64 research outputs found

    MICA: A MID Compiler in Java

    Full text link
    Management Information Bases (MIBs) define the attributes of objects managed by the Simple Network Management Protocol (SNMP). An SNMP application uses the information in one or more MIBs to learn the attributes of the objects supported by the managed devices in a network. MIBs in source form are not directly usable; they must first be compiled into a format acceptable to the SNMP application. Java's built-in network facilities make it an ideal language for writing SNMP applications, so the need arises for a Java-based MIB compiler. The MICA project is the design and implementation a Java class library that treats a MIB as an abstract data type (ADT). Java-based SNMP applications use this ADT to compile MIBs and extract their information.http://deepblue.lib.umich.edu/bitstream/2027.42/107925/1/citi-tr-97-1.pd

    Medical informatics : the generic interchange of comprehensive health data

    Get PDF
    The objective of this project was to study the area of generic transfer of comprehensive medical data.The work presented in this thesis had as its main premise the belief that generic transfer of comprehensive medical data will help towards the goal of better healthcare particularly in an environment of shared care. It studied the main methods of data transfer available at present, and as a result carried out an in depth review of one such method adopted by the National Health Service (NHS). Criticism of this method was made. These criticisms lead on to the development of an alternative method of generic data transfer based on an emerging European standard for the storage of medical data. This in turn led on to the consideration of data in legacy systems. Finally, an evaluation of the developed method was undertaken

    Medical informatics : the generic interchange of comprehensive health data

    Get PDF
    The objective of this project was to study the area of generic transfer of comprehensive medical data.The work presented in this thesis had as its main premise the belief that generic transfer of comprehensive medical data will help towards the goal of better healthcare particularly in an environment of shared care. It studied the main methods of data transfer available at present, and as a result carried out an in depth review of one such method adopted by the National Health Service (NHS). Criticism of this method was made. These criticisms lead on to the development of an alternative method of generic data transfer based on an emerging European standard for the storage of medical data. This in turn led on to the consideration of data in legacy systems. Finally, an evaluation of the developed method was undertaken

    Reconfiguration dynamique et simulation fine modélisée au niveau de transaction dans les réseaux de capteurs sans fil hétérogènes matériellement-logiciellement

    Get PDF
    Cette thèse porte premièrement sur la reconfiguration dynamique et la simulation hétérogène dans les Réseaux des Capteurs sans Fil. Ces réseaux sont constitués d une multitude de systèmes électroniques communicants par radio-fréquence, très contraints en énergie. La partie de communication radio entre ces nœuds est la plus consommatrice. C est pourquoi la minimisation du temps effectif est désirée. On a implémenté une solution qui consiste à envoyer au nœud un fichier de reconfiguration codé utilisant un langage de programmation haut niveau (MinTax). Le nœud sera capable de compiler ce fichier et générer le code object associé à son architecture, in-situ. Grâce au caractère abstrait du MinTax, plusieurs architectures matérielles et systèmes d exploitation sont visés. Dans un deuxième temps, ce travail de thèse est lié au simulateur de réseaux de capteurs IDEA1TLM.IDEA1TLM permet de prédire quels circuits et configurations sont les plus adéquats à une application sans fil donnée. Ce simulateur a été amélioré pour permettre la simulation rapide des systèmes électroniques matériellement différents dans le même réseau ainsi que le logiciel présent sur les noeuds. Mots clés : Reconfiguration dynamique, Compilation in-situ, MinTax, Hétérogénéité, IDEA1TLM.This PhD thesis concerns the dynamic reconfiguration and simulation of heterogeneous Wireless Sensor Networks. These networks consist of a multitude of electronic units called ?nodes ?, which communicate through a radio interface. The radio interface is the most power-consuming on the node. This is why the minimisation of the radio-time would lead to improved energy efficiency. We have implemented a software solution which consists in sending an update to a node which is coded in a high-level language (MinTax). This file is compiled by the node and machine code is generated for the target hardware architecture. Owing to the abstract nature of MinTax, multiple hardware architectures. as well as operating systems are supported. As a second part of this PhD, work has been focused on a network simulator called IDEATLM.IDEA1TLM allows us to predict which circuits and configurations are the most appropriate for a given task. This solution has been improved to allow a faster simulation of electronic systems which are different from a hardware standpoint, yet part of the same network, as well as to model the actual software running on them.LYON-Ecole Centrale (690812301) / SudocSudocFranceF

    An empirical, in-depth investigation into service creation in H.323 Version 4 Networks

    Get PDF
    Over the past few years there has been an increasing tendency to carry voice on IP networks as opposed to the PSTN and other switched circuit networks. Initially this trend was favoured due to reduced costs but occurred at the expense of sacrificing the quality of the voice communications. Switched circuit networks have therefore remained the preferred carrier-grade voice communication network, but this is again changing. The advancement in improved quality of service (QoS) of real-time traffic on the IP network is a contributing factor to the anticipated future of the IP network supplying carrier-grade voice communications. Another contributing factor is the possibility of creating a new range of innovative, state-of-the-art telephony and communications services that acquire leverage through the intelligence and flexibility of the IP network. The latter has yet to be fully explored. Various protocols exist that facilitate the transport of voice and other media on IP networks. The most well known and widely supported of these is H.323. This work presents and discusses H.323 version 4 service creation. The work also categorises the various H.323 services and presents the mechanisms provided by H.323 version 4 that have facilitated the development of the three services I have developed, EmailReader, Telgo323 and CANS

    Mustererkennungsbasierte Verteidgung gegen gezielte Angriffe

    Get PDF
    The speed at which everything and everyone is being connected considerably outstrips the rate at which effective security mechanisms are introduced to protect them. This has created an opportunity for resourceful threat actors which have specialized in conducting low-volume persistent attacks through sophisticated techniques that are tailored to specific valuable targets. Consequently, traditional approaches are rendered ineffective against targeted attacks, creating an acute need for innovative defense mechanisms. This thesis aims at supporting the security practitioner in bridging this gap by introducing a holistic strategy against targeted attacks that addresses key challenges encountered during the phases of detection, analysis and response. The structure of this thesis is therefore aligned to these three phases, with each one of its central chapters taking on a particular problem and proposing a solution built on a strong foundation on pattern recognition and machine learning. In particular, we propose a detection approach that, in the absence of additional authentication mechanisms, allows to identify spear-phishing emails without relying on their content. Next, we introduce an analysis approach for malware triage based on the structural characterization of malicious code. Finally, we introduce MANTIS, an open-source platform for authoring, sharing and collecting threat intelligence, whose data model is based on an innovative unified representation for threat intelligence standards based on attributed graphs. As a whole, these ideas open new avenues for research on defense mechanisms and represent an attempt to counteract the imbalance between resourceful actors and society at large.In unserer heutigen Welt sind alle und alles miteinander vernetzt. Dies bietet mächtigen Angreifern die Möglichkeit, komplexe Verfahren zu entwickeln, die auf spezifische Ziele angepasst sind. Traditionelle Ansätze zur Bekämpfung solcher Angriffe werden damit ineffektiv, was die Entwicklung innovativer Methoden unabdingbar macht. Die vorliegende Dissertation verfolgt das Ziel, den Sicherheitsanalysten durch eine umfassende Strategie gegen gezielte Angriffe zu unterstützen. Diese Strategie beschäftigt sich mit den hauptsächlichen Herausforderungen in den drei Phasen der Erkennung und Analyse von sowie der Reaktion auf gezielte Angriffe. Der Aufbau dieser Arbeit orientiert sich daher an den genannten drei Phasen. In jedem Kapitel wird ein Problem aufgegriffen und eine entsprechende Lösung vorgeschlagen, die stark auf maschinellem Lernen und Mustererkennung basiert. Insbesondere schlagen wir einen Ansatz vor, der eine Identifizierung von Spear-Phishing-Emails ermöglicht, ohne ihren Inhalt zu betrachten. Anschliessend stellen wir einen Analyseansatz für Malware Triage vor, der auf der strukturierten Darstellung von Code basiert. Zum Schluss stellen wir MANTIS vor, eine Open-Source-Plattform für Authoring, Verteilung und Sammlung von Threat Intelligence, deren Datenmodell auf einer innovativen konsolidierten Graphen-Darstellung für Threat Intelligence Stardards basiert. Wir evaluieren unsere Ansätze in verschiedenen Experimenten, die ihren potentiellen Nutzen in echten Szenarien beweisen. Insgesamt bereiten diese Ideen neue Wege für die Forschung zu Abwehrmechanismen und erstreben, das Ungleichgewicht zwischen mächtigen Angreifern und der Gesellschaft zu minimieren

    A Knowledge-Based System for Message Translation. (Volumes I and II).

    Get PDF
    This research addresses the use of a knowledge-based interface to provide the communication service of message translation. The focus of this research is on the technical feasibility of using a knowledge-based design to perform this service for programmable devices on the shop-floor. The uniqueness of this approach is in the use of a knowledge-based design for the software interface. This method of implementation is different from the procedural programming approach used in today\u27s custom interfaces. This research asserts that use of a knowledge-based design will result in an interface system that is easier to construct and maintain than an interface based on the procedural programming. Based on the proposed design, a prototype knowledge-based interface was developed. This prototype was successfully applied in four different applications. Each of these applications involved the translation of messages between the Manufacturing Message Format Standard (MMFS) messaging language and one of four device-specific languages selected for study. These languages represent devices of the type: programmable logic controllers, robots, and NC machines. The capability of the system to provide the translation service was demonstrated using simulated messaging for each device. The system was also adapted for connection with a robot. The resulting design of the interface revealed that the system does impose several restrictions on the messaging languages. These restrictions are expressed in the form of rules which specify if a messaging language is appropriate for use with the system. The requirements and limitations of the design were identified based on the adaptation of the system to each of the different languages. The benefits of the system and recommendations for future work are presented

    Performance of data serialization methods for wireless communication in resource-constrained devices

    Get PDF
    The present thesis aims at comparing the performance of the data serialization methods, JSON and EXI, as recommended in the Technical Specifications published by ETSI Machine-To-Machine Technical Committee. The objective is to evaluate the portability of ETSI M2M to constrained wireless sensor network devices measuring the messaging performance at the application layer. The evaluation has been performed using a ETSI M2M benchmarking service implemented on top of the full Internet of Things stack of protocols including CoAP, 6LoWPAN, and IEEE 802.15.

    A Corpus-driven Approach toward Teaching Vocabulary and Reading to English Language Learners in U.S.-based K-12 Context through a Mobile App

    Get PDF
    In order to decrease teachers’ decisions of which vocabulary the focus of the instruction should be upon, a recent line of research argues that pedagogically-prepared word lists may offer the most efficient order of learning vocabulary with an optimized context for instruction in each of four K-12 content areas (math, science, social studies, and language arts) through providing English Language Learners (ELLs) with the most frequent words in each area. Educators and school experts have acknowledged the need for developing new materials, including computerized enhanced texts and effective strategies aimed at improving ELLs’ mastery of academic and STEM-related lexicon. Not all words in a language are equal in their role in comprehending the language and expressing ideas or thoughts. For this study, I used a corpus-driven approach which is operationalized by applying a text analysis method. For the purpose of this research study, I made two corpora, Teacher’s U.S. Corpus (TUSC) and Science and Math Academic Corpus for Kids (SMACK) with a focus on word lemma rather than inflectional and derivational variants of word families. To create the corpora, I collected and analyzed a total of 122 textbooks used commonly in the states of Florida and California. Recruiting, scanning and converting of textbooks had been carried out over a period of more than two years from October 2014 to March 2017. In total, this school corpus contains 10,519,639 running words and 16,344 lemmas saved in 16,315 word document pages. From the corpora, I developed six word lists, namely three frequency-based word lists (high-, mid-, and low-frequency), academic and STEM-related word lists, and essential word list (EWL). I then applied the word lists as the database and developed a mobile app, Vocabulary in Reading Study – VIRS, (available on App Store, Android and Google Play) alongside a website (www.myvirs.com). Also, I developed a new K-12 dictionary which targets the vocabulary needs of ELLs in K-12 context. This is a frequency-based dictionary which categorizes words into three groups of high, medium and low frequency words as well as two separate sections for academic and STEM words. The dictionary has 16,500 lemmas with derivational and inflectional forms
    • …
    corecore