Tesi sul tema "Protools"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Protools".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Gullová, Soňa. "Společenská etiketa, obchodní a diplomatický protokol". Doctoral thesis, Vysoká škola ekonomická v Praze, 2005. http://www.nusl.cz/ntk/nusl-77056.
Testo completoJelinski, Olaf [Verfasser]. "Diplomatisches Protokoll versus Corporate Protocol : Das internationale diplomatische Protokoll im Vergleich zum Protokoll in Unternehmen. Eine Analyse des Protokolls als politische Institution / Olaf Jelinski". Frankfurt a.M. : Peter Lang GmbH, Internationaler Verlag der Wissenschaften, 2017. http://d-nb.info/114209703X/34.
Testo completoBandyopadhyay, Amrit. "The smart stone protocol (SSP) design and protocols /". College Park, Md. : University of Maryland, 2006. http://hdl.handle.net/1903/3953.
Testo completoThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Ondráček, David. "Databáze specifikací bezpečnostních protokolů". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235438.
Testo completoAlbuquerque, Edison de Queiroz. "Um protocolo multicast bi-direcional para educação a distancia". [s.n.], 2005. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260530.
Testo completoTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-05T07:05:01Z (GMT). No. of bitstreams: 1 Albuquerque_EdisondeQueiroz_D.pdf: 2450262 bytes, checksum: 1142d9b235574921d845ac5246fbe250 (MD5) Previous issue date: 2005
Resumo: Este trabalho está baseado em uma experiência real, vivida no dia-a-dia do nosso trabalho na Empresa Brasileira de Telecomunicações S.A, EMBRATEL, quando da busca de ferramentas capazes de viabilizar o permanente treinamento dos Consultores Técnicos da empresa, localizados em diferentes partes do nosso país, em face da escassez de recursos financeiros e de tempo. Para tanto, iniciamos com uma retrospectiva histórica da Educação a Distância no mundo, seu presente e suas tendências visíveis. Depois, apresentamos uma descrição dos protocolos multicasting existentes, seguido de nossa proposta. Apresentamos, também, uma simulação usando o Simulador ns-2 de maneira a comprovar o correto funcionamento do protocolo proposto e avaliar seu desempenho. O núcleo desta tese é a proposta de um novo protocolo multicasting, elemento essencial para a otimização da rede de suporte, um imperativo para a eficiência de seu funcionamento e, principalmente, da diminuição de seu custo, tendo em vista a situação ideal de se transmitir voz e vídeo para garantir que uma aula a distância será o mais próximo possível de uma aula presencial, conforme aponta o resultado de pesquisas referenciadas no presente texto, uma vez que vídeo é uma aplicação que demanda grande largura de banda
Abstract: This work is based on a real life situation, experienced in our daily work at Empresa Brasileira de Telecomunicações S.A, EMBRATEL, when pursuing tools that would allow the continuous training of its staff of Technical Consultants. The Technical Consultants were spread all over Brasil, a country of continental dimensions. Time and cost were obstac1es to achieve the above mentioned training. This thesis starts providing a short account of the historical milestones on Distance Learning. We added considerations on the state-of-the-art and scenarios of future developments, which were drawn taking into account social and economical policies. Routing and existing multicasting protocols are described and compared with the bidirectional multicast protocol proposed in this thesis. The main purpose of this thesis is the proposal of a new Multicasting Protocol, to support a new concept on which a teacher can be a student on a different subject by taking into account that we aim a Distance Learning environment inside a corporation. The ns-2 Simulator is used to simulate the perfect operation of the proposed protocol and evaluate its performance. The use of video is mandatory in order to achieve a maximum efficiency at c1ass. The rapid switching of video transmission from the teacher to a remote student that asks a question (so that all other students spread around the country can also see who is asking) and back to the teacher is mandatory and is what motivated the development of this new Multicast Protocol
Doutorado
Telecomunicações e Telemática
Doutor em Engenharia Elétrica
Halfar, Patrik. "Zabezpečený transportní protokol monitorovacích systémů". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237155.
Testo completoGerault, David. "Security analysis of contactless communication protocols". Thesis, Université Clermont Auvergne (2017-2020), 2018. http://www.theses.fr/2018CLFAC103.
Testo completoBareš, Jan. "Návrh protokolu hardwarového akcelerátoru náročných výpočtů nad více jádry". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-376928.
Testo completoDebant, Alexandre. "Symbolic verification of distance-bounding protocols : application to payment protocols". Thesis, Rennes 1, 2020. http://www.theses.fr/2020REN1S057.
Testo completoThe rise of new technologies, and in particular Near Field Communication (NFC) tags, offers new applications such as contactless payments, key-less entry systems, transport ticketing... Due to their security concerns, new security protocols, called distance-bounding protocols, have been developed to ensure the physical proximity of the de- vices during a session. In order to prevent flaws and attacks, these protocols require formal verification. In this manuscript, we present several techniques that allow for an automatic verification of such protocols. To this aim, we first present a symbolic model which faithfully models time and locations. Then we develop two approaches : either ba- sed on a new verification procedure, or leveraging existing tools like Proverif. Along this manuscript, we pay a particular attention to apply our results to contactless payment protocols
Maria, Fábio Rogério Tôrres. "Frequência dos diferentes protocolos de extrações nos tratamentos ortodônticos conduzidos na Faculdade de Odontologia de Bauru FOB-USP, nos últimos 35 anos". Universidade de São Paulo, 2010. http://www.teses.usp.br/teses/disponiveis/25/25134/tde-02062011-143725/.
Testo completoThe purpose of this retrospective study was to evaluate all orthodontic treatment plannings conducted at the Orthodontic Department at Bauru Dental School, University of São Paulo, since 1973, in order to investigate extraction and nonextraction frequency protocols selected at each considered period. The sample comprised initially 3745 records of treated patients, that according to exclusion criteria, reduced the final sample to 3413 documentations. This total sample was evaluated according to the protocol choice, being divided into 10 groups: Protocol 0 (nonextraction group); Protocol 1 (4-first premolar extractions); Protocol 2 (2-maxillary first and 2-mandibular second premolar extractions); Protocol 3 (2-maxillary premolar extractions); Protocol 4 (4-second premolar extractions); Protocol 5 (asymmetric premolar extractions); Protocol 6 (incisor and canine extractions); Protocol 7 (first and second molar extractions); Protocol 8 (atypical extractions) and Protocol 9 (agenesis and previously missing teeth group). These 3413 obtained protocols were divided into seven 5-year intervals: Interval 1 (1973-1977); Interval 2 (1978-1982); Interval 3 (1983-1987); Interval 4 (1988-1992); Interval 5 (1993-1997); Interval 6 (1998-2002); Interval 7 (2003-2007). The frequency of each protocol was compared among the 7 intervals, using the Proportion Test, in order to identify some predominant trends at each tested period. The results showed that 7 frequency protocols were significantly different among the 7 considered intervals, evidencing that the protocols choice was influenced by some dominant philosophies or dogmas during the evaluated periods.
Iyengar, Janardhan R. "End-to-end concurrent multipath transfer using transport layer multihoming". Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file 1.67 Mb., p. 123, 2006. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:3220807.
Testo completoLukovicsová, Nicola. "The history of diplomatic protocol with the emphasis on French influence on diplomatic protocol and new cultural influences on today´s diplomatic protocol". Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193888.
Testo completoTibor, Sakal. "Metoda za povezivanje mernog sistema i računarapomoću konverzije podataka iz I2S u TCP/IP protokol". Phd thesis, Univerzitet u Novom Sadu, Tehnički fakultet Mihajlo Pupin u Zrenjaninu, 2017. https://www.cris.uns.ac.rs/record.jsf?recordId=103839&source=NDLTD&language=en.
Testo completoThis doctoral thesis presents the research work carried out in order to solve a practical problem, the realization of a connection between a medical measuring device and a personal computer. The result of the research is a general method that provides efficient data conversion from the I2S protocol to the TCP/IP protocol.
Pimenta, Diogo da Silva. "O efeito do protocolo preventivo dos músculos isquiotibiais “L-Protocol”+“C-Protocol” em jovens futebolistas". Bachelor's thesis, [s.n.], 2018. http://hdl.handle.net/10284/6749.
Testo completoIntrodução: as lesões musculares dos isquiotibiais são comuns em futebolistas, por este facto existem diversos protocolos de reabilitação e/ou de prevenção. Objetivo: analisar o efeito da realização do L-Protocol+C-Protocol em jovens futebolistas no ganho de flexibilidade, equilíbrio dinâmico e força muscular. Metodologia: a amostra foi constituída por 38 futebolistas, 19 do escalão júnior e 19 do escalão juvenil, divididos em dois grupos, em que um dos grupos realizou o L-Protocol+C-Protocol. Os parâmetros avaliados foram a flexibilidade quantificada através do banco Wells, o equilíbrio dinâmico pelo Star Execursion Balance Test (SBET) e a força pelas diferentes formas do Hop test. Resultados: a realização do L-Protocol+C-Protocol não alterou a força, favoreceu o equilíbrio dinâmico na maioria das distâncias no escalão juvenil, e melhorou a flexibilidade nos futebolistas juniores. Conclusão: o L-Protocol+C-Protocol pode ser benéfico no desempenho dos futebolistas, e um modo de prevenção de lesões dos isquiotibiais.
Background: the muscular hamstring injuries are common in soccer players, so there are several rehabilitation and/or prevention protocols. Objectives: to analyze the effect of L-Protocol+C-Protocol on young soccer players in gain flexibility, dynamic balance and muscular strength. Methodology: The sample was constituted of 38 soccer players, 19 junior players and 19 juvenile players, divided into two groups, in which one group performed the L-Protocol+C-Protocol. The parameters evaluated were the flexibility quantified by the Wells bank, the dynamic balance by the Star Execursion Balance Test (SBET) and the strength by the different forms of the Hop test. Results: The realization L-Protocol+C-Protocol did not change strength, benefited dynamic balance at most distances in juvenile, and improved flexibility in junior soccer players. Conclusion: L-Protocol+C-Protocol may be beneficial in footballers performance, and a way to prevention hamstring injuries.
N/A
Costa, Daniel Gouveia. "Uma arquitetura baseada em SCTP e SIP para suporte a aplica??es VoIP m?veis e a especifica??o formal do seu m?dulo de controle". Universidade Federal do Rio Grande do Norte, 2006. http://repositorio.ufrn.br:8080/jspui/handle/123456789/15461.
Testo completoNew versions of SCTP protocol allow the implementation of handover procedures in the transport layer, as well as the supply of a partially reliable communication service. A communication architecture is proposed herein, integrating SCTP with the session initiation protocol, SIP, besides additional protocols. This architecture is intended to handle voice applications over IP networks with mobility requirements. User localization procedures are specified in the application layer as well, using SIP, as an alternative mean to the mechanisms used by traditional protocols, that support mobility in the network layer. The SDL formal specification language is used to specify the operation of a control module, which coordinates the operation of the system component protocols. This formal specification is intended to prevent ambiguities and inconsistencies in the definition of this module, assisting in the correct implementation of the elements of this architecture
Novas vers?es do protocolo SCTP permitem sua utiliza??o para implementa??o de mecanismos de handover em n?vel de transporte, bem como o fornecimento de um servi?o de transmiss?o de dados parcialmente confi?vel. Integrando o SCTP com o protocolo de inicia??o de sess?es, SIP, al?m de utilizar adicionalmente servi?os de outros protocolos auxiliares, uma arquitetura de comunica??o p?de ser proposta, a fim de atender ?s aplica??es de voz sobre IP com requisitos de mobilidade. S?o especificados ainda os procedimentos de localiza??o de usu?rio em n?vel de aplica??o, utilizando o protocolo SIP, como alternativa aos mecanismos empregados por protocolos tradicionais que suportam mobilidade na camada de rede. A linguagem de especifica??o formal SDL ? utilizada para especificar o funcionamento de um M?dulo de Controle, relacionado ? opera??o coordenada dos protocolos que comp?e a arquitetura. Pretende-se assim evitar ambig?idades e inconsist?ncias na defini??o desse m?dulo, o que pode auxiliar em implementa??es corretas de elementos dessa arquitetura
Šafář, Jan. "Návrh zero-knowledge protokolů". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237255.
Testo completoSadrin, Stéphane. "Evaluation du bénéfice chez l'homme des probiotiques dans la prise en charge du syndrome de l'intestin irritable : méthodologie de l'essai contrôlé randomisé et allégations nutritionnelles et de santé". Thesis, Toulon, 2017. http://www.theses.fr/2017TOUL0007/document.
Testo completoA health claim across the EU requires clinical evidence about the efficacy and safety of a nutritionalsupplementation. Probiotics, especially lactic acid bacteria, fall within this regulatory framework inwhich EFSA indicates that the evidence from patients with functional gastrointestinal disorder aretransferable in a population of healthy subjects. The LAPIBSS protocol is a high-quality clinicaltrial assessing the efficacy of 2 strains of Lactobacillus acidophilus to reduce the irritable bowelsyndrome symptoms severity. Results confirm the safety of strains used but do not show asignificant decrease of symptoms compared with placebo after 8 weeks. The overall treatment effectis statistically significant on the flatus score. A placebo effect and the considerable heterogeneity ofsymptoms severity at baseline would explain our results. A better understanding of physiologicaleffects of probiotics in human would be needed to upgrade the rationale for their use in clinicalresearch
Froldi, Carlos Augusto 1979. "Uma variação do protocolo DCCP para redes de alta velocidade". [s.n.], 2011. http://repositorio.unicamp.br/jspui/handle/REPOSIP/275723.
Testo completoDissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação
Made available in DSpace on 2018-08-19T17:25:04Z (GMT). No. of bitstreams: 1 Froldi_CarlosAugusto_M.pdf: 543951 bytes, checksum: e4f64a2921c88fd1461445bd39a04278 (MD5) Previous issue date: 2011
Resumo: Os protocolos da camada de transporte na Internet, TCP e UDP, não oferecem serviços para transmissão eficiente de fluxos multimídia, porém, este último é adotado com maior freqüência por essas aplicações. Uma proposta de um novo protocolo da camada de transporte, chamado DCCP, foi elaborada para atender a demanda das aplicações multimídia e substituir o protocolo UDP. A presente dissertação propõe uma variante deste protocolo, chamada Fast DCCP, para operar de maneira eficiente em redes de alta velocidade. A nova variante foi avaliada através de experimentos de simulação, utilizando o NS-2 e experimentos de medição, utilizando o sistema operacional Linux
Abstract: The Internet transport layer protocols, TCP and UDP, do not provide efficient transport service for multimedia streams. UDP is usually used for these applications, due to its low overhead. A new transport layer protocol, called DCCP, was proposed to meet the demand of multimedia applications, aiming at replacing the UDP protocol. This dissertation will propose a variant for this protocol, called Fast DCCP, for operating efficiently on high-speed networks. It was evaluated by simulation using the NS-2 network simulator and measurements of the FAST DCCP protocol operation in the Linux operating system
Mestrado
Ciência da Computação
Mestre em Ciência da Computação
Kou, Tian. "Conformance testing of OSI protocols : the class O transport protocol as an example". Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26427.
Testo completoScience, Faculty of
Computer Science, Department of
Graduate
Muhammad, Shahabuddin. "EXTENDING DISTRIBUTED TEMPORAL PROTOCOL LOGIC TO A PROOF BASED FRAMEWORK FOR AUTHENTICATION PROTOCOLS". Doctoral diss., University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3086.
Testo completoPh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
Prathaban, Mahendiran. "Contributions to the performance study of interplanetary networks". Phd thesis, Institut National des Télécommunications, 2010. http://tel.archives-ouvertes.fr/tel-00538532.
Testo completoHoran, Stephen, e Giriprassad Deivasigamani. "USING LABVIEW TO DESIGN A FAULT-TOLERANT LINK ESTABLISHMENT PROTOCOL". International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605784.
Testo completoThe design of a protocol for a satellite cluster link establishment and management that accounts for link corruption, node failures, and node re-establishment is presented in this paper. This protocol will need to manage the traffic flow between nodes in the satellite cluster, adjust routing tables due to node motion, allow for sub-networks in the cluster, and similar activities. This protocol development is in its initial stages and we will describe how we use the LabVIEW Sate Diagram tool kit to generate the code to design a state machine representing the protocol for the establishment of inter-satellite communications links.
Guedj, Michaël. "BSP algorithms for LTL & CTL model checking of security protocols". Thesis, Paris Est, 2012. http://www.theses.fr/2012PEST1081.
Testo completoIn a world strongly dependent on distributed data communication, the design of secure infrastructures is a crucial task. Distributed systems and networks are becoming increasingly important, as most of the services and opportunities that characterise the modern society are based on these technologies. Communication among agents over networks has therefore acquired a great deal of research interest. In order to provide effective and reliable means of communication, more and more communication protocols are invented, and for most of them, security is a significant goal
Shah, Munam Ali. "A novel MAC protocol for cognitive radio networks". Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/301090.
Testo completoBarros, Gavilanes Juan Gabriel. "Réseaux de capteurs pour applications de suivi médical". Phd thesis, Toulouse, INPT, 2013. http://oatao.univ-toulouse.fr/10664/1/barros.pdf.
Testo completoMatúška, Peter. "Metody návrhu platebních protokolů". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-236980.
Testo completoDowling, Benjamin James. "Provable security of internet protocols". Thesis, Queensland University of Technology, 2017. https://eprints.qut.edu.au/108960/1/Benjamin%20James_Dowling_Thesis.pdf.
Testo completoTachecí, Petra. "Globální environmentální smlouvy a jejich efektivita". Master's thesis, Vysoká škola ekonomická v Praze, 2008. http://www.nusl.cz/ntk/nusl-10936.
Testo completoCaires, Milena Constantino. "Avaliação e implementação de propostas de melhoria para o protocolo IRIS baseadas em tecnologias de web semântica". Universidade de São Paulo, 2007. http://www.teses.usp.br/teses/disponiveis/3/3141/tde-08012008-092006/.
Testo completoThe aim of this thesis is to evaluate whether Semantic Web technologies can contribute to Internet Registry Information Service Protocol (IRIS) protocol development. IRIS is a new protocol for providing an information service for Internet resources. It is currently still under development by an Internet Engineering Task Force (IETF) working group. The objective of the working group is to develop and standardize a new protocol to replace the Whois protocol. Whois is the standard protocol used today by information services for Internet resources, i.e. domain names, Internet Protocol (IP) addresses, autonomous systems, amongst others. The motivation to develop a new protocol was based on increasing concerns regarding the security of data stored in the Whois database as the Whois protocol does not provide any security mechanism. Another motivation was the absence of support for distributed databases as the Whois protocol was developed for a centralized database, hence it no longer meets the standard requirements for Internet protocols. So far, the working group has tackled and solved two main issues concerning the Whois protocol: (1) security and (2) support for distributed databases. However, the development of a new standard demands a great investment from the community, in particular with respect to consensus-based policies. Additionally, there is one major barrier against adopting the new protocol: the users adoption. The new protocol must have longevity without being updated or replaced by another protocol. To reach this goal, it is necessary to meet not only the current requirements, such as security issues, but to cater also for future requirements. This thesis is concerned with the following research activities: (1) comparative analysis of the current protocols used to provide information services on Internet resources, (2) the IRIS protocol analysis and (3) the evaluation of new technologies that could be incorporated in the new protocol, in particular Semantic technologies. The results demonstrate that Semantic Web technologies could provide the necessary flexibility and extensibility to meet the current and future requirements of IRIS. To validate the theoretical results a prototype based on the IRIS specification was implemented using Semantic Web technologies. Two types of experiments were conducted: (1) experiments comparing the Whois and the prototype performance and (2) performance evaluation of the prototype based on load tests. Finally, the prototype implementation and subsequent experiment results serve as a proof-of-concept that Semantic Web technologies could contribute towards the IRIS protocol success.
Maciel, Luciana França Smith. "Expressão dos receptores endometriais de estrógeno e progesterona em éguas acíclicas após administração de progesterona". Botucatu, 2017. http://hdl.handle.net/11449/151275.
Testo completoResumo: Progesterone (P4) is frequently used after the administration of estradiol, to prepare seasonal non-cyclic mares as embryo recipients, however previous studies have reported gestation of seasonal non-cyclic mares treated only with P4. The objective of the present study was to evaluate the gene and protein expression of estrogen receptor alpha (ERα), estrogen beta (ERβ) and progesterone (PR) in the endometrium of seasonal non-cyclic mares treated with long acting progesterone (LAP4). Eight mares were used during the seasonal anoestrus phase, uterine biopsies were performed immediately before and five days after administration of 1,5 g of LA P4. Blood samples were taken daily for the determination of plasma P4 concentration. The protein expression of the receptors was evaluated by the immunohistochemistry and the immunostaining area percentage was determined by the ImageJ software. Transcripts abundance for ERα (ESR1), ERβ (ESR2) and PR (PGR) were determined by RT-qPCR. ERα showed higher protein expression (p <0.05) after administration of P4LA, but there was no change in mRNA abundance encoding this gene (p> 0,05). Tendency to lower protein expression was observed (p=0,07) and gene expression inhibition (p <0,05) for ERβ, PR did not changes (p>0,05). The plasma concentration of P4 presented a higher concentration 24 hours after the application of LA P4 (D1), with subsequent decline in these values (p<0,05). The 1.5 g dose of LA P4 reached the minimum concentrations of P4 requi... (Resumo completo, clicar acesso eletrônico abaixo)
Mestre
Carvalho, Yuri Jorge Sampaio. "Modelo de métrica multidimensional para a melhoria do roteamento em redes AD HOC móveis". reponame:Repositório Institucional da UnB, 2013. http://repositorio.unb.br/handle/10482/23419.
Testo completoSubmitted by Fernanda Percia França (fernandafranca@bce.unb.br) on 2016-06-08T16:31:40Z No. of bitstreams: 1 2013_YuriJorgeSampaioCarvalho.pdf: 2518181 bytes, checksum: 5f52f6b0ae48a575dd295220dd882bdd (MD5)
Approved for entry into archive by Patrícia Nunes da Silva(patricia@bce.unb.br) on 2017-04-30T14:45:09Z (GMT) No. of bitstreams: 1 2013_YuriJorgeSampaioCarvalho.pdf: 2518181 bytes, checksum: 5f52f6b0ae48a575dd295220dd882bdd (MD5)
Made available in DSpace on 2017-04-30T14:45:09Z (GMT). No. of bitstreams: 1 2013_YuriJorgeSampaioCarvalho.pdf: 2518181 bytes, checksum: 5f52f6b0ae48a575dd295220dd882bdd (MD5)
Este trabalho visa a propor uma métrica multidimensional que tem como propósito causar um melhor desempenho no roteamento de redes ad hoc móveis, na presença de nós egoístas e nós em modo sleep, e com mobilidade. A melhora de desempenho diz respeito, principalmente, ao incremento da taxa de entrega de pacotes com sucesso. Para alcançar um melhor desempenho, foram observados e analisados os resultados prévios alcançados por outras métricas, o que resultou na descoberta de padrões e comportamentos, de modo a embasar à elaboração de uma nova métrica capaz de suprir as lacunas e imprecisões daquelas métricas existentes anteriormente. A validação do trabalho foi feita por método de simulação, tendo o protocolo DSR sido modificado para implantar a métrica proposta e operar considerando tal métrica. Como resultado das simulações, constatou-se que métrica proposta por este trabalho teve, em alguns pontos, uma taxa de entrega de pacotes com sucesso 30% superior àquela encontrada para a métrica original do próprio protocolo DSR (DynamicSourceRouting) e cerca de 15% superior àquela encontrada para uma métrica proposta em trabalho precedente (Serique; Sousa, 2011).
This work aims to propose a multidimensional metric that aims to improve routing performance in mobile ad hoc networks in the presence of selfish nodes, nodes in sleep mode. In order to reach a better performance in the delivery rate of packets successfully, we observed the results achieved by other metrics in simulations, which resulted in the discovery of patterns and behaviors that led to the development of a metric that supplied the gaps and inaccuracies of those metrics. This work´s validation was performed using a simulation method, with the DSR (Dynamic Source Routing) protocol which was modified so as to implement and to operate with our proposed metric. The simulations results show that the metric proposed in this work presents, at some points, a successfully delivery rate of packets 30% higher than the original metric of the DSR protocol and about 15% higher than that of the metric proposed in a previous work by (Serique; Sousa, 2011).
Williams, James Pate. "A quantitative study of musical instrument digital interface (MIDI) over Internet Protocol (IP) protocols". Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Fall/Dissertation/WILLIAMS_JAMES_14.pdf.
Testo completoLevillain, Olivier. "Une étude de l’écosystème TLS". Thesis, Evry, Institut national des télécommunications, 2016. http://www.theses.fr/2016TELE0014/document.
Testo completoSSL/TLS, a 20-year old security protocol, has become a major component securing network communications, from HTTPS e-commerce and social network sites to Virtual Private Networks, from e-mail protocols to virtually every possible protocol. In the recent years, SSL/TLS has received a lot of attentions, leading to the discovery of many security vulnerabilities, and to protocol improvements. In this thesis, we first explore the SSL/TLS ecosystem at large using IPv4 HTTPS scans, while proposing collection and analysis methodologies to obtain reproducible and comparable results across different measurement campaigns. Beyond these observations, we focused on two key aspects of TLS security: how to mitigate Record Protocol attacks, and how to write safe and efficient parsers. Finally, building on the numerous implementation flaws in almost all TLS stacks in the last years, we propose some thoughts about the challenges in writing a secure TLS library
Gustavsson, C. C. Magnus. "Mail Exchange Protocol (MEP): Ett utkast till nytt protokoll för elektronisk post". Thesis, Linköping University, Department of Computer and Information Science, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2698.
Testo completoSMTP, the current protocol for sending electronic mail (e-mail) over the Internet, has for many years suffered from several problems and limitations. When it was designed, well over twenty years ago, the requirements for e-mail were very different from those of today. A message was a text message in English, and both user and machine were explicitly named in the address. The protocol was not designed to transfer other types of messages, and no mechanism was included to verify the identity of the sender.
In order to solve these shortcomings, a new e-mail protocol needs to be defined. This report specifies a basis for what such a protocol may look like. The protocol has been designed to be easy to modify and expand, as well as to benefit from more recent ideas and technology. Binary message content is transferred without conversion, sender addresses are verified, and the address format is flexible. Along with the specification of the protocol, a sample implementation has been provided.
Jelinski, Olaf [Verfasser]. "Das internationale diplomatische Protokoll im Vergleich zum Protokoll in Unternehmen. Eine Analyse des Protokolls als politische Institution / Olaf Jelinski". Greifswald : Universitätsbibliothek Greifswald, 2015. http://d-nb.info/107812583X/34.
Testo completoLu, Jing. "Semi-automatic protocol implementation using an Estelle-C compiler, LAPB and RTS protocols as examples". Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/29419.
Testo completoScience, Faculty of
Computer Science, Department of
Graduate
Mustell, Eliot John. "Internet Protocol Version 6: The Next Generation?" [Milwaukee, Wis.] : e-Publications@Marquette, 2009. http://epublications.marquette.edu/theses_open/23.
Testo completoYu, Shui, e mikewood@deakin edu au. "Anycast services and its applications". Deakin University. School of Information Technology, 2004. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20051208.112407.
Testo completoYang, Ying. "Routing protocols for wireless sensor networks: A survey". Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-19700.
Testo completoCavalcanti, Alexandre Biasi. "Estudo randomizado, aberto, para avaliação da eficácia e segurança de dois protocolos para infusão de insulina endovenosa e um protocolo de administração de insulina subcutânea, em pacientes gravemente enfermos". Universidade de São Paulo, 2008. http://www.teses.usp.br/teses/disponiveis/5/5137/tde-19112008-161404/.
Testo completoTruneček, Petr. "Kryptografické protokoly v praxi". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-218171.
Testo completoLi, Kang. "Modeling the bandwidth sharing behavior of congestion controlled flows /". Full text open access at:, 2002. http://content.ohsu.edu/u?/etd,632.
Testo completoZamrzla, Martin. "Průmyslový stavový indikátor". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2011. http://www.nusl.cz/ntk/nusl-218908.
Testo completoHlavatý, Josef. "Návrh laboratorní úlohy zaměřené na protokol AODV". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2018. http://www.nusl.cz/ntk/nusl-377001.
Testo completoMachálka, Lukáš. "Implementace komunikačního protokolu CAN 2.0 v jednočipových mikroprocesorech". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217247.
Testo completoEl, Sawda Samer. "Contribution à l'amélioration de la sécurité pour le protocole SIP (Session Initiation Protocol)". Paris 6, 2011. http://www.theses.fr/2011PA066019.
Testo completoAMORIM, Rodrigo Diego Melo. "HTR Heterogeneous Routing Protocol, um protocolo de roteamento para redes ad hoc heterogêneas". Universidade Federal de Pernambuco, 2011. https://repositorio.ufpe.br/handle/123456789/2458.
Testo completoFaculdade de Amparo à Ciência e Tecnologia do Estado de Pernambuco
A popularidade de dispositivos móveis como meio de comunicação tem crescido nos últimos anos devido à facilidade de uso, custo e as mais variadas tecnologias. O aumento no número dessas opções como WiFi, Bluetooth ou até mesmo rede de telefonia móvel permitem uma maior conectividade desses dispositivos móveis na rede. Determinadas tarefas, como compartilhamento de stream de vídeo, implicam diferentes requisitos, o que pode requerer diferentes tecnologias de rede. Nos cenários de emergência, que incluem operações militares, força-tarefa para desastres e grupos de busca e resgate, onde se pressupõe a ausência de infraestrutura, o uso de redes sem fio e a permanente conectividade podem ser requisitos essenciais para realização de algumas tarefas. Para tanto o uso de um protocolo de roteamento que seja adequado a esse ambiente é de fundamental importância. Este trabalho faz um estudo comparativo de um novo protocolo de roteamento para redes heterogêneas ad hoc, chamado Heterogeneous Routing Protocol ou simplesmente HTR, focado em cenários de emergência, com um dos protocolos de roteamento para redes ad hoc mais usado, o OLSR. A fim de fazer uma análise robusta e escalável, o protocolo HTR foi implementado no simulador NS-3 e comparado ao OLSR através de métricas como taxa de entrega, atraso, pacotes perdidos, entre outros
Mikuš, Peter. "Nástroje a interaktivní prostředí pro simulaci komunikace". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237205.
Testo completoWu, Chen. "A new TCP protocol based on end-to-end available bandwidth measurement /". View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.
Testo completoNemani, Srinivasa Sankar Carlisle W. Homer. "Investigation of EtherYatri's compatibility with IPV6". Auburn, Ala., 2006. http://repo.lib.auburn.edu/2006%20Summer/Theses/NEMANI_SRINIVASA_48.pdf.
Testo completo