Dissertationen zum Thema „Network devices“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Network devices" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Alexander, David. „A Network Metadata Infrastructure for Locating Network Devices“. Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.
Der volle Inhalt der QuelleKühnert, Wolfram. „Dynamic Devices Network Architecture“. [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10952962.
Der volle Inhalt der QuelleZenteno, Efrain. „Vector Measurements for Wireless Network Devices“. Licentiate thesis, KTH, Signalbehandling, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-111863.
Der volle Inhalt der QuelleQC 20130204
Duan, Xiao. „DSP-enabled reconfigurable optical network devices and architectures for cloud access networks“. Thesis, Bangor University, 2018. https://research.bangor.ac.uk/portal/en/theses/dspenabled-reconfigurable-optical-network-devices-and-architectures-for-cloud-access-networks(68eaa57e-f0af-4c67-b1cf-c32cfd2ee00f).html.
Der volle Inhalt der QuelleCardwell, Gregory S. „Residual network data structures in Android devices“. Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5506.
Der volle Inhalt der QuelleThe emergence and recent ubiquity of Smartphones present new opportunities and challenges to forensic examiners. Smartphones enable new mobile application and use paradigms by being constantly attached to the Internet via one of several physical communication media, e.g. cellular radio, WiFi, or Bluetooth. The Smartphone's storage medium represents a potential source of current and historical network metadata and records of prior data transfers. By using known ground truth data exchanges in a controlled experimental environment, this thesis identifies network metadata stored by the Android operating system that can be readily retrieved from the device's internal non-volatile storage. The identified network metadata can ascertain the identity of prior network access points to which the device associated. An important by-product of this research is a well-labeled Android Smartphone image corpus, allowing the mobile forensic community to perform repeatable, scientific experiments, and to test mobile forensic tools.
Anderson, Pehr C. (Pehr Christian) 1974. „Filaments : lightweight network interfaces for embedded devices“. Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46249.
Der volle Inhalt der QuelleIncludes bibliographical references (leaf 63).
Filaments are low-cost interfaces for attaching devices to an Ethernet network. While most networking research pushes for faster high-end systems, the filament project targets low-end devices with the goal of making networking easy. Filaments wrap the complexity of the network into a simple and convenient package. The vast majority of device communications require only a tiny thread or filament of connectivity. Before filaments, one could either tie each device to a desktop PC or to deploy a specialized device network. Filaments allow you to leverage the same network used by desktop computers without making devices dependent on them.
by Pehr C. Anderson.
M.Eng.
Tan, SiewYeen Agnes. „A Network Measurement Tool for Handheld Devices“. Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/32982.
Der volle Inhalt der QuelleMaster of Science
Yusuf, Adewale, Jerry Lartey und Vilhelm Wareus. „Network Admission Control (NAC)Securing end point devices“. Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-5507.
Der volle Inhalt der QuelleThere have been remarkable growths in wireless communication networks in
recent years; this is because of its merits over the wired networks such as
Mobility and convenience. Wireless networks transmit the signal over the
open air via radio waves of different frequencies, this makes it to be
vulnerable to several attacks and anybody on the street can easily intercept the
wireless data or inject new data into the entire network. There has been
existence of wired equivalent privacy (WEP) protocol (IEEE 802.11i), which
was designed for wireless network security. There were concerns of security
vulnerabilities in WEP; this made it necessary for the implementation of
another solution to overcome the weaknesses of the previous wireless
network security. The IEEE 802.1X (port-based network admission control)
which is defined on Extensible Authentication protocol (EAP) provides
effective and efficient admission control to wireless and other networks
devices [8].
Our thesis investigates the efficiency of NAC (IEEE 802.1X) as a security
solution, access different vendor solutions, protocols supported and look into
the inter-operability of these various vendors. In as much as we support the
premise of NAC being an excellent solution, we will also make brilliant
recommendations in this thesis to be considered for future refinements of this
security solution as well as deployment scenarios for the university network.
Spadavecchia, Ljiljana. „A network-based asynchronous architecture for cryptographic devices“. Thesis, University of Edinburgh, 2006. http://hdl.handle.net/1842/860.
Der volle Inhalt der QuelleKrishna, Ashwin. „Composing and connecting devices in animal telemetry network“. Kansas State University, 2016. http://hdl.handle.net/2097/32882.
Der volle Inhalt der QuelleDepartment of Computing and Information Sciences
Venkatesh P. Ranganath
As the Internet of Things (IoT) continues to grow, the need for services that span multiple application domains will continue to increase to realise the numerous possibilities enabled by IoT. Today, however, heterogeneity among devices leads to interoperability issues while building a system of systems and often give rise to closed ecosystems. The issues with interoperability are driven by the inability of devices and apps from different vendors to communicate with each other. The interoperability problem forces the users to stick to one particular vendor, leading to vendor lock-in. To achieve interoperability, the users have to do the heavy lifting (at times impossible) of connecting heterogeneous devices. As we slowly move towards system-of-systems and IoT, there is a real need to support heterogeneity and interoperability. A recent effort in Santos Lab developed Medical Device Coordination Framework (MDCF), which was a step to address these issues in the space of human medical systems. Subsequently, we have been wondering if a similar solution can be employed in the area of animal science. In this effort, by borrowing observations from MDCF and knowledge from on-field experience, we have created a demonstration showcasing how a combination of precise component descriptions (via DSL) and communication patterns can be used in software development and deployment to overcome barriers due to heterogeneity, interoperability and to enable an open ecosystem of apps and devices in the space of animal telemetry.
Gabdurahmanov, Murat, und Simon Trygg. „Analysis and Evaluation of Network Management Solutions : A Comparison of Network Management Solutions Suitable for Networks with 2,500+ Devices“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188793.
Der volle Inhalt der QuelleVissa företag använder idag suboptimala och föråldrade övervakningsssystem för sina nätverk. Med tanke på det stora antalet olika tjänster som efterfrågas av användare finns det ett stort behov av att anpassa nätverksstrukturen för att stödja de nuvarande och potentiellt framtida kraven. Som ett resultat finns det ett behov av nya övervakningssystem (Network Management Solutions (NMSs)) för nätverken. Syftet med detta examensarbete är att hjälpa ett företag som använder NMS:en Local Area Network (LAN) Management Solution (LMS). LMS utecklades av Cisco för att hantera lokala nätverk (LANs). Men med tiden har företagets krav förändrats och de har därför behövt expandera sitt nätverk mer än väntat. Dessutom är LMS endast utformad för att hantera enheter tillverkade av Cisco, medan företaget vill ha en universal lösning med stöd för enheter från många olika tillverkare. Denna rapport presenterar en analys av deras nuvarande system, samt föreslår möjliga lösningar som kan ersätta detta. Den nya lösningen ska vara långvarig samt ska uppfylla alla krav företaget ställt. För att hitta lämpliga lösningar har en grundlig utvärdering av den befintliga NMS:en samt en analys av de ställda kraven utförts. Denna analys gav goda insikter i olika aspekter av deras nuvarande system. En lämplig lösning hittades genom att följa en trestegsmetod. Metoden utgick från 82 möjliga lösningar, som efter flera steg av filtrering resulterade i de mest lämpade ersättningssystemen. Två NMS:er har föreslagits som lika lämpliga ersättare: IBM Tivoli Netcool/OMNIbus och ManageEngine OpManager. Oavsett vilken som väljs, har de båda följande fördelar jämfört med den nuvarande NMS:en: de är båda väldigt stabila lösningar som klarar av en stor mängd hanterade enheter; de är universella lösningar med stöd för en stor mängd olika enheter, dessutom går det även att lägga till eget stöd för enheter vid behov; de är användarvänliga och har möjlighet till att anpassa egna gränssnitt; samt att de båda har en professionell first-line teknisk support placerad lokalt i landet.<p>
Lykouropoulos, Efstathios, Andreas Kostoulas und Zainab Jumaa. „Connect street light control devices in a secure network“. Thesis, Högskolan i Halmstad, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-28180.
Der volle Inhalt der QuelleAltrabsheh, Bilal. „Investigation of low cost techniques for realising microwave and millimeter-wave network analysers“. Thesis, University of Surrey, 2003. http://epubs.surrey.ac.uk/843309/.
Der volle Inhalt der QuelleMcMahon, Michael J. „An approach for enhanced management of network-attached devices“. abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1442840.
Der volle Inhalt der QuelleDeng, Shuo. „Intelligent network selection and energy reduction for mobile devices“. Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99819.
Der volle Inhalt der QuelleCataloged from PDF version of thesis.
Includes bibliographical references (pages 137-142).
The popularity of mobile devices has stimulated rapid progress in both Wi-Fi and cellular technologies. Before LTE was widely deployed, Wi-Fi speeds dominated cellular network speeds. But that is no longer true today. In a study we conducted with a crowd-sourced measurement tool used by over 1,000 users in 16 countries, we found that 40% of the time LTE outperforms Wi-Fi, and 75% of the time the difference between LTE and Wi-Fi throughput is higher than 1 Mbits/s. Thus, instead of the currently popular "always prefer Wi-Fi" policy, we argue that mobile devices should use the best available combination of networks: Wi-Fi, LTE, or both. Selecting the best network combination, however, is a challenging problem because: 1) network conditions vary with both location and time; 2) many network transfers are short, which means that the decision must be made with low overhead; and, 3) the best choice is determined not only by best network performance, but also constrained by practical factors such as monetary cost and battery life. In this dissertation, we present Delphi, a software controller for network selection on mobile devices. Delphi makes intelligent network selection decisions according to current network conditions and monetary cost concerns, as well as battery-life considerations. Our experiments show that Delphi reduces application network transfer time by 46% for web browsing and by 49% for video streaming, compared with Android's default policy of always using Wi-Fi when it is available. Delphi can also be configured to achieve high throughput while being energy efficient; in this configuration, it achieves 1.9 x the through-put of Android's default policy while only consuming 6% more energy. Delphi improves performance but uses the cellular network more extensively than the status quo, consuming more energy than before. To address this problem, we develop a general method to reduce the energy consumption of cellular interfaces on mobile devices. The key idea is to use the statistics of data transfers to determine the best times at which to put the radio in different power states. These techniques not only make Delphi more useful in practice but can be deployed independently without Delphi to improve energy efficiency for any cellular-network-enabled devices. Experiments show that our techniques reduce energy consumption by 15% to 60% across various traffic patterns.
by Shuo Deng.
Ph. D.
Qian, Xiaolan 1977. „A protocol for a wireless network of mobile devices“. Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86494.
Der volle Inhalt der QuelleIncludes bibliographical references (leaf 53).
by Xiaolan Qian.
S.B.and M.Eng.
Guulay, Biniam Gebregergs. „CheesePi: Measuring Home Network Performance Using Dedicated Hardware Devices“. Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-184917.
Der volle Inhalt der QuelleCheesePi
Nyrönen, P. (Pekka). „Convolutional neural network based super-resolution for mobile devices“. Master's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201812083250.
Der volle Inhalt der QuelleSuperresoluutio on haastava diffraktion kuvaa otettaessa hävittämien yksityiskotien palautusongelma. Ympäristöstä ja kuvantamislaitteistosta syntyvät rappeumat lisäävät sen vaikeutta, ja ne ovat voimakkaasti läsnä matkapuhelinten kameroissa. Viimeisimmät lupaavat lähestymistavat hyödyntävät konvoluutioneuroverkkoja, mutta niiden testausta heikkolaatuisilla kuvilla on tehty vähän. Lisäksi neuroverkkojen koot herättävät kysymyksen niiden käytettävyydestä mobiililaitteilla. Julkaistuista superresoluutioverkoista tehdään laaja katsaus. Neljän valitun verkkoarkkitehtuurin TensorFlow-mallien ulostulojen laatua testataan puhtailla ja heikompilaatuisilla kuvilla ja tuloksia verrataan terävöitettyyn kuutiolliseen interpolaatioon. Ensimmäistä kertaa MTF- ja CPIQ-terävyysvaste mitataan niiden ulostulokuvista niiden käsiteltyä valokuvia resoluutiokartasta. Mallien suoritusaikoja mitataan niin pienille kuville kuin tyypillisille kännykkäkameroiden kuvakoille. Tulokset osoittavat, että verkot pystyvät oppimaan kestäviksi laadun heikennyksille, ja että niiden tulosten laatu ylittää terävöitetyn kuutiollisen interpolaation tulokset. Kevyimmätkin mallit vaativat kuitenkin huomattavasti laskenta-aikaa mobiililaitteella. Lisäksi osoitetaan, että nykyinen tapa kouluttaa ja arvioida superresoluutioneuroverkkoja korkealaatuisilla kuvilla on riittämätön käytännön tarkoitusperiin, ja että laadun heikennys on sisällytettävä koulutusaineistoon ongelman yli pääsemiseksi
Krkusic, Enis. „Security of the mobile devices in VäxjöKommun and corporation“. Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6253.
Der volle Inhalt der QuelleAstistova, T. I., und O. B. Typa. „Chatbot development for Telegram social network“. Thesis, Київський національний університет технологій та дизайну, 2021. https://er.knutd.edu.ua/handle/123456789/19330.
Der volle Inhalt der QuelleZhou, Wei. „Autonomous smart antenna systems for future mobile devices“. Thesis, University of Edinburgh, 2015. http://hdl.handle.net/1842/9959.
Der volle Inhalt der QuelleCoue, Dominique Xavier Henri Leon. „Feedforward artificial neural network design utilising subthreshold mode CMOS devices“. Thesis, University of Plymouth, 1997. http://hdl.handle.net/10026.1/1633.
Der volle Inhalt der QuelleKao, Yi-Hsuan. „Optimizing task assignment for collaborative computing over heterogeneous network devices“. Thesis, University of Southern California, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10124490.
Der volle Inhalt der QuelleThe Internet of Things promises to enable a wide range of new applications involving sensors, embedded devices and mobile devices. Different from traditional cloud computing, where the centralized and powerful servers offer high quality computing service, in the era of the Internet of Things, there are abundant computational resources distributed over the network. These devices are not as powerful as servers, but are easier to access with faster setup and short-range communication. However, because of energy, computation, and bandwidth constraints on smart things and other edge devices, it will be imperative to collaboratively run a computational-intensive application that a single device cannot support individually. As many IoT applications, like data processing, can be divided into multiple tasks, we study the problem of assigning such tasks to multiple devices taking into account their abilities and the costs, and latencies associated with both task computation and data communication over the network.
A system that leverages collaborative computing over the network faces highly variant run-time environment. For example, the resource released by a device may suddenly decrease due to the change of states on local processes, or the channel quality may degrade due to mobility. Hence, such a system has to learn the available resources, be aware of changes and flexibly adapt task assignment strategy that efficiently makes use of these resources.
We take a step by step approach to achieve these goals. First, we assume that the amount of resources are deterministic and known. We formulate a task assignment problem that aims to minimize the application latency (system response time) subject to a single cost constraint so that we will not overuse the available resource. Second, we consider that each device has its own cost budget and our new multi-constrained formulation clearly attributes the cost to each device separately. Moving a step further, we assume that the amount of resources are stochastic processes with known distributions, and solve a stochastic optimization with a strong QoS constraint. That is, instead of providing a guarantee on the average latency, our task assignment strategy gives a guarantee that p% of time the latency is less than t, where p and t are arbitrary numbers. Finally, we assume that the amount of run-time resources are unknown and stochastic, and design online algorithms that learn the unknown information within limited amount of time and make competitive task assignment.
We aim to develop algorithms that efficiently make decisions at run-time. That is, the computational complexity should be as light as possible so that running the algorithm does not incur considerable overhead. For optimizations based on known resource profile, we show these problems are NP-hard and propose polynomial-time approximation algorithms with performance guarantee, where the performance loss caused by sub-optimal strategy is bounded. For online learning formulations, we propose light algorithms for both stationary environment and non-stationary environment and show their competitiveness by comparing the performance with the optimal offline policy (solved by assuming the resource profile is known).
We perform comprehensive numerical evaluations, including simulations based on trace data measured at application run-time, and validate our analysis on algorithm's complexity and performance based on the numerical results. Especially, we compare our algorithms with the existing heuristics and show that in some cases the performance loss given by the heuristic is considerable due to the sub-optimal strategy. Hence, we conclude that to efficiently leverage the distributed computational resource over the network, it is essential to formulate a sophisticated optimization problem that well captures the practical scenarios, and provide an algorithm that is light in complexity and suggests a good assignment strategy with performance guarantee.
Nafziger, Jonathan W. „A Novel Cache Migration Scheme in Network-on-Chip Devices“. University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1282327354.
Der volle Inhalt der QuelleLindqvist, Anna. „Threats to smart buildings : Securing devices in a SCADA network“. Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.
Der volle Inhalt der QuelleDikme, Altay. „A Quantum Neural Network for Noisy Intermediate Scale Quantum Devices“. Thesis, KTH, Tillämpad fysik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300394.
Der volle Inhalt der QuelleNeurala nätverk har varit en stor del av utvecklingen av maskininlärning som ett forskningsområde i det senaste årtiondet, och dessa nätverk har flera appliceringsområden, som till exempel klassificieringsproblemet. Parallelt med denna utveckling, har forskning kring kvantdatorer vuxit fram, med flera kvantsystem allmänt tillgängliga via molnet. Denna tillgänglighet har lett till skapandet av ett nytt forskningsområde; kvantmaskininlärning, som försöker skapa motsvarigheter till klassiska maskininlärningsmetoder på kvantdatorer. En sån metod är kvantneurala nätverk som inspireras av klassiska neurala nätverk. I denna avhandling designar vi ett kvantneuralt närverk som är kompatibel med nuvarande kvantsystem, som kännetecknas av ett begränsat antal qubits och korta dekoherenstider. Dessutom tillhandahåller vi en implementering av en klassificerare med ett kvantneuralt nätverk, med hjälp av IBMs programvaruutvecklingsmiljö Qiskit. Vi utför ett binärt klassificeringsexperiment på en delmängd av MNIST-datamängden, och våra resultatvisar en klassificeringsnoggrannhet på 80,6% för ett kvantneuralt nätverk med kretsdjup 20.
Phillips, Ian D. „OTDM network processing using all-optical and electro-optical devices“. Thesis, Aston University, 1998. http://publications.aston.ac.uk/15370/.
Der volle Inhalt der QuellePierfederici, Eugenio. „Inferring the behaviour and security of networked devices via communication analysis“. Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19418/.
Der volle Inhalt der QuelleNuangjamnong, Chompu. „An investigation of network management“. Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2009. https://ro.ecu.edu.au/theses/1836.
Der volle Inhalt der QuelleChu, Guang Yong. „Photonic devices for next generation fiber-to-the-home access network“. Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/386564.
Der volle Inhalt der QuellePor sus altos requerimientos técnicos, sería inasumible aplicar las tecnologías WDM-PON directamente para el despliegue masivo de Fiber-to-the-Home de nueva generación. Por lo tanto, el potencial se WDM-PON se debe integrar y mejorar con el fin de adaptarlo para NGPON y el futuro 5G. Hoy dia, operadores, usuarios y científicos, ven crucial augmentar la velocitat de funcionament y el alcance de las redes de acceso PON, si bien no tiene sentido conseguirlo con un coste inasequible. El UDWDM-PON puede considerarse como una solución definitiva para la red de acceso de próxima generación, capaz de proporcionar ancho de banda ilimitado para cada usuario, gracias a la detección coherente, por lo que en esta tesis se aborda su realización con un coste e integración prácticos. Con el fin de aplicarlos de manera rentable, el sistema debería exigir a las ONU que sean idénticas, si láseres preseleccionados o incoloros, y ser bidireccionales. Se desea que el conjunto de moduladores del sistema tengan en un bajo consumo, e incluso limitar el número de amplificadores. Sin embargo, para la transmisión bidireccional los efectos de retrodispersión limitarían el rendimiento si queremos volver a utilizar la portadora generada en la OLT. Por lo tanto, debemos diseñar un método para separar la longitud de onda en las transmisiones de bajada y de retorno del usuario a la central. El tradicional UDWDM-PON utiliza 2 láseres en la ONU; en esta tesis, las ONUs usan dispositivos integrados basados en un sólo DFB. ¿Cuál es la configuración más plausible? Los dispositivos fotónicos como RSOA, DEML, FML con configuraciones avanzadas se presentan en esta tesis con diferentes aplicaciones, que resuelven distintos problemas técnicos. La tesis incluye las siguientes partes: análisis y medida de dispositivos fotónicos clave para WDM-PON con modulación de fase, la independencia a la polarización de RSOA con diferentes aplicaciones, demostración de DEML con doble salida para transmisión bidireccional coherente UDWDM-PON, mitigación de AM residual de DEML para la modulación de fase, y la sintonía rápida de canal de UDWDM a través de FML.
Murphy, Ethan Kane. „Radial-Basis-Function Neural Network Optimization of Microwave Systems“. Link to electronic thesis, 2002. http://www.wpi.edu/Pubs/ETD/Available/etd-0113103-121206/.
Der volle Inhalt der QuelleKeywords: optimization technique; microwave systems; optimization technique; neural networks; QuickWave 3D. Includes bibliographical references (p. 68-71).
Martínez, Anny. „An ontology-based approach toward the configuration of heterogeneous network devices“. Doctoral thesis, Universitat Politècnica de Catalunya, 2015. http://hdl.handle.net/10803/299803.
Der volle Inhalt der QuelleA pesar de los numerosos esfuerzos de estandarización, los problemas de semántica continúan en efecto en muchas subáreas de networking. La inabilidad de intercambiar data sin ambiguedad entre sistemas es un problema que limita la interoperabilidad semántica. En esta tesis, abordamos los problemas de semántica en dos áreas: (i) la gestión de configuración y (ii) arquitecturas de direccionamiento. El hecho que hace el estudio en estas áreas de interés, es que los problemas de semántica datan desde los inicios del Internet. Sin embargo, mientras las redes continúan creciendo en tamaño y complejidad, los mecanismos desplegados dejan de ser escalabales y prácticos. Una de las tareas más complejas y esenciales en la gestión de redes es la configuración de equipos. La falta de mecanismos estándar para la modificación y control de la configuración de equipos ha llevado al uso continuado y extendido de interfaces por líneas de comando (CLI). Desafortunadamente, las CLIs son generalmente, específicos por fabricante y dispositivo. En el contexto de redes heterogéneas--es decir, redes típicamente compuestas por múltiples dispositivos de distintos fabricantes--el uso de varias CLIs trae consigo serios problemas de operación, administración y gestión. En consecuencia, los administradores de red se ven forzados a adquirir experiencia en el manejo específico de múltiples tecnologías y además, a mantenerse continuamente actualizados en la medida en que nuevas funcionalidades o tecnologías emergen, o bien con actualizaciones de sistemas operativos. En general, la utilización de mecanismos propietarios no permite compartir conocimientos de forma consistente a lo largo de plataformas heterogéneas, ni reutilizar configuraciones con el objetivo de alcanzar la completa automatización de tareas de configuración--que son típicamente requeridas en el área de gestión autonómica. Debido a esta heterogeneidad, las CLIs suelen proporcionar una función de ayuda que fundamentalmente aporta información para la interpretación semántica del entorno de configuración de un fabricante. La gran cantidad de información que un administrador debe aprender y manejar, hace de la extracción de información y otras formas de análisis de lenguaje natural del campo de Inteligencia Artificial, potenciales herramientas para la configuración de equipos en entornos heterogéneos. Esta tesis presenta el diseño y especificaciones de implementación del primer sistema de extracción de información basada en ontologías desde el CLI de dispositivos de red, para la automatización y abstracción de configuraciones. Por otra parte, la denominada sobrecarga semántica de direcciones IP--en donde, las direcciones son identificadores y localizadores al mismo tiempo--es una de las principales limitaciones sobre mobilidad, multi-homing y escalabilidad del sistema de enrutamiento. Por esta razón, numerosas propuestas han emergido en un esfuerzo por desacoplar la semántica del esquema de direccionamiento de las redes actuales. En esta tesis, abordamos este problema desde dos perspectivas, la primera de ellas una aproximación no-disruptiva (es decir, evolucionaria) al problema del Internet actual y la segunda, una nueva propuesta en torno a futuras arquitecturas del Internet. En el primer escenario, analizamos el protocolo LISP (del inglés, Locator/Identifier Separation Protocol) ya que es en efecto, una de las soluciones con mayor potencial para la resolucion del problema de semántica. Sin embargo, su adopción está limitada por problemas en los sistemas de mapeo propuestos. En esta tesis, proponemos LRP (del inglés, LISP Redundancy Protocol) un protocolo destinado a complementar LISP e incrementar la factibilidad de despliegue, a la vez que, reduce el tamaño de las tablas de mapeo, tiempo de latencia y maximiza accesibilidad. En el segundo escenario, exploramos TARIFA una arquitectura de red de nueva generación e introducimos un novedoso esquema de direccionamiento orientado a servicios.
Mandowara, Piyush. „Live video streaming for handheld devices over an ad hoc network“. Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/941.
Der volle Inhalt der QuelleLarsson, Magnus. „Sanitization of embedded network devices : Investigation of vendor’s factory reset procedure“. Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166305.
Der volle Inhalt der QuelleNätverksutrustning såsom routrar, switchar och brandväggar har ofta känslig information lagrad internt, som lösenord, kryptografiska nycklar, information om nätverket runt dem samt tjänster de tillhandahåller. Om denna utrustning ska säljas på andrahandsmarkanden eller på annat sätt byta ägare är det viktigt att all känslig information raderas. Men kan man lita på att raderings rutiner och metoder som tillhandahålls av tillverkaren verkligen raderar känslig data? Denna avhandling undersöker lämpliga verktyg och metoder för att granska vilken information som minnen i inbyggda system innehåller. Dessa metoder testas praktiskt på några system som visar sig ha kvar känslig information efter att de raderats enligt tillverkarens rekommendationer. Ett datorprogram som demonstrerar hur denna information kan undersökas och raderas finns med som en del av avhandlingen. Informationen i detta dokument är användbar för ägare av datakomutrustning, mäklare av sådana samt andra som vill minimera risken för att läcka känslig information vid återförsäljning av sin begagnade utrustning.
Milner, Simon Howard. „In service non-intrusive measurement devices for telephony networks“. Thesis, Manchester Metropolitan University, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.260851.
Der volle Inhalt der QuelleKalin, John Howard. „Simulating IoT Frameworks and Devices in the Smart Home“. Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78767.
Der volle Inhalt der QuelleMaster of Science
Kobezak, Philip D. „Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations“. Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83375.
Der volle Inhalt der QuelleMaster of Science
Yan, Han. „Smart devices collaboration for energy saving in home networks“. Thesis, Rennes 1, 2014. http://www.theses.fr/2014REN1S122/document.
Der volle Inhalt der QuelleIn recent years, Information and Communications Technology (ICT) has totally changed the people daily life in the Digital Home. Meanwhile, not only the amount of CO2 emission of ICT, so called ''footprint'', is increasing without cease, but also the price of electricity is constantly rising. Thus, it is quite important to reduce energy consumption in the home network and home devices for the environmental and economic reasons. In order to cope with this context, the thesis concerns the design, the evaluation, and the implementation of a novel set of mechanisms with the purpose of responding to home network energy consumption problems. We proposed firstly an Overlay Energy Control Network which is formed by the overlay energy control nodes. Each node is connected to one device which forms an overlay control network to coordinate the power states of the device. Then, a testbed for HOme Power Efficiency system (HOPE) is implemented to demonstrate the technical solution for energy control in a real home network environment with several frequently used scenarios. After analyzing user's way of use of their home network equipment, we propose a power management which controls the devices based on the analysis of the collaborative services. These frequently used collaborative services require different functional blocks in different devices. This model provides the possibility to turn on the right requested functional blocks in the right device at the right moment. Finally, based on the former contribution, the collaborative overlay power management offers several possible tradeoffs between the power consumption and the waiting delay in the home network
Qiao, Wei. „Integrated control of wind farms, facts devices and the power network using neural networks and adaptive critic designs“. Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/29716.
Der volle Inhalt der QuelleCommittee Chair: Ronald G. Harley; Committee Member: David G. Taylor; Committee Member: Deepakraj M. Divan; Committee Member: Ganesh Kumar Venayagamoorthy; Committee Member: Thomas G. Habetler. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Sánchez, Rivera Giovanny. „Efficient multiprocessing architectures for spiking neural network emulation based on configurable devices“. Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/285319.
Der volle Inhalt der QuelleL'estudi de la dinàmica de les xarxes neuronals bio-inspirades ha permès als neurocientífics entendre alguns processos i estructures del cervell. Les implementacions electròniques d'aquestes xarxes neuronals són eines útils per dur a terme aquest tipus d'estudi. No obstant això, l'alta complexitat de les xarxes neuronals requereix d'una arquitectura apropiada que pugui simular aquest tipus de xarxes. Emular aquest tipus de xarxes en dispositius configurables és possible a causa del seu extraordinari desenvolupament respecte a la seva disponibilitat de recursos, velocitat i capacitat de reconfiguració (FPGAs ). En aquesta tesi es proposa una arquitectura maquinari paral·lela i configurable per emular les complexes i realistes xarxes neuronals tipus spiking en temps real. S'han estudiat i analitzat alguns models de neurones tipus spiking rellevants i les seves implementacions en maquinari , amb la finalitat de crear una arquitectura que suporti la implementació d'aquests models de manera eficient . S'han tingut en compte diversos factors clau, incloent flexibilitat en la programació d'algorismes, processament d'alt rendiment, baix consum d'energia i àrea. S'han aplicat diverses tècniques en l'arquitectura desenvolupada amb el propòsit d'augmentar la seva capacitat de processament. Aquestes tècniques són: mapejat de temps a espai, virtualització de les neurones, mapeig flexible de neurones i sinapsis, modes d'execució, i aprenentatge específic, entre d'altres. A més, s'ha desenvolupat una unitat d'interfície de dades per tal de construir un sistema bio-inspirat, que pot processar informació sensorial del medi ambient. Aquest sistema basat en neurones tipus spiking combina implementacions analògiques i digitals. S'han desenvolupat diverses aplicacions usant aquest sistema com a prova de concepte, per tal de mostrar les capacitats de l'arquitectura proposada per al processament d'aquest tipus d'informació.
Nguyen, Neal Huynh. „Logging, Visualization, and Analysis of Network and Power Data of IoT Devices“. DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1990.
Der volle Inhalt der QuelleFenn, Edward, und Eric Fornling. „Mapping and identifying misplaced devices on a network by use of metadata“. Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-14687.
Der volle Inhalt der QuelleKontext. Placeringen av enheter i nätverk har idag blivit en säkerhetsfråga för de flesta företagen. Eftersom en felplacerad enhet kan äventyra ett helt nätverk, och i förlängning, ett företag så är det essentiellt att ha koll på vad som är placerat vart. Kunskap är nyckeln till framgång, och att ha kunskap om sin nätverksstruktur är avgörande för att göra nätverket säkert. Stora nätverk kan dock vara svåra att ha koll på om anställda kan lägga till eller ta bort enheter, och på så sätt göra det svårt för administratören att ständigt hålla sig uppdaterad om vad som finns vart. Mål. Den här studien fokuserar på skapandet av en analysmetod för att kartlägga ett nätverk baserat på metadata från nätverket. Analysmetoden ska sedan implementeras i ett verktyg som sedan automatiskt kartlägger nätverket utifrån den metadata som valts ut i analysmetoden. Motivationen och målet med den här studien är att skapa en metod som förbättrar nätverkskartläggning med syftet att identifiera felplacerade enheter, och att uppnå en större förståelse för den inverkan felplacerade enheter kan få för ett nätverk. Metod. Metoden för att analysera metadatan var att genom att för hand leta igenom den metadata som Outpost24 ABs sårbarhetsskanner samlade in när den letade efter sårbarheter i ett nätverk. Genom att analysera metadatan så kunde vi singla ut enskilda bitar som vi ansåg vara nödvändiga för att identifiera enhetens typ. Dessa attribut implementerades sedan i en sannolikhetsfunktion som avgjorde vilken typ en enhet hade, baserat på informationen i metadatan. Resultatet från denna sannolikhetsfunktion presenterades sedan visuellt som en graf. En algoritm som matade ut varningar om den hittade felkonfigurerade subnät kördes sedan mot resultaten från sannolikhetsfunktionen. Resultat. Den i den här rapporten föreslagna metoden är fastställt till att vara cirka 30 878 gånger snabbare än föregående metoder, i.e. att leta igenom metadatan för hand. Dock så är den föreslagna metoden inte lika exakt då den har en identifikationsgrad på 80-93% av enheterna på nätverket, och en korrekt identifikationsgrad på enhetstypen på 95-98% av de identifierade enheterna. Detta till skillnad från den föregående metoden som hade 80-93% respektive 100% identifikationsgrad. Den föreslagna metoden identifierade också 48.9% av alla subnät som felkonfigurerade. Sammanfattning. För att sammanfatta så bevisar den föreslagna metoden att det är möjligt att identifiera felplacerade enheter på ett nätverk utifrån en analys av nätverkets metadata. Den föreslagna metoden är dessutom avsevärt snabbare än föregående metoder, men behöver utvecklas mer för att nå samma identifikationsgrad som föregående metoder. Det här arbetet kan ses som ett proof-of-concept gällande identifikation av enheter baserat på metadata, och behöver därför utvecklas för att nå sin fulla potential.
Xiao, Shuo Electrical Engineering & Telecommunications Faculty of Engineering UNSW. „Transmission power control in body-wearable sensor devices for healthcare monitoring“. Publisher:University of New South Wales. Electrical Engineering & Telecommunications, 2008. http://handle.unsw.edu.au/1959.4/41104.
Der volle Inhalt der QuelleKasparek, Alexander J. „Secure Key Agreement for Wearable Medical Devices“. Digital WPI, 2019. https://digitalcommons.wpi.edu/etd-theses/1333.
Der volle Inhalt der QuelleNaik, Vinayak Shashikant. „Reliable and secure data transport in large scale wireless networks of embedded devices“. Columbus, Ohio : Ohio State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1154092710.
Der volle Inhalt der QuelleZeraatzade, Mahbube. „Transmission congestion management by optimal placement of FACTS devices“. Thesis, Brunel University, 2010. http://bura.brunel.ac.uk/handle/2438/4710.
Der volle Inhalt der QuelleHussain, Musharrif, und Sulman Mahmood. „Secure Software and Communication on Handheld Devices“. Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4348.
Der volle Inhalt der QuelleSome applications on mobile handheld devices are involved in exchanging critical information e. g. sending positioning data of heavy-good vehicles as a basis for road toll. This information must not be accessed or modified illegitimately; however, there is the risk that can be accessed or modified by modifying the application or during communication of the handheld device with its counterpart. This thesis report investigates concepts to shelter software from modification and how the communication of these applications running on a handheld device over public mobile network can be made more secure. This work was performed by carefully identifying relevant literature and developing the concept that how a smart card can enhance the security of the software running on it particularly for handheld devices. It also discusses the issues and threats to smart cards. Furthermore it proposes a solution based on the specified scenario. The security of the software comprises on two layers; one layer is for analysis prevention, making it hard to understand the behaviour of the program both at static and dynamic levels. The other layer is responsible for verifying the integrity of the software to ensure that it is not modified. The software is installed on smart card which acts as an extra security layer. The communication relies on the security features of the public mobile network with some enhancement. In order to shelter the communication via public Internet, a border based VPN solution is deployed between the public mobile network and the remote server using the network assisted approach. This thesis will serve as basis for designing a secure communication path for Swedish road toll system.
+46 762733374 +46 737038932
Rossland, Lindvall Caspar, und Mikael Söderberg. „Efficient naming for Smart Home devices in Information Centric Networks“. Thesis, Uppsala universitet, Institutionen för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-424259.
Der volle Inhalt der QuelleNorman, Kelly Robert. „Encryption of Computer Peripheral Devices“. Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1232.pdf.
Der volle Inhalt der QuelleKeeney, Jacquelyn Nicole. „Evaluation of the Repeatability and Reproducibility of Network-Level Pavement Macrotexture Measuring Devices“. Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78721.
Der volle Inhalt der QuelleMaster of Science