• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 189
  • 32
  • 30
  • 22
  • 16
  • 10
  • 9
  • 6
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 387
  • 387
  • 97
  • 92
  • 59
  • 55
  • 50
  • 45
  • 36
  • 34
  • 33
  • 33
  • 31
  • 29
  • 27
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
221

Procedure for the Study of Insect Structures

Wilber, Ryan Scott 24 October 2019 (has links)
No description available.
222

Automated Vehicle Electronic Control Unit (ECU) Sensor Location Using Feature-Vector Based Comparisons

Buthker, Gregory S. 24 May 2019 (has links)
No description available.
223

Reverse Engineering of 3-D Point Cloud into NURBS Geometry

Joshi, Shriyanka 04 November 2020 (has links)
No description available.
224

An Overview of Reverse Engineering and A Security Analysis of TikTok

Sengelmann, Michael January 2020 (has links)
No description available.
225

Assessing Code Decay by Detecting Software Architecture Violations

Bandi, Ajay 13 December 2014 (has links)
Code decay is a gradual process that negatively impacts the quality of a software system. Developers need trusted measurement techniques to evaluate whether their systems have decayed. This dissertation aims to assess code decay by discovering software architectural violations. Our methodology uses Lightweight Sanity Check for Implemented Architectures to derive architectural constraints represented by can-use and cannot-use phrases. Our methodology also uses Lattix to discover architectural violations. We also introduce measures that indicate code decay in a software system. We conducted two case studies of proprietary systems (9 versions of System A and 14 versions of System B) to demonstrate our methodology for assessing code decay. Resulting architectural constraints and architectural violations were validated by the expert of each system. Our results show that the net violations of System A increased from one version to other version even though there were architecture changes. However, in System B, the number of net violations decreased after changes in the architecture. The proposed code decay metrics can give managers insight into the process of software development, the history of the software product, and the status of unresolved violations. Our results and qualitative analysis showed that the methodology was effective and required a practical level of effort for moderate sized software systems. Code decay values increase because of an increase in the number of violations over multiple versions. We compared our code decay measures with definitions in the literature, namely coupling metrics. In addition, our empirical results showed that coupling is qualitatively correlated with the size of a system as expected. We note that coupling is an opportunity for architectural violations. We concluded that coupling is not consistently related to violations.
226

ARTIFICIAL MATERIAL 3D PRINTED TEACHING TOOLS FOR CARDIAC SURGICAL SKILLS TRAINING

Bubshait, Hamad January 2021 (has links)
PhD Thesis / Cardiac surgeons rely on simulation training to improve their surgical skills. The focus of this research was on creating a 3D aortic valve model for cardiac surgical skills training. The research was divided into four different stages including CAD model development, tissue testing using surgical tools, aortic valve model manufacturing and model evaluation. First, the development of a patient-specific aortic valve model was carried out. The process involved heavily processing CT scanned data of the aortic valve to extract the geometric information via segmentation. Patient-specific models are critical for pre-operative planning and training. However, those models are not ideal for large volume quantities due to the high production costs and the extensive manual labour required to process the models. Therefore, another approach was chosen to produce a generic model that was more suitable for large volume quantities. The generic aortic valve model was developed using data obtained from the literature. The contribution in this stage was developing the methodology to reverse engineer patient-specific cardiac tissues. Additionally, a generic CAD model of the aortic valve was developed. Second, to select suitable materials for the model, samples from biological tissues and polymers were tested using a surgical tool. The contribution in this stage was documenting the forces and displacements obtained from puncturing and cutting the samples using suturing needles and scalpel blades. Third, the aortic valve model was manufactured using two approaches including AM and casting. The contribution in this stage revolved around the development of several moulds for casting. Finally, evaluation of the model was done via an initial assessment session with surgical residents. Although the model was not evaluated in extensive training sessions, a plan highlighting the important elements to do that was included in this research. Thus, the contribution in this stage was developing the model testing plan. / Thesis / Doctor of Philosophy (PhD) / Typically, surgeons use post-mortem human tissues (cadavers) and animal tissues for surgical skills training. However, those methods can be both expensive and limited in availability. Therefore, other non-biological methods are introduced constantly to provide viable alternatives. Those methods include producing models using 3D printing, virtual reality (VR) simulation and even using household items to create training models. However, to date, there is a lack of highly accurate representation of real tissues (fidelity) of most models for cardiac surgical training. The purpose of this research was to develop and manufacture surgical skill training tools for cardiac surgeons focusing on the aortic valve cardiac tissues. The research was divided into several parts including developing computer models using patient-specific medical imaging, developing a general training model and training models manufacturing. Also, the research included manufacturing materials selection process as well as plans for testing the training models in training sessions.
227

A Security Study for Non-Internet Connected Managed Software

Galassi De Orchi, Tommaso January 2012 (has links)
This master thesis project aims to improve the security of managed software developed at SCANIA's research and development group NEVE. The thesis will present several security schemes that can be effective against tampering, theft, and reverse engineering of application. The schemes presented were selected to ensure confidentiality, integrity, authenticity, and authentication of applications. NEVE’s software will be analyzed and compared against state of the art solutions. A theoretical threat analysis will be presented, corroborated by empirical reverse engineering attacks. The final part of this thesis introduces a new security scheme for C# .NET programs operating without requiring an internet connection. / Denna uppsats försöker förbättra säkerheten av [managed software] utvecklad hos SCANIAS forsknings- och utvecklingsgrupp NEVE. Den visar på flera säkerhetslösningar som kan vara effektiva mot manipulation, stöld och omvänd ingenjörskonst av applikationer. De säkerhetslösningar som presenteras valdes för att säkerställa sekretess, integritet, äkthet och autentisering hos applikationer. NEVEs mjukvara kommer att analyseras och ställs mot de allra senaste lösningarna. En teoretisk hotanalys kommer att presenteras, förstärkt med attacker baserat empiriskt omvänd ingenjörskonst. Den sista delen av denna uppsats introducerar en ny säkerhetslösning. Den riktar sig mot program skrivna i C# .NET som inte kräver en uppkoppling mot internet.
228

Wheel Loader Rear Axle Mounting for Weld Deformations : Exploration and Evaluation of Alternative Mounting Methods

Forsberg, Frans January 2023 (has links)
Welded structures susceptible to weld deformations require sequent processing to allow for mounting of precision components. This thesis includes a case study of the rear axle mount on a Volvo L220 wheel loader. A product development process was deployed in order to explore and evaluate alternative mounting methods such that manufacturing cost due to sequent processing could be decreased. Analysis of the frame variations showed any new concepts has to accommodate variations of up to $\delta z=-1.24\pm3.5$ mm. The product development process found two potential concept philosophies; transferring concepts which improves upon the current concept by transferring the processing away from the frame onto smaller components that are cheaper to process, and absorbing concepts that avoids sequent processing by absorbing the frame variations altogether. The transferring concept "Custom Plate" was selected for further development. The concept is based on the principals of reverse engineering by manufacturing a custom plate from a 3D surface map of the deformed mounting surface, placed between the frame and rear axle bridge, matching the surface geometry of both entities. The concept showed no apparent critical strength issues when simulated in CATIA V5. However, the economical gain of the concept is slim and depends heavily what spaces can be allocated for additional processing machinery. Suggestions for further development of the concept are given along with a discussion of improvements outside of the system boundary of the project, such as simulation of welds and welding sequence, and collection, storing, analysis, and visualisation of data.
229

APEX-ICS: Automated Protocol Exploration And Fuzzing For Closed Source ICS Protocols

Parvin Kumar (15354694) 28 April 2023 (has links)
<p>A closed-source ICS communication is a fundamental component of supervisory software and PLCs operating critical infrastructure or configuring devices. As this is a vital communication, a compromised protocol can allow attackers to take over the entire critical infrastructure network and maliciously manipulate field device values. Thus, it is crucial to conduct security assessments of these closed-source protocol communications before deploy?ing them in a production environment to ensure the safety of critical infrastructure. However, Fuzzing closed-source communication without understanding the protocol structure or state is ineffective, making testing such closed-source communications a challenging task. </p> <p><br></p> <p>This research study introduces the APEX-ICS framework, which consists of two significant components: Automatic closed-source ICS protocol reverse-engineering and stateful black-box fuzzing. The former aims to reverse-engineer the protocol communication, which is critical to effectively performing the fuzzing technique. The latter component leverages the generated grammar to detect vulnerabilities in communication between supervisory software and PLCs. The framework prototype was implemented using the Codesys v3.0 closed-source protocol communication to conduct reverse engineering and fuzzing and successfully identified 4 previously unknown vulnerabilities, which were found to impact more than 400 manufacturer’s devices. </p>
230

APEX-ICS: Automated Protocol Exploration and Fuzzing For Closed-Source ICS Protocols

Parvin Kumar (15354694) 28 April 2023 (has links)
<p> A closed-source ICS communication is a fundamental component of supervisory software and PLCs operating critical infrastructure or configuring devices. As this is a vital communication, a compromised protocol can allow attackers to take over the entire critical infrastructure network and maliciously manipulate field device values. Thus, it is crucial to conduct security assessments of these closed-source protocol communications before deploying them in a production environment to ensure the safety of critical infrastructure. However, Fuzzing closed-source communication without understanding the protocol structure or state is ineffective, making testing such closed-source communications a challenging task.</p> <p><br> This research study introduces the APEX-ICS framework, which consists of two significant components: Automatic closed-source ICS protocol reverse-engineering and stateful black-box fuzzing. The former aims to reverse-engineer the protocol communication, which is critical to effectively performing the fuzzing technique. The latter component leverages the generated grammar to detect vulnerabilities in communication between supervisory software and PLCs. The framework prototype was implemented using the Codesys v3.0 closed-source protocol communication to conduct reverse engineering and fuzzing and successfully identified 4 previously unknown vulnerabilities, which were found to impact more than 400 manufacturer’s devices. </p>

Page generated in 0.0697 seconds