Searched for: subject:"Protocol"
(1 - 20 of 67)

Pages

document
Bouwmeester, B.J. (author)
The increasingly important availability of online services is constantly threatened by malicious software such as botnets. Attackers have gained power through devices that are part of the rising Internet of Things (IoT), mostly through infections caused by Mirai. The botnets created by Mirai are used for the purpose of DDoS attacks, which can...
master thesis 2020
document
van Dooren, M.M.M. (author), Visch, V.T. (author), Spijkerman, Renske (author), Goossens, R.H.M. (author), Hendriks, Vincent M. (author)
Background: Electronic health (eHealth) programs are often based on protocols developed for the original face-to-face therapies. However, in practice, therapists and patients may not always follow the original therapy protocols. This form of personalization may also interfere with the intended implementation and effects of eHealth...
journal article 2020
document
Siddiqi, M.A. (author), Serdijn, W.A. (author), Strydis, C. (author)
The wireless capabilities of modern Implantable Medical Devices (IMDs) make them vulnerable to security attacks. One prominent attack, which has disastrous consequences for the patient’s wellbeing, is the battery Denial-of-Service attack whereby the IMD is occupied with continuous authentication requests from an adversary with the aim of...
journal article 2020
document
This open access book constitutes the proceedings of the 12th International Conference on Human Haptic Sensing and Touch Enabled Computer Applications, EuroHaptics 2020, held in Leiden, The Netherlands, in September 2020. <br/><br/>The 60 papers presented in this volume were carefully reviewed and selected from 111 submissions. The were...
book 2020
document
Sfakianou, Areti (author)
Psychiatric disorders are associated with major societal, personal issues and comprise 13% of the global burden of disease. They are heritable and present a complex pathophysiology, characterized by hundreds of genetic variants which are cumulated together and provoke a specific psychiatric disorder. Although a considerable progress has been...
master thesis 2019
document
Nateghizad, M. (author)
In order to achieve practical e-healthcare systems, five requirements should be addressed, namely 1) availability, 2) integrity, 3) accuracy, 4) confidentiality, and 5) efficiency. Using remote computer storage and processing services satisfies availability, integrity, and efficiency. However, it introduces privacy concerns regarding the leakage...
doctoral thesis 2019
document
Buijze, Arjen (author)
In aircraft maintenance, performance of routine maintenance tasks is prone to generate additional non-routine tasks. These non- routine tasks relate to solving an unexpected issue and have specific requirements in terms of materiel, tools and manpower. In existing research regarding optimization of aircraft maintenance environments and schedules...
master thesis 2019
document
de Vries, Maarten (author)
Pose estimation through fusion of GNSS with secondary sensors has long been an established field. With the developments surrounding autonomous navigation over the past decade this topic has gained extra importance. In the current literature GNSS based pose and localisation is often improved through fusion with either a IMU}or VS with the goal of...
master thesis 2019
document
Carvajal Godínez, J. (author), Guo, J. (author), Gill, E.K.A. (author)
Bus saturation is deemed as one of the primary causes of delays in the data propagation between spacecraft components. However, the conditions under which bus congestion can affect measurements variability were not well characterized before. This work presents a bus saturation model and a set of experiments to characterize the bus performance of...
journal article 2019
document
van Geest, Wiebe (author)
Session types are a formal method to describe communication protocols between two or more actors. Protocols that type check are guaranteed to respect communication safety, linearity, progress, and session fidelity. Basic session types, however, do not in general guarantee anything about the contents of messages, while real-life applications of...
master thesis 2018
document
Festen, David (author)
In order to be accepted by negotiating parties, negotiation protocols need to be fair and unbiased. We extend the bilateral turn-taking negotiation protocol to multiparty multilateral turn-taking peer negotiation protocols maintaining its fairness properties. We define the de- sign space of such protocols and capture the design decisions that go...
master thesis 2018
document
Meneguzzi, Felipe (author), Magnaguagno, Mauricio C. (author), Singh, Munindar P. (author), Telang, Pankaj R. (author), Yorke-Smith, N. (author)
This article addresses the challenge of planning coordinated activities for a set of autonomous agents, who coordinate according to social commitments among themselves. We develop a multi-agent plan in the form of a commitment protocol that allows the agents to coordinate in a flexible manner, retaining their autonomy in terms of the goals...
journal article 2018
document
Naglic, M. (author), Popov, M. (author), van der Meijden, M.A.M.M. (author), Terzija, Vladimir (author)
Electrical power system monitoring, protection, operation, and control schemes are undergoing significant changes toward the next generation fully automated, resilient, and self-healing grids. At present, there still exists a lack of available user-friendly tools for the synchronized measurement technology supported application design. This...
journal article 2018
document
Dirkse, Bas (author)
This thesis provides an overview of the standard randomized benchmarking protocol, the extension to interleaved randomized benchmarking and the related unitarity randomized benchmarking, used to characterize noisy implementations of quantum gates from the Clifford group. It contains a brief overview of the textbook and literature preliminaries...
master thesis 2017
document
Geneste, Ginger (author)
Modern Implantable Medical Devices (IMDs) are enabled to communicate with an external device trough wireless channels. The non-invasive method allow health-care practitioners to investigate the effectiveness of a treatment delivered by the IMD and tailor it specifically to the patients' needs. The wireless communication capability however, also...
master thesis 2017
document
Rizky Dharmawan, Tubagus (author)
Software-Defined Networking (SDN) potentially can improve the flexibility and management of Wireless Sensor Networks (WSNs). To investigate the impact of SDN on WSN, in this thesis, we consider three Software-Defined Wireless Sensor Network (SD-WSN) frameworks, namely SDN-WISE, SDWN-ONOS, and TinySDN. After comparing these frameworks, the...
master thesis 2017
document
Shamsundar, Ashwini (author)
Internet of Things (IoT) as the name suggests is a network of interconnected devices connected to the internet. There are lot of 802.15.4 network technologies in the market for current implementation of IoT, however, they have critical problems which is preventing IoT to become fully successful. Some of the issues are lack of interoperability,...
master thesis 2017
document
Chavez Olalla, Juan (author)
Aftercare of sanitary landfills represents a burden for future generations, for emission potential of leachate and gases remains for hundred of years. Treatment methods have to be developed in order to accelerate waste degradation and reduce emission potential preferably within the time-span of one generation. Aeration seems a promising...
master thesis 2017
document
Stokkink, Q.A. (author)
There are two key components for high throughput distributed anonymizing applications. The first key component is overhead due to message complexity of the utilized algorithms. The second key component is an nonscalable architecture to deal with this high throughput. These issues are compounded by the need for anonymization. Using a state of the...
master thesis 2017
document
Akhundov, H. (author)
Secure communication has been paramount throughout history. Although in the early ages it was mainly found in niche applications such as the military and royal society, today it is an inevitable part of our daily lives. The recent rapid proliferation of Internet of Things (IoT), a diverse set of devices that are connected to the Internet,...
master thesis 2017
Searched for: subject:"Protocol"
(1 - 20 of 67)

Pages