Dissertations / Theses on the topic 'NODE DETECTION'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'NODE DETECTION.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Resul, Hulya. "Node replication detection in sensor networks." College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/3253.
Full textThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Chen, Wan Qing. "Predictors of Auxillary Lymph Node Involvement in Screen Detected Breast Cancer." Thesis, The University of Sydney, 2004. http://hdl.handle.net/2123/676.
Full textChen, Wan Qing. "Predictors of Auxillary Lymph Node Involvement in Screen Detected Breast Cancer." University of Sydney. Public Health, 2004. http://hdl.handle.net/2123/676.
Full textSchleip, Christoph. "Climate change detection in natural systems by Bayesian methods." kostenfrei, 2009. http://mediatum2.ub.tum.de/node?id=805580.
Full textKotari, Ravi Teja. "Node failure detection and data retrieval in wireless sensor networks." Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108190.
Full textThis project presents a method for detecting node failure in a wireless sensor network. The defective node is identified using round-trip delay measurements. Data transfer from the transmitter section to the receiver section is accomplished via the ZigBee protocol. As soon as a node has been identified as defective, the node is removed from the sensor network. Information about the failed node is provided to users with registered mobile device through the Global System for Mobile (GSM) module. The proposed method has been successfully implemented and tested experimentally on a small sensor network using the LPC2148 ARM7 microcontroller.
Pettersson, Christopher. "Automatic fault detection and localization in IPnetworks : Active probing from a single node perspective." Thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120414.
Full textAl-Riyami, Ahmed. "Towards an adaptive solution to data privacy protection in hierarchical wireless sensor networks." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/towards-an-adaptive-solution-to-data-privacy-protection-in-hierarchical-wireless-sensor-networks(a096db2a-251c-4e9e-a4ff-8bfe4c6f1bf4).html.
Full textBarrus, Joseph D. "Intrusion detection in real-time in a multi-node, multi-host environment." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341406.
Full text"September 1997." Thesis advisor(s): Neil C. Rowe, Ronald Broersma. Includes bibliography references (p. 77). Also available online.
Khanapure, Vishal. "Memory efficient distributed detection of node replication attacks in wireless sensor networks." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0025072.
Full textThekedar, Bhushan. "Investigations on the use of breath gas analysis with Proton Transfer Reaction Mass Spectrometry (PTR-MS) for a non-invasive method of early lung cancer detection." kostenfrei, 2009. https://mediatum2.ub.tum.de/node?id=821780.
Full textHoblos, Jalaa. "Selfish Node Misbehaving Statistical Detection with Active MAC Layer NAV Attack in Wireless Networks}." [Kent, Ohio] : Kent State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1164119272.
Full textKano, Masato. "Detection of Lymph Node Metasatasis of Oesophageal Cancer by RT-nested PCR for SCC antigen mRNA." Kyoto University, 2001. http://hdl.handle.net/2433/150176.
Full textJauhar, Ahmad Shujauddin. "A CMA-FRESH Whitening Filter for Blind Interference Rejection." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85389.
Full textMaster of Science
Wireless communication is complicated by the fact that multiple radios may be attempting to transmit at the same frequency, time and location concurrently. This scenario may be a due to malicious intent by certain radios (jamming), or mere confusion due to a lack of knowledge that another radio is transmitting in the same channel. The latter scenario is more common due to congested wireless spectrum, as the number of devices increases exponentially. In either case, interference results. We present a novel interference rejection method in this work, one that is blind to the properties of the interferer and adapts to cancel it. It follows the philosophy of property restoration as extolled by the constant modulus algorithm (CMA) and is a frequency shift (FRESH) filter, hence the name. The process of restoring the wireless spectrum to white noise is what makes it a whitening filter, and is also how it adapts to cancel interference. Such a filter has myriad possible uses, and we examine the use case of rejecting interference to detect or recover the signal-of-interest (SOI) that we are attempting to receive. We present performance results in both cases and compare with conventional time-invariant filters and state of the art FRESH filters.
Marits, Per. "On CD4+ T Lymphocytes in Solid Tumours." Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-8325.
Full textZia, Tanveer. "A Security Framework for Wireless Sensor Networks." University of Sydney, 2008. http://hdl.handle.net/2123/2258.
Full textSensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes etc. However, wireless sensor networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. Though there has been some development in the field of sensor network security, the solutions presented thus far address only some of security problems faced. This research presents a security framework WSNSF (Wireless Sensor Networks Security Framework) to provide a comprehensive security solution against the known attacks in sensor networks. The proposed framework consists of four interacting components: a secure triple-key (STKS) scheme, secure routing algorithms (SRAs), a secure localization technique (SLT) and a malicious node detection mechanism. Singly, each of these components can achieve certain level of security. However, when deployed as a framework, a high degree of security is achievable. WSNSF takes into consideration the communication and computation limitations of sensor networks. While there is always a trade off between security and performance, experimental results prove that the proposed framework can achieve high degree of security with negligible overheads.
Jafarian, Javad. "Modelling and analysis of wireless MAC protocols with applications to vehicular networks." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/modelling-and-analysis-of-wireless-mac-protocols-with-applications-to-vehicular-networks(3695e637-12eb-4fde-9c31-08b3b46e8f55).html.
Full textCochran, Travis. "Ultra Low Power Wake-up Receiver with Unique Node Addressing for Wireless Sensor Nodes." Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/76909.
Full textMaster of Science
Sabo, Jozef. "Aplikace metody učení bez učitele na hledání podobných grafů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445517.
Full textRu, Jifeng. "Adaptive estimation and detection techniques with applications." ScholarWorks@UNO, 2005. http://louisdl.louislibraries.org/u?/NOD,285.
Full textTitle from electronic submission form. "A dissertation ... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Engineering and Applied Science"--Dissertation t.p. Vita. Includes bibliographical references.
Rinne, Vidar. "A Zoomable 3D User Interface using Uniform Grids and Scene Graphs." Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-13360.
Full textYang, Ling. "Nodes failure detection in large scale network." Thesis, The University of Sydney, 2005. https://hdl.handle.net/2123/27923.
Full textNilsson, Kent. "Detection of wood decay using an electronic nose /." Uppsala : Swedish Univ. of Agricultural Sciences (Sveriges lantbruksuniv.), 1998. http://epsilon.slu.se/avh/1998/91-576-5602-9.gif.
Full textKumar, Kavitha. "Intrusion Detection in Mobile Adhoc Networks." Connect to full text in OhioLINK ETD Center, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1260232844.
Full textTypescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Bibliography: leaves 80-84.
Bhamidipati, Harini. "SINGLE TROJAN INJECTION MODEL GENERATION AND DETECTION." Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1253543191.
Full textSingamsetty, Ratna Sireesha. "Detection of Malicious Nodes in Mobile Ad hoc Networks." University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1321043030.
Full textMegahed, Mohamed Helmy Mostafa. "SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure." Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31154.
Full textWestling, Magnus. "Microbial Processes and Volatile Metabolites in Cheese Detection of Bacteria Using an Electronic Nose." Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-42412.
Full textBarr, Elaine Lewis. "Acoustic sampling considerations for bats in the post-white-nose syndrome landscape." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/104232.
Full textMaster of Science
Bat populations across North America are either facing new threats from white-nose syndrome (WNS) and wind energy development or have already experienced devastating declines. Accordingly, wildlife biologists need to know how to best monitor bats to document population and distribution changes, as well as where to look for remaining populations. Landscape-scale WNS impacts to summer bat populations are not well understood, and although acoustic technology is commonly used to monitor these populations, there is limited information about differences among acoustic detectors and the implications to managers thereof. My objectives were to model the relationship between WNS impact, influence of available bat hibernation caves, and environmental factors for summer nightly presence of three WNS-affected bats and to compare how multiple models of acoustic detectors perform in terms of detection probability and nightly recorded bat activity. I collected acoustic data from 10 study areas across Virginia, West Virginia, Ohio and Kentucky to describe changes in nightly presence of WNS-affected bat species during summer 2017. During the same period of time, I compared five types of acoustic detectors at Fort Knox, Kentucky. My results show potential viability of a WNS impact-year metric to predict summer bat presence, and highlight which environmental variables are relevant for large-scale acoustic monitoring. Additionally, my findings suggest that each of the detector types tested would suit most research and monitoring activities, but standardization of detector type within the scope of a project or study should be encouraged.
Liu, Hongxun. "Hardware assisted misbehaving nodes detection in mobile ad hoc networks." Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Summer2007/h_liu_072507.pdf.
Full textSahbai, Samine [Verfasser]. "Scintigraphic detection of sentinel nodes in endometrial cancer / Samine Sahbai." Tübingen : Universitätsbibliothek Tübingen, 2019. http://d-nb.info/1227963939/34.
Full textSharma, Nikita. "Detection of Similarly-structured Anomalous sets of nodes in Graphs." University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1627665644265336.
Full textMartinez, Rebecca L. "Chemosensory Evaluation of Prostate Cancer Cells." Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/46316.
Full textMaster of Science
Albert, Keith J. "Microbead array-based artificial nose : explosives detection and simple/complex odor discrimination /." Thesis, Connect to Dissertations & Theses @ Tufts University, 2001.
Find full textAdviser: David R. Walt. Submitted to the Dept. of Chemistry. Includes bibliographical references. Access restricted to members of the Tufts University community. Also available via the World Wide Web;
Kershri, G. "Novel food applications of electronic nose technology for detection of spoilage fungi." Thesis, Cranfield University, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.392743.
Full textZaidi, Syed. "Detecting rogue nodes in vehicular ad-hoc networks (DETER)." Thesis, City, University of London, 2016. http://openaccess.city.ac.uk/17029/.
Full textMcDonald, Louise Ann. "A Comparison Of The Detection Of Tumour Cells In Cervical Lymph Nodes Of Patients With Head And Neck Squamous Cell Carcinoma By Testing For Spliced Transcripts Of Cytokeratin 5 Immunohistochemistry Or Light Microscopy; And The Prognostic Effect Compared With That Of Other Factors." Thesis, The University of Sydney, 2002. http://hdl.handle.net/2123/4456.
Full textNeedham, Rachel. "Early detection and differentiation of microbial spoilage of bread using electronic nose technology." Thesis, Cranfield University, 2004. http://hdl.handle.net/1826/786.
Full textRamzi, Ammari. "DESIGN AND DEVELOPMENT OF A FALL DETECTION DEVICE WITH INFRARED RECEIVING CAPABILITIES." Wright State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=wright1314139225.
Full textMishra, Alekha Kumar. "Node replica detection in wireless sensor networks." Thesis, 2014. http://ethesis.nitrkl.ac.in/6562/1/509CS103_thesis.pdf.
Full textLi, Wei, and 李威. "A Novel Node Movement Detection Scheme in Wireless Sensor Networks." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58345508926363398455.
Full text國立中央大學
資訊工程研究所
98
The location information of sensors is significant in Wireless Sensor Network (WSN). However, after deploying and localizing the sensors, the location of sensors has to maintain constantly. Sensors may be moved from their original location by the depredation of the enemy or natural phenomena, and further, sensors return the inconsistent information with their incorrect location to sink or spread the incorrect location to the network resulted in arising problem with geographic protocol or applications. Consequently, in this paper, we proposed a new light-weight distributed scheme which is utilized the movement before and after with different topology to detect moved nodes. The simulation results show that our scheme can cost a bit of communication overhead and has high detection rate especially with large scale node movement.
FARUK, SYED MD OMAR. "Variants of the Critical Node/Edge Detection Problem on a tree." Doctoral thesis, 2021. http://hdl.handle.net/11577/3407812.
Full textchen, stanley, and 陳嘉融. "The Malicious Node Detection and Identification Mechanisms for Wireless Sensor Networks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/63265720978978639169.
Full text長庚大學
資訊管理研究所
94
Wireless Sensor Network (WSN) is a new developing type of wireless networks. Comparing with Wireless Local Area Network (WLAN), WSN has more restrictions on hardware specification of sensor node and deployment environment. The application of WSN has been growing in recent years. Many security protocols that designed for this particular network had been developed, simulated, verified and successfully implemented. However, the security challenge and difficulty that WSN has to faced will not be able to be solved completely in a few years. This study will begin with improving the whole of security of WSN to propose a suite of malicious node detection and identification mechanisms for WSN. These mechanisms include key pre-load mechanism, neighbor discovery mechanism, authentication key distribution mechanism and node authentication mechanism. The first three mechanisms may be regard as pre-processing to execute the last mechanism. After pre-processing, node in the network can easily detect whether malicious node in its communication range exists. If malicious node exists, it could be identified simultaneously.
Yang, Shih-An, and 楊世安. "A Log-Only Node Fault Detection Method in Wireless Sensor Network." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/40470148701113594855.
Full textHsieh, Kuan-Yu, and 謝冠宇. "Automatic Mediastinal Lymph Node Computer-aided Detection System in Chest CT." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/28385362800471174861.
Full text國立臺灣大學
資訊工程學研究所
101
Computed tomography (CT) plays an important role in the assessment of involvement of mediastinal lymph nodes for cancer staging. In the present clinical workflow, the radiologists need to examine all the slice of a CT scan manually for finding the enlarged lymph nodes which are possibly abnormal and this process is time-consuming and error-prone. Hence, in this study, a fully automatic system for detecting enlarged mediastinal lymph node in CT is proposed. First, two blob detectors are utilized for detecting the possible centers of lymph nodes following by a series of candidate reduction steps based on the intensity, size, and anatomical knowledge such as the extractions of mediastinum, airway tree and aortic arch. Second, the watershed transform is performed to segment the detected blobs for obtaining the lymph node candidate regions. Finally, two classifiers trained by the proposed feature sets including statistic, geometry, texture, and histogram in two different reduction phases are utilized for removing false positive detections. 25 contrast enhanced 3-D lung CT volumes are used to evaluate our proposed method. The proposed system achieved the sensitivities of 98.70%, 90.90%, 80.51%, 70.12%, and 61.00% with 22.04, 16.28, 10.56, 7.60, and 4.64 false positives per volume, respectively.
Eleutério, Ricardo Jorge Neves. "Microwave imaging of the axilla to aid breast cancer diagnosis." Master's thesis, 2014. http://hdl.handle.net/10362/13658.
Full textLuke, Geoffrey Patrick. "Functional and molecular photoacoustic imaging for the detection of lymph node metastasis." Thesis, 2013. http://hdl.handle.net/2152/28713.
Full texttext
Li, Zhijun. "Efficient Authentication, Node Clone Detection, and Secure Data Aggregation for Sensor Networks." Thesis, 2010. http://hdl.handle.net/10012/5739.
Full textJAINT, BHAVNESH. "STUDY ON EMBEDDED SENSOR NETWORKS." Thesis, 2020. http://dspace.dtu.ac.in:8080/jspui/handle/repository/18112.
Full textLin, Christy. "Unsupervised random walk node embeddings for network block structure representation." Thesis, 2021. https://hdl.handle.net/2144/43083.
Full text2023-09-24T00:00:00Z
Lee, Yi-Chang, and 李宜昌. "A Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/13353818875293089256.
Full text國立中正大學
資訊管理所暨醫療資訊管理所
97
The applications for wireless sensor networks (WSNs) were originally motivated by military applications like battlefield surveillance. Today, wireless sensor networks are widely used in civilian application areas, such as home security monitoring, healthcare applications, traffic control. However, a novel attack, named node replication attacks are proved to be a harmful attack. The node replication attack is an attack that the adversary captures a node and replicates the node in a large number of clones. After that, the adversary will insert the replicated nodes in the network. At last the adversary will control the network gradually. A few solutions have recently been proposed. Nevertheless, these solutions are still unable to solve following issues- First, the large memory overhead and high computational complexity are unsuitable for WSNs. The communication cost and probabilities of detection are important issues as well. Further, a detection could be used in mobile sensor networks is more satisfactory. The contributions of this paper include (1) an efficient memory overhead and communication cost of detection protocol is suggested, (2) mobile sensor nodes are concerned in our protocol. It is possible for the sensor nodes to be mobile, not only stationary. (3) The security analysis and simulation experiments are also proposed. The results show that the probability of deletion is high, our protocol is useful.