• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 44
  • 23
  • 9
  • 8
  • 6
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 110
  • 17
  • 11
  • 10
  • 10
  • 9
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Smartcard based heart-beat service for M2M communication

Erlandsson, Marcus January 1984 (has links)
This study concerns machine-to-machine (M2M) applications that use smartcards. More specifically,The Subscriber Identity Module (SIM) smart card is used for the purpose of monitoring a continuousnetwork connection between a host device and a server. Multicom Security is a security company thatoffers several secure communication connection services (e.g. payment transactions, alarm signals). Themonitoring of these connections is carried out with continuous heart-beat messages sent from thedevice to a server. Today they provide this heart-beat service through logic in their own manufactureddevices, but they have a desire to place the logic on a SIM card in order to be able to move such serviceswith this card and not with a device. Such services can then also be offered on devices not necessarilymanufactured by Multicom Security.The work consisted of investigation of current telecommunication standards, papers regardingsmartcard applications and the current monitoring service, in order to consider possible solutions toimplement a proof of concept of such solution and evaluate it. One aspect of the study was to checkwhether the implemented solution was general and would work in different mobile equipments and alsoto determine the limitations of such smartcard applications.Three solutions were considered for implementation of which one was successfully implemented andtested. The successful heart-beat application was developed using a network subscription enabled JavaCard smart card and using SMS as bearer for the heart-beat messages. By evaluating the solution withbasic tests of functionality, robustness, performance and compatibility the solution was considered to begeneral and compliant with most new mobile equipments. The evaluation was performed in realenvironment with the application running on an actual SIM card with network subscription tested indifferent mobile devices such as cell phones, built-in communication modules and alarm control panels.An alternative solution based on GRPS instead of SMS was also realized but the tests could not becarried out completely due to lack of access to the SIM card implementation by the card provider.
52

Analysing the behaviour of a smart card based model for secure communication with remote computers over the internet

Bhatt, Deep Vardhan 12 July 2011 (has links)
This dissertation presents the findings of a generic model aimed at providing secure communication with remote computers via the Internet, based on smart cards. The results and findings are analysed and presented in great detail, in particular the behaviour and performance of smart cards when used to provide the cryptographic functionality. Two implemented models are presented. The first model uses SSL to secure the communication channel over the Internet while using smart cards for user authentication and storage of cryptographic keys. The second model presents the SSH for channel security and smart cards for user authentication, key storage and actual encryption and decryption of data. The model presented is modular and generic by nature, meaning that it can easily be modified to accept the newer protocol by simply including the protocols in a library and with a minor or no modification to both server and client application software. For example, any new algorithm for encryption, key exchange, signature, or message digest, can be easily accommodated into the system, which proves that the model is generic and can easily be integrated into newer technologies. Similarly, smart cards are used for cryptography. Two options are presented: first the smart cards only store the algorithm keys and user authentication, and secondly, smart cards are used for storing the algorithm keys, user authentication, and actual data encryption or decryption, as the requirement may dictate. This is very useful, for example, if data to be transferred is limited to a few bytes, then actual data encryption and decryption is performed using smart cards. On the other hand, if a great deal of data is to be transferred, then only authentication and key storage are performed with smart cards. The model currently uses 3DES with smart card encryption and decryption, because this is faster and consumes fewer resources when compared to RSA. Once again, the model design is flexible to accommodate new algorithms such as AES or IDEA. Important aspects of the dissertation are the study and analysis of the security attacks on smart card use. Several smart card attack scenarios are presented in CHAPTER 3, and their possible prevention is also discussed in detail. AFRIKAANS : Hierdie verhandeling bied die bevindinge van 'n generiese model wat daarop gemik is om veilige kommunikasie te voorsien met 'n afstandsrekenaar via die Internet en op slimkaarte gebaseer. Die resultate en bevindings word ontleed en breedvoerig aangebied, veral die gedrag en werkverrigting van slimkaarte wanneer hulle gebruik word om die kriptografiese funksionaliteit te voorsien. Daar word twee geïmplementeerde modelle aangebied. Die eerste model gebruik SSL om die kommunikasiekanaal oor die Internet te beveilig terwyl slimkaarte vir gebruikerbekragtiging en stoor van kriptografiese sleutels gebruik word. Die tweede model bied die SSH vir kanaalsekuriteit en slimkaarte vir gebruikergeldigheidvasstelling, sleutelstoor en werklike kodering en dekodering van data. Die model wat aangebied word, is modulêr en generies van aard, wat beteken dat dit maklik gewysig kan word om die jongste protokolle te aanvaar deur bloot die protokolle by 'n programbiblioteek met geringe of geen wysiging van beide die bediener- en kliënttoepassingsagteware in te sluit. Byvoorbeeld, enige nuwe algoritme vir kodering, sleuteluitruiling, handtekening of boodskapbondeling kan maklik in die stelsel gehuisves word, wat bewys dat die model generies is en maklik in jonger tegnologieë geïntegreer kan word. Slimkaarte word op soortgelyke wyse vir kriptografie gebruik. Daar word twee keuses aangebied: eerstens stoor die slimkaarte slegs die algoritmesleutels en gebruikergeldigheidvasstelling en tweedens word slimkaarte gebruik om die algoritmesleutels, gebruikergeldigheidvasstelling en werklike datakodering en –dekodering te stoor na gelang van wat vereis word. Dit is baie nuttig, byvoorbeeld, wanneer data wat oorgedra moet word, tot 'n paar grepe beperk is, word die eintlike datakodering en – dekodering uitgevoer deur slimkaarte te gebruik. Andersyds, indien 'n groot hoeveelheid data oorgedra moet word, word slegs geldigheidvasstelling en stoor met slimkaarte uitgevoer. Die model gebruik tans 3DES met slimkaartkodering en –dekodering omdat dit vinniger is en minder hulpbronne gebruik vergeleke met RSA. Die modelontwerp is weer eens buigsaam om nuwe algoritmes soos AES of IDEA te huisves. Nog 'n belangrike aspek van die verhandeling is om die sekuriteitaanvalle op slimkaartgebruik te ondersoek en te ontleed. Verskeie slimkaartaanvalscenario's word in Hoofstuk 3 aangebied en die moontlike voorkoming daarvan word ook breedvoerig bespreek. / Dissertation (MEng)--University of Pretoria, 2011. / Electrical, Electronic and Computer Engineering / unrestricted
53

Modelling the Dynamics and Forcesof Wave Energy Converters using WEC-Sim

Johansson, David January 2020 (has links)
The waves traveling on the surface of the world’s oceans carry atremendous amount of energy. The ability to convert this energy forhuman use has the potential to help solves the worlds energy problem. Adirect-drive linear generator point absorber is a wave energy converter(WEC) that aims to reduce the complexity of the overall system andshelter the most vulnerable parts of the system by placing them on theseabed. This concept builds around the buoy moving up and down indifferent sea-states which leads to a correlating vertical movement of thestroke in the generator resulting in the conversion of mechanical energyto power. This report aims to explore the possibility to use the open codeWEC-Sim to model the Uppsala University direct-drive linear generatorWEC in extreme sea states and to identify the resulting extreme loads. Theconstructed WEC-Sim model constrained the buoys motion in heave andsurge and limited its range of motion by modeling the generators upperend-stop spring. Simulations were run for different sea-states and theresulting forces on the system were analyzed. The peak line force for thedifferent sea states was calculated and compared to previous studies. Theresults validated the model as they showed a good correlation for mostsea-states. It was only for larger significant wave heights that there was adivergence compared to the results in previous studies.
54

Sim-to-Real Transfer for Autonomous Navigation

Müller, Matthias 05 1900 (has links)
This work investigates the problem of transfer from simulation to the real world in the context of autonomous navigation. To this end, we first present a photo-realistic training and evaluation simulator (Sim4CV)* which enables several applications across various fields of computer vision. Built on top of the Unreal Engine, the simulator features cars and unmanned aerial vehicles (UAVs) with a realistic physics simulation and diverse urban and suburban 3D environments. We demonstrate the versatility of the simulator with two case studies: autonomous UAV-based tracking of moving objects and autonomous driving using supervised learning. Using the insights gained from aerial object tracking, we find that current object trackers are either too slow or inaccurate for online tracking from an UAV. In addition, we find that in particular background clutter, fast motion and occlusion are preventing fast trackers such as correlation filter (CF) trackers to perform better. To address this issue we propose a novel and general framework that can be applied to CF trackers in order incorporate context. As a result the learned filter is more robust to drift due to the aforementioned tracking challenges. We show that our framework can improve several CF trackers by a large margin while maintaining a very high frame rate. For the application of autonomous driving, we train a driving policy that drives very well in simulation. However, while our simulator is photo-realistic there still exists a virtual-reality gap. We show how this gap can be reduced via modularity and abstraction in the driving policy. More specifically, we split the driving task into several modules namely perception, driving policy and control. This simplifies the transfer significantly and we show how a driving policy that was only trained in simulation can be transferred to a robotic vehicle in the physical world directly. Lastly, we investigate the application of UAV racing which has emerged as a modern sport recently. We propose a controller fusion network (CFN) which allows fusing multiple imperfect controllers; the result is a navigation policy that outperforms each one of them. Further, we embed this CFN into a modular network architecture similar to the one for driving, in order to decouple perception and control. We use our photo-realistic simulation environment to demonstrate how navigation policies can be transferred to different environment conditions by this network modularity.
55

Zařízení pro osobní identifikaci a sdílení dat / Device for personal identification and data sharing

Severa, Pavel January 2015 (has links)
Result of my work is make device for logging visitors or game players. I arranged to make two devices, web pages and communication protocol between server and devices. Graphical device will have graphical display with HDMI input, Raspberry main board, NFC reader, camera and GSM module. Second device will have microcontroler ATMEGA644, NFC reader, 2-4 line text display and optional GSM module. Both device will communicate with server via GPRS. Server can change configuration of devices and colecting logs
56

Advanced Image Deconvolution Techniques for Super-resolution Microscopy

Qin, Shun 10 September 2019 (has links)
No description available.
57

Frequency Response and Gain Enhancement of Solid-State Impact-Ionization Multipliers (SIMs)

Beutler, Joshua L. 23 February 2010 (has links) (PDF)
A study of the frequency response and gain of Solid-state the Impact-ionization Multiplier (SIM). The SIM generates current gain via impact ionization also known as avalanche gain. The SIM provides low noise amplification from an arbitrary current source. In the case of this study, current sources consisted of photodiodes optimized for a particular wavelength of light. The SIM is fabricated from silicon and enjoys the low noise, low carrier transit time advantages of conventional silicon impact ionization devices while amplifying current from a photodiode of a different material. This is advantageous because ideal detection and multiplication regions cannot always be grown on the same wafer. Furthermore a photodiode fitted to a SIM allows absorption and multiplication regions to be independently optimized. The SIM exhibits a current dependant input resistance. This resistance in combination with field effects from the SIM collector is the limiting factor in the frequency response of the SIM. Frequency response is improved to the extent that this floating voltage at the input can be minimized. Higher AC gains are realized in the device with the incorporation of 3-dimensional geometries. These improvements allow for improved device breakdown and reduced space-charge resistance at high input currents. Frequency response can also be improved by increasing the current flowing into the SIM, this current is most often in the form of DC current such that it can be filtered off at a the output and not interfere with the input signal.
58

Mechanically Scanned Interference Pattern Structured Illumination Imaging

Jackson, Jarom Silver 01 June 2019 (has links)
A method of lensless, single pixel imaging is presented. This method, referred to as MAS-IPSII, is theoretically capable of resolutions as small as one quarter of the wavelength of the imaging light. The resolution is not limited by the aperture of any optic, making high resolutions (including subwavelength) feasible even at very large (greater than a meter) distances. Imaging requires only flat optics and a coherent source, making it a good candidate for imaging with extreme wavelengths in the UV and x-ray regimes. The method is demonstrated by the imaging of various test targets. Both real and complex imaging (i.e. holography) is demonstrated.
59

The Anxious Aardvark Sees the Light: Divine Masculinity in Dave Sim's <i>Cerebus</i>

Mayeux, Isaac J. 16 May 2011 (has links)
No description available.
60

Rôle différentiel des isoformes de PML en réponse au trioxyde d’arsenic et dans la défense antivirale / Differencial role of PML isoforms in arsenic trioxyde response and in antiviral defense

El Asmi, Faten 13 December 2013 (has links)
Les interférons (IFN) constituent une famille de cytokines aux propriétés antiprolifératives et antivirales. Ils activent, via la voie Jak/STAT, des gènes spécifiques dont les produits sont les médiateurs des effets biologiques des IFN. C’est le cas de PML (Promyelocytic leukemia), appelée aussi TRIM19, qui joue un rôle central dans la défense antivirale. PML appartenant à la famille des protéines Tripartite Motif (TRIM), caractérisée par la présence en N-terminal d’un motif RBCC, constitué d’un domaine RING, d’une ou de deux boites B et d’un domaine coiled-coil. PML a été identifiée dans la leucémie aiguë promyélocytaire, une pathologie causée par la translocation chromosomique t(15 ;17) qui fusionne les gènes PML et RARA, aboutissant à la synthèse d'une protéine chimère PML-RARA. Le trioxyde d'arsenic (As2O3) cible la portion PML de la protéine oncogénique, entraînant sa dégradation et la rémission complète des patients. Dans les cellules saines, les transcrits PML issus d’un gène unique génèrent par épissage alternatif 7 isoformes principales de PML, dont six sont nucléaires (PMLI à PMLVI) et une cytoplasmique (PMLVIIb). Toutes possèdent la même extrémité N-terminale mais diffèrent au niveau de leur extrémité C-terminale, conférant à chaque isoforme des fonctions spécifiques.PML est l’organisatrice d’une structure multi-protéique appelée corps nucléaires (CN), impliquée dans divers processus cellulaires tels que l’apoptose, la dégradation des protéines ou encore la défense antivirale.PML est modifiée par SUMO de façon covalente au niveau de trois sites lysines (K65, K160, K490) et de façon non covalente, via son domaine SIM (pour « SUMO Interacting Motif »). Ces modifications sont requises pour la formation de CN fonctionnels et le recrutement de protéines partenaires au sein de ceux-ci. Le but de ma thèse a été d’étudier le rôle différentiel des différentes isoformes de PML en réponse à l’As2O3 et suite à l’infection virale. Nous avons montré que le SIM de PML est nécessaire à sa dégradation en réponse à l'As2O3. Ce motif est présent dans toutes les isoformes de PML, hormis l’isoforme nucléaire PMLVI et l’isoforme cytoplasmique PMLVIIb. Le SIM de PML n’est pas requis pour sa SUMOylation et son interaction avec RNF4 (une E3 ubiquitine ligase responsable de la dégradation de PML via le protéasome). En revanche, ce motif est requis pour l’ubiquitination de PML, le recrutement des composants du protéasome et sa dégradation en réponse à l’As2O3. Concernant les propriétés antivirales de PML, l’étude que nous avons menée avec toutes les isoformes de PML a permis de montrer que seules PMLIII et PMLIV confèrent une résistance au Virus de la Stomatite Vésiculaire (VSV). L’effet antiviral de PMLIII n'est observé qu'à faible multiplicité d’infection (MOI) et est indépendant de la production d’IFN. Par contre, PMLIV exerce une puissante activité anti-VSV, y compris à forte MOI et s'exerce selon deux mécanismes distincts : (i) PMLIV inhibe la réplication du VSV par un mécanisme précoce indépendant de l’IFN, (ii) PMLIV augmente tardivement la production d’IFN-β via une plus forte activation d’IRF3 qui est due à la séquestration spécifique de Pin1 au sein des CN par PMLIV. Ces deux processus nécessitent la SUMOylation de PMLIV. Ces résultats montrent que PMLIV exerce une activité antivirale intrinsèque et est impliquée dans l’immunité innée en régulant positivement la voie de transduction conduisant à la synthèse d’IFN-β. / Interferons (IFNs) are a family of cytokines with antiproliferative and antiviral properties.They activate, via the Jak/Stat pathway, specific genes whose products are the mediators of the biological effects of IFNs. This is the case of PML (Promyelocytic leukemia), also known as TRIM19, which plays a central role in antiviral defense.PML belongs to the Tripartite Motif (TRIM) protein family, characterized by the presence of an N- terminal RBCC pattern, consisting of a RING domain, one or two B-boxes and a coiled-coil domain. PML was identified in acute promyelocytic leukemia, a disease caused by the chromosomal translocation t(15 ;17), which fuses the PML and RARA genes, leading to the synthesis of a chimeric protein PML-RARA . Arsenic trioxide (As2O3) targets the PML moiety of the oncogenic protein, resulting in its degradation and in the complete remission of patients.In healthy cells, PML transcripts derived from a single gene generate seven major isoforms of PML by alternative splicing, including six nuclear (PMLI to PMLVI) and one cytoplasmic (PMLVIIb). All share the same N-terminus but differ at their C-terminus, giving each isoform specific functions.PML is the organizer of a multi-protein structure called nuclear bodies (NBs) that are involved in various cellular processes such as apoptosis, protein degradation or antiviral defense.PML is covalently modified by SUMO at three lysine residues (K65, K160, K490) but also non-covalently via its SIM domain (for « SUMO Interacting Motif »). These modifications are required for the formation of functional NBs and the recruitment of partner proteins within them.The aim of my thesis was to study the differential role of the different PML isoforms in response to As2O3 and during viral infection.We have shown that the SIM PML SIM is necessary for its degradation in response to As2O3. This motif is present in all PML isoforms, except the nuclear PMLVI and the cytoplasmic PMLVIIb isoforms. The SIM of PML is not required for its SUMOylation and its interaction with RNF4 (the E3 ubiquitin ligase responsible for PML proteasome-dependent degradation). However, this motif is required for the ubiquitination of PML, the recruitment of proteasome components and the degradation of PML in response to As2O3.Concerning the antiviral properties of PML, the study that we conducted with all PML isoforms allowed us to show that only PMLIII and PMLIV confer resistance to Vesicular Stomatitis Virus (VSV). Whereas the antiviral activity of PMLIII is only observed at low multiplicity of infection (MOI) and is independent of IFN production, PMLIV has a potent anti-VSV activity, including at high MOI, which is mediated through two distinct mechanisms: (i) PMLIV inhibits the replication of VSV by an early and IFN-independent mechanism, (ii) PMLIV later increases the production of IFN-β via a stronger activation of IRF3, which is due to the specific sequestration of Pin1 by PMLIV within NBs. Both processes require the PMLIV SUMOylation. These results show that PMLIV has an intrinsic antiviral activity and is also involved in innate immunity by positively regulating the transduction pathway leading to IFN-β synthesis.

Page generated in 0.0571 seconds