Dissertations / Theses on the topic 'Network analyze'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Network analyze.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Nath, Madhurima. "Application of Network Reliability to Analyze Diffusive Processes on Graph Dynamical Systems." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/86841.
Full textPh. D.
The research presented here explores the effects of the structural properties of an interacting system on the outcomes of a diffusive process using Moore-Shannon network reliability. The network reliability is a finite degree polynomial which provides the probability of observing a certain configuration for a diffusive process on networks. Examples of such processes analyzed here are outbreak of an epidemic in a population, spread of an invasive species through international trade of commodities and spread of a perturbation in a physical system with discrete magnetic spins. Network reliability is a novel tool which can be used to compare the efficiency of network models with the observed data, to find important components of the system as well as to estimate the functions of thermodynamic state variables.
Isik, Zerrin. "Network Structure Based Pathway Enrichment System To Analyze Pathway Activities." Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12612951/index.pdf.
Full textOliveira, Homero Fernandes. "Design and implementation of a toolbox of modularized C programs to construct, analyze and test network optimization algorithms." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/26452.
Full textTHOMAS, VINEET SUNNY. "A Multiscale Framework to Analyze Tricuspid Valve Biomechanics." University of Akron / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=akron1542255754172363.
Full textTobolka, Lukáš. "Problematika návrhu síťové infrastruktury." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442356.
Full textNassani, Sararose. "An Application of Statistics and Random Graphs to Analyze Local Heroin Markets." Case Western Reserve University School of Graduate Studies / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=case155440032815001.
Full textVu, Xuan Thang. "Joint Network / Channel Decoding over Noisy Wireless Networks." Phd thesis, Université Paris Sud - Paris XI, 2014. http://tel.archives-ouvertes.fr/tel-01060330.
Full textCaruba, Thibaut. "Analyses médico-économiques de la prise en charge de la maladie coronarienne stable : méta-analyse en réseau et modélisation." Phd thesis, Université René Descartes - Paris V, 2013. http://tel.archives-ouvertes.fr/tel-00921072.
Full textRodriguez, Ramón. "Network Analyzer Functionality Simulator." Thesis, University of Gävle, Department of Technology and Built Environment, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-704.
Full textThe objective of this thesis work was to implement all the hardware and software necessary to simulate the functionality of a Vector Network Analyzer (VNA). With equipment that is already available, and is common in a measurement station, the most common functions of a VNA were implemented, using an Vector Signal Generator, that provide the signal for testing, and a Vector Signal Analyzer, to make all the amplitude and phase measurements. With these instruments and the appropriate software that control them, the basic functionality of a Vector Network Analyzer can be achieved with a reasonable accuracy. With this system, we can reduce costs, avoiding the need of a real VNA and take advantage off instruments that are already available in a laboratory. A Complete measurement system of all four scattering parameters is proposed at the end of the report for future implementation. With this implementation all the different S-parameter measurements were made with an acceptable accuracy that can be comparable to a commercial VNA.
Zreik, Rawya. "Analyse statistique des réseaux et applications aux sciences humaines." Thesis, Paris 1, 2016. http://www.theses.fr/2016PA01E061/document.
Full textOver the last two decades, network structure analysis has experienced rapid growth with its construction and its intervention in many fields, such as: communication networks, financial transaction networks, gene regulatory networks, disease transmission networks, mobile telephone networks. Social networks are now commonly used to represent the interactions between groups of people; for instance, ourselves, our professional colleagues, our friends and family, are often part of online networks, such as Facebook, Twitter, email. In a network, many factors can exert influence or make analyses easier to understand. Among these, we find two important ones: the time factor, and the network context. The former involves the evolution of connections between nodes over time. The network context can then be characterized by different types of information such as text messages (email, tweets, Facebook, posts, etc.) exchanged between nodes, categorical information on the nodes (age, gender, hobbies, status, etc.), interaction frequencies (e.g., number of emails sent or comments posted), and so on. Taking into consideration these factors can lead to the capture of increasingly complex and hidden information from the data. The aim of this thesis is to define new models for graphs which take into consideration the two factors mentioned above, in order to develop the analysis of network structure and allow extraction of the hidden information from the data. These models aim at clustering the vertices of a network depending on their connection profiles and network structures, which are either static or dynamically evolving. The starting point of this work is the stochastic block model, or SBM. This is a mixture model for graphs which was originally developed in social sciences. It assumes that the vertices of a network are spread over different classes, so that the probability of an edge between two vertices only depends on the classes they belong to
Gabdurahmanov, Murat, and Simon Trygg. "Analysis and Evaluation of Network Management Solutions : A Comparison of Network Management Solutions Suitable for Networks with 2,500+ Devices." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-188793.
Full textVissa företag använder idag suboptimala och föråldrade övervakningsssystem för sina nätverk. Med tanke på det stora antalet olika tjänster som efterfrågas av användare finns det ett stort behov av att anpassa nätverksstrukturen för att stödja de nuvarande och potentiellt framtida kraven. Som ett resultat finns det ett behov av nya övervakningssystem (Network Management Solutions (NMSs)) för nätverken. Syftet med detta examensarbete är att hjälpa ett företag som använder NMS:en Local Area Network (LAN) Management Solution (LMS). LMS utecklades av Cisco för att hantera lokala nätverk (LANs). Men med tiden har företagets krav förändrats och de har därför behövt expandera sitt nätverk mer än väntat. Dessutom är LMS endast utformad för att hantera enheter tillverkade av Cisco, medan företaget vill ha en universal lösning med stöd för enheter från många olika tillverkare. Denna rapport presenterar en analys av deras nuvarande system, samt föreslår möjliga lösningar som kan ersätta detta. Den nya lösningen ska vara långvarig samt ska uppfylla alla krav företaget ställt. För att hitta lämpliga lösningar har en grundlig utvärdering av den befintliga NMS:en samt en analys av de ställda kraven utförts. Denna analys gav goda insikter i olika aspekter av deras nuvarande system. En lämplig lösning hittades genom att följa en trestegsmetod. Metoden utgick från 82 möjliga lösningar, som efter flera steg av filtrering resulterade i de mest lämpade ersättningssystemen. Två NMS:er har föreslagits som lika lämpliga ersättare: IBM Tivoli Netcool/OMNIbus och ManageEngine OpManager. Oavsett vilken som väljs, har de båda följande fördelar jämfört med den nuvarande NMS:en: de är båda väldigt stabila lösningar som klarar av en stor mängd hanterade enheter; de är universella lösningar med stöd för en stor mängd olika enheter, dessutom går det även att lägga till eget stöd för enheter vid behov; de är användarvänliga och har möjlighet till att anpassa egna gränssnitt; samt att de båda har en professionell first-line teknisk support placerad lokalt i landet.<p>
Walton, Robert. "A microwave Nonlinear Network Analyser." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0016/MQ55268.pdf.
Full textLee, Whan Su. "The de-embedment of network-analyzer measurements." Thesis, Monterey, California. Naval Postgraduate School, 1988. http://hdl.handle.net/10945/23154.
Full textSlováček, Miroslav. "Monitor bezdrátové sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2009. http://www.nusl.cz/ntk/nusl-217844.
Full textChaurasia, Gautam. "Analysis, integration and applications of the human interactome." Doctoral thesis, Humboldt-Universität zu Berlin, Mathematisch-Naturwissenschaftliche Fakultät I, 2012. http://dx.doi.org/10.18452/16635.
Full textProtein interaction networks aim to provide the scaffold maps for systematic studies of the complex molecular machinery in the cell. The complexity of protein interactions poses, however, large experimental and computational challenges regarding their identification, validation and annotation. Additionally, storage and linking is demanding since new data are rapidly accumulating. In this research work, I addressed these issues and provided solutions to overcome the limitations of current human protein-protein interaction (PPI) maps. In particular, my thesis can be partitioned into two parts: In the first part, I conducted a comparative assessment of eight recently constructed human protein-protein interaction networks to identify experimental biases. Results showed strong selection and detection biases which are necessary to take into consideration in future applications of these maps. One of the important conclusions of this study was that the current human interaction networks contain complementary information; hence, a database was developed, termed as Unified Human Interactome (UniHI), integrating human PPI data from twelve major sources. Several new tools were included for querying, analyzing and visualizing human PPI networks. In the second part of this research work, UniHI dataset was applied to characterize the genetic modifiers involved in a specific disease: Chorea Huntington (HD), an autosomal dominant neurodegenerative disease. To find the modifiers, a network-based modeling approach was implemented by integrating huntingtin-specific protein interaction network with gene expression data from HD patients in multiple steps. Using this approach, a Caudate Nucleus-specific HD protein interaction (PPI) network was predicted, connecting 14 potentially dysregulated proteins directly or indirectly to the disease protein, showing a possible link to molecular processes such as pro-apoptotic pathways, cell survival, anti-apoptotic, growth, and neuronal diseases.
Machado, Tatiane Martins. "Analisador de redes WirelessHART com capacidade de detecção de coexistência." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2014. http://hdl.handle.net/10183/97234.
Full textThe use of wireless networks in industrial environment is growing due to the advantages of these networks compared to wired systems. However, the wireless networks must have the same robustness that wired networks. It is necessary to ensure the link between devices and it is also necessary that the network meets the requirements of real-time communication. The WirelessHART protocol was created in 2007, and it is the first open wireless communication standard specifically designed for industrial environments. This protocol has been gaining increasing applicability in industry due to its high reliability and robustness. Because it is a recent protocol, there are still many ongoing researches. One of them is related to tools for analyzing and monitoring the network. Such tools have the main objective to capture the messages that travel on the network, acting as a sniffer. However, the WirelessHART protocol has some peculiarities as compared to other wireless networks, such as the use of 15 different channels. Because of this, many sniffers already proposed for wireless networks can not be applied, because they capture data on only one frequency. Another issue is related to the monitoring networks already installed, where devices can be found in places of difficult access. Thus, it is necessary that the tool has mobility, i.e., does not need to be connected to a computer, for example. So, since there is still no ideal monitoring tool for WirelessHART networks, this paper proposes a new tool, which has advantages such as: data capture in 15 channels using only one radio receiver, local storage of captured data using a memory card and measuring the energy in the channels for getting information about interference in the network. In addition, an offline application presents statistics and analysis about the captured data. This paper presents some important theoretical concepts about the protocol and implementation details of the tool. The results show that the tool is working properly as a sniffer and it’s performing the interference detection in the network . A case study shows the behavior of the WirelessHART network coexisting with IEEE 802.11 standard.
Bertolotti, Antoine. "Traitements locaux des condylomes ano-génitaux externes (revue systématique, méta-analyses, analyse poolée et méta-analyse en réseau²)." Thesis, Antilles, 2019. http://www.theses.fr/2019ANTI0412.
Full textBackground: While several treatments exist for anogenital warts (AGWs), no clear treatment hierarchy is mentioned in the latest guidelines. Objectives: To compare the efficacy of topical treatments and ablative procedures for the management of AGWs. Methods: Twelve electronic databases were systematically searched. All randomized controlled trials (RCTs) comparing immunocompetent adults with AGWs who received at least 1 provider-administered or patient-administered treatment in at least 1 parallel group were included. Risk of bias assessment followed the Cochrane Handbook. Study endpoints were clearance, recurrence, side effects (SE) and complete lesion response (CLR) after treatment assessment. Meta-analyses, pooled analysis then network meta-analysis were performed. Results: Seventy RCTs (9,931 patients) were included. All but 4 RCTs had a high risk of bias. In network meta-analysis (only CLR assessment): a network geometry was constructed based on 49 of the 70 RCTs. The most efficacious treatments compared to placebo were surgery (RR 10.54; CI95% 4.53-24.52), association of ablative therapy and imiquimod (RR 7.52; CI95% 4.53-24.52), and electrosurgery (RR 7.10; CI95% 3.47-14.53). SUCRA values confirmed the superiority of surgery (90.9%), association of ablative therapy and imiquimod (79.8%), and electrosurgery (77.1%). The most efficacious patient-administered treatments were podophyllotoxin 0.5% solution (63.5%) and podophyllotoxin 0.5% cream (62.2%). Conclusions: Most included RCTs have low-level evidence. Surgery and electrosurgery seem to be superior to other treatments. Combined therapy should be more evaluated in future RCT
Dugué, Nicolas. "Analyse du capitalisme social sur Twitter." Thesis, Orléans, 2015. http://www.theses.fr/2015ORLE2081/document.
Full textBourdieu, a sociologist, defines social capital as : "The set of current or potential ressources linked to the possession of a lasting relationships network". On Twitter,the friends, followers, users mentionned and retweeted are considered as the relationships network of each user, which ressources are the chance to get relevant information, to beread, to satisfy a narcissist need, to spread information or advertisements. We observethat some Twitter users that we call social capitalists aim to maximize their follower numbers to maximize their social capital. We introduce their methods, based on mutual subscriptions and dedicated hashtags. In order to study them, we first describe a large scaledetection method based on their set of followers and followees. Then, we show with an automated Twitter account that their methods allow to gain followers and to be retweeted efficiently. Afterwards, we bring to light that social capitalists methods allows these users to occupy specific positions in the network allowing them a high visibility.Furthermore, these methods make these users influent according to the major tools. Wethus set up a classification method to detect accurately these user and produce a newinfluence score
Carlén, Eriksson Lennie, and Willners Jonatan Scharff. "Body Area Network with Gait Symmetry Analyses." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28353.
Full textScharff, Willners Jonatan. "Body Area Network with Gait Symmetry Analyses." Thesis, Mälardalens högskola, Inbyggda system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-28306.
Full textCicek, A. Ercument. "METABOLIC NETWORK-BASED ANALYSES OF OMICS DATA." Case Western Reserve University School of Graduate Studies / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=case1372866879.
Full textKröller, Alexander. "Algorithms for topology aware sensor networks." Göttingen Cuvillier, 2007. http://d-nb.info/987558293/04.
Full textLannes, Romain. "Recherche de séquences environnementales inconnues d’intérêt médical/biologique par l’utilisation de grands réseaux de similarité de séquences." Electronic Thesis or Diss., Sorbonne université, 2019. http://www.theses.fr/2019SORUS232.
Full textThe objective of this thesis was to identify as yet unknown microorganisms present in various environments and to characterize some of their metabolisms. This unidentified diversity, both taxonomic and functional, is commonly referred to as microbial dark matter. I have used and developed new network methods, including sequence similarity networks, to exploit very large sequence datasets from metagenomic projects. In particular, my work has highlighted the ecological role of ultra-small micro-organisms in some autotrophic metabolic pathways in the oceans. It also shows that CPR and DPANN, recently discovered ultra-small bacteria and archaea, participate in the dynamics of microbial communities through quorum sensing systems similar to those of better characterized organisms. An application of sequence similarity networks to meta-barcoding data also revealed a previously unknown diversity of Holozoans, which could allow us to better understand the transition to multicellularity of Metazoans. Finally, I have developed a method and software for searching for remote homologs of proteins of interest in very large datasets, such as those from metagenomics. This method, now validated, should make it possible to search for sequences belonging to still unknown and very divergent organisms, in the hope of discovering new deep branching phyla, or even new domains of life
Ennaji, Moulay Abderrahim. "Analyse et conception d'un réseau de neurones formels pour le filtrage d'un signal dynamique /." Thèse, Chicoutimi : Université du Québec à Chicoutimi, 1992. http://theses.uqac.ca.
Full textYasin, Amanullah. "Incremental Bayesian network structure learning from data streams." Nantes, 2013. https://archive.bu.univ-nantes.fr/pollux/show/show?id=b81198e1-9d39-4282-9de6-f29ab95c0664.
Full textIn the last decade, data stream mining has become an active area of research, due to the importance of its applications and an increase in the generation of streaming data. The major challenges for data stream analysis are unboundedness, adaptiveness in nature and limitations over data access. Therefore, traditional data mining techniques cannot directly apply to the data stream. The problem aggravates for incoming data with high dimensional domains such as social networks, bioinformatics, telecommunication etc, having several hundreds and thousands of variables. It poses a serious challenge for existing Bayesian network structure learning algorithms. To keep abreast with the latest trends, learning algorithms need to incorporate novel data continuously. The existing state of the art in incremental structure learning involves only several tens of variables and they do not scale well beyond a few tens to hundreds of variables. This work investigates a Bayesian network structure learning problem in high dimensional domains. It makes a number of contributions in order to solve these problems. In the first step we proposed an incremental local search approach iMMPC to learn a local skeleton for each variable. Further, we proposed an incremental version of Max-Min Hill-Climbing (MMHC) algorithm to learn the whole structure of the network. We also proposed some guidelines to adapt it with sliding and damped window environments. Finally, experimental results and theoretical justifications that demonstrate the feasibility of our approach demonstrated through extensive experiments on synthetic datasets
Hájek, Martin. "Využití analýzy sociálních sítí při analýze sociálního okolí projektového manažera." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-17012.
Full textMdini, Maha. "Anomaly detection and root cause diagnosis in cellular networks." Thesis, Ecole nationale supérieure Mines-Télécom Atlantique Bretagne Pays de la Loire, 2019. http://www.theses.fr/2019IMTA0144/document.
Full textWith the evolution of automation and artificial intelligence tools, mobile networks havebecome more and more machine reliant. Today, a large part of their management tasks runs inan autonomous way, without human intervention. In this thesis, we have focused on takingadvantage of the data analysis tools to automate the troubleshooting task and carry it to a deeperlevel. To do so, we have defined two main objectives: anomaly detection and root causediagnosis. The first objective is about detecting issues in the network automatically withoutincluding expert knowledge. To meet this objective, we have proposed an algorithm, WatchmenAnomaly Detection (WAD), based on pattern recognition. It learns patterns from periodic timeseries and detect distortions in the flow of new data. The second objective aims at identifying theroot cause of issues without any prior knowledge about the network topology and services. Toaddress this question, we have designed an algorithm, Automatic Root Cause Diagnosis (ARCD)that identifies the roots of network issues. ARCD is composed of two independent threads: MajorContributor identification and Incompatibility detection. WAD and ARCD have been proven to beeffective. However, many improvements of these algorithms are possible
Iova, Oana-Teodora. "Standards optimization and network lifetime maximization for wireless sensor networks in the Internet of things." Thesis, Strasbourg, 2014. http://www.theses.fr/2014STRAD022/document.
Full textNew protocols have been standardized in order to integrate Wireless Sensor Networks (WSN) in the Internet. Among them, the IEEE 802.15.4 MAC layer protocol, and RPL, the IPv6 Routing Protocol for Low-power and Lossy Networks. The goal of this thesis is to improve these protocols, considering the energy constraints of the devices that compose the WSN. First, we proposed a new MAC layer broadcast mechanism in IEEE 802.15.4, to ensure a reliable delivery of the control packets from the upper layers (especially from RPL). Then, we provided an exhaustive evaluation of RPL and highlighted an instability problem. This instability generates a large overhead, consuming a lot of energy. Since the lifetime of WSN is very limited, we proposed a new routing metric that identifies the energy bottlenecks and maximizes the lifetime of the network. Finally, by coupling this metric with a multipath version of RPL, we are able to solve the instability problem previously highlighted
Feng, Tianyang. "Studying Noise Contributions in Nonlinear Vector Network Analyzer (NVNA) Measurements." Thesis, Högskolan i Gävle, Avdelningen för elektronik, matematik och naturvetenskap, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-13119.
Full textVan, Rooyen M. W. (Melchior Werner). "Simple broadband measurements of balanced loads using a network analyzer." Thesis, Stellenbosch : Stellenbosch University, 2001. http://hdl.handle.net/10019.1/52451.
Full textENGLISH ABSTRACT: Balanced loads such as antennas normally require baluns when they are measured. For wide band applications, designing and building a balun complicates the measurement and introduces errors. A simple model for load impedances was developed, together with a novel measurement procedure. The procedure enables the measurement of balanced loads using a network analyzer with no balun. Measured and simulated results are presented.
AFRIKAANSE OPSOMMING: Gebalanseerde laste soos antennas benodig gewoonlik balons om korrek gemeet te word. Die ontwerp van 'n balon vir wye band toepassings bemoeilik die metings en veroorsaak foute. 'n Eenvoudige model vir die lasimpedansies is ontwikkel sowel as 'n eenvoudige meetmetode. Die metode word gebruik om die gebalanseerde laste te meet met 'n netwerk analiseerder sonder die gebruik van 'n balon. Gemete en gesimuleerde resultate word getoon.
Теребов, И. А., and I. A. Terebov. "Разработка программного обеспечения для DIY Vector Network Analyzer : магистерская диссертация." Master's thesis, б. и, 2021. http://hdl.handle.net/10995/100812.
Full textThe object of research is the device DIY Vector Network Analyzer UVNA-63. The purpose of the work is to develop software for DIY Vector Network Analyzer UVNA-63. This paper describes software development in Matlab. The operation of the developed measurement functions is described. The work of the developed graphical interface is described. Refinement of the laboratory work methodology. The relevance of the work is justified by the lack of software for carrying out measurements on a vector network analyzer, which is at the disposal of the department and can be used in the educational process. The developed software will make it possible to carry out measurements, calibrate the apparatus, save the obtained data in various formats, display the obtained data on a graph and set markers on the graph. The scope is the educational area. With the help of the developed software, it is possible to carry out laboratory work and measure the investigated devices.
Youngseo, Ko. "Multi-Harmonic Broadband Measurement with an Large-Signal Network Analyzer." The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1268237958.
Full textMurray, James John. "Development of a real-time automatic network analyzer measurement system." Master's thesis, University of Cape Town, 1989. http://hdl.handle.net/11427/8331.
Full textGrootboom, Lanche Linden. "Using an Agilent E5071B Vector Network Analyzer and Rotating Platform." Master's thesis, University of Cape Town, 2013. http://hdl.handle.net/11427/5210.
Full textIncludes bibliographical references.
Ultra-Wideband (UWB) technology has become very famous amongst the radar imaging community. This system is well suited for tomographic imaging as it offers high special resolution and a low probability of detection. Some of the UWB applications include ground penetrating radar, medical imaging and some military applications. In this thesis an UWB radar imaging system has been designed and implemented using an Agilent E5071B Vector Network Analyzer and a rotating pedestal. The two ports of the device are used as a transmitter and receiver, measuring the frequency domain data of the scene in front of the antennas at each angular position as the rotating pedestal rotates in front of the antennas. This data is then put through a time domain back-projection algorithm which reconstructs an image of the scene. This is done in 2D space and then later extended to 3D space.
Wang, Qinghua. "Traffic analysis, modeling and their applications in energy-constrained wireless sensor networks on network optimization and anomaly detection /." Doctoral thesis, Sundsvall : Tryckeriet Mittuniversitetet, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-10690.
Full textSinha, Amit Kumar Medhi Deepankar. "Methodologies and analyses of broadband access network traffic." Diss., UMK access, 2007.
Find full text"A dissertation in computer networking and telecommunications networking." Advisor: Deep Medhi. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed July 30, 2008. Includes bibliographical references (leaves 94-100). Online version of the print edition.
Wilson, Jennifer L. (Jennifer Lynn). "Network analyses for functional genomic screens in cancer." Thesis, Massachusetts Institute of Technology, 2016. http://hdl.handle.net/1721.1/104236.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 128-151).
Gene interference screens are a widely adopted and popular tool for uncovering gene function but imperfections in the technology limit the power of these investigations. There are many completed and on-going RNAi investigations across a multitude of biological systems because these experiments are scalable, cost-effective, and relatively easily adapted to multiple experimental environments. The most influential disadvantage is that many of the individual reagents are non-specific and interfere with genes other than the intended target. Efforts to improve limitations in RNAi have focused on statistical models and improving reagents, yet have not explored using biological context to select gene targets. This thesis uses network modeling and data integration to provide context for gene interference studies, and demonstrates the utility of this approach in two systems: Acute Lymphoblastic Leukemia (ALL) is a disease of undifferentiated B-cells that results from accumulation of genetic lesions, yet we have an incomplete understanding of all genes contributing to the disease and how they interact. To discover genetic mediators of this disease, we employ a genome-scale shRNA screen, and complement this data with differential mRNA expression and ChIP-seq data using network integration. The integrated model identifies processes not represented in any input set and predicts novel genes contributing to disease. We specifically validate the role of Wwpl as a tumor suppressor in ALL. Aberrant growth factor pathway activity drives cancer pathology and is the target of molecular cancer therapies. Specifically, the epidermal growth factor receptor (EFGR) pathway and its ligand, transforming growth factor alpha (TGF[alpha]) are clinically relevant to gastric cancer. We use an shRNA screen and Prize Collecting Steiner Forest (PCSF) algorithm to discover the pathway regulating TGF shedding. This pathway identifies common regulators of TGF[alpha] shedding and NF[chi]B regulation, yet targeting NF[chi]B and the EGFR pathway has thus far been unsuccessful in cancer therapies. Our network identifies IRAK1 as a viable path forward for modulating both TGF[alpha] and NF[chi]B in gastric cancer.
by Jennifer L. Wilson.
Ph. D.
Xia, Yun. "Neuronal Network Analyses in vitro of Acute Individual and Combined Responses to Fluoxetine and Ethanol." Thesis, University of North Texas, 2002. https://digital.library.unt.edu/ark:/67531/metadc3191/.
Full textTackx, Raphaël. "Analyse de la structure communautaire des réseaux bipartis." Electronic Thesis or Diss., Sorbonne université, 2018. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2018SORUS550.pdf.
Full textIn the real world, numerous networks appear naturally, they are everywhere, in many disciplines, for example in computer science with router networks, satellite networks, webpage networks, in biology with neural networks, in ecology with biological interaction networks, in linguistic with synonym networks, in law with legal decision networks, in economy with interbank networks, in social sciences and humanities with social networks. Generally, a network reflects the interactions between many entities of a system. These interactions have different sources, a social link or a friendship link in a social network, a cable in a router network, a chemical reaction in a protein-protein interaction network, a hyperlink in a webpage network. Furthermore, the rapid democratization of digital technology in our societies, with internet in particular, leads to create new systems which can be seen as networks. Finally, all these networks depict very specific features : they come from pratical contexts, most of the time they are big (they may be comprised of several billion of nodes and links, containing a large amount of information), they share statistical properties. In this regard, they are called real-world networks or complex networks. Nowaday, network science is a research area in its own right focusing on describing and modeling these networks in order to reveal their main features and improve our understanding of their mecanisms. Most of the works in this area use graphs formalism which provides a set of mathematical tools well suited for analyzing the topology of these networks. It exists many applications, for instance applications in spread of epidemy or computer viruses, weakness of networks in case of a breakdown, attack resilience, study for link prediction, recommandation, etc. One of the major issue is the identification of community structure. The large majority of real-world networks depicts several levels of organization in their structure. Because of there is a weak global density coupled with a strong local density, we observe that nodes are usually organized into groups, called communities, which are more internally connected than they are to the rest of the network. Moreover, these structures have a meaning in the network itself, for example communities of a social network may correspond to social groups (friends, families, etc.), communities of a protein-protein network may translate fonctions of a cell, communities may be also related to similar subjects in a webpage network [...]
Shu, Xingliang. "Electrocardiograph Signal Classification By Using Neural Network." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1592395089900722.
Full textDaniel, John Edward. "Development of enhanced multiport network analyzer calibrations using non-ideal standards." [Tampa, Fla.] : University of South Florida, 2005. http://purl.fcla.edu/fcla/etd/SFE0001392.
Full textNeuenhahn, Martin Christian [Verfasser]. "Emulator- und kostenbasierte Analyse von Network-on-Chip / Martin Christian Neuenhahn." Hannover : Gottfried Wilhelm Leibniz Universität Hannover, 2019. http://d-nb.info/1192440501/34.
Full textHSIEH, I.-LUN, and 謝易倫. "Analyze the structures of cancer networks and signal transduction networks using network motif approach." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/2qnm84.
Full text國立虎尾科技大學
資訊工程系碩士班
106
Molecular biological networks are composed of many small network modules, which are called network motifs. These network motifs are often play important roles in biological network. This study makes use of information theory to characterize the network motifs. We will perform a series of comparison and analysis on network motifs, with the hope that it could possibly enhance our understanding of the underlying structures of the biological networks. In the previous study, we have conducted functional enrichment analysis for 16 cancer networks and 24 signal transduction networks derived from KEGG database, and thereby compared their motif structures by information theory. This study will make several efforts to extend the previous study. These improvements include: (1) utilizes the latest KEGG data, (2) extend data source: by including new cancer networks and signal transduction networks; (3) use of generalized graph energy to characterize network motifs, (4) combine the graph energy, reciprocal links and cyclomatic complexity parameters to uniquely label the network motifs – so-called motif fingerprint indices, (5) compute the Jensen-Shannon entropy and thereby measure the similarity between two networks. We believe this thesis could help dissecting the underlying structures of biological networks, and the method proposed by this study could possibly be further applied in the analysis of non-biological complex networks.
Zhong, Ming-Xun, and 鍾明勳. "Using NetFlow to Analyze Usage and Anomalies in Large Network." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/82448725733539839302.
Full text國立中山大學
資訊工程學系研究所
92
NetFlow is a de facto protocol to export information about IP flow from network device. In this paper, we describe the modification to the famous open source software Flow-tools which let it has the ability to process the large NetFlow data under reasonable time and resource in the first part. In second part, we propose a series network usage and anomalies analysis methods, using TANet as example. These analyses are useful for capacity planning, peering, security, usage policy enacting.
Lu, Ko-Ping, and 盧可平. "Applying Cascade Neural Network to analyze Energy Saving of Chiller." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/kq6cuz.
Full text國立臺北科技大學
能源與冷凍空調工程系
106
Three methods are applied in this study: linear regression, backpropagation network and cascade forward backpropagation network. The power consumption models, before cleaning the condenser, are established by using these three methods. We collect data of the chillers after cleaning condenser, then simulate the power consumption of the chillers before cleaning by using these three models. After that, the simulate results and improvement of performance are analyzed and compared by using three methods under the same baseline. In this study, the model established by cascade forward backpropagation network is more accurate and have less error than the models established by linear regression and backpropagation network. In the result, we realized that the effects of energy saving after we cleaned the condenser in case 1 is about 5.1% and in case 2 is 3.77%. In case 3, the results show that replacing hydrocarbon refrigerant R-290 can get about 25% of energy saving. Generally, using neural network to do simulation will get high accuracy. Cascade forward backpropagation network can consider the original input so that can make the results more accurate.
LOAN, BUI THANH, and BUI THANH LOAN. "Using DEMATEL to Analyze Patent Network of Touch Screen Techniques." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/60414737093179031865.
Full text開南大學
國際企業學系
101
Patents are used by companies to protect their innovations; therefore the patent analysis is a very important work in a business. Normally, the main reason of error occurring in the patent analysis process is because of inaccurate information and misunderstanding information language. So, working in this field requires two essential factors so called an absoluteness and practical experience. Nowadays, it is necessary for a company to have a good patent analysis, the more accurate the patent analysis can be the more successful the company’s strategy will be. According to the present tendency, smartphone is one of the most competitive products, which is able to substitute for several digital devices such as camera, console. Therefore, smartphone patent infringement becomes very complicated. By dissecting smartphone industry, this research will prove the significance of the touch screen patent analysis toward one entrepreneur. It combines Decision Making Trial and Evaluation Laboratory (DEMATEL) and Clustering Method with Patent Guider which is a newly developed patent analysis tool to analyse patent citation. Commonly, the smartphone technology patents cannot be simultaneously grouped and ranked in an easy apprehensible manner. Therefore, in order to make this research become understandable to the reader, the Clustering Method will be introduced. The result of this research shows: 1. There is an intimate relationship between patent citation documents of each company. 2. Apple Company according to this research has a high quality of patent citation documents and almost other companies have been affected by Apple. 3. LG Company has a highest amount of patent documents, and this company was focus on research and developing capability in the past. But it does not mean LG has most important patent documents compare with other companies. 4. By analysing touch screen technology patent we found: Touch panel and electronic data processing got the highest investment in smartphone industry. In addition, this research could be used as a reference source for other advanced research. Key words: Smartphone patent, Touch screen, Patent Network Analysis, DEMATEL.
Hsiao, Shuo-I., and 蕭碩毅. "Using NetFlow Technique to Analyze the Behavior of Mobile Network Users." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/95296277064733714466.
Full textWu, Chia-Chen, and 吳佳真. "Analyze of Network Neutrality Issues From the Perspective of Free Speech." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/ypgkjg.
Full text國立臺北大學
法律學系一般生組
106
Network Neutrality is an important public policy issue in United Stated. Since Federal Communications Commission (FCC) announced Network Neutrality policy in 2005, three orders has been issued continuously by FCC and has been reviewed by Federal Circuit Court for three times. This show the regulation of Net Neutrality has triggered many arguments in legislation. For the past few years, our country, Taiwan, paid more attention in Network Neutrality than before. Thus, this paper will explore the development of the legalization of Network Neutrality in United Stated, and focus on the constitutionality of the network neutrality policy from the perspective of freedom of speech. Provide reference for Taiwan's future broadband supervision direction. Keywords: Network Neutrality, Freedom of Speech, First Amendment to the United States Constitution, Broadband Service Providers, Editorial Discretion, Restoring Internet Freedom Order, State Action Doctrine.
Li, Hsiang-Ju, and 李相儒. "Analyze firms’ market valuation and operational performance by social network variables." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/73syvv.
Full text國立中山大學
財務管理學系研究所
107
This paper investigates how network structural measures─network constraint, information centrality, and integration centrality─affect firms’ market valuation and operational performance. Using major customers and financial data from COMPUSTAT for the period 1998-2013, this study first concludes that network constraint and information centrality are negatively associated with firms’ market valuation. However, firms with high integration centrality can enhance their market valuation. In addition, firms with high network constraint can enhance their operational performance, in which the enhancement of operational performance can be attributed to the improvement of network constraint on assets turnover. Lastly, we find that all three network structure variables play positive impacts on firms’ assets turnover.
Ni, Hsu-Yang, and 倪旭揚. "Use two Geometrical-derived Parameters to Analyze two Port Active Network Stability." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/10142962243466786602.
Full text國立中興大學
電機工程學系
88
With the operation speed of circuit increasing, the range of frequency is wider and stable situations become multiplex. Thus my thesis is motivated to find a wider and more precise discuss to analyze two-port network stability at any frequency available. The thesis describes stability and gain of two-port active networks which are operated in small signal. According to its stable degree, show individual case which exists as possible. Chapter 2 uses two geometrical-derived parameterμandν,and geometry angle to divide into 16 cases. Also determine their stability factor D,E,K,B range. With μandν parameters, we are able to get more sense about two-port active network stability. And R.F. circuit design is much easier in hand. Chapter 3 includes more detail deduction of gain formulas and gain profiles. And power gain vs. reflection coefficient diagrams are illustrated for 16 cases introduced by Chapter 2. Through its analysis, stability and power gain of two-port active networks can be selected. It will be very useful to trade off stability and match properties.