Academic literature on the topic 'Internet of Threads'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Internet of Threads.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Internet of Threads"

1

Tillabaeva, A. A., and V. A. Shulginov. "Speech behaviour of Internet users in conflict communication." Slovo.ru: Baltic accent 11, no. 4 (2020): 45–57. http://dx.doi.org/10.5922/2225-5346-2020-4-4.

Full text
Abstract:
This article explores the expression of impoliteness of Internet users in confrontational threads. This approach involves the identification of speech aggression markers typical of a certain type of discourse. This makes it possible to define the roles and attitudes of partici­pants in the conflict interaction. The authors employed methods of discourse analysis and corpus tools of data collection and marking. Seven confrontational threads in the communities of the social network "Vkontakte" were analysed. The authors identified language markers of the switch from cooperative to confrontational speech interaction. The authors investigated the typical roles of communicators in a confrontational thread, and observed the dynamics of using aggressive language tools for each of the proposed strategies. The article describes typi­cal situations for the confrontational threads: reliability of the information presented, lack of the user's intention to check facts, and the violation of spelling and punctuation rules. Con­frontations around these situations tend to lead to more complex conflicts and are character­ized as motives typical of impolite communication.
APA, Harvard, Vancouver, ISO, and other styles
2

CLARK, KEITH, PETER J. ROBINSON, and RICHARD HAGEN. "Multi-threading and message communication in Qu-Prolog." Theory and Practice of Logic Programming 1, no. 3 (May 2001): 283–301. http://dx.doi.org/10.1017/s147106840100120x.

Full text
Abstract:
This paper presents the multi-threading and internet message communication capabilities of Qu-Prolog. Message addresses are symbolic and the communications package provides high-level support that completely hides details of IP addresses and port numbers as well as the underlying TCP/IP transport layer. The combination of the multi-threads and the high level inter-thread message communications provide simple, powerful support for implementing internet distributed intelligent applications.
APA, Harvard, Vancouver, ISO, and other styles
3

Marshall, Michael. "Fungal threads are the internet of the plant world." New Scientist 208, no. 2786 (November 2010): 14. http://dx.doi.org/10.1016/s0262-4079(10)62793-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saravanan, D. "A Proposed Architecture for Finding Missing Threads in Internet." Bioscience Biotechnology Research Communications 13, no. 13 (December 25, 2020): 363–67. http://dx.doi.org/10.21786/bbrc/13.13/56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

TIGELAAR, ALMER S., RIEKS OP DEN AKKER, and DJOERD HIEMSTRA. "Automatic summarisation of discussion fora." Natural Language Engineering 16, no. 2 (March 24, 2010): 161–92. http://dx.doi.org/10.1017/s135132491000001x.

Full text
Abstract:
AbstractWeb-based discussion fora proliferate on the Internet. These fora consist of threads about specific matters. Existing forum search facilities provide an easy way for finding threads of interest. However, understanding the content of threads is not always trivial. This problem becomes more pressing as threads become longer. It frustrates users that are looking for specific information and also makes it more difficult to make valuable contributions to a discussion. We postulate that having a concise summary of a thread would greatly help forum users. But, how would we best create such summaries? In this paper, we present an automated method of summarising threads in discussion fora. Compared with summarisation of unstructured texts and spoken dialogues, the structural characteristics of threads give important advantages. We studied how to best exploit these characteristics. Messages in threads contain both explicit and implicit references to each other and are structured. Therefore, we term the threads hierarchical dialogues. Our proposed summarisation algorithm produces one summary of an hierarchical dialogue by ‘cherry-picking’ sentences out of the original messages that make up a thread. We try to select sentences usable for obtaining an overview of the discussion. Our method is built around a set of heuristics based on observations of real fora discussions. The data used for this research was in Dutch, but the developed method equally applies to other languages. We evaluated our approach using a prototype. Users judged our summariser as very useful, half of them indicating they would use it regularly or always when visiting fora.
APA, Harvard, Vancouver, ISO, and other styles
6

Zen Munawar, S.T., S.Kom., M.Kom. "PENGGUNAAN METODE MULTI THREADS UNTUK PENGELOLAAN PROSES DOWNLOAD DI INTERNET." TEMATIK 1, no. 1 (June 30, 2014): 47–58. http://dx.doi.org/10.38204/tematik.v1i1.35.

Full text
Abstract:
Abstrak : Penelitian ini bertujuan merancang aplikasi download manager yang dapat mengatur beberapa proses download sekaligus dengan metode multi-thread pada sebuah aplikasi download yang efisien dan membandingkan aplikasi yang dibuat dengan aplikasi yang sudah ada. Hasil penelitian ini diharapkan dapat memberikan kegunaan bagi pengguna internet dalam melakukan proses download file dengan sebuah aplikasi yang dapat menangani beberapa proses download serta memberikan pilihan thread (eksekusi download terhadap file) dengan metode multi-thread. Hasil pengujian pada penelitian ini, aplikasi yang dibuat setara dengan aplikasi berlisensi yang sudah ada.
APA, Harvard, Vancouver, ISO, and other styles
7

Coles, Bryn Alexander, and Melanie West. "Weaving the internet together: Imagined communities in newspaper comment threads." Computers in Human Behavior 60 (July 2016): 44–53. http://dx.doi.org/10.1016/j.chb.2016.02.049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kaigo, Muneo. "Internet Aggregators Constructing the Political Right Wing in Japan." JeDEM - eJournal of eDemocracy and Open Government 5, no. 1 (November 20, 2013): 59–79. http://dx.doi.org/10.29379/jedem.v5i1.184.

Full text
Abstract:
The Matome Saito are edited popular topic threads of the Ni-Channel anonymous bulletin board. The information on the Matome Saito is efficiently and concisely edited for those who do not usually access the vast Ni-Channel forum. This paper overviews the state and mechanism of the Ni-Channel forum of Japan, the edited blogs of Ni-Channel called Matome Saito, and aggregation of Matome Saito in relation to online aggregation and politics, with a focus on Japan and the December 2012 election. This paper examines the tone argument of the Matome Saito aggregation by conducting a content analysis of 148 politically related threads from November 16, 2012 to December 20, 2012 spanning the time period following the dissolving of the Japanese government by Prime Minister Noda to five days after the election.
APA, Harvard, Vancouver, ISO, and other styles
9

Squires, Lauren. "Enregistering internet language." Language in Society 39, no. 4 (August 18, 2010): 457–92. http://dx.doi.org/10.1017/s0047404510000412.

Full text
Abstract:
AbstractThis article investigates the enregisterment of an internet-specific language variety and its features. The enregisterment of internet language is explored through several sites of metadiscourse: academic scholarship about computer-mediated communication, uses of the metalinguistic termsnetspeakandchatspeakin print media, and online comment threads about language and the internet. This metadiscourse provides evidence of a shared concept of internet language as comprising distinctive written features, primarily acronyms, abbreviations, and respellings. Internet language's enregisterment emerges from standard language ideology and deterministic views of technology, where the construal of these features as both nonstandard and internet-specific articulates the perceived distinctiveness of internet interactions. Yet empirical evidence shows that these features are relatively rare in instant messaging conversations, one form of interaction to which internet language is attributed; this discrepancy has implications for the application of indexical order to enregisterment. (Enregisterment, language ideology, computer-mediated communication, internet, metadiscourse, indexical order, Standard English, technological determinism, mass media)*
APA, Harvard, Vancouver, ISO, and other styles
10

Kamiński, Mikołaj, Michał Borger, Piotr Prymas, Agnieszka Muth, Adam Stachowski, Igor Łoniewski, and Wojciech Marlicz. "Analysis of Answers to Queries among Anonymous Users with Gastroenterological Problems on an Internet Forum." International Journal of Environmental Research and Public Health 17, no. 3 (February 6, 2020): 1042. http://dx.doi.org/10.3390/ijerph17031042.

Full text
Abstract:
Internet forums are an attractive source of health-related information. We aimed to investigate threads in the gastroenterological section of a popular Polish medical forum for anonymous users. We characterised the following aspects in threads: the main problem of the original poster, declared ailments and rationale of the responses (rational, neutral, harmful or not related to the problem of the original poster). We analysed over 2717 forum threads initiated in the years 2010–2018. Users mostly asked for diagnosis of the problem [1814 (66.8%)], treatment [1056 (38.9%)] and diagnostic interpretation [308 (11.3%)]. The most commonly declared symptoms were abdominal pain [1046 (38.5%)], diarrhea [454 (16.7%)] and bloating [354 (13.0%)]. Alarm symptoms were mentioned in 309 (11.4%) threads. From the total 3550 responses, 1257 (35.4%) were assessed as rational, 693 (19.5%) as neutral, 157 (4.4%) as harmful and 1440 (40.6%) as not related to the user’s problem. The original poster’s declaration of blood in stool, dyspepsia, pain in the abdominal right lower quadrant, weight loss or inflammatory bowel disease was positively related to obtaining at least one potentially harmful response. Advice from anonymous users on Internet forums may be irrational and disregards alarm symptoms, which can delay the diagnosis of life-threatening diseases.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Internet of Threads"

1

Giuggioloni, Federico. "PycoTCP: Una libreria Python per l'Internet of Threads." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/11888/.

Full text
Abstract:
Grazie all'evoluzione dei servizi di rete indirizzare le interfacce di rete come se fossero i veri destinatari delle comunicazioni è diventato obsoleto. Per questo è nato il concetto di Internet of Threads, in cui gli indirizzi IP sono assegnati ad ogni processo in esecuzione nel computer mediante una rete ethernet virtuale. Attualmente esistono progetti che forniscono la gestione della rete virtuale e librerie che forniscono lo stack TCP/IP da integrare all'interno dei propri programmi. Queste librerie richiedono però la modifica e ricompilazione del proprio codice, anche a causa della loro interfaccia differente dai Berkeley Socket. Attraverso PycoTCP è possibile sperimentare all'interno di un ambiente IoTh senza riscrivere il proprio codice. Inoltre unifica le API fornite dalle librerie sottostanti esponendo una interfaccia identica a quella standard del Python, in modo che non sia necessario imparare un altro metodo di programmazione per utilizzare il nuovo paradigma.
APA, Harvard, Vancouver, ISO, and other styles
2

De, Marchi Federico. "Studio e implementazione di strumenti di domain name resolution per l'Internet of Threads." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/23547/.

Full text
Abstract:
Nell'Internet of Threads ogni processo può avere il proprio indirizzo e nome di dominio. Facendo uso combinato di IPv6, DNS e virtualizzazione di stack di rete si vanno a costruire sistemi per abilitare l'uso di sistemi basati su indirizzi IPv6 generati da funzioni hash, per facilitare il deployment (indirizzi basati su nomi di dominio) e rafforzare la sicurezza (indirizzi temporanei) di infrastrutture dell'Internet of Threads e di sistemi classici. Il principale strumento implementato in seguito allo studio dei requisiti di base è VdeDNS, un proxy DNS per la risoluzione di indirizzi hash IPv6. A seguire sono implementati e sperimentati strumenti per l'abilitazione di sistemi di sicurezza basati su indirizzi temporanei.
APA, Harvard, Vancouver, ISO, and other styles
3

Aronsson, Johanna. "Code Switching on Flashback : A Study of Code Switching on an Internet Based Discussion Forum." Thesis, Södertörns högskola, Institutionen för kultur och lärande, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-26800.

Full text
Abstract:
This essay is a study of how English is used in a Swedish discussion forum called Flashback. The mixing of two languages when speaking or writing is called Code switching. Code switching often occurs in bilingual societies. In Sweden it is possible to say that English is a second language due to the daily encounter with the language through education, but also through different media. The daily encounter with English and the number of English loan words in Swedish might be a reason why code switching exists in Sweden. The material that was analyzed in this essay was collected from Flashback and analyzed with a method based on Sharp’s (2001) study of spoken language. The aim of this study was to see how often and in what way the users on Flashback code switched between Swedish and English. The results showed that even though English was used in the discussion, Swedish was the main language. Most of the code switches that were found in the material occurred in mixed units, in other words English was mixed with Swedish.
APA, Harvard, Vancouver, ISO, and other styles
4

Bertin, Gilberto. "ExoTCP: uno stack di rete minimale e userspace specializzato per il protocollo HTTP." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7875/.

Full text
Abstract:
In questo lavoro verrà presentato ExoTCP, uno stack di rete minimale e userspace specializzato per il protocollo HTTP. Verrà inoltre presentato Eth, un server web zerocopy che utilizza ExoTCP per servire contenuti statici. L'obiettivo del lavoro è riuscire ad ottenere prestazioni migliori di quelle di un server web tradizionale che si appoggia ai servizi offerti dal sistema operativo per accedere alla rete.
APA, Harvard, Vancouver, ISO, and other styles
5

Nasyrov, Ildar. "Výroby závitů závitníky." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2017. http://www.nusl.cz/ntk/nusl-318401.

Full text
Abstract:
In the theoretical part of this thesis are described types of threads, methods of production and control of threads, types of taps, types of coatings and cutting fluids, analysis of specific cutting forces during thread cutting and theoretical analysis of the cross-section distribution by taps using. The experimental part of this thesis includes the production of internal threads by cutting tap at constant cutting conditions. The cutting time was measured according to the function of time during the experiment. The measured data were statistically processed and, as a result, the cost of one thread production was calculated.
APA, Harvard, Vancouver, ISO, and other styles
6

Alm, Anton. "Internet of Things mesh network : Using the Thread networking protocol." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-70809.

Full text
Abstract:
This thesis summarizes my project in setting up a Thread network. The idea of this project was presented by the company ÅF in Karlstad, Sweden. ÅF wishes to upgrade their current demonstrator for IoT. The current demonstrator includes Azure Cloud component, Raspberry Pi, Bluetooth and Arduino components. The upgrade includes implementing Thread technology together with Thread verified hardware from Nordic semiconductor and the Raspberry Pi Foundation. Thread is an IoT mesh networking protocol that was released year 2014. Compared to Bluetooth it offers IP communication (including IPv6) combined with higher reliability, performance and security. The process of installing, compiling and configuring the Thread network is explained. The result is an operational thread network that has sensor devices sending data to an HTTP web server, where the data is stored and monitored. Though, there are many improvements and functions that can be implemented to make this demonstrator more appealing.
APA, Harvard, Vancouver, ISO, and other styles
7

Mealer, Michael J. "Internet Radicalization : Actual Threat or Phantom Menace?" Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/17416.

Full text
Abstract:
Approved for public release; distribution is unlimited
Popular opinion expresses fear that accessing radical Islamic content and connecting with extremist networks through Internet functionalities causes radicalization and recruitment to commit terrorist acts. Anecdotal evidence has been used to support this assertion. The opinion assumes the Internet creates a new path that drives radicalization and recruitment. Whether computer-mediated communication (CMC) and Internet functionalities cause individuals to radicalize has not been thoroughly studied. This thesis explores whether a correlation can be found to attribute radicalization to radicalizing content and extremist networks accessed through CMC and Internet functionalities. A framework is used to evaluate vulnerabilities identified by the psychological, sociological and social-psychological elements of radicalization against the radicalization process, personal history, and the presence of radicalizing conventional communication and extremist contact. The analysis finds three cases that may support a conclusion that Internet radicalization is possible; however, the importance of root causes and individual vulnerabilities may have a greater impact. Since some circumstances involving CMC may increase the likelihood of radicalization, the fear of Internet radicalization may be reasonable, but the number of incidents validating that fear makes the threat unlikely, and appears more as a phantom menace than a real threat.
APA, Harvard, Vancouver, ISO, and other styles
8

Fifield, David. "Threat Modeling and Circumvention of Internet Censorship." Thesis, University of California, Berkeley, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688573.

Full text
Abstract:

Research on Internet censorship is hampered by poor models of censor behavior. Censor models guide the development of circumvention systems, so it is important to get them right. A censor model should be understood not just as a set of capabilities—such as the ability to monitor network traffic—but as a set of priorities constrained by resource limitations.

My research addresses the twin themes of modeling and circumvention. With a grounding in empirical research, I build up an abstract model of the circumvention problem and examine how to adapt it to concrete censorship challenges. I describe the results of experiments on censors that probe their strengths and weaknesses; specifically, on the subject of active probing to discover proxy servers, and on delays in their reaction to changes in circumvention. I present two circumvention designs: domain fronting, which derives its resistance to blocking from the censor's reluctance to block other useful services; and Snowflake, based on quickly changing peer-to-peer proxy servers. I hope to change the perception that the circumvention problem is a cat-and-mouse game that affords only incremental and temporary advancements. Rather, let us state the assumptions about censor behavior atop which we build circumvention designs, and let those assumptions be based on an informed understanding of censor behavior.

APA, Harvard, Vancouver, ISO, and other styles
9

Larsson, Victor. "IoT - an internet of threats? : Identifying the dangers of an IoT-connection." Thesis, Blekinge Tekniska Högskola, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-15351.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Sieklik, Ivan. "Thread Smart Home Model." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316420.

Full text
Abstract:
This thesis is focused on smart buildings where communication and automatization technologies are deployed. It includes overview and description of frequently applied network protocols in smart homes and their side by side comparison with an emphasis on Thread networking protocol. The next chapters describe details and parameters of used development boards provided by NXP Semiconductors and their implementation in a smart home model. Subsequent chapters are focused on hardware and software components which are the basis for smart home model’s internal workings. The last chapter highlights how a physical model of a smart home was developed with suggestions for future improvements.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Internet of Threads"

1

.NET multithreading. Greenwich, Conn: Manning, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shiaeles, Stavros, and Nicholas Kolokotronis, eds. Internet of Things, Threats, Landscape, and Countermeasures. Boca Raton : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003006152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thermos, Peter. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Boston, MA: Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ari, Takanen, ed. Securing VoIP networks: Threats, vulnerabilities, and countermeasures. Upper Saddle River, NJ: Addison-Wesley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dienel, Hans-Liudger. Terrorism and the Internet: Threats, target groups, deradicalisation strategies. Amsterdam: IOS Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Terrorism and the Internet: Threats, target groups, deradicalisation strategies. Amsterdam: IOS Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Godman, Rob. Internet: Threat or opportunity to the printer?. London: LCPDT, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bou-Harb, Elias, and Nataliia Neshenko. Cyber Threat Intelligence for the Internet of Things. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45858-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Threat talk: The comparative politics of internet addiction. Burlington, VT: Ashgate, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

The twisted thread. New York: Hyperion/Voice, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Internet of Threads"

1

Enokido, Tomoya, and Makoto Takizawa. "The Improved Active Time-Based (IATB) Algorithm with Multi-threads Allocation." In Advances in Internet, Data and Web Technologies, 134–42. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70639-5_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wolf, Marilyn, and Dimitrios Serpanos. "Threats and Threat Analysis." In Safe and Secure Cyber-Physical Systems and Internet-of-Things Systems, 35–45. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-25808-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Buchmann, Johannes A. "Privacy Threats and Their Impact on the Core Values." In Internet Privacy, 61–71. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37913-0_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hallur, Sudhakar, Roopa Kulkarni, and Prashant Patavardhan. "Introduction, Security Challenges, and Threats in IoT." In Internet of Things, 13–38. First edition. | Boca Raton, FL : CRC Press/Taylor & Francis Group, LLC, 2021.: CRC Press, 2020. http://dx.doi.org/10.1201/9781003032441-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Patten, Mildred L., and Michelle Newhart. "Threats to Internal Validity." In Understanding Research Methods, 186–88. Tenth edition. | New York, NY : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.4324/9781315213033-60.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

McCall, Robert B., and Christina J. Groark. "Relationships and Internal Threats." In Conducting International Research and Service Collaborations, 185–95. New York: Routledge, 2021. http://dx.doi.org/10.4324/9781003183433-16-19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Peratikou, A., S. Shiaeles, and S. Stavrou. "Threats in Critical Infrastructures." In Internet of Things, Threats, Landscape, and Countermeasures, 97–135. Boca Raton : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003006152-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scheidt, N., and M. Adda. "Threats in Industrial IoT." In Internet of Things, Threats, Landscape, and Countermeasures, 137–66. Boca Raton : CRC Press, 2021.: CRC Press, 2021. http://dx.doi.org/10.1201/9781003006152-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cabaj, Krzysztof, Konrad Grochowski, and Piotr Gawkowski. "Practical Problems of Internet Threats Analyses." In Advances in Intelligent Systems and Computing, 87–96. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19216-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dhanoa, Amanpreet Singh. "Implementation of Protection Protocols for Security Threats in SDN." In Internet of Things, 247–55. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-89328-6_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Internet of Threads"

1

"MINOS - Threads of Knowledge." In Science, Art and Internet Technology: Using Mobile Devices in Cultural Environments. SciTePress - Science and and Technology Publications, 2007. http://dx.doi.org/10.5220/0001292604750478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Davoli, Renzo. "VXVDEX: Internet of threads and networks of namespaces." In ICC 2017 - 2017 IEEE International Conference on Communications. IEEE, 2017. http://dx.doi.org/10.1109/icc.2017.7996595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kalebe, Rubem, Gustavo Girao, and Itamir Filho. "A library for scheduling lightweight threads in Internet of Things microcontrollers." In 2017 International Conference on Computing Networking and Informatics (ICCNI). IEEE, 2017. http://dx.doi.org/10.1109/iccni.2017.8123793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Nagata, Satoshi, Shinichi Fujita, and Toshiyuki Sawa. "A Comparative Study on Mechanical Behavior of Pipe-Socket Threaded Joints With Taper-Taper Threads and Taper-Parallel Threads Combinations by Finite Element Analysis and Experiments." In ASME 2018 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/pvp2018-84657.

Full text
Abstract:
There are two types of combination between external and internal threads used in threaded pipe connections for pressure piping specified in industrial standards like JIS as well as ISO. One is the combination that taper external thread of pipe is engaged with taper internal thread of a fitting. The other is that taper external thread of pipe is engaged with parallel internal thread of a fitting. Taper thread is always used for external thread outside the pipe wall. Both taper thread and parallel one are applicable to internal thread inside the fittings. This paper evaluates the mechanical behaviors of threaded pipe-socket joints (or pipe-coupling joints) and the difference due to the thread type combinations by means of axisymmetric finite element analysis for 3/4” and 3” joints. The analysis shows that the taper-taper threads combination establishes the full-length contact over the engaged threads but the taper-parallel has only a pair of threads in contact at the 1st engaged thread from the end of socket, and the difference results in the different behaviors of the joints. Stress and strain pattern also completely differ due to the difference in the engaged thread length. No significant effect of the size has been found in the present analysis for 3/4”and 3” joints. Experimental tightening tests and pressure leak tests have also been carried out for 3/4” and 3” joints with taper-taper threads combination. The measured experimental stress for 3/4” joints has shown an agreement with the simulated one fairly well. The pressure leak tests have demonstrated that the taper-taper threaded pipe-socket joints can hold internal pressure without leakage without using thread seal tape or jointing compound under low-pressure service condition. The 3/4” joints have started leaking at 1–4MPaG of internal pressure. The 3” joints haven’t shown leakage even at 6MPaG of internal pressure applied.
APA, Harvard, Vancouver, ISO, and other styles
5

Thames, J. Lane, Andrew Hyder, Robert Wellman, and Dirk Schaefer. "An Information Technology Infrastructure for Internet-Enabled Remote and Portable Laboratories." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-87112.

Full text
Abstract:
With the proliferation of distributed and distance learning in higher education, there is a growing need for remote and portable laboratory design and deployment for the engineering, science, and technology education sectors. Amongst the current threads of research in this area, very little work has focused on solutions to the challenges, which are imposed by modern day information technology infrastructure, enterprise networks, and enterprise network security change management processes, that will be faced by large scale deployments of remote and portable labs. In this paper, the authors will discuss some of these challenges and will propose the use of the command and control communications architecture coupled with Web 2.0 as a solution to many of the deployment challenges.
APA, Harvard, Vancouver, ISO, and other styles
6

Galle, Timothy, Wim De Waele, and Patrick De Baets. "Enhancing Trapezoidal Threads Using a Parametric Numerical Approach." In ASME 2015 Pressure Vessels and Piping Conference. American Society of Mechanical Engineers, 2015. http://dx.doi.org/10.1115/pvp2015-45192.

Full text
Abstract:
A parametric program designed for modeling tapered, trapezoidal threaded connections is used in combination with Abaqus to investigate the behavior of couplings subjected to static load combinations containing make-up, axial tension and internal pressure. Three criteria are defined and used to quantify the performance of the connection: load distribution, helical gap size between the threads and the amount of global plasticity. From these parameters, the load distribution provides valuable information about the effectiveness of the load bearing characteristics of the thread and can be used to detect possible overstressing of the connection. The helical gap size is used to estimate its tendency to provide a leak tight thread seal, while the global plasticity reflects the total amount of plastic deformation within the connection. During the investigation, the effects of taper angle, load flank angle, wall thickness, size of threads and initial thread clearance are considered. The presented modeling approach consists of three parts. First, the optimal make-up position for a trapezoidal threaded 4.5 inch TN80 connection is calculated using the plasticity criterion. Next, the results for the three performance parameters as a function of both axial tension and internal pressure are discussed. Finally, after investigating the various isolated effects induced by geometric changes, a newly defined, enhanced threaded geometry is suggested and compared with the standardized API-buttress thread.
APA, Harvard, Vancouver, ISO, and other styles
7

Nagata, Satoshi, Shinichi Fujita, and Toshiyuki Sawa. "FEM Stress Analysis and Leakage Behavior of Pipe-Socket Threaded Joints Subjected to Bending Moment and Internal Pressure." In ASME 2020 Pressure Vessels & Piping Conference. American Society of Mechanical Engineers, 2020. http://dx.doi.org/10.1115/pvp2020-21221.

Full text
Abstract:
Abstract This paper is a report of the studies on the mechanical behaviors and leakage characteristics of pipe-socket threaded joints subjected to bending moment as well as internal pressure by means of experimental tests and finite element simulations. The paper dealt with the 3/4″ and 3″ joints, and the joints for both sizes have two different combinations of thread types in the pipe and socket, i.e. taper-taper thread combination or taper-parallel one, respectively. Experimental bending leak tests showed that the taper-taper joints could retain internal pressure under bending load up to nearly plastic collapse. The taper-parallel joints, however, could hardly keep internal pressure against bending moment even the sealing tape was applied to enhance the sealing performance. Finite element analysis was carried out to simulate those bending tests, especially to clarify the deformation and the stress distribution in the engaged threads in detail. The analysis demonstrated that the sealing performance of the joints highly depend on the contact conditions not only at the thread crest to thread root but also in between flank surfaces. A complicated leak path across the engaged threads under bending moment was identified by the simulation.
APA, Harvard, Vancouver, ISO, and other styles
8

Alexander, Henry L. "Comparison of Traditional and Emerging Technology for the Calibration of Thread Plug Gage Pitch Diameter." In NCSL International Workshop & Symposium. NCSL International, 2013. http://dx.doi.org/10.51843/wsproceedings.2013.10.

Full text
Abstract:
Comparison of Traditional and Emerging Technology for the Calibration of Thread Plug Gage Pitch Diameter. Threaded fasteners are critical elements of modern manufactured products. As such the evaluation of dimensional attributes of threads and threaded fasteners is a subject of much interest for metrologists, engineers and others concerned with quality, safety and performance. One of the most important calibrations associated with gaging for threads and threaded fasteners is the pitch diameter calibration of thread plug gages. PJLA is in the planning stage of an inter-laboratory comparison of thread plug gage pitch diameter calibration intended to provide proficiency testing opportunities to a number of our accredited laboratories. As the plans were being developed we decided to use this opportunity to investigate the performance of emerging non-contact technologies for the same calibration. The common artifact will be calibrated using the non-contact calibration method and the results obtained from the inter-laboratory comparison. Since the inter-laboratory comparison is in the preliminary stage the initial comparison will include only one laboratory using the three wire method. Additional data will be included in the comparison as it becomes available. The artifact will be a ¾-10 UNC-2B Thread Plug Gage produced by Leader Corporation of Shelby Township, MI. The gage was provided with an initial calibration from the manufacturer which will be retained and used as a control if necessary.
APA, Harvard, Vancouver, ISO, and other styles
9

Yüksel, İ. Ahmet, T. Oytun Kılınç, K. Berk Sönmez, and Sinem Ön Aktan. "Comparison of internal and external threads pitch diameter measurement by using conventional methods and CMM’s." In 19th International Congress of Metrology (CIM2019), edited by Sandrine Gazal. Les Ulis, France: EDP Sciences, 2019. http://dx.doi.org/10.1051/metrology/201909001.

Full text
Abstract:
Threads are very frequent and critical connection methods of components to build final products as per desired technical requirements. As it is used for very wide numbers of applications and industries, tolerances and thread structure differ as per requirements of applied areas. After theoretical decision of threaded parts, one hard task is to manufacture this thread as required. Correct flank angle, pitch diameter, pitch, height, major/minor diameters shall be obtained to receive desired mechanical connection properties. So as a result of all importance of threaded connection, it is also important to control thread properties. In this study it is aimed to show that as a result of significant development on sensor and probing technology, Coordinate Measuring Machines (CMMs) are good alternatives of conventional methods by considering accuracy, time requirement, setup requirements, and ease of application. In order to evaluate competence of regular bridge type CMMs regarding simple pitch diameter measurement, results of pitch diameter from symmetric thread with 30º flank angles will be taken by 1D length measurement device and bridge type CMM to compare. Comparison of conventional methods and CMM’s result shows that CMMs also provide accurate and precise results and can be used for calibration of gages as an alternative method with a number of advantages which are shown by this study.
APA, Harvard, Vancouver, ISO, and other styles
10

Sato, Takuya, Kenji Yamamoto, Rixing Li, and Hiroteru Ando. "Finite Element Analysis of Load Distribution of Threaded Connections Made of Dissimilar Materials in High Pressure Facilities." In ASME 2008 Pressure Vessels and Piping Conference. ASMEDC, 2008. http://dx.doi.org/10.1115/pvp2008-61424.

Full text
Abstract:
Threaded connections are often used for pressure vessels in high pressure services, and they must be designed to resist the shear forces due to initial tightening and internal pressure. Many investigations of the load distribution in threaded connections have been conducted. One of the most basic investigations was the work of Sopwith, and a design formula was developed. The High Pressure Gas Safety Institute of Japan (KHK) design guide provides design methods based on a modification of Sopwith’s formula for threaded connections. These methods are limited to threads made of similar materials. However, in order to prevent such problems as seizing or corrosion, threaded connections sometimes use dissimilar materials for the female and male threads. In this case, it is necessary to determine whether the modified Sopwith formula can be applied or not. In this paper, linear finite element analyses were performed to calculate the load distribution in threaded connections of dissimilar materials, and the results were compared with those of the modified Sopwith formula. The contact pressure and the friction forces on the surfaces of the threads were considered in the analyses. Two load conditions, the initial tightening and the internal pressure, were considered. From these analyses, the following conclusions were obtained: (1) In practical material combinations with an elastic modulus ratio of 0.5∼2.0, the load concentration factor for threaded connections of dissimilar materials was almost the same as that for threaded connections of similar materials. In other words, it is not necessary to consider the effects of the material combinations in threaded connection design. (2) The load concentration factors were dependent on the load type. The load concentration factor under internal pressure was smaller than that under initial tightening.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Internet of Threads"

1

Crispin, M., and K. Murchison. Internet Message Access Protocol - SORT and THREAD Extensions. RFC Editor, June 2008. http://dx.doi.org/10.17487/rfc5256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lohn, Andrew. Poison in the Well: Securing the Shared Resources of Machine Learning. Center for Security and Emerging Technology, June 2021. http://dx.doi.org/10.51593/2020ca013.

Full text
Abstract:
Modern machine learning often relies on open-source datasets, pretrained models, and machine learning libraries from across the internet, but are those resources safe to use? Previously successful digital supply chain attacks against cyber infrastructure suggest the answer may be no. This report introduces policymakers to these emerging threats and provides recommendations for how to secure the machine learning supply chain.
APA, Harvard, Vancouver, ISO, and other styles
3

Park, Soontae, Antonio García Zaballos, Enrique Iglesias Rodriguez, Pau Puig Gabarró, Kwanghee Choi, Donghwan Oh, Hyein Song, and Junok Lim. Roadmap for the Establishment of a Big Data Analysis Center for Critical Infrastructure Protection in Latin America and the Caribbean post COVID-19. Inter-American Development Bank, January 2022. http://dx.doi.org/10.18235/0003930.

Full text
Abstract:
This report, a joint effort between the Korea Internet & Security Agency (KISA) and Inter-American Development Bank (IDB), emphasizes the rising importance of critical infrastructure protection for the Latin American and Caribbean (LAC) region and proposes ways to overcome existing and potential cybersecurity threats. Considering the unexpected and high-speed transformations brought on by the COVID-19 pandemic, it is important to get prepared for imminent threats. The report examines the status of information and communication technology (ICT) infrastructure protection in the region and suggests big data analysis as a solution. To make the case, the report discusses the role of Koreas Big Data Analysis Center in protecting critical infrastructures in the country and makes suggestions to build an institutional foundation, stronger governance, and an effective roadmap for the implementation of a similar center in the LAC region.
APA, Harvard, Vancouver, ISO, and other styles
4

Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.

Full text
Abstract:
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Cambridge Quantum Computing (CQC), and Tecnológico de Monterrey to identify and eliminate quantum threats in blockchain networks. The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms. When quantum computers become robust enough to run Shor's algorithm on a large scale, the most used asymmetric algorithms, utilized for digital signatures and message encryption, such as RSA, (EC)DSA, and (EC)DH, will be no longer secure. Quantum computers will be able to break them within a short period of time. Similarly, Grover's algorithm concedes a quadratic advantage for mining blocks in certain consensus protocols such as proof of work. Today, there are hundreds of billions of dollars denominated in cryptocurrencies that rely on blockchain ledgers as well as the thousands of blockchain-based applications storing value in blockchain networks. Cryptocurrencies and blockchain-based applications require solutions that guarantee quantum resistance in order to preserve the integrity of data and assets in their public and immutable ledgers. We have designed and developed a layer-two solution to secure the exchange of information between blockchain nodes over the internet and introduced a second signature in transactions using post-quantum keys. Our versatile solution can be applied to any blockchain network. In our implementation, quantum entropy was provided via the IronBridge Platform from CQC and we used LACChain Besu as the blockchain network.
APA, Harvard, Vancouver, ISO, and other styles
5

Eser Davolio, Miryam. Research on Islamist Extremism in the Swiss Context: Assessing and Analyzing a Sensitive Phenomenon. RESOLVE Network, March 2022. http://dx.doi.org/10.37805/rve2022.1.

Full text
Abstract:
Researching and addressing “radicalization” within smaller European countries is particularly challenging. Not only is it incumbent that research and approaches take into account analyses, findings, strategies, and measures from other contexts, they must also work to craft their own national understanding of the extent and nature of the phenomena and approaches to address it. This chapter discusses the author’s reflections on experiences conducting two studies on violent jihadist radicalization in Switzerland at a time of heightened concern over potential jihadist violent extremist threats. In doing so, the chapter focuses on the ethical and methodological challenges specific to the Swiss context, as well as issues impacting research on violent extremism more generally. The two studies— both of which the author served a role in—additionally navigated the tension inherent in researching a topic of heightened public interest and media coverage.
APA, Harvard, Vancouver, ISO, and other styles
6

Roberts, Paige, Ahmed-Yasin Osman Moge, and Kaija Hurlburt. PROJECT BADWEYN: SOMALI COASTAL DEVELOPMENT OPPORTUNITIES. One Earth Future, August 2018. http://dx.doi.org/10.18289/oef.2018.032.

Full text
Abstract:
Interest in the Somali fishing sector is growing. Development agencies, donors, and investors see the potential for fisheries in Somali waters to provide income, food security, and stability in coastal communities. But reliable and up-to-date information about the state of Somali fisheries is difficult to find, complicating business decisions. Where should development be focused? What kind of investment will provide the most benefit and long-term return for coastal communities? What fisheries sector opportunities are the most sustainable, and which might be a threat to the health of Somali fisheries? Somali Coastal Development Opportunities answers these questions through targeted and original analysis of fisheries data coupled with information on current development projects throughout the Somali region. This report highlights six coastal fishing villages – Bereda, Hordio, Bander Beyla, Maydh, Hawaay, and Merca – to investigate the development needs and opportunities in each. Opportunities in the fisheries sectors are analyzed in light of sustainability and feasibility to provide recommendations that will guide investment and development in the Somali fisheries sector.
APA, Harvard, Vancouver, ISO, and other styles
7

Perk, Shimon, Maricarmen Garcia, Alexander Panshin, Caroline Banet-Noach, Irina Gissin, Mark W. Jackwood, and David Stallknecht. Avian Influenza Virus H9N2: Characterization and Control Strategies. United States Department of Agriculture, June 2007. http://dx.doi.org/10.32747/2007.7709882.bard.

Full text
Abstract:
Control of Avian Influenza (AI) infection is a highly topical subject of major economicimportance for the worldwide poultry industry at the national level and for international trade.H9N2 viruses are endemic in poultry throughout Asia and the Middle East, causing major losses inproduction. Moreover, these viruses pose wider threats since they have been isolated from bothswine and humans. At the same time, study of the AI viruses affords an opportunity to explore anumber of problems of intriguing scientific interest. The overall goal of this project was to developa sound control strategy for avian influenza subtype H9N2 viruses (AI H9N2) in commercialpoultry in Israel. The one-year feasibility study focused on two main goals, namely: to study themolecular characteristics of AI H9N2 circulating during the last seven years in Israel and todevelop tools enabling differentiation between the immune response to vaccination and infectionwith H9N2.Genetic and phylogenetic characterization of 29 selected AI H9N2 isolates (2000-2006)was performed by complete sequencing of hemagglutinin (HA), neuraminidase (NA), and all sixinternal genes [nucleoprotein (NP), polymerase basic 1 (PB1), polymerase basic 2 (PB2),polymerase acid (PA), matrix (M), and nonstructural (NS) genes]; comparative phylogenetic andgenetic analyses of these sequences; and comparative genetic analyses of deduced amino acidsequences of the HA, NA, NS1, and NS2 proteins. The major conclusions of the molecularanalyses were: (1) Israeli isolates, together with other H9N2 viruses isolated in Middle Eastcountries, comprise a single regional sublineage related to the G1-lineage. In addition, Israeliisolates subdivided into three different subgroups. Genetic analysis of these viruses suggests thatthey underwent divergent evolution paths.
APA, Harvard, Vancouver, ISO, and other styles
8

Levin, Ilan, John W. Scott, Moshe Lapidot, and Moshe Reuveni. Fine mapping, functional analysis and pyramiding of genes controlling begomovirus resistance in tomato. United States Department of Agriculture, November 2014. http://dx.doi.org/10.32747/2014.7594406.bard.

Full text
Abstract:
Abstract. Tomato yellow leaf curl virus (TYLCV), a monopartitebegomovirus, is one of the most devastating viruses of cultivated tomatoes and poses increasing threat to tomato production worldwide. Because all accessions of the cultivated tomato are susceptible to these viruses, wild tomato species have become a valuable resource of resistance genes. QTL controlling resistance to TYLCV and other begomoviruses (Ty loci) were introgressed from several wild tomato species and mapped to the tomato genome. Additionally, a non-isogenic F₁diallel study demonstrated that several of these resistance sources may interact with each other, and in some cases generate hybrid plants displaying lower symptoms and higher fruit yield compared to their parental lines, while their respective resistance genes are not necessarily allelic. This suggests that pyramiding genes originating from different resistance sources can be effective in obtaining lines and cultivars which are highly resistant to begomoviruses. Molecular tools needed to test this hypothesis have been developed by our labs and can thus significantly improve our understanding of the mechanisms of begomovirus resistance and how to efficiently exploit them to develop wider and more durable resistance. Five non-allelic Ty loci with relatively major effects have been mapped to the tomato genome using molecular DNA markers, thereby establishing tools for efficient marker assisted selection, pyramiding of multiple genes, and map based gene cloning: Ty-1, Ty-2, Ty-3, Ty-4, and ty-5. This research focused on Ty-3 and Ty-4 due to their broad range of resistance to different begomoviruses, including ToMoV, and on ty-5 due to its exceptionally high level of resistance to TYLCV and other begomoviruses. Our aims were: (1) clone Ty-3, and fine map Ty-4 and Ty-5 genes, (2)introgress each gene into two backgroundsand develop semi isogenic lines harboring all possible combinations of the three genes while minimizing linkage-drag, (3) test the resulting lines, and F₁ hybrids made with them, for symptom severity and yield components, and (4) identify and functionally characterize candidate genes that map to chromosomal segments which harbor the resistance loci. During the course of this research we have: (1) found that the allelic Ty-1 and Ty-3 represent two alternative alleles of the gene coding DFDGD-RDRP; (2) found that ty-5is highly likely encoded by the messenger RNA surveillance factor PELOTA (validation is at progress with positive results); (3) continued the map-based cloning of Ty-4; (4) generated all possible gene combinations among Ty-1, Ty-3 and ty-5, including their F₁ counterparts, and tested them for TYLCV and ToMoV resistance; (5) found that the symptomless line TY172, carrying ty-5, also carries a novel allele of Ty-1 (termed Ty-1ⱽ). The main scientific and agricultural implications of this research are as follows: (1) We have developed recombination free DNA markers that will substantially facilitate the introgression of Ty-1, Ty-3 and ty-5 as well as their combinations; (2) We have identified the genes controlling TYLCV resistance at the Ty-1/Ty-3 and ty-5 loci, thus enabling an in-depth analyses of the mechanisms that facilitate begomovirus resistance; (3) Pyramiding of Ty resistance loci is highly effective in providing significantly higher TYLCV resistance.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography