more automated and productive solution for data analysis in its operations.
57

Mathematical modelling of nonlinear internal waves in a rotating fluid

Alias, Azwani B. January 2014 (has links)
Large amplitude internal solitary waves in the coastal ocean are commonly modelled with the Korteweg-de Vries (KdV) equation or a closely related evolution equation. The characteristic feature of these models is the solitary wave solution, and it is well documented that these provide the basic paradigm for the interpretation of oceanic observations. However, often internal waves in the ocean survive for several inertial periods, and in that case, the KdV equation is supplemented with a linear non-local term representing the effects of background rotation, commonly called the Ostrovsky equation. This equation does not support solitary wave solutions, and instead a solitary-like initial condition collapses due to radiation of inertia-gravity waves, with instead the long-time outcome typically being an unsteady nonlinear wave packet. The KdV equation and the Ostrovsky equation are formulated on the assumption that only a single vertical mode is used. In this thesis we consider the situation when two vertical modes are used, due to a near-resonance between their respective linear long wave phase speeds. This phenomenon can be described by a pair of coupled Ostrovsky equations, which is derived asymptotically from the full set of Euler equations and solved numerically using a pseudo-spectral method. The derivation of a system of coupled Ostrovsky equations is an important extension of coupled KdV equations on the one hand, and a single Ostrovsky equation on the other hand. The analytic structure and dynamical behaviour of the system have been elucidated in two main cases. The first case is when there is no background shear flow, while the second case is when the background state contains current shear, and both cases lead to new solution types with rich dynamical behaviour. We demonstrate that solitary-like initial conditions typically collapse into two unsteady nonlinear wave packets, propagating with distinct speeds corresponding to the extremum value in the group velocities. However, a background shear flow allows for several types of dynamical behaviour, supporting both unsteady and steady nonlinear wave packets, propagating with the speeds which can be predicted from the linear dispersion relation. In addition, in some cases secondary wave packets are formed associated with certain resonances which also can be identified from the linear dispersion relation. Finally, as a by-product of this study it was shown that a background shear flow can lead to the anomalous version of the single Ostrovsky equation, which supports a steady wave packet.
58

Coupled Boussinesq equations and nonlinear waves in layered waveguides

Moore, Kieron R. January 2013 (has links)
There exists substantial applications motivating the study of nonlinear longitudinal wave propagation in layered (or laminated) elastic waveguides, in particular within areas related to non-destructive testing, where there is a demand to understand, reinforce, and improve deformation properties of such structures. It has been shown [76] that long longitudinal waves in such structures can be accurately modelled by coupled regularised Boussinesq (cRB) equations, provided the bonding between layers is sufficiently soft. The work in this thesis firstly examines the initial-value problem (IVP) for the system of cRB equations in [76] on the infinite line, for localised or sufficiently rapidly decaying initial conditions. Using asymptotic multiple-scales expansions, a nonsecular weakly nonlinear solution of the IVP is constructed, up to the accuracy of the problem formulation. The asymptotic theory is supported with numerical simulations of the cRB equations. The weakly nonlinear solution for the equivalent IVP for a single regularised Boussinesq equation is then constructed; constituting an extension of the classical d'Alembert's formula for the leading order wave equation. The initial conditions are also extended to allow one to separately specify an O(1) and O(ε) part. Large classes of solutions are derived and several particular examples are explicitly analysed with numerical simulations. The weakly nonlinear solution is then improved by considering the IVP for a single regularised Boussinesq-type equation, in order to further develop the higher order terms in the solution. More specifically, it enables one to now correctly specify the higher order term's time dependence. Numerical simulations of the IVP are compared with several examples to justify the improvement of the solution. Finally an asymptotic procedure is developed to describe the class of radiating solitary wave solutions which exist as solutions to cRB equations under particular regimes of the parameters. The validity of the analytical solution is examined with numerical simulations of the cRB equations. Numerical simulations throughout this work are derived and implemented via developments of several finite difference schemes and pseudo-spectral methods, explained in detail in the appendices.
59

Optimalizované sledování paprsku / Optimized Ray Tracing

Brich, Radek Unknown Date (has links)
Goal of this work is to write an optimized program for visualization of 3D scenes using ray tracing method. First, the theory of ray tracing together with particular techniques are presented. Next part focuses on different approaches to accelerate the algorithm. These are space partitioning structures, fast ray-triangle intersection technique and possibilities to parallelize the whole ray tracing method. A standalone chapter addresses the design and implementation of the ray tracing program.
60

Αναγνώριση ομιλητή / Speaker recognition

Ganchev, Todor 25 June 2007 (has links)
Η παρούσα διατριβή πραγματεύεται την αναγνώριση ομιλητή σε πραγματικές συνθήκες. Τα κύρια σημεία της εργασίας είναι: (1) αξιολόγηση διαφόρων προσεγγίσεων εξαγωγής χαρακτηριστικών παραμέτρων ομιλίας, (2) μείωση της ισχύος της περιβαλλοντικής επίδρασης στην απόδοση της αναγνώρισης ομιλητή, και (3) μελέτη τεχνικών κατηγοριοποίησης, εναλλακτικών προς τις υπάρχουσες. Συγκεκριμένα, στο (1), προτείνεται μια νέα δομή εξαγωγής παραμέτρων ομιλίας βασισμένη σε πακέτα κυματομορφών, κατάλληλα σχεδιασμένη για αναγνώριση ομιλητή. Εξάγεται με ένα αντικειμενικό τρόπο σε σχέση με την απόδοση αναγνώρισης ομιλητή, σε αντίθεση με την MFCC προσέγγιση, που βασίζεται στην προσέγγιση της αντίληψης της ανθρώπινης ακοής. Έπειτα, στο (2), δίνεται μια δομή για την εξαγωγή παραμέτρων βασισμένη στα MFCC, ανεκτική στο θόρυβο, για την βελτίωση της απόδοσης της αναγνώρισης ομιλητή σε πραγματικό περιβάλλον. Συνοπτικά, μια τεχνική μείωσης του θορύβου βασισμένη σε μοντέλο προσαρμοσμένη στο πρόβλημα της επιβεβαίωσης ομιλητή ενσωματώνεται απευθείας στη δομή υπολογισμού των MFCC. Αυτή η προσέγγιση επέδειξε σημαντικό πλεονέκτημα σε πραγματικό και ταχέως μεταβαλλόμενο περιβάλλον. Τέλος, στο (3), εισάγονται δύο νέοι κατηγοριοποιητές που αναφέρονται ως Locally Recurrent Probabilistic Neural Network (LR PNN), και Generalized Locally Recurrent Probabilistic Neural Network (GLR PNN). Είναι υβρίδια μεταξύ των Recurrent Neural Network (RNN) και Probabilistic Neural Network (PNN) και συνδυάζουν τα πλεονεκτήματα των γεννετικών και διαφορικών προσσεγγίσεων κατηγοριοποίησης. Επιπλέον, τα νέα αυτά νευρωνικά δίκτυα είναι ευαίσθητα σε παροδικές και ειδικές συσχετίσεις μεταξύ διαδοχικών εισόδων, και έτσι, είναι κατάλληλα για να αξιοποιήσουν την συσχέτιση παραμέτρων ομιλίας μεταξύ πλαισίων ομιλίας. Κατά την εξαγωγή των πειραμάτων, διαφάνηκε ότι οι αρχιτεκτονικές LR PNN και GLR PNN παρέχουν καλύτερη απόδοση, σε σχέση με τα αυθεντικά PNN. / This dissertation dials with speaker recognition in real-world conditions. The main accent falls on: (1) evaluation of various speech feature extraction approaches, (2) reduction of the impact of environmental interferences on the speaker recognition performance, and (3) studying alternative to the present state-of-the-art classification techniques. Specifically, within (1), a novel wavelet packet-based speech features extraction scheme fine-tuned for speaker recognition is proposed. It is derived in an objective manner with respect to the speaker recognition performance, in contrast to the state-of-the-art MFCC scheme, which is based on approximation of human auditory perception. Next, within (2), an advanced noise-robust feature extraction scheme based on MFCC is offered for improving the speaker recognition performance in real-world environments. In brief, a model-based noise reduction technique adapted for the specifics of the speaker verification task is incorporated directly into the MFCC computation scheme. This approach demonstrated significant advantage in real-world fast-varying environments. Finally, within (3), two novel classifiers referred to as Locally Recurrent Probabilistic Neural Network (LR PNN), and Generalized Locally Recurrent Probabilistic Neural Network (GLR PNN) are introduced. They are hybrids between Recurrent Neural Network (RNN) and Probabilistic Neural Network (PNN) and combine the virtues of the generative and discriminative classification approaches. Moreover, these novel neural networks are sensitive to temporal and special correlations among consecutive inputs, and therefore, are capable to exploit the inter-frame correlations among speech features derived for successive speech frames. In the experimentations, it was demonstrated that the LR PNN and GLR PNN architectures provide benefit in terms of performance, when compared to the original PNN.

Page generated in 0.0908 seconds