Dissertations / Theses on the topic '004.25:004.62'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic '004.25:004.62.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Бречко, Вероніка Олександрівна. "Моделі та структури даних на основі асоціативної пам’яті для комп'ютерних систем проектування структур технологічних процесів." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/42718.
Full textThere is the dissertation of the obtaining the scientific degree of the technical sciences candidate in specialty 05.13.05 – computer systems and components – National Technical University "Kharkiv Polytechnic Institute", Kharkiv, 2019. The dissertation solves the scientific and practical problem of development and researching models data structures based on associative memory for computer systems of technological processes structure design. The purpose of the dissertation is the development and researching of data structures based on associative memory for computer systems of technological processes structure design. The object of study is the processes of processing information using associative memory. The subject of study is the models of data structures based on associative memory for computer systems of technological processes structure design. The introduction substantiates the relevance of the dissertation work topic; the purpose and tasks of research are formulated; the connection of the dissertation with scientific themes and programs is given; the object and the subject of the research are determined; the provisions, that determine the practical value of the obtained results and their scientific novelty, are highlighted; the personal contribution of the applicant in the obtained results, their approbation and publication are highlighted. In the first section the analysis of the advantages and disadvantages of current methods of storing and processing information for the design of structures processes, which showed that existing methods based on standard storage do not provide the performance required for the implementation of intelligent interfaces. When creating single technological processes using databases, time is saved by the fact that the transition text is already present in the database to some extent, but the choice of processing strategy, equipment and tools remains in the hands of technologists. All necessary data should be stored in the database and be accessible when necessary to obtain information. Such a database is made possible by associative memory data structures, which can store a large amount of information and allow it to be corrected during operation. Therefore, there is a need to develop associative memory that will allow the storage and processing of a large amount of formalized information, which is currently stored as basic structures (lists, queues, trees, etc.). This, in turn, will allow the construction of TP for complex, high-precision products, with the ability to correct data in the process of TP construction and associate several technological processes with one detail. In order to solve this problem, the paper proposes to develop and research neural networks of associative memory, models and data structures for the computer system of technological process design. The second section is devoted to the development of new neural networks based on bidirectional associative memory. A neural network of N-directed associative memory, consisting of N layers of neurons and allowing multiple associations to be stored, is proposed. Associative memory neural networks have been proposed that are capable of restoring a plurality of associative input images by input, by multiple inputs, by one output element, and by a combination of input elements by multiple outputs. That is, the associative memory 1→ N , N →1 and 1 2 N → N were developed. Multilayer associative memory with control neurons is proposed, which allows the construction of associative data circuits with the possibility of correction during the operation of the network. Developed neural networks based on associative memory that can be used in the design of complex neural networks of tree structure that can be used in the construction of storage and data processing systems in information systems. The second section is devoted to the development of new types of associative memory that allow us to store information based on underlying structures and combine them for efficient information processing. When constructing a complex system of information storage, the memory elements are used not by individual cells, but by their associations, which store such structures as lists, arrays, queues, etc. Each of them is a structured element by which search and processing of the data stored in it is provided. The multilevel combination of these elements, each of which can be represented as some of the elements of associative memory, is promising for the implementation of intelligent interfaces, logical inference, image processing, pattern recognition. The fourth section discusses the model data structures based on neural networks, associative memory structures to design processes. Data structures based on associative memory are proposed for storing the information needed to design the process structure. A hierarchical neural network based on associative memory is proposed to select equipment for a single process operation. The results of the dissertation work are introduced: – in the state enterprise "State project and scientific aviation industry research institute" in the manufacture of high-precision products; – in the educational process of the NTU "KhPI" at the department of computer engineering and programming during the teaching of the academic disciplines: "Fundamentals of Neurocomputing", "Artificial intelligence systems", and also in courses, thesis and scientific works of students of the specialty 123 "Computer engineering".
Stewart, Robert. "End-to-end delay analysis for small/medium scale IP networks." Thesis, Queen Mary, University of London, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.417838.
Full textSalles, Ronaldo Moreira. "Fair and efficient resource allocation strategies in multi-application networks using utility functions." Thesis, Imperial College London, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.406503.
Full textYang, Xiaodong. "Handover issues in DVB-H and in converged DVB-H/UMTS networks." Thesis, Brunel University, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422420.
Full textMurali, Aarthi. "Dynamic bandwidth provisioning in multi-layer optical networks for heterogeneous services." Thesis, University of Essex, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.574449.
Full textMahfouz, Ayman. "Requirements-driven adaptation of choreographed interactions." Thesis, Open University, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.578666.
Full textLafon, Christophe. "New Bluetooth scatternet concept." Thesis, University of Strathclyde, 2005. http://oleg.lib.strath.ac.uk:80/R/?func=dbin-jump-full&object_id=21571.
Full textHinds, Joanne. "An investigation of the nominal group effect in computer mediated collaborative recall." Thesis, University of Manchester, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.549083.
Full textChiyangwa, Sibusisiwe. "Analysing timed properties of ad hoc network protocols via model checking." Thesis, University of Birmingham, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423368.
Full textGhita, Bogdan Vladimir. "Performance characterisation of IP networks." Thesis, University of Plymouth, 2004. http://hdl.handle.net/10026.1/1700.
Full textAlbahanta, Ahmed S. F. "Towards efficient polling strategies for monitoring management information in TCP/IP networks." Thesis, Heriot-Watt University, 2006. http://hdl.handle.net/10399/198.
Full textLi, Yee-Ting. "An investigation into transport protocols and data transport applications over high performance networks." Thesis, University College London (University of London), 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.435839.
Full textHuang, Pi. "Wireless personal area networks and free-space optical links." Thesis, Bournemouth University, 2006. http://eprints.bournemouth.ac.uk/338/.
Full textRobinson, Craig. "Optimisation of Bluetooth wireless personal area networks." Thesis, Durham University, 2004. http://etheses.dur.ac.uk/2822/.
Full textAbuelma'atti, Omar. "An interoperability architecture for wireless networked appliances." Thesis, Liverpool John Moores University, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.431281.
Full textKuan, Heng Lee. "Simulation and algorithm design of robust coding for a DVB-S based multimedia wireless system." Thesis, Nottingham Trent University, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.443324.
Full textBarry, Mudar A. O. "Architectures for supporting Internet mobility beyond third generation mobile access networks." Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.410920.
Full textMichalareas, Theodoros. "Discrete value-based bandwith provisioning & routing complexity in IP networks." Thesis, University College London (University of London), 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.398018.
Full textOtterloo, Sieuwert Maarten van. "A strategic analysis of multi-agent protocols." Thesis, University of Liverpool, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.426106.
Full textTibenderana, Charles. "A high-performance, efficient, and reliable receiver for Bluetooth signals." Thesis, University of Southampton, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423040.
Full textShadgar, Bita. "A framework for authoring databases based on the WebDAV protocol : WebDAD." Thesis, University of Bristol, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.399920.
Full textAmin, Mina. "Resource optimisation for robust IP networking provisioning." Thesis, University of Surrey, 2008. http://epubs.surrey.ac.uk/843724/.
Full textKueh, Victor Yong Hwa. "Session establishment over an IP-based satellite UMTS network." Thesis, University of Surrey, 2004. http://epubs.surrey.ac.uk/844560/.
Full textCampbell, Duncan Russell. "Approaches for the digital profiling of activities and their applications in design information push." Thesis, University of Bath, 2007. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.443125.
Full textHaji, Mohammed Hassan Abdulla. "SNAP-based grid resource broker using the three phase commit protocol." Thesis, University of Leeds, 2005. http://etheses.whiterose.ac.uk/1339/.
Full textGu, Q. "An investigation into the use of middleware for the management of telecommunication and computer networks." Thesis, Queen's University Belfast, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.419508.
Full textFlegkas, Parisis. "Policy-based quality of service management in IP networks." Thesis, University of Surrey, 2005. http://epubs.surrey.ac.uk/843625/.
Full textБречко, Вероніка Олександрівна. "Моделі та структури даних на основі асоціативної пам’яті для комп'ютерних систем проектування структур технологічних процесів." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2019. http://repository.kpi.kharkov.ua/handle/KhPI-Press/42717.
Full textThere is the dissertation of the obtaining the scientific degree of the technical sciences candidate in specialty 05.13.05 – computer systems and components – National Technical University "Kharkiv Polytechnic Institute", Kharkiv, 2019. The research is devoted to solving a scientific and practical problem, which is to develop and study the models and structures of data based on associative memory for computer systems of technological processes structure design. In the research work, architecture, algorithms of training and functioning and software components are proposed that implement the developed neural networks of N-directional associative memory, multilayered associative memory and associative memory with control neurons used in the database for the design of the structure of the technological process; the structure of data on the basis of neural networks of associative memory is developed, which allows you more effectively to model technological processes. Experimental studies of the improved computer system design of structures of technological processes were carried out at the level of mathematical modeling and on the real object, the reliability of the proposed decisions are confirmed.
Mohamed, Tasir Abdul Rahman. "Enhancing OSPF to provide adaptive traffic distribution with networks for improved QoS performance." Thesis, University of Salford, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490281.
Full textPapanastasiou, Stylianos. "Investigating TCP performance in mobile ad hoc networks." Thesis, University of Glasgow, 2006. http://theses.gla.ac.uk/3068/.
Full textYoo, Jeong Ju. "Evaluation of QoS-based signalling for traffic engineering in an MPLS/ATM environment." Thesis, Lancaster University, 2001. http://eprints.lancs.ac.uk/11945/.
Full textPavlosoglou, Ioannis. "Emergence in the security of protocols for mobile ad-hoc networks." Thesis, University of Warwick, 2005. http://wrap.warwick.ac.uk/1193/.
Full textGouvy, Nicolas. "Routage géographique dans les réseaux de capteurs et d’actionneurs." Thesis, Lille 1, 2013. http://www.theses.fr/2013LIL10185/document.
Full textThis thesis is about wireless multi-hop networks such as sensor/actuator networks and actuator networks. Those networks are composed of independent entities which have limited computing and memory capabilities and are battery powered. They communicate through the radio medium and do not require any static infrastructure. In order to relay messages between actuators up to the base station, we use what is called "routing protocols". My works rely on CoMNet, the first geographic routing protocol which aims to adapt the network topology to the routed traffic in order to save energy. Nevertheless, CoMNet does not consider the consequences of those relocations more than in a one-hop way. We proposed MobileR (Mobile Recursivity), which anticipates the routing in a multi-hop manner through computations over its one-hop neighbors. Hence it can select the “best” next forwarding node according to its knowledge. Another important topic is that events are likely to be detected by multiple sensors and all of them transmit message toward the destination. But those messages are likely to cross over an intersection node. This crossing provokes useless oscillation for it and premature node death. The PAMAL (PAth Merging ALgorithm) routing algorithm detects those routing path crossing and provokes a path merging upstream and uses a packet aggregation downstream. Finally, the Greedy Routing Recovery (GRR) protocol takes controlled mobility into account in order to increase delivery rate on topology with holes or obstacles. GRR includes a dedicated relocation pattern which will make it circumvent routing holes and create a routing path
Biswas, Md Israfil. "Internet congestion control for variable-rate TCP traffic." Thesis, University of Aberdeen, 2011. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=182264.
Full textBoehm, Peter. "Incremental modelling for verified communication architectures." Thesis, University of Oxford, 2011. http://ora.ox.ac.uk/objects/uuid:ec6c9e06-7395-4af4-b961-b2ed837fda89.
Full textPhung, Chi Dung. "Enriching the internet control-plane for improved traffic engineering." Thesis, Sorbonne université, 2018. http://www.theses.fr/2018SORUS017/document.
Full textOne of the major challenges in the evolution of the Internet architecture is the definition of a protocol architecture that allows to solve the following major issues in Internet routing and traffic forwarding capabilities, (i) keeping a routing state that is manageable with current and forthcoming computing infrastructure – i.e., with few millions of states, (ii) offering a scalable pull architecture in support of data-plane programmability, (iii) offering a scalable forwarding plane able to be regularly optimized with only active flows information, (iv) offering locator/identifier separation for advanced IP mobility, (v) is incrementally deployable, (vi) can enhance the support of over-the-top services. The Locator/Identifier Separation Protocol (LISP) has been identified as one of the rising protocols in this respect. In its current status, it supports the above mentioned requirements at a level that is acceptable for basic networking environments. However, it shows too limited capacities when it comes to take into consideration fault resiliency and capability to react fast to network state updates. These shortcomings can be compensated by enhancing the control-plane architecture, and the routing algorithms therein. In this dissertation, we propose new protocol features and experiment novel control-plane primitives, as well as hybrid distributed-centralized routing state dissemination algorithms, to scale with different network conditions. We first design and build own open source LISP data-plane and control plane node, comparing it with other implementations, showing how our implementation can scale for large networks and reach performances suitable for real deployments. We present how our implementation served to operate all network nodes (data-plane and control-plane nodes) of a large scale experimentation testbed, the LISP-Lab testbed. Then we propose a novel LISP-based solution for VM live migrations across geographically separated datacenters over wide area IP networks. Experimenting it at large scale, we show that with our approach we can easily reach sub-second downtimes upon Internet-wide migration, even for very distant clients. Moreover, we investigate cross-layer network optimization protocols, in particular in relation with the Multipath Transport Control Protocol (MPTCP) to which LISP can deliver path diversity in support of bandwidth increase, confidentiality support and connection reliability, also using LISP traffic engineering network overlays. Despite we could benefit from only few overlay network nodes, we could experimentally evaluate our proposals showing the positive impact by using our solution, the negative impact of long round-trip times on some MPTCP subflows, and the strong correlation between the differential round-trip time among subflows and the throughput performance. Finally, we worked on a framework to improve LISP operation at the Internet scale, by facilitating cooperation between LISP Mapping Systems and introducing more automation in the LISP connectivity service delivery procedure. We believe such optimization could raise awareness among the service providers’ community, yielding new business opportunities related to LISP mapping services and the enforcement of advanced inter-domain traffic engineering policies for the sake of better quality of service guarantees
Луцишин, Роман Олегович, and Roman Olehovych Lutsyshyn. "Методи автоматизованого перекладу природної мови на основі нейромережевої моделі “послідовність-послідовність”." Master's thesis, Тернопільський національний технічний університет імені Івана Пулюя, 2020. http://elartu.tntu.edu.ua/handle/lib/33271.
Full textThe master's thesis is devoted to the research and implementation of methods of automated translation of natural language on the basis of the neural network model "sequence-sequence". The basic principles and approaches to the preparation of training data sampling, including the use of deep neural networks as encoders, are considered. The existing methods of solving the problem of natural language translation have been studied and analyzed, in particular, several neural network architectures of deep machine origin have been considered. Examples of creation and processing of natural language corpora to solve the problem of forming training and test data samples are given. A full assessment of the cost of creating a computer system required to solve the problem was performed, as well as a complete process of deploying software in this environment using third-party platforms. The results of the research were a complete review of existing solutions to solve the problem, choosing the best technology, improving the latter, implementation and training of a deep neural network model such as sequence-sequence" for the problem of natural language translation.
1. ВСТУП 2. АНАЛІЗ ПРЕДМЕТНОЇ ОБЛАСТІ 3. ОБҐРУНТУВАННЯ ОБРАНИХ ЗАСОБІВ 4. РЕАЛІЗАЦІЯ СИСТЕМИ ПЕРЕКЛАДУ ПРИРОДНОЇ МОВИ НА ОСНОВІ МОДЕЛІ "ПОСЛІДОВНІСТЬ-ПОСЛІДОВНІСТЬ" ТА НЕЙРОМЕРЕЖЕВОЇ АРХІТЕКТУРИ ТРАСНФОРМЕРС 5. ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ
Тхір, Ігор Ігорович, and Ihor Tkhir. "Дослідження можливостей використання відкритих даних при проєктуванні автоматизованої системи перевірки інформації для онлайн-майданчику з продажу автомобілів." Master's thesis, Тернопільський національний технічний університет ім. І. Пулюя, Факультет прикладних інформаційних технологій та електроінженерії, Кафедра автоматизації технологічних процесів і виробництв, 2020. http://elartu.tntu.edu.ua/handle/lib/33280.
Full textМетою магістерської роботи є розробка автоматизованої системи перевірки інформації для онлайн-майданчику з продажу автомобілів, яка дозволить перевіряти інформацію із користувацького оголошення в реєстрах відомостей про транспортні засоби та їх власників, а також перевірки авто на факт розшуку. Для досягнення цієї мети потрібно: дослідити предметну область, провести аналіз використання відкритих даних при розробці онлайн сервісів та здійснити постановку проблеми; побудувати модель автоматизованої системи перевірки інформації; визначити технології розробки; реалізувати систему і розробити методику перевірки інформації з реєстру; провести тестування і оцінку якості розробленої системи.
The purpose of the master's thesis is to develop an automated information verification system for the online platform for the sale of cars, which will verify the information from the user's ad in the registers of vehicles and their owners, as well as checking cars for search. To achieve this goal you need: explore the subject area, analyze the use of open data in the development of online services and pose a problem; build a model of an automated information verification system; identify development technologies; implement the system and develop a methodology for verifying information from the register; to test and evaluate the quality of the developed system.
Вступ 5 1 Аналітична частина 6 1.1 Загальні поняття відкритих даних 6 1.2 Загальний стан та статус відкритих даних в Україні 10 2 Науково-дослідна частина 14 2.1 Формати та набори відкритих даних 14 3 Технологічна частина 21 3.1 Опис та обґрунтування використовуваних технологій 21 3.2 Вибір мови програмування 22 3.3 Вибір системи керування базами даних 24 3.4 Огляд засобів для відображення системи 25 4 Конструкторська частина 28 4.1 Розробка онлайн-майданчику з продажу автомобілів 28 4.2 Розробка модуля автоматизованої системи перевірки інформації 34 5 Спеціальна частина 41 5.1 Розробка онлайн-сервісів в Україні на основі відкритих даних 41 6 Охорона праці та безпека в надзвичайних ситуаціях 49 6.1 Гігієнічні вимоги до параметрів виробничих приміщень в яких експлуатується інформаційна система 49 6.2 Напрацювання заходів щодо протипожежної стійкості автоматизованих систем перевірки інформації під час надзвичайних ситуацій техногенного характеру 54 Висновки 60 Перелік посилань 61
Marchal, Xavier. "Architectures et fonctions avancées pour le déploiement progressif de réseaux orientés contenus." Thesis, Université de Lorraine, 2019. http://www.theses.fr/2019LORR0049/document.
Full textInternet historical protocols (TCP/IP) that were used to interconnect the very first comput-ers are no longer suitable for the massive distribution of content that is now being made. New content-based network protocols (Information-Centric Networking) are currently being designed to optimize these exchanges by betting on a paradigm shift where content, rather than machines, are addressable across the Internet. However, such a change can only be made gradually and if all operational imperatives are met. Thus, this thesis aims to study and remove the main tech-nological obstacles preventing the adoption of the NDN (Name Data Networking) protocol by operators by guaranteeing the security, performance, interoperability, proper management and automated deployment of an NDN network. First, we evaluate the current performance of an NDN network thanks to a tool we made, named ndnperf, and observe the high cost for a provider delivering fresh content using this protocol. Then, we propose some optimizations to improve the efficiency of packet generation up to 6.4 times better than the default parameters. Afterwards, we focus on the security of the NDN protocol with the evaluation of the content poisoning attack, known as the second more critical attack on NDN, but never truly characterized. Our study is based on two scenarios, with the usage of a malicious user and content provider, or by exploiting a flaw we found in the packet processing flow of the NDN router. Thus, we show the danger of this kind of attacks and propose a software fix to prevent the most critical scenario. Thirdly, we are trying to adapt the HTTP protocol in a way so that it can be transported on an NDN network for interoperability purposes. To do this, we designed an adaptation protocol and developed two gateways that perform the necessary conversions so that web content can seamlessly enter or exit an NDN network. After describing our solution, we evaluate and improve it in order to make web content benefit from a major NDN feature, the in-network caching, and show up to 61.3% cache-hit ratio in synthetic tests and 25.1% in average for browsing simulations with multiple users using a Zipf law of parameter 1.5. Finally, we propose a virtualized and orchestrated microservice architecture for the deploy-ment of an NDN network following the Network Fonction Virtualization (NFV) paradigm. We developed seven microservices that represent either an atomic function of the NDN router or a new one for specific purposes. These functions can then be chained to constitute a full-fledged network. Our architecture is orchestrated with the help of a manager that allows it to take the full advantages of the microservices like scaling the bottleneck functions or dynamically change the topology for the current needs (an attack for example). Our architecture, associated with our other contributions on performance, security and in-teroperability, allows a better and more realistic deployment of NDN, especially with an easier development of new features, a network running on standard hardware, and the flexibility allowed by this kind of architecture
Despaux, François. "Modeling and evaluation of the end-to-end delay in wireless sensor networks." Thesis, Université de Lorraine, 2015. http://www.theses.fr/2015LORR0100/document.
Full textIn this thesis, we propose an approach that combines both measurements and analytical approaches for infering a Markov chain model from the MAC protocol execution traces in order to be able to estimate the end to end delay in multi-hop transmission scenarios. This approach allows capturing the main features of WSN. Hence, a suitable Markov chain for modelling the WSN is infered. By means of an approach based on frequency domain analysis, end to end delay distribution for multi-hop scenarios is found. This is an important contribution of our approach with regard to existing analytical approaches where the extension of these models for considering multi-hop scenarios is not possible due to the fact that the arrival distribution to intermediate nodes is not known. Since local delay distribution for each node is obtained by analysing the MAC protocol execution traces for a given traffic scenario, the obtained model (and therefore, the whole end to end delay distribution) is traffic-dependant. In order to overcome this problem, we have proposed an approach based on non-linear regression techniques for generalising our approach in terms of the traffic rate. Results were validated for different MAC protocols (X-MAC, ContikiMAC, IEEE 802.15.4) as well as a well-known routing protocol (RPL) over real test-beds (IOT-LAB)
Δάβρη, Ελένη-Κωνσταντίνα. "Μελέτη πρωτοκόλλου IPFIX και προσομοίωσή του με τη χρήση OPNET." Thesis, 2009. http://nemertes.lis.upatras.gr/jspui/handle/10889/3868.
Full textThe goal of this diploma thesis is the development of an application in order to simulate the function of the IPFIX Protocol, which is used to collect and transmit network data to the network management stations. For this purpose OPNET (Optimized Network Engineering Tools) was used. Briefly, IPFIX helps network managers to monitor the flow of data within the network. Throughout the first part of this dissertation emphasis is given to the study and analysis of the protocol in theory, and this way the need for a protocol that is in charge of extracting information out of network devices is underlined. In addition, extensive coverage of the widespread Cisco Netflow protocol has been made since IPFIX is based on it. Throughout the second part of this dissertation a network is presented in order to explain the way data is observed within it. The execution of the application for different, kinds of traffic, traffic intensity and ways of collecting data, using OPNET, enables us to export useful conclusions considering cost and performance of the protocol.
Τάσσης, Κωνσταντίνος. "Υλοποίηση της υπηρεσίας διαλειτουργικότητας μεταξύ τεχνικών circuit cross connect & any transfer over MPLS." 2005. http://nemertes.lis.upatras.gr/jspui/handle/10889/162.
Full textThe subject of this paper is the implementation techniques of L2 MPLS VPNs Cicruit Cross Connect (CCC) and Any Trasfer over MPLS (AtoM) that are provided by the two main manufactures of network connection (Juniper and Cisco). Furthermore this paper searches the special technical features of each technique and tries to find ways of interoperability between those two. This is useful when a providing L2 MPLS VPNs service expands in a network that consists of equipment of these two main manufactures . In the special occasion of EDET, which is a completely «Cisco» network the upper has implementation in the connection limits with GEANT, which is a completely «Juniper» network. Therefore the providing of L2 MPLS VPN between any carrier that is connected with EDET (eg. Academic Institute) and another carrier that is behind GEANT (of course out of EDET) presupposes the solution of the interoperability problems between these techniques.
Ζέρβας, Νικόλαος. "Μεθοδολογίες χαμηλής κατανάλωσης ενέργειας για ασύρματες εφαρμογές πολυμέσων." 2005. http://nemertes.lis.upatras.gr/jspui/handle/10889/319.
Full textIn this Ph.D. dissertation, design methodologies that enable energy minimization of wireless multimedia application realizations are presented. The proposed methodologies mainly optimize the management of the memory subsystem, which role is dominant as far as energy dissipation of multimedia application is concerned. Furthermore, techniques for the low-power partitioning, which is required for the real-time implementation of the highly computational complex multimedia applications, are proposed. Apart from the multimedia processing itself the dissertation, also focuses on the transmition of the multimedia content. To this end, power management techniques applicable for the design of wireless receivers are proposed. The proposed techniques are employed for the design of real-life implementation of low and medium rate receivers. Apart from energy minimization The proposed methodologies and techniques take into account constraints regarding the integration area as well as the processing time. The involved trade-offs are identified, and methods for their efficient exploration are proposed
Κόκκαλης, Χρήστος. "Ανάλυση λειτουργιών πρωτοκόλλου ΜΙΜΕ για τη διαχείριση ομάδων συζητήσεων (forums) και ηλεκτρονικού ταχυδρομείου (e-mail) σε ιστοσελίδες δικτυακού τόπου." Thesis, 2008. http://nemertes.lis.upatras.gr/jspui/handle/10889/671.
Full textAnalysis of features of MIME presentation protocol
Дармограй, Василь Олегович. "Алгоритмічне та програмне забезпечення технології Blockchain при побудові мережевих IoT- інфраструктур." Master's thesis, 2019. http://elartu.tntu.edu.ua/handle/lib/29861.
Full textΑγγελόπουλος, Σ. Κ. "Ανάλυση και ανάπτυξη δικτύου υπολογιστών σε διάταξη βρόχου με κατανεμημένο έλεγχο επικοινωνίας." Thesis, 1989. http://nemertes.lis.upatras.gr/jspui/handle/10889/1852.
Full textΛιβαθινός, Νικόλαος. "Δομημένη δρομολόγηση σε ασύρματα ad hoc δίκτυα." Thesis, 2006. http://nemertes.lis.upatras.gr/jspui/handle/10889/1423.
Full text-
Бачинський, Ярослав Юрійович. "Програмне та апаратне забезпечення роботизованих систем автоматизованого розгортання безпровідних мереж передавання даних." Master's thesis, 2019. http://elartu.tntu.edu.ua/handle/lib/29848.
Full textЖуйвода, Андрій Юрійович. "Методи оптимізації передачі голосової інформації комп’ютерних мережах." Master's thesis, 2019. http://elartu.tntu.edu.ua/handle/lib/29863.
Full textΙγγλέσης, Ευάγγελος. "Μετάδοση δεδομένων σε κινητά δίκτυα επικοινωνιών 3ης γενιάς." 2005. http://nemertes.lis.upatras.gr/jspui/handle/10889/146.
Full textThe purpose of this dissertation is to study data transmission using Third Generation (3G) Mobile Networks and in particular using the Universal Mobile Telecommunications Systems (UMTS) network. Over the last decade, Cellular Mobile Telephony and Internet have spread rapidly worldwide. The need for mobility on the one side and on the other side the need for access to information and services, led to the convergence of the two worlds using Third Generation Mobile Networks. The UMTS network is slowly becoming an all-IP network that allows high speed data Internet connection. This dissertation discusses the UMTS network’s architectural and functional framework starting from the general characteristics of the available bandwidth and the UMTS cells’ structure. The architectural design of the network is presented next with respect to the user’s equipment, the Universal Terrestrial Radio Access Network (UTRAN) and the Core Network, followed by the signaling protocol and the user level within UMTS. After that, the dissertation covers Quality of Service (QoS) issues while using the UMTS network. The two QoS groups are presented along with their UMTS characteristics, and certain parameters for specific services (such as voice, video, multimedia streaming applications, etc.). In addition, the Multimedia Broadcast/Multicast Service (MBMS) is discussed. MBMS is a service designed for the UMTS network and the procedure and services of its functionality are being analysed. The second part of this dissertation deals with the experimental evaluation of the UMTS network in the ns-2 simulator, regarding the transmission of different types of traffic and the efficiency of the different protocols. The method of the traffic generation is being discussed at first, along with the implemented modules. Following that, the results from the experiments on TCP protocol performance over the UMTS air interface are being presented and some issues that raise up due to the high bit error rate that occur in the wireless channel are being discussed. In this case, we study the performance of both UMTS Dedicated Channels (DCH) and the High Speed Downlink Packet Access) transmissions. In order to study the transmission of multimedia content over the UMTS, some experiments took place, and showed that UMTS is able of guaranteeing the different requirements of this type of traffic, especially regarding the packets’ time delays and the friendly behavior against the TCP protocol, when coexisting in the network traffic load. Finally, this dissertation proposes a scheme for developing a multimedia content transmission system over UMTS, which takes into consideration the current state of the network and adapts the multimedia data stream to these conditions.