Dissertationen zum Thema „Classification of network devices“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Classification of network devices" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Eis, Pavel. „Datová sada pro klasifikaci síťových zařízení pomocí strojového učení“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445543.
Der volle Inhalt der QuelleSleem, Lama. „Design and implementation of lightweight and secure cryptographic algorithms for embedded devices“. Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD018.
Der volle Inhalt der QuelleLiving in an era where new devices are astonishing considering their high capabilities, new visions and terms have emerged. Moving to smart phones, Wireless Sensor Networks, high-resolution cameras, pads and much more, has mandated the need to rethink the technological strategy that is used today. Starting from social media, where apparently everything is being exposed, moving to highly powerful surveillance cameras, in addition to real time health monitoring, it can be seen that a high amount of data is being stored in the Cloud and servers. This introduced a great challenge for their storage and transmission especially in the limited resourced platforms that are characterized by: (a) limited computing capabilities, (b) limited energy and source of power and (c) open infrastructures that transmit data over wireless unreliable networks. One of the extensively studied platforms is the Vehicular Ad-hoc Networks which tends to have many limitations concerning the security field. In this dissertation, we focus on improving the security of transmitted multimedia contents in different limited platforms, while preserving a high security level. Limitations of these platforms are taken into consideration while enhancing the execution time of the secure cipher. Additionally, if the proposed cipher is to be used for images, the intrinsic voluminous and complex nature of the managed images is also taken into account. In the first part, we surveyed one of the limited platforms that is interesting for many researchers, which is the Vehicular Ad-hoc Networks. In order to pave the way for researchers to find new efficient security solutions, it is important to have one reference that can sum most of the recent works. It almost investigates every aspect in this field shedding the light over different aspects this platform possesses. Then, in order to propose any new security solution and validate its robustness and the level of randomness of the ciphered image, a simple and efficient test is proposed. This test proposes using the randomness tools, TestU01 and Practrand, in order to assure a high level of randomness. After running these tests on well known ciphers, some flaws were exposed. Proceeding to the next part, a novel proposal for enhancing the well-known ultra lightweight cipher scheme, Speck, is proposed. The main contribution of this work is to obtain a better version compared to Speck. In this proposal, 26 rounds in Speck were reduced to 7 rounds in Speck-R while enhancing the execution time by at least 50%. First, we validate that Speck-R meets the randomness tests that are previously proposed. Additionally, a dynamic substitution layer adds more security against key related attacks and highly fortifies the cipher. Speck-R was implemented on different limited arduino chips and in all cases, Speck-R was ahead of Speck. Then, in order to prove that this cipher can be used for securing images, especially in VANETS/IoV, where images can be extensively re/transmitted, several tests were exerted and results showed that Speck-R indeed possesses the high level of security desired in any trusted cipher. Extensive experiments validate our proposal from both security and performance point of views and demonstrate the robustness of the proposed scheme against the most-known types of attacks
Erlandsson, Niklas. „Utilizing machine learning in wildlife camera traps for automatic classification of animal species : An application of machine learning on edge devices“. Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104952.
Der volle Inhalt der QuelleLuckhardt, Christoph [Verfasser]. „Development of thermo-analytical prediction and classification models for food in thermal devices using a multi sensor system and artificial neural networks / Christoph Luckhardt“. Kassel : Universitätsbibliothek Kassel, 2013. http://d-nb.info/1043361863/34.
Der volle Inhalt der QuelleAkarapu, Deepika. „Object Identification Using Mobile Device for Visually Impaired Person“. University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1628092619349812.
Der volle Inhalt der QuelleWolf, Robert, Niko Joram, Stefan Schumann und Frank Ellinger. „Dual-band impedance transformation networks for integrated power amplifiers“. Cambridge University Press, 2016. https://tud.qucosa.de/id/qucosa%3A70680.
Der volle Inhalt der QuelleKühnert, Wolfram. „Dynamic Devices Network Architecture“. [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10952962.
Der volle Inhalt der QuelleAlexander, David. „A Network Metadata Infrastructure for Locating Network Devices“. Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.
Der volle Inhalt der QuelleZenteno, Efrain. „Vector Measurements for Wireless Network Devices“. Licentiate thesis, KTH, Signalbehandling, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-111863.
Der volle Inhalt der QuelleQC 20130204
Omer, Mahgoub Saied Khalid. „Network Latency Estimation Leveraging Network Path Classification“. Thesis, KTH, Network Systems Laboratory (NS Lab), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229955.
Der volle Inhalt der QuelleMed utvecklingen av Internet har nya nätverkstjänster med strikta fördröjningskrav möjliggjorts. Dessa tjänster är implementerade som distribuerade system spridda över flera geografiska platser. För att tillgodose låg svarstid kräver dessa tjänster kunskap om svarstiden i det nuvarande nätverket. Tyvärr ändras ofta nätverksfördröjningen bland geodistribuerade webbplatser, således är distribuerade tjänster beroende av kontinuerliga mätvärden för nätverksfördröjning. Ett mål med sådana mätningar är att skilja mellan momenta ökade svarstider från relativt långsiktiga förändringar av svarstiden. Differentieringen uppnås genom statistisk bearbetning av de samlade mätningarna. Denna högfrekventa insamling av mätningar av nätverksfördröjningen har höga overheadkostnader, identifierar ändringar långsamt och saknar noggrannhet. Vi föreslår ett nytt tillvägagångssätt för beräkningen av nätverksfördröjning genom att korrelera nätverksvägar till nätverksfördröjning. Vi visar att nätverksfördröjningen kan vara exakt uppskattad genom att man först mäter och identifierar den nätverksväg som används och sedan hämtar den förväntade fördröjningen för den nätverksvägen baserad på en tidigare uppsättning av mätningar. Baserat på dessa principer introducerar vi Sudan traceroute, ett Verktyg för att uppskatta nätverksfördröjning. Sudan traceroute kan användas för att både minska tiden att uppskatta fördröjningen samt att minska overhead för mätningarna i nätverket. Sudan traceroute använder en förbättrad vägdetekteringsmekanism som bara skickar några försiktigt valda prober för att identifiera den aktuella vägen i nätverket. Vi har utvecklat och utvärderat Sudan traceroute i en testmiljö och utvärderade genomförbarheten av Sudan traceroute i verkliga nätverk med hjälp av Amazon EC2. Med hjälp av Sudan traceroute har vi förkortat den tid det tar för värdar att identifiera nätverksfördröjnings förändringar jämfört med befintliga tillvägagångssätt.
Cardwell, Gregory S. „Residual network data structures in Android devices“. Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5506.
Der volle Inhalt der QuelleThe emergence and recent ubiquity of Smartphones present new opportunities and challenges to forensic examiners. Smartphones enable new mobile application and use paradigms by being constantly attached to the Internet via one of several physical communication media, e.g. cellular radio, WiFi, or Bluetooth. The Smartphone's storage medium represents a potential source of current and historical network metadata and records of prior data transfers. By using known ground truth data exchanges in a controlled experimental environment, this thesis identifies network metadata stored by the Android operating system that can be readily retrieved from the device's internal non-volatile storage. The identified network metadata can ascertain the identity of prior network access points to which the device associated. An important by-product of this research is a well-labeled Android Smartphone image corpus, allowing the mobile forensic community to perform repeatable, scientific experiments, and to test mobile forensic tools.
Anderson, Pehr C. (Pehr Christian) 1974. „Filaments : lightweight network interfaces for embedded devices“. Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46249.
Der volle Inhalt der QuelleIncludes bibliographical references (leaf 63).
Filaments are low-cost interfaces for attaching devices to an Ethernet network. While most networking research pushes for faster high-end systems, the filament project targets low-end devices with the goal of making networking easy. Filaments wrap the complexity of the network into a simple and convenient package. The vast majority of device communications require only a tiny thread or filament of connectivity. Before filaments, one could either tie each device to a desktop PC or to deploy a specialized device network. Filaments allow you to leverage the same network used by desktop computers without making devices dependent on them.
by Pehr C. Anderson.
M.Eng.
Tan, SiewYeen Agnes. „A Network Measurement Tool for Handheld Devices“. Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/32982.
Der volle Inhalt der QuelleMaster of Science
Rimer, Michael Edwin. „Improving Neural Network Classification Training“. Diss., CLICK HERE for online access, 2007. http://contentdm.lib.byu.edu/ETD/image/etd2094.pdf.
Der volle Inhalt der QuelleYusuf, Adewale, Jerry Lartey und Vilhelm Wareus. „Network Admission Control (NAC)Securing end point devices“. Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-5507.
Der volle Inhalt der QuelleThere have been remarkable growths in wireless communication networks in
recent years; this is because of its merits over the wired networks such as
Mobility and convenience. Wireless networks transmit the signal over the
open air via radio waves of different frequencies, this makes it to be
vulnerable to several attacks and anybody on the street can easily intercept the
wireless data or inject new data into the entire network. There has been
existence of wired equivalent privacy (WEP) protocol (IEEE 802.11i), which
was designed for wireless network security. There were concerns of security
vulnerabilities in WEP; this made it necessary for the implementation of
another solution to overcome the weaknesses of the previous wireless
network security. The IEEE 802.1X (port-based network admission control)
which is defined on Extensible Authentication protocol (EAP) provides
effective and efficient admission control to wireless and other networks
devices [8].
Our thesis investigates the efficiency of NAC (IEEE 802.1X) as a security
solution, access different vendor solutions, protocols supported and look into
the inter-operability of these various vendors. In as much as we support the
premise of NAC being an excellent solution, we will also make brilliant
recommendations in this thesis to be considered for future refinements of this
security solution as well as deployment scenarios for the university network.
Spadavecchia, Ljiljana. „A network-based asynchronous architecture for cryptographic devices“. Thesis, University of Edinburgh, 2006. http://hdl.handle.net/1842/860.
Der volle Inhalt der QuelleKrishna, Ashwin. „Composing and connecting devices in animal telemetry network“. Kansas State University, 2016. http://hdl.handle.net/2097/32882.
Der volle Inhalt der QuelleDepartment of Computing and Information Sciences
Venkatesh P. Ranganath
As the Internet of Things (IoT) continues to grow, the need for services that span multiple application domains will continue to increase to realise the numerous possibilities enabled by IoT. Today, however, heterogeneity among devices leads to interoperability issues while building a system of systems and often give rise to closed ecosystems. The issues with interoperability are driven by the inability of devices and apps from different vendors to communicate with each other. The interoperability problem forces the users to stick to one particular vendor, leading to vendor lock-in. To achieve interoperability, the users have to do the heavy lifting (at times impossible) of connecting heterogeneous devices. As we slowly move towards system-of-systems and IoT, there is a real need to support heterogeneity and interoperability. A recent effort in Santos Lab developed Medical Device Coordination Framework (MDCF), which was a step to address these issues in the space of human medical systems. Subsequently, we have been wondering if a similar solution can be employed in the area of animal science. In this effort, by borrowing observations from MDCF and knowledge from on-field experience, we have created a demonstration showcasing how a combination of precise component descriptions (via DSL) and communication patterns can be used in software development and deployment to overcome barriers due to heterogeneity, interoperability and to enable an open ecosystem of apps and devices in the space of animal telemetry.
Bailer-Jones, Coryn Andreas. „Neural network classification of stellar spectra“. Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627444.
Der volle Inhalt der QuelleBrophy, Jonathan. „Collective Classification of Social Network Spam“. Thesis, University of Oregon, 2017. http://hdl.handle.net/1794/22625.
Der volle Inhalt der QuelleHarris, David Anthony. „Neural network studies of lithofacies classification“. Thesis, University of Edinburgh, 1994. http://hdl.handle.net/1842/14001.
Der volle Inhalt der QuelleMcMahon, Michael J. „An approach for enhanced management of network-attached devices“. abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1442840.
Der volle Inhalt der QuelleLykouropoulos, Efstathios, Andreas Kostoulas und Zainab Jumaa. „Connect street light control devices in a secure network“. Thesis, Högskolan i Halmstad, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-28180.
Der volle Inhalt der QuelleDeng, Shuo. „Intelligent network selection and energy reduction for mobile devices“. Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99819.
Der volle Inhalt der QuelleCataloged from PDF version of thesis.
Includes bibliographical references (pages 137-142).
The popularity of mobile devices has stimulated rapid progress in both Wi-Fi and cellular technologies. Before LTE was widely deployed, Wi-Fi speeds dominated cellular network speeds. But that is no longer true today. In a study we conducted with a crowd-sourced measurement tool used by over 1,000 users in 16 countries, we found that 40% of the time LTE outperforms Wi-Fi, and 75% of the time the difference between LTE and Wi-Fi throughput is higher than 1 Mbits/s. Thus, instead of the currently popular "always prefer Wi-Fi" policy, we argue that mobile devices should use the best available combination of networks: Wi-Fi, LTE, or both. Selecting the best network combination, however, is a challenging problem because: 1) network conditions vary with both location and time; 2) many network transfers are short, which means that the decision must be made with low overhead; and, 3) the best choice is determined not only by best network performance, but also constrained by practical factors such as monetary cost and battery life. In this dissertation, we present Delphi, a software controller for network selection on mobile devices. Delphi makes intelligent network selection decisions according to current network conditions and monetary cost concerns, as well as battery-life considerations. Our experiments show that Delphi reduces application network transfer time by 46% for web browsing and by 49% for video streaming, compared with Android's default policy of always using Wi-Fi when it is available. Delphi can also be configured to achieve high throughput while being energy efficient; in this configuration, it achieves 1.9 x the through-put of Android's default policy while only consuming 6% more energy. Delphi improves performance but uses the cellular network more extensively than the status quo, consuming more energy than before. To address this problem, we develop a general method to reduce the energy consumption of cellular interfaces on mobile devices. The key idea is to use the statistics of data transfers to determine the best times at which to put the radio in different power states. These techniques not only make Delphi more useful in practice but can be deployed independently without Delphi to improve energy efficiency for any cellular-network-enabled devices. Experiments show that our techniques reduce energy consumption by 15% to 60% across various traffic patterns.
by Shuo Deng.
Ph. D.
Qian, Xiaolan 1977. „A protocol for a wireless network of mobile devices“. Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86494.
Der volle Inhalt der QuelleIncludes bibliographical references (leaf 53).
by Xiaolan Qian.
S.B.and M.Eng.
Guulay, Biniam Gebregergs. „CheesePi: Measuring Home Network Performance Using Dedicated Hardware Devices“. Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-184917.
Der volle Inhalt der QuelleCheesePi
Nyrönen, P. (Pekka). „Convolutional neural network based super-resolution for mobile devices“. Master's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201812083250.
Der volle Inhalt der QuelleSuperresoluutio on haastava diffraktion kuvaa otettaessa hävittämien yksityiskotien palautusongelma. Ympäristöstä ja kuvantamislaitteistosta syntyvät rappeumat lisäävät sen vaikeutta, ja ne ovat voimakkaasti läsnä matkapuhelinten kameroissa. Viimeisimmät lupaavat lähestymistavat hyödyntävät konvoluutioneuroverkkoja, mutta niiden testausta heikkolaatuisilla kuvilla on tehty vähän. Lisäksi neuroverkkojen koot herättävät kysymyksen niiden käytettävyydestä mobiililaitteilla. Julkaistuista superresoluutioverkoista tehdään laaja katsaus. Neljän valitun verkkoarkkitehtuurin TensorFlow-mallien ulostulojen laatua testataan puhtailla ja heikompilaatuisilla kuvilla ja tuloksia verrataan terävöitettyyn kuutiolliseen interpolaatioon. Ensimmäistä kertaa MTF- ja CPIQ-terävyysvaste mitataan niiden ulostulokuvista niiden käsiteltyä valokuvia resoluutiokartasta. Mallien suoritusaikoja mitataan niin pienille kuville kuin tyypillisille kännykkäkameroiden kuvakoille. Tulokset osoittavat, että verkot pystyvät oppimaan kestäviksi laadun heikennyksille, ja että niiden tulosten laatu ylittää terävöitetyn kuutiollisen interpolaation tulokset. Kevyimmätkin mallit vaativat kuitenkin huomattavasti laskenta-aikaa mobiililaitteella. Lisäksi osoitetaan, että nykyinen tapa kouluttaa ja arvioida superresoluutioneuroverkkoja korkealaatuisilla kuvilla on riittämätön käytännön tarkoitusperiin, ja että laadun heikennys on sisällytettävä koulutusaineistoon ongelman yli pääsemiseksi
Ammermüller, Sebastian, Oliver Bohl, Oliver Gerstheimer und Shakib Manouchehri. „Ansätze zur Nutzung Sozialer Netzwerke mittels mobiler Endgeräte“. Technische Universität Dresden, 2007. https://tud.qucosa.de/id/qucosa%3A27898.
Der volle Inhalt der QuelleKrkusic, Enis. „Security of the mobile devices in VäxjöKommun and corporation“. Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6253.
Der volle Inhalt der QuelleAltrabsheh, Bilal. „Investigation of low cost techniques for realising microwave and millimeter-wave network analysers“. Thesis, University of Surrey, 2003. http://epubs.surrey.ac.uk/843309/.
Der volle Inhalt der QuelleCoue, Dominique Xavier Henri Leon. „Feedforward artificial neural network design utilising subthreshold mode CMOS devices“. Thesis, University of Plymouth, 1997. http://hdl.handle.net/10026.1/1633.
Der volle Inhalt der QuelleKao, Yi-Hsuan. „Optimizing task assignment for collaborative computing over heterogeneous network devices“. Thesis, University of Southern California, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10124490.
Der volle Inhalt der QuelleThe Internet of Things promises to enable a wide range of new applications involving sensors, embedded devices and mobile devices. Different from traditional cloud computing, where the centralized and powerful servers offer high quality computing service, in the era of the Internet of Things, there are abundant computational resources distributed over the network. These devices are not as powerful as servers, but are easier to access with faster setup and short-range communication. However, because of energy, computation, and bandwidth constraints on smart things and other edge devices, it will be imperative to collaboratively run a computational-intensive application that a single device cannot support individually. As many IoT applications, like data processing, can be divided into multiple tasks, we study the problem of assigning such tasks to multiple devices taking into account their abilities and the costs, and latencies associated with both task computation and data communication over the network.
A system that leverages collaborative computing over the network faces highly variant run-time environment. For example, the resource released by a device may suddenly decrease due to the change of states on local processes, or the channel quality may degrade due to mobility. Hence, such a system has to learn the available resources, be aware of changes and flexibly adapt task assignment strategy that efficiently makes use of these resources.
We take a step by step approach to achieve these goals. First, we assume that the amount of resources are deterministic and known. We formulate a task assignment problem that aims to minimize the application latency (system response time) subject to a single cost constraint so that we will not overuse the available resource. Second, we consider that each device has its own cost budget and our new multi-constrained formulation clearly attributes the cost to each device separately. Moving a step further, we assume that the amount of resources are stochastic processes with known distributions, and solve a stochastic optimization with a strong QoS constraint. That is, instead of providing a guarantee on the average latency, our task assignment strategy gives a guarantee that p% of time the latency is less than t, where p and t are arbitrary numbers. Finally, we assume that the amount of run-time resources are unknown and stochastic, and design online algorithms that learn the unknown information within limited amount of time and make competitive task assignment.
We aim to develop algorithms that efficiently make decisions at run-time. That is, the computational complexity should be as light as possible so that running the algorithm does not incur considerable overhead. For optimizations based on known resource profile, we show these problems are NP-hard and propose polynomial-time approximation algorithms with performance guarantee, where the performance loss caused by sub-optimal strategy is bounded. For online learning formulations, we propose light algorithms for both stationary environment and non-stationary environment and show their competitiveness by comparing the performance with the optimal offline policy (solved by assuming the resource profile is known).
We perform comprehensive numerical evaluations, including simulations based on trace data measured at application run-time, and validate our analysis on algorithm's complexity and performance based on the numerical results. Especially, we compare our algorithms with the existing heuristics and show that in some cases the performance loss given by the heuristic is considerable due to the sub-optimal strategy. Hence, we conclude that to efficiently leverage the distributed computational resource over the network, it is essential to formulate a sophisticated optimization problem that well captures the practical scenarios, and provide an algorithm that is light in complexity and suggests a good assignment strategy with performance guarantee.
Lindqvist, Anna. „Threats to smart buildings : Securing devices in a SCADA network“. Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.
Der volle Inhalt der QuelleDikme, Altay. „A Quantum Neural Network for Noisy Intermediate Scale Quantum Devices“. Thesis, KTH, Tillämpad fysik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300394.
Der volle Inhalt der QuelleNeurala nätverk har varit en stor del av utvecklingen av maskininlärning som ett forskningsområde i det senaste årtiondet, och dessa nätverk har flera appliceringsområden, som till exempel klassificieringsproblemet. Parallelt med denna utveckling, har forskning kring kvantdatorer vuxit fram, med flera kvantsystem allmänt tillgängliga via molnet. Denna tillgänglighet har lett till skapandet av ett nytt forskningsområde; kvantmaskininlärning, som försöker skapa motsvarigheter till klassiska maskininlärningsmetoder på kvantdatorer. En sån metod är kvantneurala nätverk som inspireras av klassiska neurala nätverk. I denna avhandling designar vi ett kvantneuralt närverk som är kompatibel med nuvarande kvantsystem, som kännetecknas av ett begränsat antal qubits och korta dekoherenstider. Dessutom tillhandahåller vi en implementering av en klassificerare med ett kvantneuralt nätverk, med hjälp av IBMs programvaruutvecklingsmiljö Qiskit. Vi utför ett binärt klassificeringsexperiment på en delmängd av MNIST-datamängden, och våra resultatvisar en klassificeringsnoggrannhet på 80,6% för ett kvantneuralt nätverk med kretsdjup 20.
Nafziger, Jonathan W. „A Novel Cache Migration Scheme in Network-on-Chip Devices“. University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1282327354.
Der volle Inhalt der QuellePhillips, Ian D. „OTDM network processing using all-optical and electro-optical devices“. Thesis, Aston University, 1998. http://publications.aston.ac.uk/15370/.
Der volle Inhalt der QuelleCarela, Español Valentín. „Network traffic classification : from theory to practice“. Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/283573.
Der volle Inhalt der QuelleLim, Chee Peng. „Autonomous neural network systems for pattern classification“. Thesis, University of Sheffield, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.242285.
Der volle Inhalt der QuelleVan, Heerden Renier Pelser. „A formalised ontology for network attack classification“. Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.
Der volle Inhalt der QuelleLabarge, Isaac E. „Neural Network Pruning for ECG Arrhythmia Classification“. DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2136.
Der volle Inhalt der QuelleShu, Xingliang. „Electrocardiograph Signal Classification By Using Neural Network“. University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1592395089900722.
Der volle Inhalt der QuelleZhou, Wei. „Autonomous smart antenna systems for future mobile devices“. Thesis, University of Edinburgh, 2015. http://hdl.handle.net/1842/9959.
Der volle Inhalt der QuellePierfederici, Eugenio. „Inferring the behaviour and security of networked devices via communication analysis“. Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19418/.
Der volle Inhalt der QuelleChu, Guang Yong. „Photonic devices for next generation fiber-to-the-home access network“. Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/386564.
Der volle Inhalt der QuellePor sus altos requerimientos técnicos, sería inasumible aplicar las tecnologías WDM-PON directamente para el despliegue masivo de Fiber-to-the-Home de nueva generación. Por lo tanto, el potencial se WDM-PON se debe integrar y mejorar con el fin de adaptarlo para NGPON y el futuro 5G. Hoy dia, operadores, usuarios y científicos, ven crucial augmentar la velocitat de funcionament y el alcance de las redes de acceso PON, si bien no tiene sentido conseguirlo con un coste inasequible. El UDWDM-PON puede considerarse como una solución definitiva para la red de acceso de próxima generación, capaz de proporcionar ancho de banda ilimitado para cada usuario, gracias a la detección coherente, por lo que en esta tesis se aborda su realización con un coste e integración prácticos. Con el fin de aplicarlos de manera rentable, el sistema debería exigir a las ONU que sean idénticas, si láseres preseleccionados o incoloros, y ser bidireccionales. Se desea que el conjunto de moduladores del sistema tengan en un bajo consumo, e incluso limitar el número de amplificadores. Sin embargo, para la transmisión bidireccional los efectos de retrodispersión limitarían el rendimiento si queremos volver a utilizar la portadora generada en la OLT. Por lo tanto, debemos diseñar un método para separar la longitud de onda en las transmisiones de bajada y de retorno del usuario a la central. El tradicional UDWDM-PON utiliza 2 láseres en la ONU; en esta tesis, las ONUs usan dispositivos integrados basados en un sólo DFB. ¿Cuál es la configuración más plausible? Los dispositivos fotónicos como RSOA, DEML, FML con configuraciones avanzadas se presentan en esta tesis con diferentes aplicaciones, que resuelven distintos problemas técnicos. La tesis incluye las siguientes partes: análisis y medida de dispositivos fotónicos clave para WDM-PON con modulación de fase, la independencia a la polarización de RSOA con diferentes aplicaciones, demostración de DEML con doble salida para transmisión bidireccional coherente UDWDM-PON, mitigación de AM residual de DEML para la modulación de fase, y la sintonía rápida de canal de UDWDM a través de FML.
Martínez, Anny. „An ontology-based approach toward the configuration of heterogeneous network devices“. Doctoral thesis, Universitat Politècnica de Catalunya, 2015. http://hdl.handle.net/10803/299803.
Der volle Inhalt der QuelleA pesar de los numerosos esfuerzos de estandarización, los problemas de semántica continúan en efecto en muchas subáreas de networking. La inabilidad de intercambiar data sin ambiguedad entre sistemas es un problema que limita la interoperabilidad semántica. En esta tesis, abordamos los problemas de semántica en dos áreas: (i) la gestión de configuración y (ii) arquitecturas de direccionamiento. El hecho que hace el estudio en estas áreas de interés, es que los problemas de semántica datan desde los inicios del Internet. Sin embargo, mientras las redes continúan creciendo en tamaño y complejidad, los mecanismos desplegados dejan de ser escalabales y prácticos. Una de las tareas más complejas y esenciales en la gestión de redes es la configuración de equipos. La falta de mecanismos estándar para la modificación y control de la configuración de equipos ha llevado al uso continuado y extendido de interfaces por líneas de comando (CLI). Desafortunadamente, las CLIs son generalmente, específicos por fabricante y dispositivo. En el contexto de redes heterogéneas--es decir, redes típicamente compuestas por múltiples dispositivos de distintos fabricantes--el uso de varias CLIs trae consigo serios problemas de operación, administración y gestión. En consecuencia, los administradores de red se ven forzados a adquirir experiencia en el manejo específico de múltiples tecnologías y además, a mantenerse continuamente actualizados en la medida en que nuevas funcionalidades o tecnologías emergen, o bien con actualizaciones de sistemas operativos. En general, la utilización de mecanismos propietarios no permite compartir conocimientos de forma consistente a lo largo de plataformas heterogéneas, ni reutilizar configuraciones con el objetivo de alcanzar la completa automatización de tareas de configuración--que son típicamente requeridas en el área de gestión autonómica. Debido a esta heterogeneidad, las CLIs suelen proporcionar una función de ayuda que fundamentalmente aporta información para la interpretación semántica del entorno de configuración de un fabricante. La gran cantidad de información que un administrador debe aprender y manejar, hace de la extracción de información y otras formas de análisis de lenguaje natural del campo de Inteligencia Artificial, potenciales herramientas para la configuración de equipos en entornos heterogéneos. Esta tesis presenta el diseño y especificaciones de implementación del primer sistema de extracción de información basada en ontologías desde el CLI de dispositivos de red, para la automatización y abstracción de configuraciones. Por otra parte, la denominada sobrecarga semántica de direcciones IP--en donde, las direcciones son identificadores y localizadores al mismo tiempo--es una de las principales limitaciones sobre mobilidad, multi-homing y escalabilidad del sistema de enrutamiento. Por esta razón, numerosas propuestas han emergido en un esfuerzo por desacoplar la semántica del esquema de direccionamiento de las redes actuales. En esta tesis, abordamos este problema desde dos perspectivas, la primera de ellas una aproximación no-disruptiva (es decir, evolucionaria) al problema del Internet actual y la segunda, una nueva propuesta en torno a futuras arquitecturas del Internet. En el primer escenario, analizamos el protocolo LISP (del inglés, Locator/Identifier Separation Protocol) ya que es en efecto, una de las soluciones con mayor potencial para la resolucion del problema de semántica. Sin embargo, su adopción está limitada por problemas en los sistemas de mapeo propuestos. En esta tesis, proponemos LRP (del inglés, LISP Redundancy Protocol) un protocolo destinado a complementar LISP e incrementar la factibilidad de despliegue, a la vez que, reduce el tamaño de las tablas de mapeo, tiempo de latencia y maximiza accesibilidad. En el segundo escenario, exploramos TARIFA una arquitectura de red de nueva generación e introducimos un novedoso esquema de direccionamiento orientado a servicios.
Mandowara, Piyush. „Live video streaming for handheld devices over an ad hoc network“. Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/941.
Der volle Inhalt der QuelleLarsson, Magnus. „Sanitization of embedded network devices : Investigation of vendor’s factory reset procedure“. Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166305.
Der volle Inhalt der QuelleNätverksutrustning såsom routrar, switchar och brandväggar har ofta känslig information lagrad internt, som lösenord, kryptografiska nycklar, information om nätverket runt dem samt tjänster de tillhandahåller. Om denna utrustning ska säljas på andrahandsmarkanden eller på annat sätt byta ägare är det viktigt att all känslig information raderas. Men kan man lita på att raderings rutiner och metoder som tillhandahålls av tillverkaren verkligen raderar känslig data? Denna avhandling undersöker lämpliga verktyg och metoder för att granska vilken information som minnen i inbyggda system innehåller. Dessa metoder testas praktiskt på några system som visar sig ha kvar känslig information efter att de raderats enligt tillverkarens rekommendationer. Ett datorprogram som demonstrerar hur denna information kan undersökas och raderas finns med som en del av avhandlingen. Informationen i detta dokument är användbar för ägare av datakomutrustning, mäklare av sådana samt andra som vill minimera risken för att läcka känslig information vid återförsäljning av sin begagnade utrustning.
Kobezak, Philip D. „Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations“. Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83375.
Der volle Inhalt der QuelleMaster of Science
San, Pedro Miguel G. „Signal classification using the mean separator neural network“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA377744.
Der volle Inhalt der QuelleThesis advisor(s): Fargues, Monique P. ; Hippenstiel, Ralph D. "March 2000." Includes bibliographical references (p. 193-194). Also available online.
au, P. Kraipeerapun@murdoch edu, und Pawalai Kraipeerapun. „Neural network classification based on quantification of uncertainty“. Murdoch University, 2009. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20090526.100525.
Der volle Inhalt der QuelleKraipeerapun, Pawalai. „Neural network classification based on quantification of uncertainty“. Kraipeerapun, Pawalai (2009) Neural network classification based on quantification of uncertainty. PhD thesis, Murdoch University, 2009. http://researchrepository.murdoch.edu.au/699/.
Der volle Inhalt der Quelle