Searched for: subject:"Protocol"
(1 - 20 of 30)

Pages

document
Bouwmeester, B.J. (author)
The increasingly important availability of online services is constantly threatened by malicious software such as botnets. Attackers have gained power through devices that are part of the rising Internet of Things (IoT), mostly through infections caused by Mirai. The botnets created by Mirai are used for the purpose of DDoS attacks, which can...
master thesis 2020
document
Sfakianou, Areti (author)
Psychiatric disorders are associated with major societal, personal issues and comprise 13% of the global burden of disease. They are heritable and present a complex pathophysiology, characterized by hundreds of genetic variants which are cumulated together and provoke a specific psychiatric disorder. Although a considerable progress has been...
master thesis 2019
document
Buijze, Arjen (author)
In aircraft maintenance, performance of routine maintenance tasks is prone to generate additional non-routine tasks. These non- routine tasks relate to solving an unexpected issue and have specific requirements in terms of materiel, tools and manpower. In existing research regarding optimization of aircraft maintenance environments and schedules...
master thesis 2019
document
de Vries, Maarten (author)
Pose estimation through fusion of GNSS with secondary sensors has long been an established field. With the developments surrounding autonomous navigation over the past decade this topic has gained extra importance. In the current literature GNSS based pose and localisation is often improved through fusion with either a IMU}or VS with the goal of...
master thesis 2019
document
van Geest, Wiebe (author)
Session types are a formal method to describe communication protocols between two or more actors. Protocols that type check are guaranteed to respect communication safety, linearity, progress, and session fidelity. Basic session types, however, do not in general guarantee anything about the contents of messages, while real-life applicationsĀ of...
master thesis 2018
document
Festen, David (author)
In order to be accepted by negotiating parties, negotiation protocols need to be fair and unbiased. We extend the bilateral turn-taking negotiation protocol to multiparty multilateral turn-taking peer negotiation protocols maintaining its fairness properties. We define the de- sign space of such protocols and capture the design decisions that go...
master thesis 2018
document
Dirkse, Bas (author)
This thesis provides an overview of the standard randomized benchmarking protocol, the extension to interleaved randomized benchmarking and the related unitarity randomized benchmarking, used to characterize noisy implementations of quantum gates from the Clifford group. It contains a brief overview of the textbook and literature preliminaries...
master thesis 2017
document
Geneste, Ginger (author)
Modern Implantable Medical Devices (IMDs) are enabled to communicate with an external device trough wireless channels. The non-invasive method allow health-care practitioners to investigate the effectiveness of a treatment delivered by the IMD and tailor it specifically to the patients' needs. The wireless communication capability however, also...
master thesis 2017
document
Rizky Dharmawan, Tubagus (author)
Software-Defined Networking (SDN) potentially can improve the flexibility and management of Wireless Sensor Networks (WSNs). To investigate the impact of SDN on WSN, in this thesis, we consider three Software-Defined Wireless Sensor Network (SD-WSN) frameworks, namely SDN-WISE, SDWN-ONOS, and TinySDN. After comparing these frameworks, the...
master thesis 2017
document
Shamsundar, Ashwini (author)
Internet of Things (IoT) as the name suggests is a network of interconnected devices connected to the internet. There are lot of 802.15.4 network technologies in the market for current implementation of IoT, however, they have critical problems which is preventing IoT to become fully successful. Some of the issues are lack of interoperability,...
master thesis 2017
document
Chavez Olalla, Juan (author)
Aftercare of sanitary landfills represents a burden for future generations, for emission potential of leachate and gases remains for hundred of years. Treatment methods have to be developed in order to accelerate waste degradation and reduce emission potential preferably within the time-span of one generation. Aeration seems a promising...
master thesis 2017
document
Stokkink, Q.A. (author)
There are two key components for high throughput distributed anonymizing applications. The first key component is overhead due to message complexity of the utilized algorithms. The second key component is an nonscalable architecture to deal with this high throughput. These issues are compounded by the need for anonymization. Using a state of the...
master thesis 2017
document
Akhundov, H. (author)
Secure communication has been paramount throughout history. Although in the early ages it was mainly found in niche applications such as the military and royal society, today it is an inevitable part of our daily lives. The recent rapid proliferation of Internet of Things (IoT), a diverse set of devices that are connected to the Internet,...
master thesis 2017
document
Sloots, J.J. (author)
Machine learning approaches are increasingly successful in medical image analysis. Still, learning from MR images poses some serious challenges. Scanner-dependent characteristics effect feature representations directly and hamper the clinical implementation of otherwise successful supervised-learning techniques. To compensate for variations in...
master thesis 2016
document
Lustenhouwer, J. (author)
Motor skill learning is the change in the capability to perform smooth and accurate movements, for example, complicated actions like playing sports or driving a car have to be learned through practice. Defective motor skills resulting from neurological diseases have severe negative effects on quality of life. Subjects have to relearn the skills...
master thesis 2016
document
Lee, Y. (author)
master thesis 2015
document
De Wit, R. (author)
The design of a protocol parser in hardware based on language theory to improve time-to-market, reduce development cost and increase performance compared to protocol parsing in software.
master thesis 2015
document
Treurniet, J.J. (author)
The current Dutch OV-chipkaart payment system for public transportation is based on RFID cards and requires a lot of manual actions from travellers. In this thesis, a novel automated payment system based on Bluetooth Low Energy (BLE) is proposed. Energy is an important criterion for smartphone applications. Where multiple wireless connections co...
master thesis 2015
document
Yerramreddy, V.A. (author)
Forensic schedule analysis is an analysis method that investigates the events of a CPM Schedule. It is recognized that the forensic schedule analysis may potentially be used in a legal proceeding. This means that the claimant for a delay claim might use the forensic schedule analysis to analyze the events of a CPM schedule to prove his...
master thesis 2014
document
Li, S. (author)
When a sensor network is deployed, we fundamentally care about three main outcomes: to obtain as much data as possible (high delivery rate), to obtain data as fast as possible (low latency), and to obtain data for as long as possible (long lifetime). This last metric, called network lifetime, is of great importance and has been widely...
master thesis 2014
Searched for: subject:"Protocol"
(1 - 20 of 30)

Pages