To see the other types of publications on this topic, follow the link: IHS Architecture.

Dissertations / Theses on the topic 'IHS Architecture'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'IHS Architecture.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Musial, Geoffray. "Architecture stratigraphique et modélisation sédimentaire 3-D des réservoirs à IHS (« Inclined heterolithic Stratification ») de la formation du McMurray, Canada." Paris 6, 2010. http://www.theses.fr/2010PA066314.

Full text
Abstract:
Cette étude concerne les sables bitumineux Crétacé de l’Athabasca, au Canada. Du fait de la forte viscosité des hydrocarbures, il est important de caractériser les hétérogénéités internes de ces réservoirs. Ce travail se base sur la stratigraphie, la sédimentologie, la modélisation réservoir et les simulations de production dans les sables à IHS (“Inclined Heterolithic Stratification”) de la formation du McMurray. Les études centrées sur les faciès, les ichnofaciès et les palynofaciès soulignent quatre environnements de dépôts: (i) un environnement continental; (ii) un environnement fluvio-est
APA, Harvard, Vancouver, ISO, and other styles
2

Pelletier, Jonathan. "Faciès, architecture et dynamique d’un système margino-littoral tidal : exemple de la Formation du Dur At Talah (Eocène supérieur, Bassin de Syrte, Libye)." Thesis, Strasbourg, 2012. http://www.theses.fr/2012STRAH016/document.

Full text
Abstract:
Ce manuscrit de thèse propose la première étude sédimentologique exhaustive de l’escarpement du Dur At Talah (150 km de long sur 120 m de hauteur). Ce dernier affleure dans la dépression d’Abu Tumayam, dans la partie méridionale du Bassin de Syrte (Libye). La Formation du Dur At Talah offre une séquence sédimentaire régressive (au 2nd ordre), allant de faciès marins peu profonds à des faciès fluviatiles, datée de l’Eocène supérieur. Les exceptionnelles conditions d'affleurement ont permis une analyse sédimentologique approfondie (lithofaciès, ichnofaciès, géométries et découpage séquentiel) co
APA, Harvard, Vancouver, ISO, and other styles
3

El, Moumouhi Sanaa. "Architecture hybride IMS/P2P autonomique." Paris 6, 2012. http://www.theses.fr/2012PA066703.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Peterström, Dan. "IP Multimedia for Municipalities : The supporting architecture." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91496.

Full text
Abstract:
Fiber deployment is becoming popular and is seen as a way to increase a community’s attractiveness to new inhabitants and companies. A new Open Access network is emerging, leading to a more horizontal network architecture. Combining this architecture with IMS enables developers to easily develop new and attractive services. To facilitate the development of new IMS services there needs to be an easy to use development environment and a reliable hardware/software platform upon which to deploy them. This thesis project will explore the design, development, and evaluation of new IMS applications t
APA, Harvard, Vancouver, ISO, and other styles
5

Mahamat, charfadine Salim. "Gestion dynamique et évolutive de règles de sécurité pour l'Internet des Objets." Thesis, Reims, 2019. http://www.theses.fr/2019REIMS011/document.

Full text
Abstract:
Avec l'évolution exponentielle de l'Internet des Objets (IoT), assurer la sécurité des réseaux est devenue un grand défi pour les administrateurs réseaux. La sécurité des réseaux est basée sur de multiples équipements indépendants tels que Firewall, IDS/IPS, NAC dont le rôle principal est de contrôler les informations échangées entre le réseau de l'entreprise et l'extérieur. Or, l'administration de ces équipements peut s'avérer très complexe et fastidieuse si elle est réalisée manuellement, équipement après équipement. L'introduction du concept de Software Defined Networking (SDN) depuis ces d
APA, Harvard, Vancouver, ISO, and other styles
6

Schünke, Susanne. "Entwicklung in den Chorformen englischer Kirchen vom 11. bis ins 13. Jahrhundert /." Köln : Copy-Star, 1987. http://catalogue.bnf.fr/ark:/12148/cb34925133b.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Vezinet, Jérémy. "Study of Future On-board GNSS/INS Hybridization Architectures." Phd thesis, Toulouse, INPT, 2014. http://oatao.univ-toulouse.fr/13835/1/vezinet.pdf.

Full text
Abstract:
The quick development of air traffic has led to the improvement of approach and landing operations by using flexible flight paths and by decreasing the minima required to perform these operations. Most of the aircraft operations are supported by the GNSS augmented with GBAS, SBAS and ABAS. SBAS or GBAS allow supporting navigation operations down to precision approaches. However, these augmentations do require an expensive network of reference receivers and real-time broadcast to the airborne user. To overcome, the ABAS system integrates on-board information provided by an INS so as to enhance
APA, Harvard, Vancouver, ISO, and other styles
8

Sundaresan, Vijay. "Architectural Synthesis Techniques for Design of Correct and Secure ICs." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1217424117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kim, Taekyu. "Ontology/Data Engineering Based Distributed Simulation Over Service Oriented Architecture For Network Behavior Analysis." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/193678.

Full text
Abstract:
As network uses increase rapidly and high quality-of-service (QoS) is required, efficient network managing methods become important. Many previous studies and commercial tools of network management systems such as tcpdump, Ethereal, and other applications have weaknesses: limited size of files, command line execution, and large memory and huge computational power requirement. Researchers struggle to find fast and effective analyzing methods to save maintenance budgets and recover from systematic problems caused by the rapid increment of network traffic or intrusions. The main objective of this
APA, Harvard, Vancouver, ISO, and other styles
10

Daoud, Triki Khadija. "Ufa : une architecture ultra plate pour les réseaux mobiles du futur." Phd thesis, Institut National des Télécommunications, 2011. http://tel.archives-ouvertes.fr/tel-00665221.

Full text
Abstract:
Les réseaux mobiles ont un modèle en couches, avec: (1) un réseau d'accès IP offrant une connectivité IP aux utilisateurs; (2) une couche de contrôle de service, l'IMS; (3) une couche d'interaction pour le contrôle des politiques réseau, le PCC. Ce modèle, centralisé et hiérarchique, serait à l'origine de problèmes de passage à l'échelle et de qualité de service en cas d'explosion du volume de trafic de données à transporter. Dans cette thèse, un nouveau modèle pour les réseaux mobiles du futur est proposé: Ultra Flat Architecture (UFA). UFA utilise l'IMS pour le contrôle de tout type d'applic
APA, Harvard, Vancouver, ISO, and other styles
11

Kessis, Mehdi. "Gestion intégrée et multi-échelle des systèmes répartis : Architecture et canevas intergiciel orientés composants." Grenoble, 2010. http://www.theses.fr/2010GRENM051.

Full text
Abstract:
Les deux dernières décennies ont été marquées par un essor remarquable de l'informatique répartie (réseaux pair à pair, grilles de calcul, informatique pervasive, etc. ) et des services de télécommunication. Désormais, les nouvelles technologies de l'information et de télécommunication font parti intégrante du quotidien des entreprises et des particuliers. Malgré ces avancées technologiques, !es systèmes informatiques restent souvent vulnérable: menacés de pannes, de dysfonctionnements et d'utilisation anarchique ou intempestive des leurs ressources. De plus, !es systèmes informatiques devienn
APA, Harvard, Vancouver, ISO, and other styles
12

Chalamalasetty, Kalyani. "Architecture for IMS Security to Mobile:Focusing on Artificial Immune System and Mobile Agents Integration." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5795.

Full text
Abstract:
The IP Multimedia Subsystem (IMS) is an open IP based service infrastructure that enables an easy deployment of new rich multimedia services mixing voice and data. The IMS is an overlay network on top of IP that uses SIP as the primary signaling mechanism. As an emerging technology, the SIP standard will certainly be the target of Denial of Service (DoS) attacks and consequently IMS will also inherit this problem. The objective of proposed architecture for IMS is to cram the potential attacks and security threats to IP Multimedia Subsystem (IMS) and explore the security solutions developed by
APA, Harvard, Vancouver, ISO, and other styles
13

Kourtesis, Marios. "Creating a Secure Server Architecture and Policy for Linux-based Systems." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-41007.

Full text
Abstract:
Creating and maintaining servers for hosting services in a secure and reliable way is an important but complex and time-consuming task. Misconfiguration and lack of server maintenance can potentially make the system vulnerable. Hackers can exploit these vul­nerabilities in order to penetrate into the system internals and cause damage. Having a standard architecture/configuration supporting the needed services saves time and re­sources while it reduces security risks. A server architecture protected by a security policy can secure the integrity and quality of the overall services. This research
APA, Harvard, Vancouver, ISO, and other styles
14

Srivatsa, Mudhakar. "Security Architecture and Protocols for Overlay Network Services." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/16284.

Full text
Abstract:
Conventional wisdom suggests that in order to build a secure system, security must be an integral component in the system design. However, cost considerations drive most system designers to channel their efforts on the system's performance, scalability and usability. With little or no emphasis on security, such systems are vulnerable to a wide range of attacks that can potentially compromise confidentiality, integrity and availability of sensitive data. It is often cumbersome to redesign and implement massive systems with security as one of the primary design goals. This thesis advocates a pro
APA, Harvard, Vancouver, ISO, and other styles
15

Chen, Hao, and Luyang Xu. "Software Architecture and Framework for Programmable Automation Controller: A Systematic Literature Review and A Case Study." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16820.

Full text
Abstract:
Background. PAC controller is a strengthened version of PLC controller. Its function is very similar, but its essence and construction are different. PLC and PAC have many successful applications in the field of industrial automation control. There is a lot of literature about the software architecture of PLC control system. However, there is almost no relevant literature on software architecture based on PAC control system. A well-performing and stable automatic control system is indispensable to the design and development of suitable software architecture. The quality and pattern of software
APA, Harvard, Vancouver, ISO, and other styles
16

Wyman, Matthew Cody. "The SAP Link: A Controller Architecture for Secure Industrial Control Systems." BYU ScholarsArchive, 2019. https://scholarsarchive.byu.edu/etd/8815.

Full text
Abstract:
Industrial Control Systems are essential to modern life. They are utilized in hundreds of processes including power distribution, water treatment, manufacturing, traffic management, and amusement park ride control. These systems are an essential part of modern life and if compromised, could result in significant economic loss, safety impacts, damage to the environment, and even loss of life. Unfortunately, many of these systems are not properly secured from a cyber attack. It is likely that a well-funded and motivated attack from a nation-state will successfully compromise an industrial contro
APA, Harvard, Vancouver, ISO, and other styles
17

Werapun, Warodom. "Architectures de réseaux pour la délivrance de services à domicile." Thesis, Toulouse, INPT, 2012. http://www.theses.fr/2012INPT0081/document.

Full text
Abstract:
Avec l’omniprésence au quotidien du numérique et de l’informatique, de plus en plus d’utilisateurs souhaitent avoir accès à Internet et à leurs applications via n’importe quel périphérique, de n’importe où et n’importe quand. Les appareils domestiques intelligents se développant, les besoins d’échanger des données au domicile même se font de plus en plus sentir. C’est dans ce contexte, celui des services à domicile avec besoin d’interconnexion que se situe notre étude. Ce type de service est qualifié de Home Service (HS) alors que le réseau à domicile est nommé Home Network (HN). La problémati
APA, Harvard, Vancouver, ISO, and other styles
18

Jones, James R. "A Client-Server Architecture for Collection of Game-based Learning Data." Thesis, Virginia Tech, 2015. http://hdl.handle.net/10919/51229.

Full text
Abstract:
Advances in information technology are driving massive improvement to the education industry. The ubiquity of mobile devices has triggered a shift in the delivery of educational content. More lessons in a wide range of subjects are being disseminated by allowing students to access digital materials through mobile devices. One of the key materials is digital-based educational games. These games merge education with digital games to maximize engagement while somewhat obfuscating the learning process. The effectiveness is generally measured by assessments, either after or during gameplay, in the
APA, Harvard, Vancouver, ISO, and other styles
19

Adams, Alissa R. "French depictions of Napoleon I's resurrection (1821-1848)." Diss., University of Iowa, 2018. https://ir.uiowa.edu/etd/3236.

Full text
Abstract:
Despite the inherently multivalent nature of images of Napoleon Bonaparte created during the middle of the nineteenth century, scholars often employ only one lens to interpret them: the political context of the age in which they were created. In doing so, they effectively separate these images from the wider art historical narrative. A second—and equally fraught—effect of this tendency is the perpetuation of dominant assumptions that the popularity of his image was due to his status as a “Great Man.” This dissertation examines a subset of mid-century Napoleonic imagery that demonstrates the fl
APA, Harvard, Vancouver, ISO, and other styles
20

Akhlaq, Monis. "Improved performance high speed network intrusion detection systems (NIDS) : a high speed NIDS architectures to address limitations of packet loss and low detection rate by adoption of dynamic cluster architecture and traffic anomaly filtration (IADF)." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5377.

Full text
Abstract:
Intrusion Detection Systems (IDS) are considered as a vital component in network security architecture. The system allows the administrator to detect unauthorized use of, or attack upon a computer, network or telecommunication infrastructure. There is no second thought on the necessity of these systems however; their performance remains a critical question. This research has focussed on designing a high performance Network Intrusion Detection Systems (NIDS) model. The work begins with the evaluation of Snort, an open source NIDS considered as a de-facto IDS standard. The motive behind the eval
APA, Harvard, Vancouver, ISO, and other styles
21

Nag, Abhishek. "Understanding the genetic architecture of glaucoma and its endophenotypes." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/understanding-the-genetic-architecture-of-glaucoma-and-its-endophenotypes(2cd26bc9-2015-45eb-b7d5-6007d2d99207).html.

Full text
Abstract:
Heritability estimates for glaucoma and its endophenotypes [intraocular pressure (IOP) and vertical cup-to-disc ratio (VCDR)] indicate that genetic factors determine a significant part of the susceptibility to glaucoma or variance of its endophenotypes. Identification and characterization of glaucoma susceptibility genes will therefore help strengthen our understanding and provide insights into novel mechanisms underlying glaucoma pathogenesis. The GWAS era saw a surge in the identification of susceptibility genes for glaucoma and its endophenotypes. As has been the experience with most other
APA, Harvard, Vancouver, ISO, and other styles
22

Nobôa, Francisco José Viudes. "Análise do mecanismo de segurança da arquitetura IMS." [s.n.], 2012. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260053.

Full text
Abstract:
Orientador: Yuzo Iano<br>Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação<br>Made available in DSpace on 2018-08-20T16:13:03Z (GMT). No. of bitstreams: 1 Noboa_FranciscoJoseViudes_M.pdf: 2562716 bytes, checksum: 8090bd81ec54aaeab629033ee45a1ef0 (MD5) Previous issue date: 2012<br>Resumo: Considerando-se que para controlar e possibilitar a entrega de diversos conteúdos e serviços a qualquer tipo de acesso fazia-se necessário um núcleo bem definido e estruturado, surgiu o IMS (IP Multimedia Subsystem) com o propósito de prover a integr
APA, Harvard, Vancouver, ISO, and other styles
23

Cabral, Warren. "Architectural analysis and customised deployment of deceptive cowrie and conpot honeypots." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2021. https://ro.ecu.edu.au/theses/2468.

Full text
Abstract:
Honeypots are progressively becoming a fundamental cybersecurity tool to detect, prevent, and record new threats and attack methodologies used by attackers to penetrate systems. A honeypot is a deceptive or fake computer system that presents itself as a real computer system with actual sensitive information. A range of open-source honeypots are available today, such as Cowrie and Conpot, which can be easily downloaded and deployed within minutes—with default settings. Cowrie is a medium-interaction secure shell (SSH) and Telnet honeypot intended to log brute force and shell interaction attacks
APA, Harvard, Vancouver, ISO, and other styles
24

Pantam, Sneha. "BOOK-HUNT! ANDROID MOBILE APPLICATION USING INDOOR POSITIONING TECHNOLOGY." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/744.

Full text
Abstract:
Indoor Positioning System (IPS) focuses on locating objects inside Buildings. Till date, GPS has helped us obtain accurate locations outdoors. These locations have helped us in many ways like navigating to a destination point, tracking people etc. Indoor Positioning System aims at navigating and tracking objects inside buildings. [1] IndoorAtlas is a technology that works on the theory of Indoor Positioning System. Book-Hunt is an Android mobile application which majorly makes use of IndoorAtlas therefore making use of the technique of indoor tracking. This Android mobile application is design
APA, Harvard, Vancouver, ISO, and other styles
25

Wlaszyn, Joanna. "Dimension (in)visible : réception technologique comme valeur ajoutée vers une architecture amplifiée." Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1187.

Full text
Abstract:
L'objet de cette recherche consiste à capturer et analyser les relations entre l'architecture et les technologies récentes sous l'angle de la perception. Loin de la subjectivité supposée, l‘analyse guidée par la notion d'expérience perceptive s'appuie à la fois sur des concepts esthétiques et phénoménologiques. Cette double réflexivité porte également sur une étude de cas conceptuels et « concrets » qui opèrent la vision de la spatialité architecturale dans des tensions spéculatives entre le monde « numérique » et physique. La problématique porte sur la réception de l'architecture comme valeur
APA, Harvard, Vancouver, ISO, and other styles
26

Tantayakul, Kuljaree. "Mobility Management in New Internet Architectures." Phd thesis, Toulouse, INPT, 2018. http://oatao.univ-toulouse.fr/23732/1/Tantayakul_Kuljaree.pdf.

Full text
Abstract:
The software integration with new network architectures via Software-Defined Networking (SDN) axis appears to be a major evolution of networks. While this paradigm was primarily developed for easy network setup, its ability to integrate services has also to be considered. Thus, the mobility service for which solutions have been proposed in conventional architectures by defining standardized protocols should be rethought in terms of SDN service. Mobile devices might use or move in SDN network. In this thesis, we proposed a new mobility management approach which called "SDN-Mobility" and has sho
APA, Harvard, Vancouver, ISO, and other styles
27

Pagna, Disso Jules Ferdinand. "A novel intrusion detection system (IDS) architecture : attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Full text
Abstract:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention System
APA, Harvard, Vancouver, ISO, and other styles
28

Pagna, Disso Jules F. "A novel intrusion detection system (IDS) architecture. Attack detection based on snort for multistage attack scenarios in a multi-cores environment." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5248.

Full text
Abstract:
Recent research has indicated that although security systems are developing, illegal intrusion to computers is on the rise. The research conducted here illustrates that improving intrusion detection and prevention methods is fundamental for improving the overall security of systems. This research includes the design of a novel Intrusion Detection System (IDS) which identifies four levels of visibility of attacks. Two major areas of security concern were identified: speed and volume of attacks; and complexity of multistage attacks. Hence, the Multistage Intrusion Detection and Prevention
APA, Harvard, Vancouver, ISO, and other styles
29

Huang, Cuiting. "Service composition in converged service environment." Thesis, Evry, Institut national des télécommunications, 2012. http://www.theses.fr/2012TELE0009/document.

Full text
Abstract:
L'objectif de cette thèse est de fournir des mécanismes améliorés pour déployer des services compétitifs par des manières rapides et rentables. Nous proposons un modèle de composition de service basé sur un environnement IMS/Web convergent. Ce modèle permet aux utilisateurs non professionnels de réutiliser les services existants pour créer de nouveaux services facilement. Pour améliorer la fonctionnalité de composition automatique, trois stratégies, y compris mise à jour passive, mise à jour active et mise à jour hybride sont proposées et analysées. Nous introduisons ensuite une plateforme cen
APA, Harvard, Vancouver, ISO, and other styles
30

Cargelius, Lovisa. "Mariagårdstäppan." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213418.

Full text
Abstract:
Tillägget på Mariagårdstäppan ska bland annat rymma utbildningslokaler för en komvuxverksamhet, konferenslokaler och en restaurang. På tomten står idag en blåklassad palatsliknande byggnad anno 1875, Oscar den I:s minne. I och med Citybanans byggande har det lagds ned otroligt mycket tid, kompetens oh kapital för att rädda byggnaden från att kollapsa, så hur går man tillväga för att lyfta fram den befintliga byggnaden på bästa sätt? Området är präglat av byggnader från många olika historiska epoker, men det som utmärkte sig mest på platsen är de malmgårdar som uppförts runt Fatbursparken under
APA, Harvard, Vancouver, ISO, and other styles
31

Mani, Mehdi. "Stratégies d'overlay de service : d'une architecture centalisée vers le Pair-à-Pair." Paris 6, 2008. http://www.theses.fr/2008PA066188.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Luu, Thanh Tra. "Etude et mise en oeuvre d'une signalisation IP universelle." Paris, ENST, 2006. http://www.theses.fr/2006ENST0046.

Full text
Abstract:
Les futures générations d’Internet nécessitent un plan de contrôle puissant dans lequel la signalisation joue un rôle important en permettant l'échange d'information entre les entités du réseau. Cette thèse développe un protocole de signalisation IP générique, nommé GISP (Generic sIgnaling Service Protocol). Le protocole fournit les fonctionnalités communes qui sont exigées par la plupart des protocoles de signalisation IP incluant les services de gestion d’état, transport, et sécurité. GIPS implémente une approche soft-state pour gérer les sessions de signalisation établies dans les entités d
APA, Harvard, Vancouver, ISO, and other styles
33

Yeung, Adah. "Kunskapspalatsen : Vision." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-213975.

Full text
Abstract:
Kunskapspalatsen är en vuxenutbildning nära Fatubursparken i Stockholm. Projektets utgångspunkt var att ta inspiration från fiktiva koncepter för att styra projektet. Jag valde att utgå ifrån konceptet “tiden”, tagen från en berättelse som handlar om hur viktigt tiden är. Många associerar tiden med klockor eller med solens rörelse - något som de båda har gemensamt är att båda rör sig i cirklar. Då beslöt jag mig att jobba med en cirkulär rörelse i byggnaden. Slutprojektet blev en oval formade byggnad, men med raka väggar som går parallellt till omgivningens byggnader. Den rundade formen styr f
APA, Harvard, Vancouver, ISO, and other styles
34

Hao, Shilun. "IDS---Intelligent Dougong System: A Knowledge-based and Graphical Simulation of Construction Processes of China’s Song-style Dougong System." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1417702752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Rodriguez, Bertha Helena. "Modèle SOA sémantique pour la multimodalité et son support pour la découverte et l'enregistrement de services d'assistance." Thesis, Paris, ENST, 2013. http://www.theses.fr/2013ENST0006/document.

Full text
Abstract:
Les entrées et sorties unimodales dans les systèmes actuels ont atteint une maturité reconnue, avec les applications tactiles ou par les services distribués pour la géo-localisation ou la reconnaissance de la parole, du son ou l’'image. Cependant, l'intégration et l’instanciation de toutes ces modalités, manque d’une gestion intelligente du contexte d’acquisition et de restitution basée sur des notions fortement formalisées mais reflétant le sens commun. Ceci demande un comportement plus dynamique du système avec une approche plus adéquate pour gérer l'environnement de l'utilisateur. Cependant
APA, Harvard, Vancouver, ISO, and other styles
36

Atencio, Luis, Bruno Aybar, and Padilla Alfredo Barrientos. "Comparative analysis of cross-platform communication mechanisms." Association for Computing Machinery, 2018. http://hdl.handle.net/10757/624690.

Full text
Abstract:
El texto completo de este trabajo no está disponible en el Repositorio Académico UPC por restricciones de la casa editorial donde ha sido publicado.<br>The present research aims to compare the different technologies that allow real-time communication between Android and iOS devices. We conducted a measurement-driven experiment to test the performance of each technology under different scenarios. We determine their functionality according to the environment for which they have been developed, showing competent information about their capabilities based on the communication channel they use, and
APA, Harvard, Vancouver, ISO, and other styles
37

Onesti, Laura. "From F energy rating to Nearly ZEB: project of energy retrofit and architectural upgrade of a brick terraced house in Co. Dublin, Ireland." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016.

Find full text
Abstract:
Questo progetto è stato sviluppato durante un periodo di ricerca presso il Dipartimento di Ingegneria Civile del Trinity College e continuato presso l’Università di Bologna. Il progetto ha l’obiettivo di analizzare le soluzioni per l’ampliamento, la sostituzione degli impianti e l’ottimizzazione energetica di un tipico edificio residenziale Irlandese, una end of terrace in mattoni costruita negli anni ’20, collocata a Blackrock (Dublino). Diversi studi sostengono che lo stock abitativo irlandese è il peggiore del nord Europa per quanto riguarda la performance energetica. Questa tesi consta
APA, Harvard, Vancouver, ISO, and other styles
38

Gudimetla, Thakshak Mani Chandra Reddy. "ORGANIZE EVENTS MOBILE APPLICATION." CSUSB ScholarWorks, 2018. https://scholarworks.lib.csusb.edu/etd/772.

Full text
Abstract:
In a big organization there are many events organized every day. To know about the events, we typically need to check an events page, rely on flyers or on distributed pamphlets or through word of mouth. To register for an event a user now a days typically does this online which involves inputting user details. At the event, the user either signs a sheet of paper or enters credentials in a web page loaded on a tablet or other electronic device. Typically, this is a time-consuming process with many redundancies like entering user details every time the user wants to register for a new event and
APA, Harvard, Vancouver, ISO, and other styles
39

Mahdi, Mohamed. "Architectures réseaux pour le partage de contenus multimédias avec garantie de qualité de service." Phd thesis, Université Paul Sabatier - Toulouse III, 2011. http://tel.archives-ouvertes.fr/tel-00667635.

Full text
Abstract:
Le succès des services de partage de contenus multimédias sur internet témoigne de l'intérêt des utilisateurs à partager leurs expériences personnelles à travers des fichiers multimédias (photo, vidéo, musique). Les solutions actuelles sont basées essentiellement sur des serveurs web et souffrent d'un manque de QoS, de sécurité et de confidentialité. Plusieurs travaux de recherche ont été menés pour proposer des architectures réseaux d'accès à distance pour de tels services. Ils sont soit trop complexes pour être utilisés par des services dédiés au grand public, soit inadaptés au contexte de p
APA, Harvard, Vancouver, ISO, and other styles
40

Arbault, Damien. "Globalized impacts International trade accounting in a hybrid LCI method." Thesis, KTH, Urban and Regional Studies, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-24863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

COSTA, Wagner Elvio de Loiola. "SISTEMA DE DETECÇÃO DE INTRUSÃO EM REDES BASEADO EM SOA (NIDS-SOA) PARA SUPORTAR A INTEROPERABILIDADE ENTRE IDS S: APLICAÇÃO AO NIDIA." Universidade Federal do Maranhão, 2012. http://tedebc.ufma.br:8080/jspui/handle/tede/497.

Full text
Abstract:
Made available in DSpace on 2016-08-17T14:53:23Z (GMT). No. of bitstreams: 1 Dissertacao Wagner Elvio.pdf: 4463476 bytes, checksum: 4fda2686652d403cd2641f98f3b51575 (MD5) Previous issue date: 2012-10-10<br>The antivirus system and firewall are protection systems designed to prevent malicious work in the network, thus constituting a barrier to invaders (e.g. vírus, worms e hackers). However, there is no guarantee a full protection to network and computers, invasions can occur by exploiting vulnerabilities, known, and allow running programs remotely, changing privileges within the system and
APA, Harvard, Vancouver, ISO, and other styles
42

Karachaliou, Ermioni. "The architectural and iconographic identity of Paliochora on Aegina : an introduction to its Late and Post Byzantine churches." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/the-architectural-and-iconographic-identity-of-paliochora-on-aegina-an-introduction-to-its-late-and-post-byzantine-churches(4d5fdfec-712e-4b7b-a875-b74404fba8cc).html.

Full text
Abstract:
How can we approach the surviving evidence on Paliochora in order for it to become a site of cultural consciousness in a wider medieval context? Its architectural and iconographic identity is hidden in its thirty-four Late and Post Byzantine churches. This thesis constitutes the first complete interdisciplinary approach to this settlement accompanied by a detailed appendix in the second volume. The two parts of this study examine Paliochora through different perspectives which reveal different aspects of its character. Urban planning and individual architectural specificities are examined thro
APA, Harvard, Vancouver, ISO, and other styles
43

Andersson, Robin. "CAN-bus Multi-mixed IDS : A combinatory approach for intrusion detection in the controller area network of personal vehicles." Thesis, Malmö universitet, Fakulteten för teknik och samhälle (TS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-43450.

Full text
Abstract:
With the digitalization and the ever more computerization of personal vehicles, new attack surfaces are introduced, challenging the security of the in-vehicle network. There is never such a thing as fully securing any computer system, nor learning all the methods of attack in order to prevent a break-in into a system. Instead, with sophisticated methods, we can focus on detecting and preventing attacks from being performed inside a system. The current state of the art of such methods, named intrusion detection systems (IDS), is divided into two main approaches. One approach makes its models ve
APA, Harvard, Vancouver, ISO, and other styles
44

Pint, Alexander Steven. "Building energy codes and their impact on greenhouse gas emissions in the United States." Kansas State University, 2015. http://hdl.handle.net/2097/20534.

Full text
Abstract:
Master of Science<br>Architectural Engineering and Construction Science<br>Russell J. Murdock<br>The purpose of this study is to identify and explore relationships between the building industry, building energy usage, and how both the industry and the energy usage correspond to greenhouse gas (GHG) emissions in the United States. Building energy codes seek to reduce energy usage and, subsequently, GHG emissions. This study specifically seeks to determine the impact that most current U.S. building energy codes could have on national GHG emissions if widespread adoption and enforcement of those
APA, Harvard, Vancouver, ISO, and other styles
45

Stockselius, Johan. "Studiepark: Södermalm." Thesis, KTH, Arkitektur, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-208870.

Full text
Abstract:
Studiepark: Södermalm Rätten till utbildning är en av våra mest värdefulla och bör vara en självklarhet, oberoende av vilket skede i livet man befinner sig i. Statusen på vuxenutbildningar tenderar dock att vara låg i förhållande till andra utbildningsformer och de lokaler där undervisning sker är ofta eftersatta eller förpassade gamla kontorslokaler. Studiepark: Södermalm är ett förslag på en ny byggnad tillägnad vuxenutbildning med målsättning att bli en viktig symbol för vuxenutbildningen och att höja statusen på undervisningsformen. Studiepark: Södermalm är belägen i Fatbursparken på Söder
APA, Harvard, Vancouver, ISO, and other styles
46

Gottschling, Paul Thomas. "To submit is to relate : a study of architectural competitions within networks of practice." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/to-submit-is-to-relate-a-study-of-architectural-competitions-within-networks-of-practice(c3f8961d-94a8-4c91-91e2-935a6dcc4bf9).html.

Full text
Abstract:
This is a study of architectural competitions as they engage with the design practices of architects within the UK and Europe. Since only one firm or one design emerges at the end, and the project programme exists prior to the submissions, there tends to be a gap between programme and practice, past and future, language and situation. It is the aim of this research to investigate what changes in our understanding of architectural practice when we acknowledge that architects work to linear programmes and submit deliverables within the set of relations that make up the competition. In conducting
APA, Harvard, Vancouver, ISO, and other styles
47

Liotsios, Kyriakos. "3D-Modeling and Energy Simulation of a Single Family House in Southern Greece." Thesis, KTH, Byggvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91394.

Full text
Abstract:
Energy usage deriving from human activities is increasing day by day acting against the quality of the environment and the sustainable use of natural resources. The major impact of these actions is reflected on the quality of daily life. In order to face the challenge of preserving an acceptable balance between human needs and environmental status, the combination of proper design and energy simulation of buildings is the key towards smarter and more sustainable solutions. Solutions that covers a respectable percentage of the current domestic energy needs without further environmental foot pri
APA, Harvard, Vancouver, ISO, and other styles
48

Wulff, Tobias. "Evaluation of and Mitigation against Malicious Traffic in SIP-based VoIP Applications in a Broadband Internet Environment." Thesis, University of Canterbury. Computer Science and Software Engineering, 2010. http://hdl.handle.net/10092/5120.

Full text
Abstract:
Voice Over IP (VoIP) telephony is becoming widespread, and is often integrated into computer networks. Because of his, it is likely that malicious software will threaten VoIP systems the same way traditional computer systems have been attacked by viruses, worms, and other automated agents. While most users have become familiar with email spam and viruses in email attachments, spam and malicious traffic over telephony currently is a relatively unknown threat. VoIP networks are a challenge to secure against such malware as much of the network intelligence is focused on the edge devices and acces
APA, Harvard, Vancouver, ISO, and other styles
49

Gad, El Rab Mohammed. "Evaluation des systèmes de détection d'intrusion." Phd thesis, Université Paul Sabatier - Toulouse III, 2008. http://tel.archives-ouvertes.fr/tel-00366690.

Full text
Abstract:
Cette thèse vise à contribuer à l'amélioration des méthodes d'évaluation des systèmes de détection d'intrusion (en anglais, Intrusion Detection Systems ou IDS). Ce travail est motivé par deux problèmes actuels : tout d'abord, l'augmentation du nombre et de la complexité des attaques que l'on observe aujourd'hui nécessite de faire évoluer les IDS pour leur permettre de les détecter. Deuxièmement, les IDS actuels génèrent de trop fréquentes fausses alertes, ce qui les rend inefficaces voir inutiles. Des moyens de test et d'évaluation sont nécessaires pour déterminer la qualité de détection des I
APA, Harvard, Vancouver, ISO, and other styles
50

Guerriero, Annie. "La représentation de la confiance dans l'activité collective Application à la coordination de l'activité de chantier de construction." Phd thesis, Institut National Polytechnique de Lorraine - INPL, 2009. http://tel.archives-ouvertes.fr/tel-00558823.

Full text
Abstract:
Les spécificités du secteur de la construction engendrent un contexte de travail coopératif que nous pouvons qualifier d'incertain par nature. L'activité de chantier se caractérise par un mode de production in situ. Dès lors, nombreux sont les dysfonctionnements qui peuvent apparaître. Nous citerons, par exemple, les problèmes liés à la nature du sol, aux intempéries ou encore ceux qui sont propres aux interactions entre les intervenants (ex. fourniture en matériaux, interfaces entre les corps de métier...). Aussi, la coordination repose sur un mélange subtil entre interactions implicites et e
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!