To see the other types of publications on this topic, follow the link: WPA2.

Dissertations / Theses on the topic 'WPA2'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'WPA2.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Eklund, Berggren Oscar. "Penetrationstest av WLAN : med brute force av WEP, WPA, WPA2 och WPS." Thesis, Luleå tekniska universitet, Institutionen för system- och rymdteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-79541.

Full text
Abstract:
I en tid då datorer, mobiler och andra enheter som kan ansluta till ett WLAN är stor, kommer säkerheten i dessa WLAN spela en stor roll. Det som skiljer WLAN och LAN när det kommer till säkerheten är att informationen måste färdas trådlöst i luften, vilket kan medföra att obehöriga kan lyssna av eller försöka koppla upp sig mot det trådlösa nätverket. Valet och implementationen av kryptering av WLAN för SME och privatpersoner har en stor inverkan på säkerheten i ens WLAN. Hur enkelt är det för en obehörig person att ta sig in på ett WLAN? Denna undersökning testar WLAN som använder WEP, WPA/WPA2 PSK och WPS med hjälp av en brute force attack för att avgöra om krypteringprotokollen är lämpliga att använda sig av. Testet simuleras med en obehörig laptop som försöker ta sig in in WLAN med brute force på WLAN som använder WEP, WPA/WPA2 PSK och WPS. Program som aircrack-ng och airgeddon används för att utföra testerna.
APA, Harvard, Vancouver, ISO, and other styles
2

Akinola, Azeez Paul, and Chong Zhang. "Evaluate Security on the Internet Cafe." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-21553.

Full text
Abstract:
Internet security (Network security) is a big topic that is very important in our society communication system, but it is extremely dynamic and wide in scope. This is the reason that many companies and organizations invest heavily in a dedicated infrastructure security and highly trained specialists.The aim of security monitoring and preventing the network from cyber threats requires vigilance over the network equipment. The case study of this thesis is to provide the possible solution to the problems encountered by the namely network users such as: Internet Game Center (Centrum Halmstad, Sweden) and, the Blueville Internet Cafe (Ede, Nigeria).Our research and information collected over the telephone and a visit at the nearest office. We concluded that both companies mentioned above experienced similar cyber threats. The two companies have internal and external threats such as accessing the network via ssh by using it brute force attack, network war-driver, the installation of spyware, password sniffer, viruses, SQL injection and PHP attacks (web attacks) on the networks. The cyber threats virus and spyware are among the big internet threat to users, organization and companies.We carry out experiments in the lab to tests for threats such as brute force (ssh) attack, password sniffer and war-driver in the Wireless environment. From the results, we are able to the select WPA2 using 802.1x as the best possible way to limit and reduce the strength of cyber-attacks, and as a suggested solution to the namely café problems in our report. We also list different suggestion and solution to the cyber café attacks from our research papers and information gathers from different sources such as library, internet, seminar and textbooks.
APA, Harvard, Vancouver, ISO, and other styles
3

Vojtíšek, Jindřich. "Analýza šifrovacích algoritmů ve standardu 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220648.

Full text
Abstract:
This work deals with wireless standard 802.11, primaly about security algorithms used in them. Further there is made analysis of algorithms WEP, WPA and WPA2. This algorithms are described how coding by them works and for easier understandig are added block schemes of their principles. In practical part is realized algorithms WEP, WPA and WPA2 in program Matlab simulink. Model is complemented by graphs which shows how data changes when comming throught this systems.
APA, Harvard, Vancouver, ISO, and other styles
4

Klepáčková, Karolína. "Aplikace pro Android na bezpečnostní monitorování komunikace." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2019. http://www.nusl.cz/ntk/nusl-399203.

Full text
Abstract:
This diploma thesis is focused on implementation of application for security monitoring of network communication of other applications in mobile device with Android platform. Provides users information about security risks that may harm his/her privacy or device. It uses a local VPN to tunnel all data sent to the wireless network. These can be linked to an application that has sent them because the Android kernel is derived from the Linux kernel and can be used to retrieve information about established network connections and the application identifier associated with the connection. This mapping allows to get more information about an app that is potentially dangerous for your mobile device.
APA, Harvard, Vancouver, ISO, and other styles
5

Дегтяренко, А. В. "Аналіз методів захисту бездротових корпоративних мереж." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/23021.

Full text
Abstract:
Дегтяренко, А. В. Аналіз методів захисту бездротових корпоративних мереж : випускна кваліфікаційна робота : 123 "Кoмп’ютepнa iнжeнepiя" / А. В. Дегтяренко ; керівник роботи В. А. Бичко ; НУ "Чернігівська політехніка", кафедра iнфopмaцiйниx тa кoмп’ютepниx cиcтeм. – Чернігів, 2021. – 50 с.
Мета аналізу: розробити об’єкт дослідження та створити бездротову мережу і покращити її технологію захисту. Та створити резервну систему електроживлення. Технології аналізу:WAP, IEEE 802.11, HTTP, WISP, WIFI. Результат роботи: Використання МАС фільтралізації. створення системи резервного електроживлення та покращення системи захисту. Робота може застосовуватися в комерційних та державних підприємствах та офісах для покращення бездротової системи та усунення хакерьских атак та для захисту інформації.
APA, Harvard, Vancouver, ISO, and other styles
6

Eriksson, Per, William Wiklund, and Elie El-Hajj. "Analys och utvärdering av trådlösa nätverk i Kalmar : En säkerhetsundersökning." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5935.

Full text
Abstract:

Syftet med arbetet är att ta reda på hur väl privatpersoner informeras om hur de ska skydda sina trådlösa nätverk och varför. Genom arbetet ska följande frågor besvaras:

- Vid beställning av bredband inklusive trådlös router från en bredbandsleverantör: informerar leverantören sina kunder om att det trådlösa nätverket bör säkras upp och varför?

- Blir man informerad om säkerheten när man köper en trådlös router i en lokal affär?

- Skyddar invånare i Kalmar generellt sett sina trådlösa nätverk?

Genom användning av kvantitativa metoder i form av observationer har vi svarat på två av frågeställningarna. En kvalitativ metod användes genom att vi skickade enkäter via e-post till fem bredbandsleverantörer.

Resultaten från vår undersökning visar att majoriteten av invånarna i Kalmar skyddar sina nätverk, men att det är vanligast med en svag kryptering. Undersökningen visar att informationen från lokala affärer och bredbandsleverantörer är bristfällig.

APA, Harvard, Vancouver, ISO, and other styles
7

Škodák, Jaroslav. "Zabezpečení bezdrátových sítí IEEE 802.11." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217503.

Full text
Abstract:
This work describes available and used standards, protocols and mechanisms used to secure IEEE 802.11 wireless networks. In the next section are listed vulnerabilities and possible attacks against different types of security. The principles of individual attacks on authentication, WEP security and WPA/WPA2 personal mode are described and realized using various software especially linux program aircrack-ng. Password for WEP security is obtained by passive eavesdropping data, using ARP replay injection and by creating own frames. The last two methods are used to generate traffic on the network, which is captured and then used to derive the WEP password. By injecting ARP frames, password was found in the number 60 000 captured frames and about 180 000 frames of data was needed for passive method. Decryption of WEP frame was done by fragment and KoreK chopchop attacks. This decrypted frame could be used to create fake frames and obtain WEP password. Brute force attack is realized for security WPA (WPA2) personal mode (often due to lack of strong password) by comparing password (passphrase) from password list. Speed of comparing is about 200 passwords/s.
APA, Harvard, Vancouver, ISO, and other styles
8

Falk, Magnus. "Snabb och säker roaming i WLAN." Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2695.

Full text
Abstract:

This thesis investigates how Ericsson AB should do to achieve fast and secure handover when roaming in a WLAN. It also provides a security analysis of the system that the wireless access point is part of. The reason for this is that Ericsson is selling an access point called the ABS 2200 aimed at the public hotspot market.

The premise was that they wanted a standardized way of handling the roaming issue. At the outset the 802.11F standard looked like a good alternative (in fact the only standardized alternative). Towards last stages of the work though, it was discovered that the 802.11F standard is no longer supported by IEEE.

Despite this fact, the conclusion is that secure and fast roaming can be attained if 802.11F is combined with the security standard 802.11i.

The security analysis concludes that Denial Of Service is a major threat to WLAN hotspots. It also points out the link between the access point and authentication server is the weakest link in the system. The recommendation is that this link receives an additional layer of protection through IPsec withESP. The algorithm recommendations for ESP are AES for confidentiality and SHA-1 for integrity.

This thesis can also be used as a primer on security in WLAN and contains an extensive glossary making it useful as a reference when reading 802.11 standards.

APA, Harvard, Vancouver, ISO, and other styles
9

Marušek, Michal. "Zefektivnění zabezpečení bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218098.

Full text
Abstract:
Nowadays every wireless radio-communication services encompass huge type of technology used for transfer video, voice or data. Wireless communication is the most expanded branch and many companies are using this technology because of low cost and simply management. The biggest advantage is easy connection to shared wireless medium and allows users of network to move around whole covered area. The most expanded types of wireless networks are called Wireless LAN (WLAN). With rising number of WLANs is rising chance to attack shared wireless medium by hacker and many sensitive information can be stolen or modified. To avoid this chance was created the first security protocol used in WLAN called WEP. Its goal was protect data transmitted trough WLAN as strong as were protected in wired networks. Unfortunately WEP was hiding a big weakness which can be used in a crack of WLAN in a minute with the aid of special software. Example of this kid of software can be Airsnort constructed to monitor shared medium and captured every packet transferred trough this medium. Based on statistical method Airsnort can obtain hidden password in a few minutes. The second type of this software can be Aircrack-ng, which can crack hidden password without any user connected to WLAN. Aircrack-ng uses active techniques to generate network load and can obtain password more effectively and faster. The result of both cases was successful and protection of WLAN was completely cracked. Later was created new security protocol called WPA, which had to fix the cryptography weakness of previous WEP. WPA was only temporary security protocol, during standard 802.11 was developing which had to offer highest security and integrity protection of transferred data trough WLAN. For this reasons was created new version of WPA called WPA2 which satisfy requirements of standard 802.11i. Both protocols WPA/WPA2 contain weakness, which can crash security of WLAN. This crack is based on authentication PSK. Attacker during authentication is using information from four-way handshake between user of WLAN and access point. Based on this information attacker can crack password with the aid of password list attack which took approximately 30 minutes. Based on previous result is important to chose strong password contains alphanumeric string or special strings with satisfy length.
APA, Harvard, Vancouver, ISO, and other styles
10

Endrle, Pavel. "Zabezpečení standardu 802.11 a jeho možnosti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218184.

Full text
Abstract:
This master´s thesis is about 802.11 standard security techniques and their features. Particular types of this standard and its features are shown in the introduction. Wireless network security cypher alghoritm types, their features, weaknesses and principles of functions are closely described in next few chapters. Realized attacks on these security alghoritms with their principles are described and shown in the practical part of thesis. One chapter is about effectivity, accessibility and practicability valorization of these attacks in practice.
APA, Harvard, Vancouver, ISO, and other styles
11

de, Laval johnny. "Trådlösa Nätverk : säkerhet och GPU." Thesis, Högskolan på Gotland, Institutionen för speldesign, teknik och lärande, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hgo:diva-1063.

Full text
Abstract:
Trådlosa nätverk är av naturen sårbara for avlyssning för att kommunikationen sker med radiovagor. Därfor skyddas trådlosa nätverk med kryptering. WEP var den första krypteringsstandarden som användes av en bredare publik som senare visade sig innehålla flera sårbarheter. Följden blev att krypteringen kunde förbigås på ett par minuter. Därför utvecklades WPA som ett svar till sårbarheterna i WEP. Kort därefter kom WPA2 som är den standard som används i nutid. Den svaghet som kan påvisas med WPA2 finns hos WPA2-PSK när svaga lösenord används. Mjukvaror kan med enkelhet gå igenom stora uppslagsverk för att testa om lösenord går att återställa. Det är en process som tar tid och som därför skyddar nätverken i viss mån. Dock har grafikprocessorer börjat användas i syfte för att återställa lösenord. Grafikkorten är effektivare och återställer svaga lösenord betydligt snabbare än moderkortens processorer. Det öppnar upp for att jämföra lösenord med ännu större uppslagsverk och fler kombinationer. Det är vad denna studie avser att belysa; hur har grafikkortens effektivitet påverkat säkerheten i trådlösa nätverk ur ett verksamhetsperspektiv.
Wireless networks are inherently vulnerable for eavesdropping since they use radio waves to communicate. Wireless networks are therefore protected by encryption. WEP was the first encryption standard that was widely used. Unfortunately WEP proved to have several serious vulnerabilities. WEP could be circumvented within few minutes. Therefore WPA was developed as a response to the weak WEP. Shortly thereafter WPA2 was released and are now being used in present. The only weakness with WPA2 is in the subset WPA2-PSK when weak passwords are being used. Software could easily go through large dictionaries to verify if a password could be recovered. But that is time consuming and therefore providing wireless networks limited protection. However a new area of use with advanced graphic cards has showed that it is providing a faster way of recovering passwords than the ordinary processor on the motherboard. That opens up for the larger use of dictionaries and the processing of words or combinations of words. That is what this study aims to shed light on. How the efficiency of the graphic cards have affected security in wireless networks from a corporate perspective of view.
APA, Harvard, Vancouver, ISO, and other styles
12

Вильотніков, В. В. "Модель системи захисту бездротової мережі підприємства." Thesis, Чернігів, 2021. http://ir.stu.cn.ua/123456789/24846.

Full text
Abstract:
Вильотніков, В. В. Модель системи захисту бездротової мережі підприємства : випускна кваліфікаційна робота : 125 "Кібербезпека" / В. В. Вильотніков ; керівник роботи І. В. Гур’єв ; НУ "Чернігівська політехніка", кафедра кібербезпеки та математичного моделювання . – Чернігів, 2021. – 63 с.
Метою кваліфікаційної роботи є проведення аналізу безпеки бездротових мереж, виділення методів їх захисту та розробка моделі системи захисту інформації в бездротовій мережі підприємства. Об'єкт дослідження: процеси забезпечення інформаційної безпеки в бездротових мережах. Предмет дослідження: система захисту інформації в бездротовій мережі. Методи дослідження: Для розв’язання поставлених завдань використовувався комплекс методів, які зумовлені об’єктом, предметом, метою та завданнями дослідження, до яких входять систематизація та узагальнення, описовий, експериментальний метод, метод узагальнення, статистичний метод, метод аналізу і синтезу. Використання цих методів дозволило провести аналіз особливостей захисту інформації в бездротових мережах та розробити універсальну модель системи захисту бездротових мереж. Результати та новизна: систематизовано та узагальнено інформацію про захист інформації в бездротових мережах що міститься в наукових роботах та інших інформаційних матеріалах. Досліджені основні принципи функціонування бездротових мереж. Проаналізовані проблеми захисту бездротових мереж, загрози, вразливості та кібератаки на бездротові мережі. Систематизовано сучасні методи захисту бездротових мереж, виділені їх переваги та недоліки. Розроблена модель системи захисту бездротової мережі підприємства. Запропонована практична реалізація захищеної бездротової мережі на основі обладнання MikroTik RB2011UiAS-2HnD-IN
The purpose of the qualification work is to analyze the security of wireless networks, identify methods for their protection and develop a model of information security system in the wireless network of the enterprise. Object of research: processes of information security in wireless networks. Subject of research: information protection system in a wireless network. Research methods: A set of methods was used to solve the tasks, which are determined by the object, subject, purpose and objectives of the study, which include systematization and generalization, descriptive, experimental method, generalization method, statistical method, method of analysis and synthesis. The use of these methods allowed to analyze the features of information security in wireless networks and to devel- op a universal model of wireless security system. Results and novelty: information on protection of information in wireless networks contained in scientific works and other information materials is systematized and generalized. The basic principles of wireless networks functioning are investigated. Problems of wireless network protection, threats, vulnerabilities and cyber attacks on wireless networks are analyzed. Modern methods of wireless network protection are systematized, their advantages and disadvantages are highlighted. A model of the enter- prise wireless network protection system has been developed. The practical implemen- tation of a secure wireless network based on MikroTik RB2011UiAS-2HnD-IN equip- ment is proposed.
APA, Harvard, Vancouver, ISO, and other styles
13

Jelínek, Martin. "Bezpečnost bezdrátových počítačových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218257.

Full text
Abstract:
The master's thesis deals with the issue of Wireless Local Area Network (WLAN) from the viewpoint of the security and functional principle of security mechanisms. The transition to the issue concerning the security is accompanied by the methods of wireless data transmission operating on the level of physical layer (FHSS, DSSS, OFDM, MIMO), which is followed by the summary of individual 802.11 standards. The next part deals with the issue of shared transmission medium (CSMA/CA), influence of interference and correcting mechanisms (RTS/CTS). Within the security, the principles of the authentication along with the commonly used methods of security (WEP, WPA, WPA2) are described in detail. The first part concerning security deals with the security in the form of the WEP protocol, which is considered insufficient nowadays and points out the imperfect implementation and the consequent risks. The following part describes the security in the form of WPA which eliminates the implementation weaknesses of the previous WEP security protocol. The description of commonly used mechanisms of authentication (PSK, 802.1x), required temporary key management (PTK, GTK), data integrity (MIC) and encryption which uses TKIP protocol are also included. The last part, possible WLAN security, is aimed at the full support of 802.11i standard, which is called WPA2 (sometimes RSN). That part describes the basic encryption security element CCMP, which is based on the AES block cipher modes. The practical part of the thesis deals with the security verification of current wireless networks. In the process of verification the accessible HW means and programming tools of Open Source Software (OSS) are used. By means of verification it has been pointed out that there are possible security risks resulting from the security method which has been used. Also several recommendations how to reduce the security risks of the used method to minimum are mentioned.
APA, Harvard, Vancouver, ISO, and other styles
14

Mironov, Georgiana. "Challenges of Wireless Security in the Healthcare Field : A study on the WPA3 standard." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-99780.

Full text
Abstract:
The healthcare environment is a complex one, saturated by wireless medical devices and sensitive patient data flowing through the network traffic. With the increased popularity of wireless medical devices in the healthcare domain together with the announcement of the new wireless security standard WPA3 comes a need to prepare for a new generation shift in wireless security. The goal of this study is therefore to investigate what challenges the healthcare sector can encounter when faced with the inevitable transition to WPA3. By performing a literature review on the security state of WPA3 compared to its predecessor and performing qualitative interviews with network technicians working in the healthcare sector, three major challenges were identified. IT professionals in the healthcare domain struggle with integrating legacy software systems, keeping middleware software solutions secure, and with handling hardware medical devices that come with outdated wireless standards. By analysing existing literature, several mitigating actions to battle these challenges were presented in this study.
APA, Harvard, Vancouver, ISO, and other styles
15

Stehlík, Richard. "Útok na WiFi síť s využitím ESP32/8266." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445502.

Full text
Abstract:
The goal of this thesis is an exploration of the possibilities of Espressif's ESP32 chips in combination with Espressif IoT Development Framework with intention of implementing well-known Wi-Fi attacks on this platform. In this work, multiple implementation proposals were done for deauthentication attack in two variants followed by WPA/WPA2 handshake capture, attack on PMKID, creation of rogue MitM access point, or brute-force attack on WPS PIN, and more. A universal penetration tool ESP32 Wi-Fi Penetration Tool was proposed and implemented, including deauthentication attacks with WPA/WPA2 handshake capture. This tool provides an easy way to configure and run malicious Wi-Fi attacks without any domain knowledge required from the user. The outcome of this work opens new attack vectors for the attacker, thanks to cheap, ultra-low powered, and lightweight ESP32 chips.
APA, Harvard, Vancouver, ISO, and other styles
16

Glöckner, Alexander. "Wireless-LAN im Studentennetzwerk (CSN)." Master's thesis, Universitätsbibliothek Chemnitz, 2006. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200600409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Sedlák, Břetislav. "Zabezpečení bezdrátových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218192.

Full text
Abstract:
Master thesis focuses on wireless network security. The thesis is divided in two parts. First part describes today’s used standards and their components, topology and security methods as stealth SSID, MAC addresses filtration, WEP, WPA and WPA2. The last three methods are described in detail. In second part there are realized attacks on above described methods of security. There are described attacks on WEP as KoreK chopchop attack, fragment attack, attack FMS, KoreK and attack PTW. Then is described the dictionary attack on passphrase by WPA/WPA2 with PreShared Key authentication obtaining, precomputed hash tables for faster passphrase finding and for using more core procesors during dictionary browsing. The last attack describes obtaining of keystream used for encrypting of frames by WPATKIP and then sending custom data to client. It is described how to carry out each attack and how to protect against them.
APA, Harvard, Vancouver, ISO, and other styles
18

Parolek, Pavel. "Bezpečnost bezdrátové sítě poskytovatele internetových služeb." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2013. http://www.nusl.cz/ntk/nusl-223791.

Full text
Abstract:
This thesis analyzes the wireless network security of the Internet service provider company Net-Connect s.r.o. It identifies its weak points and suggests measures that lead to the increase of the wireless network security.
APA, Harvard, Vancouver, ISO, and other styles
19

Dančuk, Michal. "Nový model zabezpečení implementovaný v metropolitní síti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217507.

Full text
Abstract:
This diploma thesis deals with wireless computer networks in a point of view security. It contains security principles and standards used in these networks. It shows failings of old security methods in contras of new standards. The result of the thesis is a design of the metropolitan network and its realization. In this network appropriate solutions of security are used. The last part of the thesis deals with a design of web applications created in the PHP programming language and SQL database system.
APA, Harvard, Vancouver, ISO, and other styles
20

Bauer, Francisca, Christoph Bremberger, and Margarethe Rammerstorfer. "The Impact of Different Unbundling Scenarios on Concentration and Wholesale Prices in Energy Markets." Forschungsinstitut für Regulierungsökonomie, WU Vienna University of Economics and Business, 2010. http://epub.wu.ac.at/3069/1/wp12.pdf.

Full text
Abstract:
A recent highly disputed subject of regulating energy markets in Europe is the unbundling of vertically integrated down- and upstream firms. While legal unbundling is already implemented in most countries and indisputable in its necessity for approaching regulatory aims, continuative models as ownership unbundling or the alternative of an independent system operator are still ambiguous. Hence, this article contributes to the economic analyses of identifying the differences of separate types of unbundling. Via simulation, we find that legal unbundling brings about the lowest prices in a market under Cournot competition. Moreover, under Bertrand competition, no differences between legal unbundling and ownership unbundling can be identified. (author's abstract)
Series: Working Papers / Research Institute for Regulatory Economics
APA, Harvard, Vancouver, ISO, and other styles
21

Dockner, Engelbert J., and Long Ngo Van. "International Pollution Control: Cooperative Versus Noncooperative Strategies." Inst. für Volkswirtschaftstheorie und -politik, WU Vienna University of Economics and Business, 1991. http://epub.wu.ac.at/6275/1/WP_2.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Богданов, Олексій, and Назарій Євгенович Бурак. "Особливості захисту мережі Wi-Fi з протоколом шифрування WPA3." Thesis, Львівський державний університет безпеки життєдіяльності, 2021. http://sci.ldubgd.edu.ua:8080/jspui/handle/123456789/9277.

Full text
Abstract:
Проведено дослідження особливостей захисту мережевого трафіку у безпровідникових мережа з використання протоколу WPA, зокрема оновленої версії 3. Висвітлено переваги та недоліки у порівнянні з попередніми версіями.
APA, Harvard, Vancouver, ISO, and other styles
23

Aloui, Sofiane. "Design of 60ghz 65nm CMOS power amplifier." Thesis, Bordeaux 1, 2010. http://www.theses.fr/2010BOR14165/document.

Full text
Abstract:
Le développement d'objets communicants dédiés aux applications Wireless Personal Area Network (WPAN) à 60GHz vise des débits de l'ordre du GBit/sec. Pour satisfaire la contrainte de faible coût, la technologie CMOS silicium est la plus adaptée. L'utilisation de cette technologie est un challenge en soi afin de concilier les aspects « pertes & rendement » vis à vis des contraintes de puissance. Le but de la thèse est de concevoir des amplificateurs de puissance opérant à 60GHz avec la technologie CMOS 65nm de STMicroelectronics. Cette démarche est progressive car il convient d'analyser puis d'optimiser les performances des composants passifs et actifs constituant l'amplificateur de puissance à l'aide des logiciels de simulations électromagnétique et microélectronique. Finalement, des amplificateurs de puissance ont été réalisés et leurs performances répondent au cahier des charges initialement défini
Telecommunication industry claims for increasing data rate in wireless communication systems. The major demand of high data rate applications concerns a large panel of home multimedia exchanging data especially for the uncompressed HD data transfer. The 7GHz band around 60GHz is free of use and fulfils the short range gigabit communication requirements. CMOS technology is most appropriate since it drives a fast time to market with a low cost for high integration volume. However, the use of CMOS technology is challenging to satisfy loss and performance trade-off under power constraints. This thesis aims at designing power amplifiers operating at 60GHz with 65nm CMOS technology from STMicroelectronics. This approach is progressive because it is necessary to analyze and optimize the performance of passive and active components constituting the power amplifier using electromagnetic and microelectronics software. Finally, power amplifiers have been made. Their performances met specifications originally defined
APA, Harvard, Vancouver, ISO, and other styles
24

Dudebout, Nicolas. "Multigigabit multimedia processor for 60GHz WPAN a hardware software codesign implementation /." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/26677.

Full text
Abstract:
Thesis (M. S.)--Electrical and Computer Engineering, Georgia Institute of Technology, 2009.
Committee Member: Chang, Gee-Kung; Committee Member: Hasler, Paul; Committee Member: Laskar, Joy. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
25

Ross, David Andrew. "Securing IEEE 802.11 wireless LANs." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/37638/1/David_Ross_Thesis.pdf.

Full text
Abstract:
As the acceptance and popularity of wireless networking technologies has proliferated, the security of the IEEE 802.11 wireless local area network (WLAN) has advanced in leaps and bounds. From tenuous beginnings, where the only safe way to deploy a WLAN was to assume it was hostile and employ higherlayer information security controls, to the current state of the art, all manner of improvements have been conceived and many implemented. This work investigates some of the remaining issues surrounding IEEE 802.11 WLAN operation. While the inherent issues in WLAN deployments and the problems of the original Wired Equivalent Privacy (WEP) provisions are well known and widely documented, there still exist a number of unresolved security issues. These include the security of management and control frames and the data link layer protocols themselves. This research introduces a novel proposal to enhance security at the link layer of IEEE 802.11 WLANs and then conducts detailed theoretical and empirical investigation and analysis of the eects of such proposals. This thesis �rst de�nes the state of the art in WLAN technology and deployment, including an overview of the current and emerging standards, the various threats, numerous vulnerabilities and current exploits. The IEEE 802.11i MAC security enhancements are discussed in detail, along with the likely outcomes of the IEEE 802.11 Task Group W1, looking into protected management frames. The problems of the remaining unprotected management frames, the unprotected control frames and the unprotected link layer headers are reviewed and a solution is hypothesised, to encrypt the entire MAC Protocol Data Unit (MPDU), including the MAC headers, not just the MAC Service Data Unit (MSDU) commonly performed by existing protocols. The proposal is not just to encrypt a copy of the headers while still using cleartext addresses to deliver the frame, as used by some existing protocols to support the integrity and authenticity of the headers, but to pass the entire MPDU only as ciphertext to also support the con�dentiality of the frame header information. This necessitates the decryption of every received frame using every available key before a station can determine if it is the intended recipient. As such, this raises serious concerns as to the viability of any such proposal due to the likely impact on throughput and scalability. The bulk of the research investigates the impacts of such proposals on the current WLAN protocols. Some possible variations to the proposal are also provided to enhance both utility and speed. The viability this proposal with respect to the eect on network throughput is then tested using a well known and respected network simulation tool, along with a number of analysis tools developed speci�cally for the data generated here. The simulator's operation is �rst validated against recognised test outputs, before a comprehensive set of control data is established, and then the proposal is tested and and compared against the controls. This detailed analysis of the various simulations should be of bene�t to other researchers who need to validate simulation results. The analysis of these tests indicate areas of immediate improvement and so the protocols are adjusted and a further series of experiments conducted. These �nal results are again analysed in detail and �nal appraisals provided.
APA, Harvard, Vancouver, ISO, and other styles
26

Franceschinelli, Daniella Arruda. "Estudo comparativo dos aspectos de segurança em redes WWAN, WLAN e WPAN." [s.n.], 2003. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276381.

Full text
Abstract:
Orientador : Ricardo Dahab
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-03T22:41:04Z (GMT). No. of bitstreams: 1 Franceschinelli_DaniellaArruda_M.pdf: 3740509 bytes, checksum: ea2dbca5dbed86af342ac84113f5ae52 (MD5) Previous issue date: 2003
Resumo: o surgimento e as evoluções das tecnologias wireless proporcionaram maior interesse pela mobilidade, que contribuíram no avanço da comunicação móvel. A crescente utilização das redes sem fios, por um lado, gerou novos negócios nos serviços de comunicação pessoal, mas por outro, trouxe novos problemas relacionados à segurança, tais como a maior exposição dos meios de transmissão e maior complexidade nos processos de autenticação. Este trabalho apresenta inicialmente uma visão geral dos sistemas de redes sem fios GSM, 802.11 e Bluetooth, destacando suas arquiteturas, componentes, funcionalidades e beneficios. Esta apresentação inicial serve como base para discutir os aspectos de segurança nessas redes sem fios e compará-Ios com outras tecnologias existentes no mercado, especialmente quanto aos requisitos de autenticação, confidencialidade, disponibilidade e privacidade
Abstract: The constant evolution 01 wireless technologies have prompted an increasing interest lor mobile computing in general, which in turn have contributed to advancements in mobile communication. If, on one side, wireless networks opened the possibilities for personal service businesses, they also exposed a whole new range 01 serious security issues such as greater exposure 01 the communication media and more complex, and thus more error prone, authentication procedures. This work presents, initially, a broad overview of wireless network systems, specifically GSM, 802.11 and Bluetooth, highlighting its architectures, components, functionalities and positive aspects. This overview is then used as a basis for discussing their security aspects and lor comparing them with other technologies available in the market, specially with regard to authentication, confidentiality and availability
Mestrado
Engenharia de Computação
Mestre em Computação
APA, Harvard, Vancouver, ISO, and other styles
27

Lomvall, Thomas, and Sara Klinthammar. "Wardriving : WEP, WPA och WPS inom och mellan städer." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-18923.

Full text
Abstract:
Friheten att kunna sitta på balkongen och surfa, chatta, läsa e-post med mera har blivit en självklarhet för de allra flesta, nya spelkonsoler med trådlös teknik gör att spelaren kan interagera mer med handlingen i spelet, personvågar som mäter vikt, BMI och fettmassa och överför denna information till en server trådlöst där användaren kan följa sin viktkurva och så vidare. I stort sett allt som kan vara trådlöst är trådlöst idag. Med de uppenbara fördelarna av att använda trådlös kommunikation och de mängder med nya enheter som stödjer detta så är det ingen nyhet att trådlöst är här för att stanna. Trådlös kommunikation finns överallt omkring oss, men det är inte alltid den är implementerad på ett sätt som sätter säkerheten först. En av svagheterna i att allt fler enheter stödjer trådlöst är att det krävs en viss teknisk kunskap för att konfigurera dessa på ett säkert sätt. Ointresse eller okunskap gör att val av kryptering och lösenord inte prioriteras hos en del användare där funktionen ses som det viktigaste. Idag finns det tre olika krypteringslösningar som är i bruk, alla tre har svagheter som kan utnyttjas. WEP - Wired Equivalent Privacy var den första krypterinslösningen för trådlös kommunikation, som hörs på namnet skulle vara lika säkert som det trådbundna. WEP knäcks snabbt och rekommenderas inte att användas av någon. WPA - Wi-Fi Protected Access anses vara nödlösningen medan arbetet på WPA2 pågick. WPA2 släpptes kort efter WPA och anses fortfarande säker om under vissa förutsättningar, mer om detta längre fram i rapporten. Även om WPA2 konfigureras rätt kan intrång ske om inte administrationsverktygen, som till exempel WPS, är säkra. WPS - Wi-Fi Protected Setup är en lösning för att snabbt och enkelt koppla in nya enheter till nätverk med högsta möjliga säkerhet utan att de som installerar enheterna behöver vara så tekniskt bevandrade. WPS knäcktes så sent som i slutet av december 2011 och kan komma att påverka säkerheten för miljontals användare då alla större tillverkare har någon form av WPS-funktion på sina accesspunkter. Denna rapport beskriver en kartläggning av svagheter, även kallat wardriving, det är ett sätt att undersöka vilka trådlösa nätverk som finns inom ett givet område. Wardriving är på inget sätt ett intrång i någons nätverk, inga data skickas och inga resurser på någons nätverk används. Det enda som sker är att mjukvara söker efter trådlösa nätverk och sparar information som sänds ut.
APA, Harvard, Vancouver, ISO, and other styles
28

Yang, Libo. "ADVANCED CODING AND MODULATION FOR ULTRA-WIDEBAND AND IMPULSIVE NOISES." Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2467.

Full text
Abstract:
The ever-growing demand for higher quality and faster multimedia content delivery over short distances in home environments drives the quest for higher data rates in wireless personal area networks (WPANs). One of the candidate IEEE 802.15.3a WPAN proposals support data rates up to 480 Mbps by using punctured convolutional codes with quadrature phase shift keying (QPSK) modulation for a multi-band orthogonal frequency-division multiplexing (MB-OFDM) system over ultra wideband (UWB) channels. In the first part of this dissertation, we combine more powerful near-Shannon-limit turbo codes with bandwidth efficient trellis coded modulation, i.e., turbo trellis coded modulation (TTCM), to further improve the data rates up to 1.2 Gbps. A modified iterative decoder for this TTCM coded MB-OFDM system is proposed and its bit error rate performance under various impulsive noises over both Gaussian and UWB channel is extensively investigated, especially in mismatched scenarios. A robust decoder which is immune to noise mismatch is provided based on comparison of impulsive noises in time domain and frequency domain. The accurate estimation of the dynamic noise model could be very difficult or impossible at the receiver, thus a significant performance degradation may occur due to noise mismatch. In the second part of this dissertation, we prove that the minimax decoder in \cite, which instead of minimizing the average bit error probability aims at minimizing the worst bit error probability, is optimal and robust to certain noise model with unknown prior probabilities in two and higher dimensions. Besides turbo codes, another kind of error correcting codes which approach the Shannon capacity is low-density parity-check (LDPC) codes. In the last part of this dissertation, we extend the density evolution method for sum-product decoding using mismatched noises. We will prove that as long as the true noise type and the estimated noise type used in the decoder are both binary-input memoryless output symmetric channels, the output from mismatched log-likelihood ratio (LLR) computation is also symmetric. We will show the Shannon capacity can be evaluated for mismatched LLR computation and it can be reduced if the mismatched LLR computation is not an one-to-one mapping function. We will derive the Shannon capacity, threshold and stable condition of LDPC codes for mismatched BIAWGN and BIL noise types. The results show that the noise variance estimation errors will not affect the Shannon capacity and stable condition, but the errors do reduce the threshold. The mismatch in noise type will only reduce Shannon capacity when LLR computation is based on BIL.
Ph.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Electrical Engineering PhD
APA, Harvard, Vancouver, ISO, and other styles
29

Oliviera, Elder Eldervitch Carneiro de. "Antenas de microfita com patch quase-fractal para aplica??es em Redes WPAN/WLAN." Universidade Federal do Rio Grande do Norte, 2008. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15213.

Full text
Abstract:
Made available in DSpace on 2014-12-17T14:55:10Z (GMT). No. of bitstreams: 1 ElderECO.pdf: 2183610 bytes, checksum: d02ab6a3abf8c0cd3e77eadf92d529a0 (MD5) Previous issue date: 2008-12-03
Coordena??o de Aperfei?oamento de Pessoal de N?vel Superior
The microstrip antennas are in constant evidence in current researches due to several advantages that it presents. Fractal geometry coupled with good performance and convenience of the planar structures are an excellent combination for design and analysis of structures with ever smaller features and multi-resonant and broadband. This geometry has been applied in such patch microstrip antennas to reduce its size and highlight its multi-band behavior. Compared with the conventional microstrip antennas, the quasifractal patch antennas have lower frequencies of resonance, enabling the manufacture of more compact antennas. The aim of this work is the design of quasi-fractal patch antennas through the use of Koch and Minkowski fractal curves applied to radiating and nonradiating antenna s edges of conventional rectangular patch fed by microstrip inset-fed line, initially designed for the frequency of 2.45 GHz. The inset-fed technique is investigated for the impedance matching of fractal antennas, which are fed through lines of microstrip. The efficiency of this technique is investigated experimentally and compared with simulations carried out by commercial software Ansoft Designer used for precise analysis of the electromagnetic behavior of antennas by the method of moments and the neural model proposed. In this dissertation a study of literature on theory of microstrip antennas is done, the same study is performed on the fractal geometry, giving more emphasis to its various forms, techniques for generation of fractals and its applicability. This work also presents a study on artificial neural networks, showing the types/architecture of networks used and their characteristics as well as the training algorithms that were used for their implementation. The equations of settings of the parameters for networks used in this study were derived from the gradient method. It will also be carried out research with emphasis on miniaturization of the proposed new structures, showing how an antenna designed with contours fractals is capable of a miniaturized antenna conventional rectangular patch. The study also consists of a modeling through artificial neural networks of the various parameters of the electromagnetic near-fractal antennas. The presented results demonstrate the excellent capacity of modeling techniques for neural microstrip antennas and all algorithms used in this work in achieving the proposed models were implemented in commercial software simulation of Matlab 7. In order to validate the results, several prototypes of antennas were built, measured on a vector network analyzer and simulated in software for comparison
As antenas de microfita est?o em constante evid?ncia nas pesquisas atuais, isso devido ?s in?meras vantagens que apresentam. A geometria fractal aliada ao bom desempenho e comodidade das estruturas planares s?o uma excelente combina??o para projetos e an?lise de estruturas cada vez menores e com caracter?sticas multi-ressonantes e banda larga. Essa geometria tem sido aplicada em antenas tipo patch em microfita para reduzir o seu tamanho e evidenciar o seu comportamento multi-banda. Em compara??o com as antenas em microfita convencionais, as antenas patch quase-fractais apresentam freq??ncias de resson?ncia inferiores, possibilitando a fabrica??o de antenas ainda mais compactas. O objetivo desse trabalho consiste no projeto de antenas patches quase-fractal por meio da utiliza??o de curvas fractais de Koch e Minkowski aplicado ?s margens radiante e n?o-radiante de uma antena inset-fed patch retangular convencional alimentada por linha de microfita com reentr?ncias, inicialmente projetada para a freq??ncia de 2,45 GHz a ser observada. A t?cnica inset-fed ? investigada para o casamento de imped?ncias das antenas fractais, que s?o alimentadas atrav?s de linhas de microfita com reentr?ncias. A efici?ncia dessa t?cnica ? investigada experimentalmente e comparada com simula??es realizadas pelo software comercial Ansoft Designer, usado para a an?lise precisa do comportamento eletromagn?tico das antenas atrav?s do m?todo dos momentos e pelo modelo neural proposto. Nessa disserta??o um estudo bibliogr?fico em teoria de antenas de microfita ? realizado, o mesmo estudo ? realizado a respeito da geometria fractal, dando ?nfase a suas mais diversas formas, t?cnicas de gera??o desses fractais bem como sua aplicabilidade. Este trabalho ainda apresenta um estudo em redes neurais artificiais, evidenciando os tipos/arquitetura de redes utilizadas e suas caracter?sticas, bem como os algoritmos de treinamento que foram utilizados para sua implementa??o. As equa??es dos ajustes dos par?metros para as redes utilizadas nesse trabalho foram deduzidas a partir do m?todo do gradiente. Tamb?m ser? realizada uma investiga??o com ?nfase na miniaturiza??o dessas novas estruturas propostas, indicando o quanto uma antena projetada com contornos fractais ? capaz de miniaturizar uma antena patch retangular convencional. O estudo tamb?m consiste de uma modelagem por meio de redes neurais artificiais dos mais diversos par?metros eletromagn?ticos das antenas quase-fractais. Os resultados apresentados demonstram a excelente capacidade das t?cnicas neurais para modelagem de antenas de microfita, e todos os algoritmos utilizados nesse trabalho na obten??o dos modelos propostos foram implementados no software comercial de simula??o Matlab 7. Com a finalidade de validar os resultados obtidos, v?rios prot?tipos de antenas foram constru?dos, medidos em um analisador de rede vetorial e simulados em software para compara??o
APA, Harvard, Vancouver, ISO, and other styles
30

Kosoff, Zoe M., and Zoe M. Kosoff. "Register variation in Arabic translations of the WPAI: Balancing localization standards and Arabic language norms." Thesis, The University of Arizona, 2017. http://hdl.handle.net/10150/626393.

Full text
Abstract:
How does localized translation relate to the Arabic language? According to the Localization Industry Standards Association, localization “involves taking a product and making it linguistically and culturally appropriate to the target locale (country/region and language) where it will be used and sold,” (Esselink 2000a, p. 3). In monoglossic situations, localized translation involves producing translations that reflect regional language variation. Localizing Arabic translations presents a greater challenge because the Arabic language is characterized by both register variation and regional variation (Badawi 1973/2012; Bassiouney 2009; Ferguson 1959/1972). Existing literature addresses both localized translation and Arabic translation, but does not address localized Arabic translation specifically. Within the field of outcomes research, a public health subfield that studies patient populations health and well-being, prior studies that analyze Arabic translations of outcomes research documentation focus solely on the validity of universal, not localized translations. Studies in other specialized fields such as law also fail to include analysis of localized Arabic translation. This study analyzes register and regional variation in one universal and twenty-seven localized Arabic translations of the Work Productivity and Activity Impairment Questionnaire (WPAI), a clinical outcome assessment that is frequently localized for use in internationally sited clinical trials (Margaret Reilly Associates 2013). To determine the degree to which the Arabic WPAIs are localized, twenty-one variables including linguistic lexical items, morphological forms, and syntactic structures were coded as either salient Modern Standard Arabic (MSA) or localized. Localized variables include salient Levantine Arabic (LA), Gulf Arabic (GA), and Egyptian Arabic (EA) features, shared MSA/LA/GA/EA variables and simplified variables. Then residual analysis of the expected and observed frequencies of each variable determined the overall degree of localization for each variable. Results indicate that salient MSA variables and localized variables are used in all twenty-eight WPAIs while localized salient LA, GA, and EA variables are completely absent. Although the inconsistent use of localized shared and simplified variables throughout the one universal and twenty-seven L-, G-, and E-WPAIs indicates that localization standards are met inconsistently, all twenty-eight WPAIs are successful within a functionalist framework because the use of salient MSA, shared, and simplified variables ensures that the text is accessible to a lay audience, which is the ultimate function of the target text (TT). This study sheds light on the inherent challenges of localized Arabic translation, which is caught between localization standards and Arabic language norms. Motivations for using salient MSA, shared, and simplified variables are discussed and implications of this study include improving methods for producing localized Arabic translations.
APA, Harvard, Vancouver, ISO, and other styles
31

Vedral, Andreas R. [Verfasser]. "Digitale Analyse, Leistungsbewertung und generative Modellierung von WPAN-Verbindungen unter industriellen Ausbreitungsbedingungen / Andreas R Vedral." Aachen : Shaker, 2007. http://d-nb.info/1163609935/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Sopko, Richard. "Univerzální mobilní komunikační platforma pracující s technologií bluetooth." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218185.

Full text
Abstract:
This master’s thesis is focused on field of communication technologies in mobile devices in personal WPAN type wireless networks. Work consists of three basic parts. First part provides overview of personal WPAN wireless networks and is specialized on Bluetooth technologies and its opportunities of communication between mobile devices. Second part deals with an opportunity of using programming language Java 2 Micro Edition in work with Bluetooth technology. Key point of this work is third part which includes scheme of conception of a communication platform and creating of application designed for mobile phones. Created application enables communication by means of changing files and written conversation of two or more people in real time by Bluetooth connection.
APA, Harvard, Vancouver, ISO, and other styles
33

Abate, Jason. "Eager and Hungry for Music: The WPA Music Project in New Orleans, 1935-1943." ScholarWorks@UNO, 2006. http://scholarworks.uno.edu/td/314.

Full text
Abstract:
Of the millions of American workers who suffered economically during the Great Depression of the 1930s, musicians in particular fell on hard times. The live music profession had begun to decline even before the onset of the Depression due to the introduction of new acoustic technologies. In 1935, President Franklin Delano Roosevelt established the Works Progress Administration (WPA) in an attempt to put the nation back to work through governmentsponsored work projects. One division of the WPA was Federal Music Project (FMP). A great deal has been written about the WPA, but the Music Project has received little scholarly attention, leaving the stories of musicians in New Orleans and other cities largely untold. This study argues that the Federal Music Project in New Orleans was an unusually successful program due to the special talents of its administrators, the rich pre-existing musical heritage of the city, and the generally positive interaction between the people of New Orleans and the FMP.
APA, Harvard, Vancouver, ISO, and other styles
34

Alvarez, Leticia. "The Influence of the Mexican Muralists in the United States. From the New Deal to the Abstract Expressionism." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32407.

Full text
Abstract:
This thesis proposes to investigate the influence of the Mexican muralists in the United States, from the Depression to the Cold War. This thesis begins with the origins of the Mexican mural movement, which will provide the background to understand the artists' ideologies and their relationship and conflicts with the Mexican government. Then, I will discuss the presence of Mexican artists in the United States, their repercussions, and the interaction between censorship and freedom of expression as well as the controversies that arose from their murals. This thesis will explore the influence that the Mexican mural movement had in the United States in the creation of a government-sponsored program for the arts (The New Deal, Works Progress Administration). During the 1930s, sociological factors caused that not only the art, but also the political ideologies of the Mexican artists to spread across the United States. The Depression provided the environment for a public art of social content, as well as a context that allowed some American artists to accept and follow the Marxist ideologies of the Mexican artists. This influence of radical politics will be also described. Later, I will examine the repercussions of the Mexican artists' work on the Abstract Expressionist movement of the 1940s. Finally I will also examine the iconography of certain murals by Mexican and American artists to appreciate the reaction of their audience, their acceptance among a circle of artists, and the historical context that allowed those murals to be created.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
35

Vlček, Peter. "Zabezpečení bezdrátových sítí a možné útoky na tyto sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218260.

Full text
Abstract:
The first of the main objectives of this work was to examine and study the different types of attacks on wireless networks. This work is focused on the most commonly occurring types of attacks such as WEP/WPA/WPA2 cracking, a Man in the Middle attack (MIM), Dictionary attacks, MAC spoofing and finally Denial of Service attacks. Description of individual attacks is also accompanied by detailed instructions on how to carry out these attacks on the Windows platform. It is described how to detect various attacks and identified. It is then implemented software that is able to identify possible risk of selected types of attacks. This software belongs to a group of wireless intrusion prevention system (WIDS). It focuses on attacks WEP/WPA/WPA2 type of cracking, Dictionary attacks and MAC spoofing. For the implementation of defense against attack by a Man in the Middle (MIM) and Denial of Service attack would need special monitoring equipment.
APA, Harvard, Vancouver, ISO, and other styles
36

Ahmed, Tanvir. "High Level Model of IEEE 802.15.3c Standard and Implementation of a Suitable FFT on ASIC." Thesis, Linköpings universitet, Elektroniksystem, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-68697.

Full text
Abstract:
A high level model of HSIPHY mode of IEEE 802.15.3c standard has been constructedin Matlab to optimize the wordlength to achieve a specific bit error rate (BER) depending on the application, and later an FFT has been implemented for different wordlengths depending on the applications. The hardware cost and power is proportional to wordlength. However, the main objective of this thesis has been to implement a low power, low area cost FFT for this standard. For that the whole system has been modeled in Matlab and the signal to noise ratio (SNR) and wordlength of the system have been studied to achieve an acceptable BER. Later an FFT has been implemented on 65nm ASIC for a wordlength of 8, 12 and 16 bits. For the implementation, a Radix-8 algorithm with eight parallel samples has been adopted. That reduce the area and the power consumption significantly compared to other algorithms and architectures. Moreover, a simple control has been used for this implementation. Voltage scaling has been done to reduce thepower. The EDA synthesis result shows that for 16bit wordlength, the FFT has 2.64 GS/s throughput, it takes 1.439 mm2 area on the chip and consume 61.51mW power.
APA, Harvard, Vancouver, ISO, and other styles
37

Patel, Shalaka S. "Functional analysis of the nuclear envelope associated protein MAF1 and preliminary investigation of the coiled-coil protein TMD1." Connect to this title online, 2005. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1110300984.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2005.
Document formatted into pages. Includes bibliographical references. Abstract available online via OhioLINK's ETD Center; full text release delayed at author's request until 2006 March 9.
APA, Harvard, Vancouver, ISO, and other styles
38

Karlsson, Carl. "IMPULSIVE NOISE MODELING AND COEXISTENCE STUDY OF IEEE 802.11 AND BLUETOOTH." Thesis, University of Gävle, Department of Technology and Built Environment, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-308.

Full text
Abstract:

This thesis describes the interference problem between IEEE 802.11 and Bluetooth. These well established communication standards are often used together simultaneously. Since both standards operate in the ISM-band at 2.45 GHz, they interfere with each other. In addition to this, interference from e.g. microwave ovens, heating processes, electric motors and cordless phones also occurs on the ISM-band. Due to this interference problem, a model has been developed in MATLAB to further investigate these interferences and the effects for the user.

The interference is modelled using the well known Class-A model for impulsive noise. The interference model is parameterized in the model and therefore the noise source(s) is described by a set of parameters derived from real measurements. Models for IEEE 802.11 legacy/b and Bluetooth are based on work published on the user community of MATHWORKS. To get a measure of performance, results from the model are presented as BER (Bit Error Rates) and PER (Packet Error Rates). When Bluetooth is used as a voice link, sound quality can also be performance evaluated directly by simply listening to a voice output file. To be able to track down a specific problem cause, measuring tools have also been included in the model to gain insight into what is causing bit/packet error.

A model describing the interference problem has been developed describing the real world usage of the standards by the use of state machines. Due to the complexity of the problem, and also for the model to be user friendly, this thesis is not composed of a thorough mathematical derivation describing BER probability for different modulation forms. The derivations for these has already been done and is therefore summarized and compared to when the model is validated. The model has been developed as a proof of concept for further work to fully support the current and coming IEEE standards for IEEE 802.11 and Bluetooth.

APA, Harvard, Vancouver, ISO, and other styles
39

Rakotondrainibe, Lahatra. "Conception et réalisation d'un systme de communications sans fil très haut débit à 60 GHz pour les applications WPAN." Rennes, INSA, 2010. http://www.theses.fr/2010ISAR0026.

Full text
Abstract:
Les systèmes sans fil à 60 GHz qui sont actuellement en cours de normalisation dans la bande sans licence de 57-66 GHz visent un débit de données de plusieurs Gbit/s pour des applications de futurs réseaux locaux sans fil (WPAN). Jusqu’à présent, de nombreux travaux publiés ont considéré les aspects caractérisation du canal de propagation, applications potentielles, antennes, conception des circuits et des techniques de modulations à 60 GHz. Or, peu d’études portent sur la réalisation d’un système de communications sans fil à 60 GHz et la caractérisation de ses performances dans des environnements réalistes. Ce travail, réalisé dans le cadre du projet Techim@ges, du pôle « Image et Réseaux » et en liaison avec le CPER Palmyre, présente une réalisation expérimentale complète de communications Ethernet Gigabit sans fil à 60 GHz opérant à environ 1 Gbit/s (plus précisément à 875 Mbit/s). Compte tenu du fait que la liaison radio à 60 GHz est mono-pièce, une hybridation de la technologie avec la fibre optique est utilisée pour assurer les communications dans toutes les pièces d’un environnement résidentiel. Le système réalisé dispose d’une bande passante de 2 GHz. En utilisant des blocs millimétriques à 60 GHz existants, le travail a porté principalement sur la conception et la réalisation des modules en bande de base et en FI (codage de canal, modulation, synchronisation, etc. ). Une modulation mono-porteuse DBPSK est retenue à l’émission (Tx). La structure du récepteur proposé est basée sur une démodulation différentielle et sur une unité de traitement du signal composée d’un bloc de synchronisation conjointe trame et octet, d’un débrasseur et d’un décodeur correcteur d’erreurs RS(255,239). Une technique originale de la synchronisation octet/trame est conçue pour obtenir une forte probabilité de détection de préambule et une très faible probabilité de fausse alarme. Le système proposé offre un bon compromis entre performances et complexité. Des mesures de performances ont été réalisées dans différentes configurations et pour différents types d’environnements. Les résultats de mesures ont montré une bonne qualité de transmission et un taux d’erreur binaire (TEB) faible pour une distance entre Tx et Rx de 30 mètres, avec des antennes directives et dans des conditions de visibilité directe
60 GHz wireless systems that are currently under standardization within the unlicensed 57-66 GHz band are targeting multi-gigabit data rate for wireless personal area networks (WPANs) applications. Up to now, in the literature, several studies have considered the characterization of the propagation channel, potential applications, antennas, circuit design issues and several modulations at 60 GHz. However, few efforts have been dedicated to the realization of a 60 GHz wireless communications system and the characterization of its performance in realistic environments. This work, conducted under the Techim@ges research project supported by French “Media and Networks Cluster” and in association with Palmyre project, presents a full experimental implementation of a 60 GHz wireless Gigabit Ethernet communication system operating at near gigabit data rate (more precisely at 875 Mbps). As the 60 GHz radio link operates only in a single room configuration, a hybrid technology with the Radio-over-Fiber is used to ensure the communications in all the rooms of a residential environment. The realized system covers 2 GHz available bandwidth. By using the existing 60 GHz millimeter-wave blocks, this work is based on the design and realization of the baseband and intermediate frequency architectures (channel coding, modulation, synchronization, etc. ). A DBPSK single-carrier modulation is retained at the transmitter (Tx). The structure of the proposed receiver (Rx) is based on a simple differential demodulation to reduce the inter-symbol interference effect and a signal processing unit comprising byte/frame synchronization, a descrambler and an RS(255,239) decoder. An original byte/frame synchronization technique is designed to obtain a small value of the preamble false alarm and missing probabilities. The proposed system provides a good trade-off between performance and complexity. Performance measurements have been achieved in different environments and in different configurations. Measurement results show a good communication link quality and a low bit error rate (BER) for a 30 meters distance between Tx and Rx, using high gain antennas and for line-of-sight conditions
APA, Harvard, Vancouver, ISO, and other styles
40

Haque, Syed E. "Efficient GTS Allocation Schemes for IEEE 802.15.4." Digital Archive @ GSU, 2012. http://digitalarchive.gsu.edu/cs_theses/75.

Full text
Abstract:
IEEE 802.15.4 is a standard defined for wireless sensor network applications with limited power and relaxed throughput needs. The devices transmit data during two periods: Contention Access Period (CAP) by accessing the channel using CSMA/CA and Contention Free Period (CFP), which consists of Guaranteed Time Slots (GTS) allocated to individual devices by the network coordinator. The GTS is used by devices for cyclic data transmission and the coordinator can allocate GTS to a maximum of only seven devices. In this work, we have proposed two algorithms for an efficient GTS allocation. The first algorithm is focused on improving the bandwidth utilization of devices, while the second algorithm uses traffic arrival information of devices to allow sharing of GTS slots between more than seven devices. The proposed schemes were tested through simulations and the results show that the new GTS allocation schemes perform better than the original IEEE 802.15.4 standard.
APA, Harvard, Vancouver, ISO, and other styles
41

Alberts, Marthinus. "Analysis of the IEEE 802.15.4a ultra wideband physical layer through wireless sensor network simulations in OMNET++." Diss., University of Pretoria, 2011. http://hdl.handle.net/2263/23103.

Full text
Abstract:
Wireless Sensor Networks are the main representative of pervasive computing in large-scale physical environments. These networks consist of a large number of small, wireless devices embedded in the physical world to be used for surveillance, environmental monitoring or other data capture, processing and transfer applications. Ultra wideband has emerged as one of the newest and most promising concepts for wireless technology. Considering all its advantages it seems a likely communication technology candidate for future wireless sensor networks. This paper considers the viability of ultra wideband technology in wireless sensor networks by employing an IEEE 802.15.4a low-rate ultra wideband physical layer model in the OMNET++ simulation environment. An elaborate investigation into the inner workings of the IEEE 802.15.4a UWB physical layer is performed. Simulation experiments are used to provide a detailed analysis of the performance of the IEEE 802.15.4a UWB physical layer over several communication distances. A proposal for a cognitive, adaptive communication approach to optimize for speed and distance is also presented. AFRIKAANS : Draadlose Sensor Netwerke is die hoof verteenwoordiger vir deurdringende rekenarisering in groot skaal fisiese omgewings. Hierdie tipe netwerke bestaan uit ’n groot aantal klein, draadlose apparate wat in die fisiese wêreld ingesluit word vir die doel van bewaking, omgewings monitering en vele ander data opvang, verwerk en oordrag applikasies. Ultra wyeband het opgestaan as een van die nuutste en mees belowend konsepte vir draadlose kommunikasie tegnologie. As al die voordele van dié kommunikasie tegnologie in ag geneem word, blyk dit om ’n baie goeie kandidaat te wees vir gebruik in toekomstige draadlose sensor netwerke. Hierdie verhandeling oorweeg die vatbaarheid van die gebruik van die ultra wyeband tegnologie in draadlose sensor netwerke deur ’n IEEE 802.15.4a lae-tempo ultra wyeband fisiese laag model in die OMNET++ simulasie omgewing toe te pas. ’n Breedvoerige ondersoek word geloots om die fyn binneste werking van die IEEE 802.15.4a UWB fisiese laag te verstaan. Simulasie eksperimente word gebruik om ’n meer gedetaileerde analiese omtrent die werkverrigting van die IEEE 802.15.4a UWB fisiese laag te verkry oor verskillende kommunikasie afstande. ’n Voorstel vir ’n omgewings bewuste, aanpasbare kommunikasie tegniek word bespreek met die doel om die spoed en afstand van kommunikasie te optimiseer.
Dissertation (MEng)--University of Pretoria, 2011.
Electrical, Electronic and Computer Engineering
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
42

Rocha, Natalia Ezagui Garcia. "Avaliação do desempenho do sistema GATELINK para PHM utilizando métodos de segurança WPA-2 e IPsec." Instituto Tecnológico de Aeronáutica, 2009. http://www.bd.bibl.ita.br/tde_busca/arquivo.php?codArquivo=1277.

Full text
Abstract:
O monitoramento da saúde dos sistemas de uma aeronave - PHM (Prognostic and Heatlth Monitoring) - é o cenário deste estudo, que aborda a transferência dos dados do avião no solo até o centro de operação e manutenção de uma companhia aérea, tendo em vista alguns requisitos de operação, como um tempo mínimo para que os dados sejam transmitidos, o tamanho de um arquivo típico de PHM e como a necessidade de se obter um canal seguro sob o ponto de vista de integridade e confidencialidade dos dados impacta no cumprimento destes requisitos. O sistema de transmissão de dados em solo abordado é composto pelo Gatelink, que utiliza um sistema de comunicação sem fio através do protocolo 802.11 entre a aeronave e um roteador no aeroporto, e uma rede cabeada Frame Relay dentro do aeroporto. Para segurança, são adotados os protocolos WPA-2 no trecho sem fio e o IPsec no trecho cabeado. O estudo demonstra que o tempo para se transmitir um quadro no trecho sem fio mostrou-se pouco afetado pela introdução do cabeçalho de segurança do WPA-2. Os cabeçalhos inseridos pelo IPsec afetam o tempo de transmissão dos dados, porém mostra-se que ainda é possível transmitir dentro do intervalo de tempo especificado considerando o método de cifragem dos dados AES.
APA, Harvard, Vancouver, ISO, and other styles
43

Silva, Diego Cesar Valente e. "An?lise experimental da aplica??o da tecnologia de r?dio sobre fibra em redes IEEE 802.15.4." Pontif?cia Universidade Cat?lica de Campinas, 2009. http://tede.bibliotecadigital.puc-campinas.edu.br:8080/jspui/handle/tede/505.

Full text
Abstract:
Made available in DSpace on 2016-04-04T18:31:25Z (GMT). No. of bitstreams: 1 Diego Cesar Valente e Silva.pdf: 2949032 bytes, checksum: 9f8f72c0ab49b16ab87dbd229e5acc93 (MD5) Previous issue date: 2009-02-09
This work presents an experimental investigation on the implementation of wireless sensor networks (IEEE 802.15.4) over fiber optics. Such investigation was performed with the utilization of IEEE 802.15.4 transceivers, an optical fiber infrastructure inside a field-trial network, called KyaTera Network, and directly modulated lasers and photodiodes designed for usual lab applications. The analysis comprised optical and electrical signal-to-noise ratio meausermentes and packet error rate evaluation under different conditions of transmission (e.g., payload length and time between consecutive frames). Results indicate that the RF signals of the sensor network may be properly propagated through unamplified optical links of up to 100 km or for longer distances with the use of optical amplifiers.
Esse trabalho apresenta uma investiga??o experimental da implementa??o de redes de sensores (IEEE 802.15.4) sobre fibras ?pticas. Tal investiga??o foi realizada com a utiliza??o de transceptores IEEE 802.15.4, de uma infra-estrutura de fibras ?pticas localizada dentro uma rede experimental, chamada Rede KyaTera, e de lasers com modula??o direta e foto-diodos projetados para opera??es usuais em laborat?rios. A an?lise compreendeu medidas a raz?o sinal-ru?do ?ptica e el?trica e a avalia??o da taxa de erro de quadros sob diferentes condi??es de transmiss?o (p. ex., tamanho de payload e intervalo de tempo entre quadros sucessivos). Os resultados indicam que os sinais de RF da rede de sensores podem ser propagados adequadamente, sem amplifica??o ?pticapor, em enlaces de at? 100 km ou por dist?ncias ainda maiores, com a utiliza??o de amplificadores ?pticos.
APA, Harvard, Vancouver, ISO, and other styles
44

Robert, Pablo Maximiliano. "Reduction in Coexistent WLAN Interference Through Statistical Traffic Management." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/27167.

Full text
Abstract:
In recent years, an increasing number of devices have been developed for operation in the bands allocated by the Federal Communications Commission (FCC) for license-free operation. Given the rules governing devices in these bands, it is possible for interference created by these devices to significantly reduce the overall capacity of these bands. Two such protocols are Bluetooth and IEEE 802.11b. Several methods have been presented in the literature for managing interference between these two devices. However, these approaches are generally not practical, since they either require the purchase of specialized hardware or do not comply with the current versions of existing protocols. In this dissertation, an approach is presented that is not only backwards-compatible, but requires the algorithm to be implemented in only a small subset of the devices operating in the local environment for the coexistence algorithm to function properly. An analytical solution for this coexistence approach when applied to generic networks is presented. A method is also presented for the backwards-compatible integration of some medium access control (MAC) protocols into Bluetooth devices. A case study of the Bluetooth/IEEE 802.11b coexistence problem is presented in this dissertation, as well as a proposed coexistence mechanism, collision-based multiple access (CBMA). A form of adaptive frequency hopping (AFH) is presented in this dissertation, as well as a combined CBMA/AFH strategy. The CBMA algorithm is shown be able to significantly reduce the impact of a Bluetooth link on an IEEE 802.11b link. The AFH algorithm is shown to have comparable performance to the CBMA algorithm. A combined CBMA/AFH algorithm presented, is shown to not only have an impact on the IEEE 802.11b link that is not greater than the CBMA-only implementation, but the Bluetooth link throughput is shown to be significantly greater than either the CBMA or AFH implementation alone.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
45

Purandare, Darshan. "ENHANCING MESSAGE PRIVACY IN WIRED EQUIVALENT PRIVACY." Master's thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2998.

Full text
Abstract:
The 802.11 standard defines the Wired Equivalent Privacy (WEP) and encapsulation of data frames. It is intended to provide data privacy to the level of a wired network. WEP suffered threat of attacks from hackers owing to certain security shortcomings in the WEP protocol. Lately, many new protocols like WiFi Protected Access (WPA), WPA2, Robust Secure Network (RSN) and 802.11i have come into being, yet their implementation is fairly limited. Despite its shortcomings one cannot undermine the importance of WEP as it still remains the most widely used system and we chose to address certain security issues and propose some modifications to make it more secure. In this thesis we have proposed a modification to the existing WEP protocol to make it more secure. We achieve Message Privacy by ensuring that the encryption is not breached. The idea is to update the shared secret key frequently based on factors like network traffic and number of transmitted frames. We also develop an Initialization Vector (IV) avoidance algorithm that eliminates IV collision problem. The idea is to partition the IV bits among different wireless hosts in a predetermined manner unique to every node. We can use all possible 224 different IVs without making them predictable for an attacker. Our proposed algorithm eliminates the IV collision ensuring Message Privacy that further strengthens security of the existing WEP. We show that frequent rekeying thwarts all kinds of cryptanalytic attacks on the WEP.
M.S.
School of Computer Science
Engineering and Computer Science
Computer Science
APA, Harvard, Vancouver, ISO, and other styles
46

Sorum, William A. ""Much Depends on Local Customs:"The WPA's New Deal for New Orleans, 1935-1940." ScholarWorks@UNO, 2010. http://scholarworks.uno.edu/td/1181.

Full text
Abstract:
The Works Progress Administration came to New Orleans in 1935, a time of economic uncertainty and even fear. The implementation of the relief embodied in the WPA was influenced by local factors that reinforced the existing social order at first but that left a framework through which that order could be challenged. The business of providing WPA relief also was attended by scandal and criticism. In spite of these inherent weaknesses and certain incident, the WPA left behind an enviable physical legacy that is used and enjoyed today by the citizens of New Orleans. This paper explores the roots of that legacy, some of the obstacles faced by the WPA, and how a local government, and its citizens, related and adjusted to an increasingly powerful and intrusive federal government.
APA, Harvard, Vancouver, ISO, and other styles
47

Orrevad, Anders. "M2M Traffic Characteristics : When machines participate in communication." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91482.

Full text
Abstract:
Machine-to-machine, machine-to-man, or man-to-machine (M2M) communications is expected to grow very rapidly over the next few years with an anticipated 50 billion devices being connected to broadband connections by 2020 [35]. To be able to plan and dimension for the expected (increase) in data traffic it is important to have a model for the traffic that will flow through the network. A concept often talked about in conjunction with M2M communications is the “Internet of things”, where billions of “smart” objects are connected to the Internet and can be easily shared and used or re-used by many applications. One sub-field of M2M communications is sensor/actuator networks that are installed in households, creating automated homes by enabling home appliances to talk to each other and to applications that can be running on hosts connected to the Internet. Such sensor/actuator networks extend the uses of home appliances into completely new and exciting applications, while also potentially making homes more energy efficient by smarter management and operation of these appliances. The thesis was proposed by and carried out at Ericsson in Kista, Sweden during the summer and fall of 2009. The academic advisor was G. Q. Maguire Jr. of the Royal Institute of Technology (KTH) and industrial advisor was Per Ljungberg at Ericsson. This thesis has an industrial focus, specifically to produce models and prototypes that benefit Ericsson as a company and the Ericsson Connected Home project. This thesis has evaluated the available standards and designed, buildt, and evaluated a prototype application for one of these standards to operate with this home gateway. Additionally, the thesis should also benefit the academic world by offering tractable models for M2M traffic that have a foundation in reality, rather than solutions in search of a problem.
Maskin-till-maskin, maskin-till-man, eller man-till-maskin (M2M) kommunikation förväntas växa mycket snabbt under de närmaste åren med förväntade 50 miljarder enheter anslutna till en bredbandsuppkoppling år 2020 [35]. För att kunna planera och dimensionera för den förväntade (ökningen) i datatrafik är det viktigt att ha en modell för den trafik som kommer att flöda genom nätverket. Ett begrepp det ofta talas om i samband med M2M-kommunikation är " Internet of things ", där miljarder "smarta" objekt är anslutna till Internet och enkelt kan delas och användas på nytt sätt och av många användare. En undergrupp inom M2M-kommunikation är sensor nätverk som installeras i hushåll, för att skapa automatiserade hem där hemelektroniken kan prata med andra apparater och program som körs på datorer anslutna till Internet. Sådana sensornätverk utvidgar användningen av hushållsapparater till helt nya och spännande applikationer, samtidigt som det potentiellt göra bostäder mer energisnåla genom smartare förvaltning och drift av dessa apparater. Detta examensarbete görs på uppdrag av Ericsson i Kista, Sverige under sommaren och hösten 2009. Akademisk rådgivare är GQ Maguire Jr från Kungliga Tekniska Högskolan (KTH) och industriell rådgivare är Per Ljungberg på Ericsson. Examensarbetet har som industriellt fokus att tillverka modeller och prototyper för att modellera trafiken i Ericssons nätverk. Examensarbetets akademiska värde är genom att erbjuda lättgörliga modeller för M2M trafik som har en grund i verkligheten, snarare än lösningar på jakt efter ett problem.
APA, Harvard, Vancouver, ISO, and other styles
48

Rabbani, Muhammad Saqib. "Microstrip antenna design with improved fabrication tolerance for remote vital signs monitoring and WLAN/WPAN applications at mm-wave and THz frequencies." Thesis, University of Birmingham, 2018. http://etheses.bham.ac.uk//id/eprint/8091/.

Full text
Abstract:
A novel approach is introduced to design microstrip patch antennas (MPAs) with improved fabrication tolerance for highly demanded Millimetre-wave (mm-wave) (30-300GHz) and Terahertz (THz) (0.3-3THz) frequency applications. The presented MP A designing method overcomes the challenges which exist with the fabrication and implementation of the conventional MP A designs at mm-wave and THz frequencies. The following research contributions have been added to the state-ofthe- art work: (i) designing of improved size MPAs at 60GHz, 1 OOGHz, 635GHz and 835GHz to prove the designing concept, (ii) detail measurements and analysis of Remote Vital Signs Monitoring (RVSM) with various sizes of the proposed MPA arrays at 60GHz for high detection accuracy and sensitivity, (iii) designing and tes~ing of MP As for 60GHz wireless local and personal area networks (WLAN/WP AN) in point-to-pint, point-to-multipoint and dual-band applications, (iv) implementation and testing of particular Partially Reflective Surface, Dielectric Lens and Defected Ground Structures on the proposed MP A designs with novel configurations at 60GHz for bandwidth and gain enhancement, and (v~ a comprehensive experimental study on the performance of large array designs with the proposed MP A elements for mm-wave applications. The mentioned research work is explained in the coming chapters in details. Moreover, all mentioned work has already been published.
APA, Harvard, Vancouver, ISO, and other styles
49

Allee, Jessica. "New Deal Art Now: Reframing the Artifacts of Diversity." OpenSIUC, 2014. https://opensiuc.lib.siu.edu/theses/1536.

Full text
Abstract:
New Deal Art Now offers a sampling of the breadth of the Works Progress Administration and Federal Art Projects (WPA/FAP), calling attention to the skills, histories, and social identities of an extraordinarily diverse spectrum of professional and amateur artists funded by the United States federal government during the Great Depression. The New Deal, a major economic stimulus initiative that ran from 1935-1943, included the Works Progress Administration Federal One Projects, encompassing fine art, music, theater, writing, and design. These projects provided economic support and cultural enrichment to hundreds of thousands of Americans, in the form of jobs, entertainment, and education in the arts. New Deal Art Now seeks to reframe a period of United States artistic production that is often narrowly cast in exhibitions and their related literature on the subject. The theme of diversity is explored through several critical lenses, such as questioning the relationship between art and artifact, considering that many creative works of the New Deal function as both. The majority of the exhibited artworks are juxtaposed against one another to challenge the designations that contemporary material culture traditionally assigns them. Showcasing 48 objects in total, the exhibits include painting, sculpture, educational models, archival film, and archival audio, which are juxtaposed alongside contemporary paintings, photography, and music, created in conjunction with this exhibition. By situating these works (as well as the very categories of amateur and professional, art and artifact, museum and archive, past and present) in productive relation to one another this exhibition argues for the significance of all of these works and artists to the diverse history of twentieth-century American art.
APA, Harvard, Vancouver, ISO, and other styles
50

Haque, Md Ansarul, and Md Delwar Hossain. "Technology Survey of Wireless Communication for In-vehicle Applications." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-23389.

Full text
Abstract:
Currently, wireless communication technologies are expected to be widely employed for in-vehicle communication where in-vehicle communication is built upon the interactions of different parts inside the vehicle. This communication is to enable a variety of applications for driver and passenger needs.  To have improved driving assistance, development of in-vehicle applications is very much needed. At present, intelligent systems inside the vehicle are mostly dominated by the wired technologies. The possibilities of wireless communication have inspired us and made an opportunity to analyse replacements for wired communication within a vehicle. In this connection, the scope of our thesis is to define the in-vehicle applications which are preferred by the wireless technologies, to define the applications using wired technologies which could be replaced by the wireless technologies and to identify those applications which are difficult to implement by the wireless technologies.   In-vehicle wired networks; and problems of these wired networks, along with several existing applications, have been discussed at the initial stage of this thesis for the purpose of having a clear understanding. After that, existing In-vehicle wireless applications and several challenging applications have also been studied. Studies have been done on the most important wireless technologies with their respective specifications. The requirement of establishing wireless communication has also been explained. Finally, an analysis has been done according to the requirements of the applications and verification of their possible reliance on the wireless technologies.   In a brief, comparable studies have been done among the wireless technologies to assess their current and future fitness for In-vehicle applications. The thesis concludes with some recommendations regarding when wireless technologies might be suitable for some in-vehicle applications to replace the wired technologies.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography