• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 106
  • 62
  • 32
  • 24
  • 9
  • 8
  • 6
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 293
  • 293
  • 77
  • 50
  • 42
  • 42
  • 39
  • 37
  • 36
  • 35
  • 32
  • 31
  • 29
  • 26
  • 26
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
261

Performance Analysis and Improvement of 5G based Mission Critical Motion Control Applications

Bhimavarapu, Koushik January 2022 (has links)
The industrial needs in the production of goods and control of processes within the factory keep leapfrogging daily by the necessities to fulfil the needs of the ever-growing population. In recent times, the industries are looking towards Industry 4.0 to improve their overall productivity and scalability. One of the significant aspects that are required to meet the requirements of Industry 4.0 is communication networks among industrial applications. Nowadays, industries from the cross markets are looking to replace their existing wired networks with wireless networks, which indeed brings many use-cases and a lot of new business models into existence. To make all these options possible, wireless networks need to meet the stringent requirements of these industrial applications in the form of reliability, latency, and service availability. This thesis focuses on a systematic methodology to integrate wireless networks like 5G, Wi-Fi 6, etc., into real-life automation devices. It also describes a methodology to evaluate their communication and control performance by varying control parameters like topology, cycle time, and type of networks. It also devises some techniques and methods that can improve the overall performance, i.e., both control and communication performance of the control applications. The method used to implement this work is a case study. This work integrates and tests the industrial applications in a real-life scenario. It is the best effort to bring a unique perspective of communication engineers and control engineers together regarding the performance of the industrial applications. This work tries to verify the suitability of the wireless in mission-critical control application scenarios with respect to their communication and control performance. Software for data analysis and visualization and its methodology for analyzing the traffic flow of the control applications via different wireless networks is demonstrated by varying different control parameters. It is shown that it is challenging for 5G to support the shorter cycle time values, and performance will get better and more stable with the increase in the cycle time of the control application. It is also found that the 1-Hop wireless topologies have a comparatively better control performance than 2-Hop wireless topologies. In the end, it is found that the communication and control performance of the motion control application can be improved by using the hybrid topology, which is a mixture of 5G and Wi-Fi 6, by modifying some key aspects. The thesis work helps to introduce a novel systematic methodology for measuring and analyzing the communication and control applications via different wireless networks. It also gives a better idea for the control engineers in the industry about which cycle times the different wireless networks and their topologies support when integrated with industrial automation devices. It also describes which wireless networks support industrial applications better. It ends with a novel methodology that could improve the performance of the mission-critical motion applications by using existing wireless technologies.
262

Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

Kolonia, Alexandra, Forsberg, Rebecka January 2020 (has links)
Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. The lack of security and privacy in an application is of main concern since the spread of sensitive and personal information can cause both physical and emotional harm, if it is being shared with unauthorized people. This thesis investigates how to confidentially transfer user information in such a way that the user remains anonymous and untraceable in a mobile application. In order to achieve that, the user will first authenticate itself to a third party, which provides the user with certificates or random generated tokens. The user can then use this as its communication credentials towards the server, which will be made through the Tor network. Further, when the connection is established, the WiFi details are sent periodically to the server without the user initiating the action. The results show that it is possible to establish connection, both with random tokens and certificates. The random tokens took less time to generate compared to the certificate, however the certificate took less time to verify, which balances off the whole performance of the system. Moreover, the results show that the implementation of Tor is working since it is possible for the system to hide the real IP address, and provide a random IP address instead. However, the communication is slower when Tor is used which is the cost for achieving anonymity and improving the privacy of the user. Conclusively, this thesis proves that combining proper implementation and good application design improves the security in the application thereby protecting the users’  privacy. / Många mobilapplikationer har möjlighet att samla in och dela användarspecifik information, utöver den väsentliga datahanteringen. Det här problemet möjliggörs genom dålig applikationsdesign och felaktig implementering. Bristen på säkerhet och integritet i en applikation är därför kritisk, eftersom spridning av känslig och personlig information kan orsaka både fysisk och emotionell skada, om den delas med obehöriga personer. Denna avhandling undersöker hur man konfidentiellt kan överföra användarinformation på ett sätt som tillåter användaren av mobilapplikationen att förbli både anonym och icke spårbar. För att uppnå detta kommer användaren först att behöva autentisera sig till en tredje part, vilket förser användaren med slumpmässigt genererade tecken eller med ett certifikat. Användaren kan sedan använda dessa till att kommunicera med servern, vilket kommer att göras över ett Tor-nätverk. Slutligen när anslutningen upprättats, kommer WiFi-detaljerna att skickas över periodvis till servern, detta sker automatiskt utan att användaren initierar överföringen. Resultatet visar att det är möjligt att skapa en anslutning både med ett certifikat eller med slumpmässiga tecken. Att generera de slumpmässiga tecknen tog mindre tid jämfört med certifikaten, däremot tog certifikaten mindre tid att verifiera än tecknen. Detta resulterade i att de båda metoderna hade en jämn prestanda om man ser över hela systemet. Resultatet visar vidare att det implementeringen av Tor fungerar då det är möjligt för systemet att dölja den verkliga IPadressen och att istället tillhandahålla en slumpmässig IP-adress. Kommunikationen genom Tor gör dock systemet långsammare, vilket är kostnaden för att förbättra användarens integritet och uppnå anonymitet. Sammanfattningsvis visar denna avhandling att genom att kombinera korrekt implementering och bra applikationsdesign kan man förbättra säkerheten i applikationen och därmed skydda användarnas integritet.
263

Paving the Path of LTE Toward 5G: Physical Layer Assurance and Operation in the Unlicensed Spectrum

Labib, Mina Salah Said 28 September 2020 (has links)
Long-Term Evolution (LTE) is the fourth generation (4G) wireless communications standard and its evolution is paving the path for the fifth generation (5G) technology. LTE is also considered for supporting public safety networks, Machine-to-Machine (M2M) communications, and many other applications. Hence, it is critical to ensure that the LTE system performs effectively even in harsh signaling environments. Unfortunately, LTE is vulnerable to intentional interference at the physical layer. We define the term LTE control channel spoofing, which refers to the case when an adversary sets a fake LTE-like base station (evolved NodeB or eNodeB) that transmits a partial or full LTE downlink frame to deceive LTE devices and hinder them from attaching to a real cell. Based on analyzing the initial cell selection process in the LTE specifications, we identify three different level of LTE control channel spoofing. We have built a testbed to demonstrate the feasibility of such an attack. The experimental results show that LTE control channel spoofing can cause permanent denial of service for LTE devices during the cell selection process. We propose effective mitigation techniques to enhance the immunity of LTE systems against all the three forms of LTE control channel spoofing, and ensure that it is secure and available when and where needed. Moreover, the commercial success of LTE and the resulting growth in mobile data demand have motivated cellular network operators to strive for new innovations. LTE-Unlicensed has been recently proposed to allow cellular network operators to offload some of their data traffic by accessing the unlicensed 5 GHz frequency band. There are three variants of LTE-Unlicensed that have been proposed in the industry. These variants differ in their operational features, but they enhance the capacity of LTE and represent a big milestone in its evolution toward 5G. However, LTE-Unlicensed faces several challenges when operating in the 5 GHz bands, as this spectrum is mainly occupied by Wi-Fi and by various radar systems. Therefore, we analyze the algorithms proposed in the industry for the LTE-Unlicensed and Wi-Fi coexistence, and we develop a new spectrum sharing technique for the coexistence between LTE-Unlicensed and radar systems. In order to analyze LTE-Unlicensed and Wi-Fi coexistence, we first explain the technical details of each of the three variants of LTE-Unlicensed, and we provide a comparative analysis of them in terms of their operational features. Then we develop an unbiased and objective evaluation of their proposed coexistence mechanisms with Wi-Fi systems, and numerically compare their performance. In order to emphasize the need for developing a new spectrum sharing technique for the coexistence between LTE-Unlicensed and radar systems, we first present the different regulatory requirements for the 5 GHz unlicensed bands in several world regions, and we perform a comprehensive survey on the different radar types within the 5 GHz sub-bands. Then we develop a novel spectrum sharing technique based on chance-constrained stochastic optimization to allow the LTE-Unlicensed eNodeB to share the spectrum efficiently with a radar system. The optimization problem is formulated to guarantee the minimum performance criteria for the radar operation, and at the same time allows the LTE-Unlicensed eNodeB to control its transmit power to maximize the performance for the serving LTE-Unlicensed device. A mathematical model is used to transform the stochastic optimization problem into a deterministic one, and an exhaustive search is used to solve the resulting optimization problem. Due to the power control mechanism resulting from the proposed algorithm, numerical results show a significant reduction in the protection distance required between the radar and the LTE-Unlicensed network for the two to coexist, as the proposed algorithm can allow the two systems to operate effectively with a protection distance of only 3.95% of the one imposed by the regulations.
264

Analysis and design of efficient techniques for video transmission in IEEE 802.11 wireless ad hoc networks

Tavares de Araujo Cesariny Calafate, Carlos Miguel 16 January 2020 (has links)
[EN] Wireless mobile ad ho networks, also known as MANETs, are omposed by independent mobile stations that ommuni ate without requiring any sort of infrastru ture for support. These networks are hara terized by variable bandwidth values and frequent path breaks, whi h are due to hannel noise, interferen e between stations and mobility. Su h fa tors require significant adaptation apabilites at different levels of the proto ol suites employed, enabling stations to qui kly respond to fast- hanging network onditions. Resear h on the most adequate proto- ols for the physi al, MAC and routing layers is still on-going, though some basi onsensus has already been rea hed and several testbeds have been setup around the world. To deploy real-time multimedia servi es, namely voi e and video, on top of su h an unreliable network environment is a very hallenging task. In this thesis we propose to a hieve that goal starting from urrently available Wi-Fi te hnology, and gradually finding the most adequate enhan ements to ea h proto ol layer of interest; we then ombine these enhan ements until we a hieve a omplete QoS framework for ad ho networks. By using urrently available te hnology we assure that the proposal of this thesis has an inherent high-level of appli ability on real life environments. Sin e our working field fo uses on video transmission over wireless ad ho networks, we will show how it is possible to support several QoS- onstrained video streams in MANET environments hara terized by moderate to high mobility levels, and by a significant amount of best efort traffic / [ES] Las redes inalámbricas ad hoc, también conocidas como redes MANET, están compuestas por un conjunto de estaciones móviles independientes capaces de omunicarse entre sí sin necesidad de ningún tipo de infraestructura común de comunicaciones. Estas redes se caracterizan por tener un ancho de banda variable y pérdidas frecuentes de ruta que se pueden atribuir al ruido del anal inalámbrico, a la interferencia entre las estaciones móviles o bien a la movilidad de las estaciones. Dichos factores requieren una gran capacidad de adaptación en las diferentes capas de la arquitectura de protocolos, permitiendo a una estación responder rápidamente a posibles cambios bruscos en las condiciones de la red. A pesar de que aún se están realizando trabajos de investigación en bus a de los protocolos más adecuados para las capas físicas, a eso al medio (MAC) y encaminamiento, ha sido posible llegar a un nivel básico de consenso, lo cual ha permitido el despliegue de plataformas y entornos aplicados que utilizan tecnología de red MANET. Ofrecer servicios multimedia, como voz y vídeo, en redes con tan poca habilidad es un desafío importante. En esta tesis nos proponemos alcanzar este objetivo partiendo de la tecnología Wi-Fi actualmente disponible, encontrando de forma paulatina las mejoras más importantes en las diferentes capas de la arquitectura de red, para llegar, finalmente, a una solución integrada capaz de ofrecer calidad de servicio (QoS) en las redes MANET. Al utilizar la tecnología que disponemos actualmente nos aseguramos que las propuestas de esta tesis tengan un alto grado de aplicabilidad en entornos reales. Ya que la línea de trabajo de la tesis está aplicada a la transmisión de vídeo en redes MANET, demostraremos que es posible ofrecer calidad de servicio a varios flujos de vídeo en una red MANET caracterizada por altos grados de movilidad en sus nodos y un nivel significativo de tráfico o de tipo best effort / Tavares De Araujo Cesariny Calafate, CM. (2006). Analysis and design of efficient techniques for video transmission in IEEE 802.11 wireless ad hoc networks [Tesis doctoral]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/135282
265

Coexistence of Wireless Systems for Spectrum Sharing

Kim, Seungmo 28 July 2017 (has links)
Sharing a band of frequencies in the radio spectrum among multiple wireless systems has emerged as a viable solution for alleviating the severe capacity crunch in next-generation wireless mobile networks such as 5th generation mobile networks (5G). Spectrum sharing can be achieved by enabling multiple wireless systems to coexist in a single spectrum band. In this dissertation, we discuss the following coexistence problems in spectrum bands that have recently been raising notable research interest: 5G and Fixed Satellite Service (FSS) at 27.5-28.35 GHz (28 GHz); 5G and Fixed Service (FS) at 71-76 GHz (70 GHz); vehicular communications and Wi-Fi at 5.85-5.925 GHz (5.9 GHz); and mobile broadband communications and radar at 3.55-3.7 GHz (3.5 GHz). The results presented in each of the aforementioned parts show comprehensively that the coexistence methods help achieve spectrum sharing in each of the bands, and therefore contribute to achieve appreciable increase of bandwidth efficiency. The proposed techniques can contribute to making spectrum sharing a viable solution for the ever evolving capacity demands in the wireless communications landscape. / Ph. D. / Sharing a band of frequencies in the radio spectrum among multiple wireless systems has emerged as a viable solution for alleviating the severe capacity crunch in next-generation wireless mobile networks such as 5th generation mobile networks (5G). Spectrum sharing can be achieved by enabling multiple wireless systems to coexist in a single spectrum band. In this dissertation, we discuss the following coexistence problems in spectrum bands that have recently been raising notable research interest: 5G and Fixed Satellite Service (FSS) at 27.5-28.35 GHz (28 GHz); 5G and Fixed Service (FS) at 71-76 GHz (70 GHz); vehicular communications and Wi-Fi at 5.85-5.925 GHz (5.9 GHz); and mobile broadband communications and radar at 3.55-3.7 GHz (3.5 GHz). The results presented in each of the aforementioned parts show comprehensively that the coexistence methods help achieve spectrum sharing in each of the bands, and therefore contribute to achieve appreciable increase of bandwidth efficiency. The proposed techniques can contribute to making spectrum sharing a viable solution for the ever evolving capacity demands in the wireless communications landscape.
266

Cybersecurity awareness among Swedish young adults in usage of public Wi-Fi networks

Al Shakosh, Suhel January 2024 (has links)
The widespread availability of public Wi-Fi has significantly impacted how young adults in Sweden access the Internet for various purposes, including social interactions, academic activities, and entertainment. However, this convenience comes with substantial cybersecurity risks. This study aims to explore and understand the awareness level among young adults regarding cybersecurity threats when utilizing public Wi-Fi and to delve into the measures and strategies employed by young adults to safeguard themselves from these identified threats. The root problem addressed in this study is the potential gap in cybersecurity awareness and protective behaviors among young adults who frequently use public Wi-Fi. Understanding this gap is crucial for developing effective educational initiatives and security practices that can mitigate the risks involved. To investigate this issue, a qualitative research method was employed, involving semi-structured interviews with ten participants, balanced in gender. The interviews aimed to gather in-depth insights into the participants' motivations for using public Wi-Fi, their awareness of cybersecurity risks, and the measures they take to protect themselves. Utilizing semi-structured interviews with ten participants, the study reveals a diverse range of awareness and behaviors. While some participants demonstrate a strong understanding of cyber threats and employ proactive measures such as using VPNs and antivirus software, others show only a cursory awareness and engage in risky behaviors due to a lack of knowledge or disregard for potential threats. This variation highlights a disparity in how young adults approach cybersecurity when using public Wi-Fi. The study underscores a need for targeted educational initiatives to enhance protective practices among this demographic, which could inform future cybersecurity policies and educational programs. By focusing on increasing cybersecurity awareness and promoting better security habits, the risks associated with public Wi-Fi usage can be better managed, thereby helping to protect the digital lives of young individuals in Sweden.
267

Undersökning och validering av lågprissystem för kraftmätning : Hur bra kan en Wii Balance Board bli med ny elektronik? / Analysis and validation of low-price system for force measurement : How good can a Wii Balance Board become with new electronics?

Mustafa, Rahand January 2024 (has links)
Behovet för kraftplattor idag växer inom idrotts- och sportsammanhang såväl som inom medicinska sektorn. Problemet med majoriteten av kraftplattorna på marknaden idag är att de är dyra, samt stora och tunga. På Kungliga tekniska högskolans skola för medicinteknik och hälsosystem utvecklades en kraftplatteprototyp med Wii Balance Board i hopp om att vara billigare och kunna användas i medicinskt, terapeutiskt och idrottssyfte. Enligt konstruktören och uppdragsgivaren finns det ett behov att göra om denna prototyp genom att undersöka möjligheten till att använda komponenter som är billiga, tillgängliga för allmänheten men samtidigt är noggrann och pålitlig i mätningarna. I detta arbete undersöks möjligheterna samt konstrueras två prototyper för jämförelse och analys för att säkerställa pålitlighet och noggrannhet.  Två kraftplatteprototyper utvecklades, ena prototypen använde en HX711 som AD- omvandlare mellan lastcellerna på Wii Balance Boarden och ESP32 mikrokontrollern och den andra en AD7124-8 som AD-omvandlare mellan lastcellerna och ESP32 mikrokontrollern. Lastcellerna kopplades till dessa AD-omvandlare som sedan kopplades till en ESP32 mikrokontroller som tog emot datat och presenterade det i Arduino IDE samt i applikationen Blynk. Resultatet av arbetet visade att båda prototyperna är pålitliga och noggranna i viktmätningarna vid låga samplingsfrekvenser, men att AD7124-8 är betydligt mycket mer lämplig i idrott och medicinska syften på grund av dess höga samplingsfrekvens samt filtreringsalternativ för brus då det i dessa sammanhang är viktigt att kunna mäta snabba kraftförändringar. / The need for force plates is increasing today in the sports and medicine industry. The challenges with force plates are the price point and the immobility of them, they are often big and heavy. A force plate prototype with a Wii Balance Board was developed at Royal Institute of Technology’s school for biomedical engineering and health systems with the hope of achieving a cheaper solution that could be used in medical research and the sports industry. According to the constructor of the force plate prototype, there is a need to redo this prototype by doing research of using cheaper and more readily available components but at the same time be precise and trustworthy in measurements. The possibilities are evaluated in this work and two prototypes are constructed.  Two force plate prototypes were constructed, one of them used a HX711 AD-converter between the load cells of the Wii Balance Board and the ESP32 microcontroller and the other prototype used a AD7124-8. The load cells connected to the AD-converters and then to the ESP32 which showed the output values in the serial monitor of Arduino IDE and in the Blynk app. The results of the tests conducted showed that both prototypes provided a reliable and precise measurement of weight at low sample rates. But that the AD7124-8 was considerably more suitable for medicine research and sports research due to its capability to sample at high frequencies and noise filtering options, which is crucial when wanting to detect rapid changes in force.
268

Etude par simulation et mesure d'un système d'exposition d'animaux aux ondes radioélectriques induites par les systèmes wi-fi

Wu, Tongning 20 February 2009 (has links) (PDF)
Ce travail de thèse consiste en la conception et l'analyse d'un système d'exposition des animaux in vivo avec les signaux Wi-Fi dans une chambre réverbérante. La nouvelle méthode d'excitation est appliquée avec 6 antennes qui fonctionnent aléatoirement pour avoir un champ plus homogène et des ondes venant de toutes les directions. Cette configuration permet d'éviter une grande taille du brasseur de la chambre réalisée. La répartition de puissance chez les rats est étudiée par la méthode hybride de simulation-mesure. La puissance incidente est enregistrée de même que le champ au centre de la chambre. Le rapport de la puissance incidente sur E carré moyenné est déterminé. La méthode FDTD est choisie pour la simulation et permet d'analyser la répartition de la puissance absorbée par les rats. La distribution du champ dans la chambre suit une statistique de Rayleigh comme il a été prouvé par les études et les mesures. Donc, la boîte de Huygens est utilisée pour émettre des ondes planes aléatoires (avec les paramètres suivant distribution Rayleigh) et exposer les rats. On peut alors obtenir le rapport de DAS pour le corps entier chez les rats sur E carré moyenné dans la chambre. Donc il est possible de relier le DAS corps entier chez les rats et la puissance d'entrée dans la chambre à E carré moyenné. Une autre méthode de simulation est aussi appliquée pour vérifier ce résultat. L'évaluation de la variabilité des résultats pour plusieurs paramètres à différents âges des rats est effectuée. En générale, les sources de variabilité sont classifiées selon trois parties : simulation, mesure, et interface entre les deux. Le DAS corps entier chez les rats pendant toute la période d'exposition avec le domaine de variabilité sont présentés dans ce travail. Cette étude pourra être utilisée afin d'évaluer des résultats d'une exposition à long terme des animaux. Elle pourra aussi servir à caractériser le champ dans des environnements domestiques et urbains
269

Simulating and prototyping software defined networking (sdn) using mininet approach to optimise host communication in realistic programmable networking environment optimise host communication in realistic programmable networking environment.

Zulu, Lindinkosi Lethukuthula 19 August 2019 (has links)
This is a Masters student Final Dissertation / In this project, two tests were performed. On the first test, Mininet-WiFi was used to simulate a Software Defined Network to demonstrate Mininet-WiFi’ s ability to be used as the Software Defined Network emulator which can also be integrated to the existing network using a Network Virtualized Function (NVF). A typical organization’s computer network was simulated which consisted of a website hosted on the LAMP (Linux, Apache, MySQL, PHP) virtual machine, and an F5 application delivery controller (ADC) which provided load balancing of requests sent to the web applications. A website page request was sent from the virtual stations inside Mininet-WiFi. The request was received by the application delivery controller, which then used round robin technique to send the request to one of the web servers on the LAMP virtual machine. The web server then returned the requested website to the requesting virtual stations using the simulated virtual network. The significance of these results is that it presents Mininet-WiFi as an emulator, which can be integrated into a real programmable networking environment offering a portable, cost effective and easily deployable testing network, which can be run on a single computer. These results are also beneficial to modern network deployments as the live network devices can also communicate with the testing environment for the data center, cloud and mobile provides. On the second test, a Software Defined Network was created in Mininet using python script. An external interface was added to enable communication with the network outside of Mininet. The amazon web services elastic computing cloud was used to host an OpenDaylight controller. This controller is used as a control plane device for the virtual switch within Mininet. In order to test the network, a webserver hosted on the Emulated Virtual Environment – Next Generation (EVENG) software is connected to Mininet. EVE-NG is the Emulated Virtual Environment for networking. It provides tools to be able to model virtual devices and interconnect them with other virtual or physical devices. The OpenDaylight controller was able to create the flows to facilitate communication between the hosts in Mininet and the webserver in the real-life network / The University of South Africa The University of Johannesburg / College of Engineering, Science and Technology
270

The promised LAN: the transformative power of information and communications technology in developing countries

Booker, Lee Catherine 05 December 2013 (has links)
Submitted by Lee Catherine Booker (lee.catherine.booker@gmail.com) on 2013-12-27T13:41:24Z No. of bitstreams: 1 LCBooker_The Promised LAN_FGVEAESP MPGI thesis_final_with capa.pdf: 9371560 bytes, checksum: 913b62eb77164fb0e3a4bb7cfdfb71d2 (MD5) / Rejected by Vera Lúcia Mourão (vera.mourao@fgv.br), reason: Faltou a folha com a composição da banca, a Eliene responderá em inglês para você. abs. Vera on 2014-01-03T16:38:41Z (GMT) / Submitted by Lee Catherine Booker (lee.catherine.booker@gmail.com) on 2014-01-03T20:31:15Z No. of bitstreams: 1 LCBooker_The Promised LAN_FGVEAESP MPGI thesis_final_with capa.pdf: 9371698 bytes, checksum: 56c200a7da28636b08d9c4c394fceff7 (MD5) / Approved for entry into archive by Luana Rodrigues (luana.rodrigues@fgv.br) on 2014-01-06T14:19:34Z (GMT) No. of bitstreams: 1 LCBooker_The Promised LAN_FGVEAESP MPGI thesis_final_with capa.pdf: 9371698 bytes, checksum: 56c200a7da28636b08d9c4c394fceff7 (MD5) / Made available in DSpace on 2014-01-06T14:22:09Z (GMT). No. of bitstreams: 1 LCBooker_The Promised LAN_FGVEAESP MPGI thesis_final_with capa.pdf: 9371698 bytes, checksum: 56c200a7da28636b08d9c4c394fceff7 (MD5) Previous issue date: 2013-12-05 / This thesis analyzes the prospects and implications of investment in Information and Communications Technology (ICT) in developing countries, particularly in terms of education, to spur the implementation of a more modern infrastructure versus conversion of traditional methods. Given the rapid pace of interest and investments in ICT, current readiness models and capability measurements have become outdated, inaccurate, and inapplicable to developing cultures. Policymakers and financiers must be cognizant of these considerations when evaluating investments in or aid for future ICT initiatives around the world, and researchers and educators should understand the factors involved in development for both ICTs and education before beginning studies in poor areas. This paper concludes that investments in mobile and wireless technologies will allow organizations and governments to leapfrog traditional infrastructure, narrowing the digital divide and resulting in enhanced education, higher literacy rates, and sustainable solutions for development in impoverished communities in the developing world. / Este tese analise as implicações dos investimentos em tecnologia de informação e comunicação (ICT) em países ainda em desenvolvimento, especialmente em termos de educação, para estimular a implementação de uma infra-estrutura mais moderna em vez da continuação do uso de métodos tradicionais. Hoje, como o interesse e os investimentos em ICT estão crescendo rapidamente, os módulos e as idéias que existem para medir o estado de ICT são velhos e inexatos, e não podem ser aplicados às culturas de países em desenvolvimento. Políticos e investidores têm que considerar estes problemas quando estão pensando em investimentos ou socorros para programas em ICT no futuro, e investigadores e professores precisam entender os fatores importantes no desenvolvimento para os ICTs e a educação antes de começar estudos nestes países. Este tese concluí que investimentos em tecnologias móveis e sem fios ajudarem organizações e governos ultrapassar a infra-estrutura tradicional, estreitando a divisão digital e dando o resulto de educação melhor, alfabetização maior, e soluções sustentáveis pelo desenvolvimento nas comunidades pobres no mundo de países em desenvolvimento.

Page generated in 0.049 seconds