• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 24
  • 5
  • 5
  • 5
  • 3
  • Tagged with
  • 57
  • 11
  • 10
  • 10
  • 8
  • 7
  • 7
  • 7
  • 7
  • 7
  • 6
  • 6
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

An analysis of alternative methods of nonmarket valuation : applications to whitewater recreation /

Bregenzer, Neil S. January 1987 (has links)
Thesis (M.S.)--Oregon State University, 1987. / Typescript (photocopy). Includes bibliographical references (leaves 131-140). Also available on the World Wide Web.
2

The Effects of Viscous Damping on Rogue Wave Formation and Permanent Downshift in the Nonlinear Schrödinger Equation

Smith, Evelyn 01 January 2022 (has links) (PDF)
This thesis investigates the effect of viscous damping on rogue wave formation and permanent downshift using the higher-order nonlinear Schrödinger equation (HONLS). The strength of viscous damping is varied and compared to experiments with only linear damped HONLS. Stability analysis of the linear damped HONLS equation shows that instability stabilizes over time. This analysis also provides an instability criterion in the case of HONLS with viscous damping. Numerical experiments are conducted in the two unstable mode regime using perturbations of the Stokes wave as initial data. With only linear damping permanent downshift is not observed and rogue wave formation is decreased. The addition of viscous damping leads to permanent downshift and a slight increase in rogue wave activity. Analysis of the energy and momentum gives a possible explanation for this behavior.
3

Rogue wave potentials occurring in the sine-Gordon equation

White, Robert Edward January 2020 (has links)
In this thesis we construct rogue waves occurring in the sine-Gordon equation. An algebraic method is used to find explicit solutions to a Lax pair of equations. The Lax pair being studied is compatible with solutions to the sine-Gordon equation. Rotational and librational traveling wave solutions to the sine-Gordon equation are considered in the Lax pair. The Darboux transformation is applied with the Lax pair solutions computed at the rotational and librational waves to generate algebraic solitons and rogue waves, respectively. The rogue waves occur on the end points of the Floquet-Lax spectrum bands and can achieve a magnification factor of at most 3. / Thesis / Master of Science (MSc)
4

Kinematics measurements of regular, irregular, and rogue waves by PIV/LDV

Choi, Hae-Jin 25 April 2007 (has links)
A comprehensive experimental study was conducted to produce benchmark wave kinematics data for five different regular waves and the maxima of four different irregular wave trains. Two of the irregular waves generated are in the category of rogue waves. A series of experiments were conducted in a 2-D wave tank at Texas A&M University to measure wave velocities and accelerations using LDV and PIV systems. The wave crests of regular and rogue waves are the focus of this study. With the measured wave velocity field, the wave accelerations were computed using a centered finite difference scheme. Both local and convective components of the total accelerations are obtained from experimental data. Also, the nonlinear wave forces on a truncated slender cylinder are computed by applying the obtained wave kinematics to the Morison equation. The force results based on measured wave kinematics are compared with those based on the kinematics of linear extrapolation, Wheeler stretching, and modified stretching. The Wheeler stretching method generally underestimates the actual wave kinematics. The linear extrapolation method is very sensitive to the cutoff frequency of the wave spectrum. The modified stretching method tends to predict the maximum value of wave kinematics above the still water level (SWL) well except for the convective acceleration. The magnitude of convective acceleration in the regular waves was negligibly small, whereas the magnitudes of horizontal and vertical convective accelerations in the rogue wave were increased rapidly above the SWL.
5

Phishing on Open WLANs: Threat and Preventive Measure

Khanna, Isha 10 January 2010 (has links)
Phishing is an internet security issue whose shape is still changing and size is still increasing. This thesis shows the possibility of a phishing attack on open, private Wireless LANs. Private WLANs which use a login page to authenticate users in hotels, airports and academic campuses are all vulnerable to this attack. Virginia Tech's WLAN is used as an example to show that the attack is possible. The attack combines two very well known attacks: one is to deceptively guide a user into logging into a fake website, which shows similar log-in page to the page of the website the user intends to go to, and the second attack is to show users a valid certificate, which does not show a warning. The rogue server takes the user to a log-in page which is similar to Virginia Tech's log-in page and shows him a valid security certificate. We present a solution to the proposed problem. Software is implemented that runs on Windows Vista. The software warns the user if there are servers with more than one type of security certificates, claiming to be from the same network. We contrast our method to already existing methods, and show in what respects our solution is better. The biggest advantage of this method is that it involves no change on the server side. It is not necessary for the users to have any prior knowledge of the network, which is very helpful when the users access WLAN at airports and hotels. Also, when using this method, the user does not need to connect to any network, and is still able to get a warning. It however, requires the user to be able to differentiate between the real and fake networks after the user has been warned. / Master of Science
6

A Recording, Performance Guide, and Composer Interviews: Six New Original Works for Trios Involving Saxophone, Commissioned for the Rogue Trio and Lotus

January 2018 (has links)
abstract: This project includes a recording, composer biographies, performance guides, and composer questionnaires for seven original works commissioned for either the Rogue Trio or Lotus. The members of the Rogue Trio are violinist Kathleen Strahm, saxophonist Justin Rollefson, and pianist Mary Cota. Lotus’s members include Samuel Detweiler, Justin Rollefson, and Kristen Zelenak on saxophone. Both ensembles are based in Tempe, Arizona. All seven original compositions were recorded at Tempest Recording in February of 2018. The first piece, Four Impersonations (2016), was commissioned by the Rogue Trio and written by Theo Chandler (b.1992) for violin, soprano saxophone and piano. The second piece was written by Spencer Arias (b. 1990) titled He Said There Was No Sound (2015) for violin, alto saxophone, and piano. The final work is titled Cabinet Meeting (2017), composed by Zachary Green (b. 1993) for violin, alto and tenor saxophone, and piano. The first piece commissioned by Lotus and composed by Spencer Arias is titled As I escape, the water calms (2017) for soprano saxophone, alto saxophone, and tenor saxophone. The second piece was composed by Graham Cohen (b. 1999), titled Introduction and Toccata (2017), written for soprano, alto, and baritone saxophones. The third piece, titled Everything that rises, was written by David “Clay” Mettens (b. 1990) in 2014 for three soprano saxophones. Samuel Detweiler, Justin Rollefson and Tyler Flowers originally commissioned this piece. The final piece commissioned by Lotus was written by Matthew Kennedy (b. 1987) titled Triceratops: tasty grooves for saxophone trio (2017) for alto, tenor, and baritone saxophones. / Dissertation/Thesis / Four Impersonations, Movement I: An outwardly-confident adolescent demanding recognition - Theo Chandler / Four Impersonations, Movement II: A grumpy hermit ignoring the attention of a suitor - Theo Chandler / Four Impersonations, Movement III: A skinny, shy boy standing in the rain - Theo Chandler / Four Impersonations, Movement IV: Subordinates mocking an authority figure - Theo Chandler / He Said There Was No Sound - Spencer Arias / Cabinet Meeting, Movement I: Introduction - Zachary Green / Cabinet Meeting, Movement II: Jared Kushner, mysterious robot - Zachary Green / Cabinet Meeting, Movement III: Secretary of State Rex Tillerson, lonesome cowboy - Zachary Green / Cabinet Meeting, Movement IV: Anthony "The Mooch" Scaramucci, in candid conversation with the New Yorker - Zachary Green / Cabinet Meeting, Movement V: Betsy DeVos Secretary of Education - Zachary Green / Cabinet Meeting, Movement VI: Ben Carson Secretary of Housing and Urban Development - Zachary Green / Cabinet Meeting, Movement VII: Attorney General Jeff Sessions, responding to questions from the Senate Intelligence Committee - Zachary Green / As I escape, the water calms - Spencer Arias / Introduction and Toccata - Graham Cohen / Everything that rises - David “Clay” Mettens / Triceratops - Matthew Kennedy / Doctoral Dissertation Music 2018
7

F-Round: Fog-Based Rogue Nodes Detection in Vehicular Ad Hoc Networks

Paranjothi, Anirudh, Atiquzzaman, Mohammed, Khan, Mohammad S. 01 December 2020 (has links)
Vehicular ad hoc networks (VANETs) facilitate vehicles to broadcast beacon messages to ensure road safety. The rogue nodes in VANETs broadcast malicious information leading to potential hazards, including the collision of vehicles. Previous researchers used either cryptography, trust values, or past vehicle data to detect rogue nodes, but they suffer from high processing delay, overhead, and false-positive rate (FPR). We propose fog-based rogue nodes detection (F-RouND), a fog computing scheme, which dynamically creates a fog utilizing the on-board units (OBUs) of all vehicles in the region for rogue nodes detection. The novelty of F-RouND lies in providing low processing delays and FPR at high vehicle densities. The performance of our F-RouND framework was carried out with simulations using OMNET ++ and SUMO simulators. Results show that F-RouND ensures 45% lower processing delays, 12% lower overhead, and 36% lower FPR at high vehicle densities compared to existing rogue nodes detection schemes.
8

A reestruturação conceitual e taxonômica dos weak e rogue states: securitização do subdesenvolvimento e instrumentalização política / The conceptual and taxonomic restructuring of weak and rogue states: securitization of underdevelopment and political instrumentalization

Silva, Murilo Mesquita Melo e 01 April 2013 (has links)
Made available in DSpace on 2015-09-25T12:22:22Z (GMT). No. of bitstreams: 1 PDF - Murilo Mesquita Melo e Silva.pdf: 1437705 bytes, checksum: 8630b67ecc67f546ecd416e32a7434d7 (MD5) Previous issue date: 2013-04-01 / Conselho Nacional de Desenvolvimento Científico e Tecnológico / This Dissertation aims to analysis the formation and utilization of state taxonomies weak states and rogue states, according to their political instrumentalization. The hypothesis is that happened a conceptual and taxonomic restructuring from weak to rogue states since the securitization of underdevelopment of the weak states and of political instrumentalization of rogue states taxonomy. The analysis of hypothesis is based on postcolonial approaches as theoric-methodologic substratum. In analysis of weak states the aim is to contextualize the beginning of construction of this taxonomy, since of underdevelopment securitization process. In analysis of rogue states the aim is verified the process of construction of rogue taxonomy and how maintains this process itself. As final considerations, there is not a conceptual and taxonomic restructuring so unanimous. If the assumptions of Rational Modern State were accepted, some States may be considered weak, but not rogue, while another may be called rogue, but not weak. It was found, however, the political exploitation of state's taxonomies, according to the diagnoses made by outside actors of state to be cataloged, especially by the United States. / Essa dissertação tem por objetivo analisar a formação e utilização das taxonomias estatais weak states e rogue states à luz da instrumentalização política das mesmas. A hipótese é que houve uma reestruturação conceitual e taxonômica dos weak para rogue states a partir da securitização do subdesenvolvimento dos weak states e da instrumentalização política da taxonomia rogue states. Na análise da hipótese foram utilizadas as abordagens pós-coloniais como substrato teórico-metodológico. Na análise dos weak states o objetivo é contextualizar o início do processo de construção da taxonomia weak, desde o processo de securitização do subdesenvolvimento. Na análise dos rogue states o objetivo é verificar o processo de construção dessa taxonomia e como ela se sustenta. Por fim, considera-se que não há uma reestruturação conceitual e taxonômica de forma unânime. Se, se aceitar as premissas do Estado Racional Moderno, alguns Estados podem ser considerados weak, mas não rogue, enquanto outros podem ser rogue, mas não weak. O que se verifica, no entanto, é a instrumentalização política das taxonomias, segundo os diagnósticos elaborados por atores externos ao Estado a ser catalogado, principalmente pelos Estados Unidos.
9

A probabilistic prediction of rogue waves from a spectral WAVEWATCH III ® wave model for the Northeast Pacific

Cicon, Leah 22 September 2022 (has links)
Rogue waves are unexpected, individual ocean surface waves that are disproportionately large compared to the background sea state. They present considerable risk to mariners and offshore structures when encountered in large seas. Rogue waves have gone from seafarer’s folktales to an actively researched and debated phenomenon. In this work an easily derived spectral parameter, as an indicator of rogue wave risk, is presented, and further evidence for the generation mechanism responsible for these abnormal waves is provided. With the additional goal of providing a practical rogue wave forecast, the ability of a standard wave model to predict the rogue wave probability is assessed. Current forecasts, like those at the European Centre for Medium-Range Weather Forecasts (ECMWF), rely on the Benjamin Feir Index (BFI) as a rogue wave predictor, which reflects the nonlinear process of modulation instability as the generation mechanism for rogue waves. However, this analysis finds BFI has little predictive power in the real ocean. From the analysis of long term sea surface elevation records in nearshore areas and hourly bulk statistics from open ocean and coastal buoys in the Northeast Pacific, crest-trough correlation shows the highest correlation with rogue wave probability. These results provide evidence in support of a probabilistic prediction of rogue waves based on random linear superposition and should replace forecasts based on modulation instability. Crest-trough correlation was then forecast by a regional WAVEWATCH III ® wave model with moderate accuracy compared with the high performance of forecasting significant wave height. Results from a case study of a large fall storm October 21-22, 2021, are presented to show that the regional wave model produces accurate forecasts of significant wave height at high seas and presents a potential rogue wave probability forecast. / Graduate
10

Detection of Man-in-the-middle Attacks Using Physical Layer Wireless Security Techniques

Wang, Le 27 August 2013 (has links)
"In a wireless network environment, all the users are able to access the wireless channel. Thus, if malicious users exploit this feature by mimicking the characteristics of a normal user or even the central wireless access point (AP), they can intercept almost all the information through the network. This scenario is referred as a Man-in-the-middle (MITM) attack. In the MITM attack, the attackers usually set up a rogue AP to spoof the clients. In this thesis, we focus on the detection of MITM attacks in Wi-Fi networks. The thesis introduces the entire process of performing and detecting the MITM attack in two separate sections. The first section starts from creating a rogue AP by imitating the characteristics of the legitimate AP. Then a multi-point jamming attack is conducted to kidnap the clients and force them to connect to the rogue AP. Furthermore, the sniffer software is used to intercept the private information passing through the rogue AP. The second section focuses on the detection of MITM attacks from two aspects: jamming attacks detection and rogue AP detection. In order to enable the network to perform defensive strategies more effectively, distinguishing different types of jamming attacks is necessary. We begin by using signal strength consistency mechanism in order to detect jamming attacks. Then, based on the statistical data of packets send ratio (PSR) and packets delivery ratio (PDR) in different jamming situations, a model is built to further differentiate the jamming attacks. At the same time, we gather the received signal strength indication (RSSI) values from three monitor nodes which process the random RSSI values employing a sliding window algorithm. According to the mean and standard deviation curve of RSSI, we can detect if a rogue AP is present within the vicinity. All these proposed approaches, either attack or detection, have been validated via computer simulations and experimental hardware implementations including Backtrack 5 Tools and MATLAB software suite. "

Page generated in 0.0706 seconds