To see the other types of publications on this topic, follow the link: Overman.

Dissertations / Theses on the topic 'Overman'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Overman.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

GLIKSMAN, SELMO. "THE ETHICS OF THE OVERMAN." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2005. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7756@1.

Full text
Abstract:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
Esta tese tem como objetivo mostrar que a concepção de sobre-humanidade em Nietzsche não é uma figura de retórica, uma ficção, um ideal e comprovar tal visão através da sua própria obra. Através da análise rigorosa das tipologias morais do nobre e do escravo, pretende-se mostrar que possíveis atributos do sobre-humano tem um parentesco aproximado e uma herança importante com as descrições que Nietzsche empreende acerca do espírito aristocrático. Com tudo isso, quer-se mostrar que Nietzsche pensou o sobre-humano como alternativa radical a isto que chamamos de viver a vida, como resposta a nossos pequenos prazeres, estratégias de sobrevivência, interesses mesquinhos, enfim, mostrar que o sobre-humano vai nos obrigar a pensar sobre nossos conflitos pequeno- burgueses e seus falsos problemas, medos e covardias.
Through a rigourous analysis, this thesis wants to show that the conception of the overman, in Nietzsche, it is not a mere rhetorical or metaphorical figure, na ideal or a fiction. We intend to prove through the conception of the noble and slave morality that the overman has inherited possible attributes and characteristics of the spirit of the aristocrat. After all, we want to demonstrate that Nietzsche conceived the overman as a radical alternative to what we call to live and enjoy life, as an answer to our little pleasures, strategies of survival, petty interests and to show that the overman constrains us to reflect about our littlle bougeois conflicts with it´s false problems, fears and cowardicwe.
APA, Harvard, Vancouver, ISO, and other styles
2

Boulding, Jacqueline. "Engendering the Overman: On Woman and Nihilism in Nietzsche." Thesis, Université d'Ottawa / University of Ottawa, 2018. http://hdl.handle.net/10393/37196.

Full text
Abstract:
This thesis examines the role of woman within Nietzsche’s late-middle period, through The Gay Science and Thus Spoke Zarathustra, as well as interrogating the more social or political elements of nihilism, in order to conceptualize a novel reading of Nietzsche’s figure of the Overman. The motivation for this project is to create an understanding of the Overman that stands in stark contrast to those interpretations of Nietzsche advanced and deployed by those on the far-right of the political spectrum, who historically have used Nietzsche’s ideas to justify acts of cruelty and violence through an appeal to preservation of the self and of the same. I begin with the idea that woman is representative of truth for Nietzsche through her embodiment of difference, both internal to herself and within her relationship to man. This view of woman within the thesis is led by the work of Luce Irigaray in her work Marine Lover of Friedrich Nietzsche, and a reading of her work alongside Nietzsche’s Gay Science comprise the first chapter. In the second chapter, I chart different typologies of nihilism as advanced by Gilles Deleuze and Alenka Zupančič in order to probe their status as “universal”. I also delve into the eternal return as the process through which nihilism is overcome and the Overman emerges, as perhaps an eternal return of the different rather than the same. In the final chapter, the lessons from the beginning of the thesis are applied to a reading of Nietzsche’s Thus Spoke Zarathustra in order to read difference into that text toward the overcoming of nihilism and the birth of the Overman.
APA, Harvard, Vancouver, ISO, and other styles
3

Brito, Silvana Perrella. "O diálogo entre os quadrinhos do Superman e do Overman." Universidade Presbiteriana Mackenzie, 2007. http://tede.mackenzie.br/jspui/handle/tede/2221.

Full text
Abstract:
Made available in DSpace on 2016-03-15T19:46:34Z (GMT). No. of bitstreams: 1 Silvana Perrella Brito.pdf: 1744477 bytes, checksum: ce5554738df42e2a46d882fead2bcaf5 (MD5) Previous issue date: 2007-09-06
The present study intends to analyze the intertextuality established between the superhero Superman, created by Joe Shuster and Jerry Siegel and the super-hero Overman, created by the Brazilian cartoonist Laerte. Overman was chosen for the analysis of intertextuality with Superman because he is the first "over" superhero whereas Superman was the first "super"; and also because he makes an opposition between an idealized hero in a rich country, the United States, and another idealized one in a developing country, Brazil, presenting, this way, the construction of different realities. From concepts by Mikhail Bakhtin and Linda Hutcheon, the carnivalization and the parody present in the texts are discussed. A comparative analyzis is done to establish the equalities and differences between the texts and the analise purpose is to present the criticism proposed by carnavalization. The Brazilian cartoonist dialogues with Superman, when he creates a superhero whose physical appearance reminds the American hero, this way the original text is mentioned and the intertextuality is established. The aim; however, is not to confirm the mentioned text, but to alter it with the intention of provoking the laughter. Once Overman was built with an antagonistic world view if compared to Superman, he dessacralizes the hero model that had been proposed. As it is possible to perceive, Overman is a carnivalized image of Superman; having been created in a different situation and in a different socioeconomic context, he establishes a parody of Superman wich, besides presenting satirical components, also becomes a homage.
Este trabalho pretende analisar a intertextualidade estabelecida entre os super-heróis Superman, criado por Joe Shuster e Jerry Siegel, e Overman, criado pelo cartunista brasileiro Laerte Coutinho. Essas duas personagens foram escolhidas para serem objetos da análise desta pesquisa por causa, principalmente, de dois motivos: 1) porque o Superman foi o primeiro herói ao qual foi dado o título super , enquanto o Overman foi o primeiro herói ao qual foi dado o título over ; 2) porque há entre eles uma contraposição entre um herói idealizado de um país rico, os Estados Unidos, e outro carnavalizado de um país em desenvolvimento, o Brasil, apresentando, dessa forma, a construção de realidades distintas. A partir de conceitos de Mikhail Bakhtin e Linda Hutcheon, discute-se a carnavalização e a paródia presentes nos textos. Realiza-se uma análise comparativa com base na aparência dos heróis e em seus comportamentos, com a finalidade de estabelecer semelhanças e diferenças entre os mesmos e apresentar a crítica proposta pela carnavalização, pois o cartunista brasileiro, ao criar um super-herói cuja aparência física lembra muito a do Superman, dialoga com ele, citando o texto original e estabelecendo assim a intertextualidade. Como será visto, o objetivo de Laerte, entretanto, não é o de confirmar o texto citado, mas de alterá-lo com a intenção de provocar o riso: ao construir o Overman com uma visão de mundo antagônica à do Superman, Laerte dessacraliza o modelo de herói que havia sido proposto. Dessa forma, Overman constitui uma imagem carnavalizada do Superman; tendo sido criado em situação e contexto sócio-econômico diferente, estabelece com o Superman uma paródia que, embora apresente componentes satíricos, se torna uma homenagem.
APA, Harvard, Vancouver, ISO, and other styles
4

Pires, de Oliveira Dias Gustavo. "A Philosophically Appealing Nietzschean Theory of Value." Scholarship @ Claremont, 2016. http://scholarship.claremont.edu/cmc_theses/1252.

Full text
Abstract:
This thesis is an attempt to bring forth a novel and philosophically appealing reading of Nietzsche, especially as it pertains to his theory of value. I define philosophically appealing as the view with the least amount of inconsistencies that still reaches a simple and logical conclusion. I explore questions regarding Nietzsche’s nihilism, his normative and metaphysical claims, as well as his view on human nature. I aim to satisfy sophisticated readers by investigating complex philosophical issues related to my interpretation of Nietzsche. I also aim to satisfy less sophisticated readers by explaining how my view is applicable, and beneficial, to one’s life. Given that there’s no widespread agreement as to what reading of Nietzsche is correct, the goal of my thesis is to contribute meaningfully to this ongoing debate.
APA, Harvard, Vancouver, ISO, and other styles
5

Valsson, Jökull. "Godot is Dead : Nietzsche and Beckett on Salvation and Suffering in a Godless Universe." Thesis, Stockholms universitet, Engelska institutionen, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-72254.

Full text
Abstract:
There are many parallels and points of similarity between the themes of the play Waiting for Godot by Samuel Beckett and the themes explored by Friedrich Nietzsche. This essay examines the play in light of some of Nietzsche’s key concepts, such as the Will to Power, the Übermensch or Overman, the Eternal Recurrence, as well as the aesthetic conception of existence. The essay argues that while Waiting for Godot shares many of the premises and conclusions of Nietzsche’s philosophy, the play can also be interpreted as a critique of the same. The play presents a post-religious world marked by pessimism and resignation rather than affirmation and Nietzschean amor fati. The characters are as far removed from the heroic Overman ideal as can be imagined, unable to harness the Will to Power, which is absent or distorted or even unknowable. Communication is fraught with difficulty and uncertainty. The dynamic of the Eternal Recurrence is present but rather than being affirmed it is a source of crushing boredom, tediousness and existential angst. The characters are unable to embrace the Eternal Recurrence and are in a continual state of mental flight from its implications. They suffer from a vague recollection of the past while projecting their hopes into the future in order to diminish the unbearable suffering of the existing present, or state of perpetual becoming. Beckett can thus be said to be offering a satirical critique of the concept of salvation, both in its traditional religious sense as well as in the sense implied by Nietzsche’s concept of the Eternal Recurrence. However, Beckett does offer a sense of hope by suggesting, paradoxically, that the abandonment of hope of salvation may lead to a sort of salvation of resignation.
APA, Harvard, Vancouver, ISO, and other styles
6

Walton, Susan Elaine. "Jew, gentile and Overman in ?renburg's Khulio Khurenito and other works : the role of jewry in ?renburg's internationalist world view /." The Ohio State University, 1998. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487951214937821.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Choi, Soon-Young. "Friedrich Nietzsches Moralkritik." Doctoral thesis, Humboldt-Universität zu Berlin, Philosophische Fakultät I, 2002. http://dx.doi.org/10.18452/14694.

Full text
Abstract:
Meine Doktorarbeit behandelt hauptsächlich den todfeindlichen Kampf zwischen Nietzsches Philosophie und Jesus Lehre, im Nietzsches Worte, Judda gegen Rom, Rom gegen Judda. Ich habe versucht, die Quelle dieses Kampfes begrifflich zu erklären. Dafür habe ich den Begriff 'Inkompatibilität' verwendet und ich habe auch versucht, den scheinbaren Widerspruch der Begriffe von Nietzsche zu erklären, z. B., die Kritik an Willensfreiheit und die Freiheit des freien Geistes, der scheinbare Widerspruch zwischen Wille zur Macht und ewiger Wiederkehr des Gleichen und die begriffliche Beziehung zwischen Philosophie und Wissenschaft. Man kann nur einen Standpunkt von Judda gegen Rom haben, weil dieser Kampf keinen Kompromiß erlaubt.
My PhD thesis treat mainly deadly battle between Nietzschean philosophy and christian doctrine, in Nietzschean concept, Jew against Rome, Rome against Jew. The source of this battle has been conceptually explained. The incompatibility describes the source of that deadly battle. The seeming inconsistency of Nietzschean concepts has been explained on entire context of Nietzschean philosophy, for example, the critique of the freedom of will and the freedom of free spirit, the seeming contradiction between will to power and eternal recurrence and conceptual relationship between philosophy and science. Just one standpoint can be chosen between Jew against Rome, because this battle doesn't allow any compromise between them.
APA, Harvard, Vancouver, ISO, and other styles
8

Akca, Uljana. "Att övervinna det mänskliga : En läsning av återkomsttanken i Nietzsches Så talade Zarathustra i ljuset av Heideggers kritik." Thesis, Södertörns högskola, Institutionen för kultur och kommunikation, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-6272.

Full text
Abstract:
The aim of this essay is to discuss the meaning of the human and its possible overcoming in Friedrich Nietzsche’s doctrine of the eternal recurrence of the same, with Martin Heidegger’s readings of Nietzsche as point of departure. According to Heidegger, Nietzsche’s doctrine of the eternal recurrence of the same represents the end of occidental metaphysical thinking. The thought concludes a thinking of being as the presence of beings, where the original question of being was never developed out of its own ground. But at the heart of this interpretation, often considered “violent”, lies the question of whether man is able to think being out of his finitude. This is the question I will unfold, through a reading of Nietzsche’s thought of the eternal recurrence of the same, as it is presented in his Thus spoke Zarathustra, as an attempt to think beings in their being beyond a “humanization” of them, expressed in transcendental aims, purposes and categories. This attempt, I argue, is essentially bound up with a comportment toward the human self as the finite and the corporal. In this sense the human being in its finitude and corporeality is thefocus and the basis for the search for “the overman”. But this focus on man, as he who can overcome himself, is at the same time a focus that canbe said to lead man away from himself, in not asking the deeper question about what it means to be this human being. I will furthermore consider the tragic as the theme where this question of the overcoming of the human comes to the fore; the dionysic-tragic reveals both a view of man as the being that is mastered by the abyss that underlies this world, and therefore mastered by his finitude - and as the being who can master this same abyss, in thinking it as one with the human self. The purpose is not to take a position for or against Heidegger’s reading, but to develop a discussion between Heidegger and Nietzsche about the human self as always being both the closed and the open, and about the ways in which human thinking can approach this.
APA, Harvard, Vancouver, ISO, and other styles
9

Vrba, Martin. "DECISIONS." Master's thesis, Vysoké učení technické v Brně. Fakulta výtvarných umění, 2017. http://www.nusl.cz/ntk/nusl-295732.

Full text
Abstract:
Presented work tries to reflect the structure of human world, which is able to create an overman as an artificial intelligence through its self-destructive tendency. It investigates the possibilities of our imagination and if we are able to think about artificial intelligence as a sui generis continuation of human species. Hand in hand it tries to create a tension between particular ethico-political decisions and subsequent binding structure, which they implies.
APA, Harvard, Vancouver, ISO, and other styles
10

Chan, Patrick Foong, and patrick chan@rmit edu au. "Outside-Singapore: A Practice of Writing: Making Subjects and Spaces yet to come." RMIT University. Architecture and Design, 2007. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20080205.164909.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lee, Yonghwa. "Diving Deep for “The Ungraspable Phantom of Life”: Melville’s Philosophical and Aesthetic Inquiries into Human Possibilities in Moby-Dick." The Ohio State University, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=osu1243629090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

McNeely, Matthew D. "Overlap." Thesis, Virginia Tech, 2001. http://hdl.handle.net/10919/32221.

Full text
Abstract:
This is a study of how literal and phenomenal transparency inform the development and understanding of a design ordered by two overlapping reference systems. A mixed-use building serves as the project to resolve the complexities of overlap that result from rotation, and to explore ideas of transparency.
Master of Architecture
APA, Harvard, Vancouver, ISO, and other styles
13

Kronstrand, Alexander, and Andreas Holmqvist. "Overlay Network." Thesis, Linköpings universitet, Informationskodning, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-119498.

Full text
Abstract:
Nowadays, optical fiber is widely used in several areas, especially in communication networking. The main reason is that optical fiber has low attenuation and high bandwidth. However, the switching functionality is performed in the electrical domain (inside the router), thus we have transmission delays in the network lanes. In this study we explore the possibility of developing a hardware “plug-in” that can be connected in parallel with routers of the network enabling the router with “plug-in” to let it bypass time-critical traffic. We researched different switching techniques for optical fibers and realized it would be an expensive endeavor to create one for a large number of wavelength/connections, thus, we scaled it down to prove the concept “plug-in” where we use fiber optical switches and Mux/Demuxes for our design. With our chosen optical components, we were able to bypass the routers (layer 3 switches) in our test environment and switch between different users to chose which one has the direct link. The conclusion can be drawn that it is possible to create such a “plug-in” which could be used by ISPs, to provide a faster lane to consumers with less modification of existing networks.
APA, Harvard, Vancouver, ISO, and other styles
14

Yiu, Wai-Pun. "Secure overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20YIU.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.
Includes bibliographical references (leaves 71-77). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
15

Fraiwan, Mohammad Amin. "Overlay networks monitoring." [Ames, Iowa : Iowa State University], 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Andersen, David G. (David Godbe) 1975. "Resilient overlay networks." Thesis, Massachusetts Institute of Technology, 2001. http://hdl.handle.net/1721.1/86657.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Qazi, Sameer Hashmat Electrical Engineering &amp Telecommunications Faculty of Engineering UNSW. "Scalable resilient overlay networks." Awarded By:University of New South Wales. Electrical Engineering & Telecommunications, 2009. http://handle.unsw.edu.au/1959.4/44536.

Full text
Abstract:
The Internet has scaled massively over the past 15 years to extend to billions of users. These users increasingly require extensive applications and capabilities from the Internet, such as Quality of Service (QoS) optimized paths between end hosts. When default Internet paths may not meet their requirements adequately, there is a need to facilitate the discovery of such QoS optimized paths. Fortunately, even though the route offered by the Internet may not work (to the required level of performance), often there exist alternate routes that do work. When the direct Internet path between two Internet hosts for instance is sub-optimal (according to specific user defined criterion), there is a possibility that the direct paths of both to a third host may not be suffering from the same problem owing to path disjointness. Overlay Networks facilitate the discovery of such composite alternate paths through third party hosts. To discover such alternate paths, overlay hosts regularly monitor both Internet path quality and choose better alternate paths via other hosts. Such measurements are costly and pose scalability problems for large overlay networks. This thesis asserts and shows that these overheads could be lowered substantially if the network layer path information between overlay hosts could be obtained, which facilitates selection of disjoint paths. This thesis further demonstrates that obtaining such network layer path information is very challenging. As opposed to the path monitoring which only requires cooperation of overlay hosts, disjoint path selection depends on the accuracy of information about the underlay, which is out of the domain of control of the overlay and so may contain inaccuracies. This thesis investigates how such information could be gleaned at different granularities for optimal tradeoffs between spatial and/or temporal methods for selection of alternate paths. The main contributions of this thesis are: (i) investigation of scalable techniques to facilitate alternate path computation using network layer path information; (ii) a review of the realistic performance gains achievable using such alternate paths; and (iii) investigation of techniques for revealing the presence of incorrect network layer path information, proposal of new techniques for its removal.
APA, Harvard, Vancouver, ISO, and other styles
18

Srivastava, Manoj. "SECURITY OVERLAY FOR RMI." NCSU, 2001. http://www.lib.ncsu.edu/theses/available/etd-20011106-220340.

Full text
Abstract:

Distributed object computing refers to allowing objects to be distributed across a network. These objects may be distributed across a number of different computers and across networks.This thesis presents a popular distributed object architecture, Remote Method Invocation (RMI). As RMI works on a Java framework, it provides the same features Java provides. Its portability, ability to transport objects as a whole, and power to connect to existing as well as legacy systems makes a strong choice amongst other competing technologies. Needless to say, the transport of objects across systems brings along with it the necessity for a strong security framework.The Secure Sockets Layer (SSL) is a widely popular protocol that currently provides the secure framework RMI needs. Most e-commerce applications these days run over SSL. However, SSL may not the right choice for every application requiring a security backbone. The motivation behind this thesis lies in this thought. The Secure Remote Password Protocol (SRP) provides a secure, simple and fast approach for providing client authentication. An attempt has been made to build a new infrastructure using SRP. The infrastructure that has been developed can provide authentication and privacy, as well as maintain message integrity. One such application domain is mobile computing. In this era where data is required to be accessible from anywhere and everywhere, mobile computing is a growing area. Again, due to the use of mobile agents in this area, security plays an important role. The security mechanism provided needs to be fast and simple and at the same time provide strong security. The new security overlay developed has been proposed as a possible solution.

APA, Harvard, Vancouver, ISO, and other styles
19

Berns, Andrew David. "Self-stabilizing overlay networks." Diss., University of Iowa, 2012. https://ir.uiowa.edu/etd/3431.

Full text
Abstract:
Today's distributed systems exist on a scale that was unimaginable only a few decades ago. Distributed systems now can consist of thousands or even millions of computers spread across the entire world. These large systems are often organized into overlay networks - networks composed of virtual links, with each virtual link realized by one or more physical links. Self-stabilizing overlay networks promise that, starting from any weakly-connected configuration, the correct network topology is always built. This area of research is young, and prior examples of self-stabilizing overlay networks have either been for simple topologies, or involved complex algorithms that were difficult to verify and extend. We address these limitations in this thesis. First, we present the Transitive Closure Framework, a generic framework to transform any locally-checkable overlay network into a self-stabilizing network. This simple framework has a running time which is at most a logarithmic number of rounds more than optimal, and in fact is optimal for a particular class of overlay networks. We also prove the only known non-trivial lower bound on the convergence time of any self-stabilizing overlay network. To allow fast and efficient repairs for local faults, we extend the Transitive Closure Framework to the Local Repair Framework. We demonstrate this framework by implementing an efficient algorithm for node joins in the Skip+ graph. Next, we present the Avatar network, which is a generic locally checkable overlay network capable of simulating many other overlay networks. We design a self-stabilizing algorithm for a binary search tree embedded onto the Avatar network, and prove this algorithm requires only a polylogarithmic number of rounds to converge and limits degree increases to within a polylogarithmic factor of optimal. This algorithm is the first to achieve such efficiency, and its modular design makes it easy to extend. Finally, we introduce a technique called network scaffolding, which builds other overlay network topologies using the Avatar network.
APA, Harvard, Vancouver, ISO, and other styles
20

Hoefler, Torsten. "Communication/Computation Overlap in MPI." Universitätsbibliothek Chemnitz, 2006. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200600021.

Full text
Abstract:
This talk discusses optimized collective algorithms and the benefits of leveraging independent hardware entities in a pipelined manner. The resulting approach uses overlap of computation and communication to reach this task. Different examples are given.
APA, Harvard, Vancouver, ISO, and other styles
21

Huurnink, Jon Egenberg. "Kvantifisering av overvann : Case Brøset." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for vann- og miljøteknikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-18427.

Full text
Abstract:
Oppgaven forsøker å vise den systemresponsen som er særegen for konvensjonelle tiltak og blå-grønne tiltak. Dette er aktuelt på Brøset bydel som en del av ”Fremtiden byer” prosjektet og skal bygges om til boligområde. MIKE URBAN og MIKE 21 er benyttet til å lage en konseptuell modell.Ved å sammenligne sommer- og vinterforhold, i tillegg til ulike gjentaksintervaller (1, 20 og 100år), vil kurver for videreført vannmengde gi et inntrykk av tiltakenes effekt. Dette gir beslutningsstøtte for Kommunalteknikk når de vurderer endringer i kommunens VA-Norm. Resultatene viser mer enn halvering av maksimal vannføring for alle forhold ved å velge fordrøyning eller blå-grønne tiltak fremfor konvensjonelle tiltak. Fordrøyning krever store sentraliserte volumer, mens blå-grønne tiltak på hver eiendom krever mange små og desentraliserte tiltak.
APA, Harvard, Vancouver, ISO, and other styles
22

Wu, Xiao. "SIP on an Overlay Network." Thesis, KTH, Kommunikationssystem, CoS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-91491.

Full text
Abstract:
With the development of mobile (specifically: wide area cellular telephony) technology, users’ requirements have changed from the basic voice service based on circuit switch technology to a desire for high speed packet based data transmission services. Voice over IP (VoIP), a packet based service, is gaining increasing attention due to its high performance and low cost. However, VoIP does not work well in every situation. Today Network address translation (NAT) traversal has become the main obstruction for future VoIP deployment. In this thesis we analyze and compare the existing NAT traversal solutions. Following this, we introduce a VoIP over IPSec (VOIPSec) solution (i.e., a VoIP over IPSec virtual private network (VPN) scheme) and an extended VOIPSec solution mechanism. These two solutions were tested and compared to measure their performance in comparison to a version of the same Session Initiation Protocol (SIP) user agent running without IPSec. In the proposed VOIPSec solution, the IPSec VPN tunnel connects each of the SIP clients to a SIP server, thus making all of the potential SIP participants reachable, i.e., solving the NAT traversal problem. All SIP signaling and media traffic for VoIP calls are transmitted through this prior established tunnel. This VPN tunnel provides the desired universal means for VoIP traffic to traverse NAT equipment. Additionally, the IPSec VPN also guarantees the security of VoIP calls at the IP level. In order to improve the security level of media streams for the VOIPSec solution, we deployed and evaluated an extended VOIPSec solution which provides end-to-end protection of the real time media traffic. In this extended VOIPSec solution, we used SRTP instead of RTP to carry the media content. This extended method was shown to provide all of the advantages of VOIPSec and SRTP without any additional delay for the media traffic (as compared to the VoIPSec solution). Note that the solution proposed in this thesis may be of limited practical importance in the future as more NATs become VoIP capable; but the solution is currently essential for facilitating the increasing deployment of VoIP systems in practice. For VoIP calls that do not need end-to-end security, we recommend the use of the VOIPSec solution as a means to solve the NAT traversal problem and to protect traffic at the IP level. When application to application security is not needed we prefer the VOIPSec solution to the extended VOIPSec solution for the following reasons: (1) our test results show that the time for call setup for the extended VOIPSec solution is twice time the time needed for the VOIPSec solution and the extended VOIPSec solution requires the use of user agents that support SRTP. While, the VOIPSec solution does not require a special user agent and all VoIP clients in the market are compatible with this solution. However, when more SIP user agents add support for SRTP, the extended VOIPSec solution will be applicable for users of these SIP user agents.
Med utvecklingen av mobil (specifikt: wide area cellulär telefoni)-teknik, har användarnas krav ändras från den grundläggande röst-tjänst som bygger på krets kopplad teknik till att vilja ha hög-hastighets paket baserade dataöverföringstjänster. Voice over IP (VoIP) som vinner allt mer uppmärksamhet på grund av sin höga prestanda och låga kostnader är en paket baserad telefon tjänst. Däremot fungerar VoIP inte bra i alla situationer. Network address translation (NAT) har blivit det största hinder för en framtida användning av VoIP. I denna avhandling analyserar vi och jämför nuvarande NAT lösningar. Efter detta inför vi en VoIP över IPSec (VOIPSec) lösning (dvs. ett VoIP över IPSec Virtual Private Network (VPN) system) och en utvidgad VOIPSec lösnings mekanism. Dessa två lösningar testas och jämfördes för att mäta prestationer i förhållande till en version av samma SIP User Agent som körs utan IPSec. I den föreslagna lösningen VOIPSec ansluter IPSec en VPN-tunnel till varje SIP-klient och SIP-server, vilket gör att alla de potentiella SIP deltagarna kan nås, dvs eventuella NAT problem löses. All SIP-signalering och media trafik för VoIP-samtal överförs via denna etablerade tunnel. Denna VPN-tunnel ger allmänna medel för VoIP-trafik att passera NAT utrustningen. Dessutom ger IPSec VPN också garanterad säkerheten för VoIP-samtal på IP-nivå. För att förbättra skyddsnivån för mediaströmmar med VOIPSec, skapade vi och utvärderade en utsträckt VOIPSec lösning som innehåller end-to-end skydd av realtids media trafik. I denna utökade VOIPSec lösning, använde vi SRTP stället för RTP för att bära medieinnehåll. Denna utvidgade metod visade sig ge alla fördelar VOIPSec och SRTP kunde erbjuda utan ytterligare dröjsmål för media trafiken (jämfört med VoIPSec lösningen). Observera att den lösning som föreslås i denna avhandling kan vara av begränsad praktisk betydelse i framtiden då fler NAT lösningar blir VoIP kapabla, men lösningen är idag nödvändigt för att underlätta den ökande användningen av VoIP-system i praktiken. För VoIP-samtal som inte behöver end to end säkerhet rekommenderar vi användning av VOIPSec lösningen som ett sätt att lösa NAT problem och för att skydda trafiken på IP-nivå. När end to end säkerhet inte behövs föredrar vi VOIPSec lösningen av följande skäl: (1) våra testresultat visar att tiden för samtal inställning för det förlängda VOIPSec lösningen är dubbelt den tid som krävs för VOIPSec lösningen och den utökade VOIPSec lösningen kräver användning av användarprogram som stödjer SRTP. Medan VOIPSec lösningen inte kräver en speciell användar agent och alla VoIP-klienter på marknaden är kompatibla med denna lösning. Men när fler SIP användaragenter får stöd för SRTP, kommer den förlängda VOIPSec lösning tillämpas för användare av dessa SIP användarprogram.
APA, Harvard, Vancouver, ISO, and other styles
23

Wagh, Prasad J. "DiffServ overlay multicast for videoconferencing." Diss., Columbia, Mo. : University of Missouri-Columbia, 2005. http://hdl.handle.net/10355/4301.

Full text
Abstract:
Thesis (M.S.)--University of Missouri-Columbia, 2005.
The entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (January 10 , 2007) Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
24

Junkert, Levi Daniel. "The grid overlay system model." Thesis, Montana State University, 2009. http://etd.lib.montana.edu/etd/2009/junkert/JunkertL0509.pdf.

Full text
Abstract:
The grid overlay system model is a new technique for forming a grid computing model for research computing. In this method we construct a grid that is dynamically allocated from a set of resources in a unique and progressive manner. This new system model allows for construction of virtual environments for execution of applications on many diverse shared resources. The system can dynamically scale to create a range of resources from a single machine to a virtual cluster of machines. This model provides a virtual container that can run legacy and customized software in an emulated environment or directly on the host's hardware through virtualization. Using this model on current consumer hardware allows for a unique blend of software containment with dynamic resource allocation. Our model, in combination with commercial off the shelf (COTS) hardware and software, is able to create a large grid system with multiple combinations of hardware and software environments. In our model we propose a unique set of abstraction layers for systems. The combination of our model with current consumer hardware and software provides a unique design principle for addressing grid implementation, hardware reusability, operating system deployment and implementation, virtualization in the grid, and user control techniques. This provides a robust and simple framework that allows for the construction of computational research solutions in which performance can be traded for flexibility, and vice versa. Our model can be applied to computational research grids, service oriented grids, and even scales to collections of mobile or embedded system grids.
APA, Harvard, Vancouver, ISO, and other styles
25

Trump, Rebecca K. "Self-Brand Overlap and Dissociation." Diss., The University of Arizona, 2010. http://hdl.handle.net/10150/194983.

Full text
Abstract:
Consumer researchers have long accepted that consumption can serve as a tool in the creation, maintenance, and expression of consumers' identities. And brands, in particular, may be important to the consumer self, even potentially serving as relationship partners. This dissertation explores how brands that are important to consumers may impact their identities at a cognitive level. Specifically, I apply Aron et al.'s (1991) "including others in the self" paradigm from interpersonal relationship research, which finds that people's cognitive representations of close others overlap the psychological self, to studying the impact of brands on the self. I provide evidence that consumers' mental representations of loved brands, which may be perceived as relationship partners, overlap the psychological self in memory. I refer to this as self-brand overlap. I also consider the relevance of disliked brands to the consumer self, providing evidence that consumers' mental representations of disliked brands are dissociated from the psychological self in memory. I refer to this as self-brand dissociation.In two studies I demonstrate and replicate the self-brand overlap and dissociation effects. And, study 2 further explores these constructs, providing evidence that self-brand overlap and dissociation are the cognitive representations of positive and negative, respectively, consumer-brand relationships. This dissertation also includes three further studies that aim to identify boundary conditions of these effects. However, no conclusive support is found for a role of any of the explored moderators. Specifically, studies 3 through 5 find the self-brand dissociation effect in every condition, in every study, suggesting that self-brand dissociation is impervious to the boundary conditions examined. Evidence for the self-brand overlap effect, which was demonstrated in both studies 1 and 2, however, is mixed in each of these 3 later studies. Potential reasons for this lack of concrete replication are offered.
APA, Harvard, Vancouver, ISO, and other styles
26

Watts, Ivor Llewellyn. "Overlap and fractional graph colouring." Thesis, Open University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.505353.

Full text
Abstract:
Although a considerable body of material exists concerning the colouring of graphs, there is much less on overlap colourings. In this thesis, we investigate the colouring of certain families of graphs.
APA, Harvard, Vancouver, ISO, and other styles
27

Parkar, M. A. "Overland flow in urban catchments." Thesis, Nottingham Trent University, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.376095.

Full text
Abstract:
A three parameter pseudo-linear reservoir model was developed and tested using data collected from urban catchments in Nottingham. Some 550 individual rainfall-runoff events, from ten different catchments, were recorded (from May 1983 to June 1985) and available for analysis. parameters, depression storage and runoff an effective hyetograph to be obtained from the The third parameter, KATCH, was a catchment obtained by an optimisation technique applied to Two- of the model coefficient, enabled measured hyetograph. constant which was development data sets. The rainfall loss parameters were determined using both the traditional method of linear regression analysis of rainfall-runoff depths, and by model optimisation of development data sets. Two versions of the pseudo-linear reservoir model were tested and results from both versions were compared with the results from the non-linear reservoir model, which is the overland flow routing model currently used in the Wallingford Procedure for the design and analysis of urban storm drainage in the United Kingdom. When the overall goodness-of-fit between simulated and observed hydrographs was assessed (using the Biassed Integral Square Error, BISE), similar model performance results were obtained for both versions of the pseudo-linear reservoir model and the non-linear reservoir model applied to paved surfaces. The pseudo-linear reservoir model accounted for the routing of flows, both on the surface and through the secondary drainage system, via the catchment constant, KATCH. For the two sub-catchments with secondary drains, the non-linear reservoir model over-estimated peak flows by some 401, since the model ignores routing through the drains. The pseudo-linear reservoir model gave consistently better results when compared with the non-linear reservoir model for storms monitored from an uncalibrated sub-catchment of mixed roof and paved surfaces. (
APA, Harvard, Vancouver, ISO, and other styles
28

Tam, W. S. "Pavement evaluation and overlay design." Thesis, University of Nottingham, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.378746.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Miao, Jun. "Load balance in overlay multicast /." View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20MIAO.

Full text
Abstract:
Thesis (M. Phil.)--Hong Kong University of Science and Technology, 2004.
Includes bibliographical references (leaves 59-62). Also available in electronic version. Access restricted to campus users.
APA, Harvard, Vancouver, ISO, and other styles
30

Bhat, Goutam. "Accurate Tracking by Overlap Maximization." Thesis, Linköpings universitet, Datorseende, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-154653.

Full text
Abstract:
Visual object tracking is one of the fundamental problems in computer vision, with a wide number of practical applications in e.g.\ robotics, surveillance etc. Given a video sequence and the target bounding box in the first frame, a tracker is required to find the target in all subsequent frames. It is a challenging problem due to the limited training data available. An object tracker is generally evaluated using two criterias, namely robustness and accuracy. Robustness refers to the ability of a tracker to track for long durations, without losing the target. Accuracy, on the other hand, denotes how accurately a tracker can estimate the target bounding box. Recent years have seen significant improvement in tracking robustness. However, the problem of accurate tracking has seen less attention. Most current state-of-the-art trackers resort to a naive multi-scale search strategy which has fundamental limitations. Thus, in this thesis, we aim to develop a general target estimation component which can be used to determine accurate bounding box for tracking. We will investigate how bounding box estimators used in object detection can be modified to be used for object tracking. The key difference between detection and tracking is that in object detection, the classes to which the objects belong are known. However, in tracking, no prior information is available about the tracked object, other than a single image provided in the first frame. We will thus investigate different architectures to utilize the first frame information to provide target specific bounding box predictions. We will also investigate how the bounding box predictors can be integrated into a state-of-the-art tracking method to obtain robust as well as accurate tracking.
APA, Harvard, Vancouver, ISO, and other styles
31

Rashid, Lezan. "Overlay welding of FeCrAl alloys." Thesis, Karlstads universitet, Fakulteten för hälsa, natur- och teknikvetenskap (from 2013), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-44345.

Full text
Abstract:
In this master thesis different overlay welding methods suitable for boiler application has been investigated. The purpose of this project is to define advantages and disadvantages for each overlay welding methods and suggest some evaluation criteria on some commercial and experimental alloys aimed for overlay welding material. Many components in a boiler are made of low alloy steel and the atmosphere in the furnace region can be very complex; therefore many different types of corrosion can occur. Weld overlay is a process where one or multiple layers of corrosion resistant material are applied to a base material. The two overlay welding methods investigated in this study were Tungsten Inert Gas welding and Metal Inert/Active Gas welding. Tests were performed with FeCrAl alloys (Kanthal A, Kanthal D and some experimental alloys). FeCrAl alloys in general are ferritic iron-based steels with a typical concentration of 20-23 wt. % chromium and ~5 wt.% aluminum. Different overlay welding evaluation was made; visual examination, dye penetrant inspection, macro/micro examination, side bend test and short term corrosion test (~50hours). Conclusion of this thesis is that MIG welding is a more productive method than TIG, but more defects such cracks and lack of fusion can be produced for MIG welding. These defects can be “fixed” if welding parameters is optimized. If repairing a certain place TIG welding is a better option. A conclusion about number of layers; one layer with MIG welding is almost as thick as three layers with TIG welding with welding wire Ø 1mm. Three welding evaluation that is really important is visual examination, dye penetrant testing and corrosion test in order to choose which overlay welding method is suitable in boiler application.
I detta examensarbete har olika påsvetsningsmetoder som är lämpliga för en pannapplikation undersökts. Syftet med denna studie var att undersöka både för- och nackdelar med påsvetsningsmetoderna och föreslå några utvärderingskriterier på vissa kommersiella och experimentella legeringar som lämpar sig för påsvetsningsmaterial. Många komponenter i en panna är tillverkade av låg legerat stål och miljön där förbränningen sker kan vara väldigt komplex, därför kan det ske korrosion. Påsvetsning är en process där ett eller flera skikt av ett mer korrosionsbeständigt material appliceras på ett basmaterial. De två olika svetsmetoderna som undersöktes i denna studie var TIG-svetsning och MIG-svetsning. Testerna utfördes med FeCrAl legeringar (Kanthal A, Kanthal D och vissa experimentella legeringar). FeCrAl legeringar är i allmänhet ferritiska järnbaserade stål med 20-23% krom och ~5% aluminium. De utvärderingsmetoderna som undersöktes var: visuell undersökning, penetrantprovning, makro/ mikroundersökning, sidobockprovning och korttidskorrosionstest (~50 timmar). Slutsatsen av detta examensarbete är att MIG-svetsning är en mer produktiv metod än TIG, men fler defekter såsom bindfel och sprickor uppkom för MIG-svetsning. Dessa defekter kan ”fixas” genom optimering av svetsparametrar. Om man bara ska reparera ett specifikt område är TIG-svetsning ett bättre alternativ. En slutsats om antal lager är att ett lager med MIG-svetsning är nästan lika tjockt som tre lager med TIG-svetsning med Ø 1mm svetstråd. Tre svetsutvärderingar som är viktiga är visuell undersökning, penetrantprovning och korrosionstest för att välja vilken påsvetsmetod som är lämpligast i pannapplikation.
APA, Harvard, Vancouver, ISO, and other styles
32

Ehnert, Jesse. "The Argument from Species Overlap." Thesis, Virginia Tech, 2002. http://hdl.handle.net/10919/34236.

Full text
Abstract:
The "argument from species overlap" (abbreviated ASO) claims that some human and nonhuman animals possess similar sets of morally relevant characteristics, and are therefore similarly morally significant. The argument stands as a general challenge to moral theories, because many theories hold that all humans possess greater moral significance than all nonhuman animals. In this thesis I discuss responses to the ASO, primarily those of Peter Carruthers, Tom Regan, Evelyn Pluhar, and Peter Singer. Carruthers denies the conclusion of the ASO, while the other three do not. I argue that the ASO is a sound argument, and that Carruthers's attempts to counter it via his contractualist theory are unsuccessful. I next discuss the rights-based theories of Regan and Pluhar, which agree with the conclusion of the ASO but which, I believe, encounter significant theoretical difficulties. Finally, I address the ASO from a utilitarian perspective, first from Singer's utilitarian formulation and then from a "welfare-utilitarian" formulation. I answer a number of critical objections to welfare utilitarianism, and argue that the theory is most successful in facing the challenge of the ASO.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
33

Papandreopoulos, Georgios. "Nietzsche's vision of the Overhuman." Thesis, Staffordshire University, 2014. http://eprints.staffs.ac.uk/2407/.

Full text
Abstract:
In this thesis we are going to examine the problem of the Overhuman [Übermensch] in the work of German philosopher Friedrich Nietzsche. The Overhuman is a subject the notoriety of which far exceeds its careful treatment by Nietzsche’s commentators. Nietzsche’s mistreatment by the Nazis, the simplistic association of the term with Hollywood phantasies, as well as the large number of issues that the term covers, are some of the reasons for the relative obscurity of the term. On our part, we are going to investigate our subject by examining a broad array of issues and problems that Nietzsche wishes to address through the use of the term Overhuman. We are going to argue that, following the demise of various humanist ideologies in the West (all united under the all-powerful signifier of a transcendent God), man faces the challenge of having to justify his existence on earth solely by the utilization of immanent reasons, an event perhaps unprecedented in human history. Nietzsche tries partly to exemplify and partly imagine an earth that is going to be man-made and the various challenges and problems that this process is going to entail. We will argue that the term Overhuman refers to a process whereby man rediscovers an immanent culture and the new rules according to which life on earth is to take place; we are also going to examine the new political order which is going to replace the old one, which for the most part produced man as a docile animal, unable to stand up for his own rights and demands. Furthermore, we will examine the extent of the interconnection between the human and the Overhuman, an issue of the highest importance for Nietzsche. Finally, we are going to argue for a different, non-productive understanding of time that the Overhuman inaugurates and humanity is in desperate need for. Our thesis will argue for the centrality of the notion of the Overhuman in Nietzsche’s work; indeed we will argue that this is Nietzsche’s most persistent and most widely researched problem, and we are going to argue that without an, as much as possible, holistic examination of Nietzsche’s philosophy, the researcher will be either at a loss to understand Nietzsche’s Overhuman as problematic, or he will be destined to drive himself to wrong conclusions. Our thesis will show the extent of the challenge that Nietzsche’s thinking poses to Western culture and that any further cultural development of the human is unimaginable without modern humanity first facing the issues that Nietzsche has raised through his conception of the Overhuman.
APA, Harvard, Vancouver, ISO, and other styles
34

Mastour, Eshgh Somayeh Sadat. "Distributed Reinforcement Learning for Overlay Networks." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92131.

Full text
Abstract:
In this thesis, we study Collaborative Reinforcement Learning (CRL) in the context of Information Retrieval in unstructured distributed systems. Collaborative reinforcement learning is an extension to reinforcement learning to support multiple agents that both share value functions and cooperate to solve tasks. Specifically, we propose and develop an algorithm for searching in peer to peer systems by using collaborative reinforcement learning. We present a search technique that achieve higher performance than currently available techniques, but is straightforward and practical enough to be easily incorporated into existing systems. Theapproach is profitable because reinforcement learning methods search for good behaviors gradually during the lifetime of the learning peer. However, we must overcome the challenges due to the fundamental partial observability inherent in distributed systems which have highly dynamic nature and changes in their configuration are common practice. Also, we undertake a performance study of the effects that some environment parameters, such as the number of peers, network traffic bandwidth, and partial behavioral knowledge from previous experience, have on the speed and reliability of learning. In the process, we show how CRL can be used to establish and maintain autonomic properties of decentralized distributed systems. This thesis is an empirical study of collaborative reinforcement learning. However, our results contribute to the broader understanding of learning strategies and design of different search policies in distributed systems. Our experimental results confirm the performance improvement of CRL in heterogeneous overlay networks over standard techniques such as random walking.
APA, Harvard, Vancouver, ISO, and other styles
35

King, Lisa Charmayne. "Stimulus overlap and dual-task performance." Thesis, Georgia Institute of Technology, 1988. http://hdl.handle.net/1853/28752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Lam, Ngok. "Capacity allocation in service overlay networks." Thesis, McGill University, 2011. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=103599.

Full text
Abstract:
Because of its decentralized nature and the lack of the required cooperations among the Internet autonomous systems, the current Internet is unable to provide end-to-end QoS guarantees to the application layer. The Service Overlay Network (SON) is a proposed solution to this end-to-end QoS provisioning problem. With its special overlay structure,the Service Overlay Network is able to provide reliable end-to-end QoS support on top of the Internet infrastructure. By considering the SON as a network with virtual connections and bandwidth allocations, we derive a series of new results for the SON. First, by referring to the reliability theory, we obtain a general form for the end-to-end blocking function. With the general blocking function, we investigate the two optimization approaches for designing a SON, namely the Maximum Profit (MP) approach that maximizes the prot and the Minimum Cost (MC) approach that minimizes the investment. Our study reveals that though the two approaches have been shown to be equivalent in many other settings, they are different in the SON environment. Our result indicates that the MP approach is a more appropriate approach for designing a SON, and the result is independent of the routing algorithm employed. Second, we develop a novel event dependent routing scheme that is efficient enough to be incorporated into the optimal capacity allocation problem. This allows the SON design problem to be formulated and solved as a MP optimization problem. Then we improve the optimization methodology by decomposing the main SON design problem into a number of sub-problems and we solve the main design problem by solving the sub-problems which involve finding the link shadow prices of the network links. It is exactly because we are using the maximum profit approach, the idea of link shadow price could be incorporatedto solve the design problem. A fast macro-state convolution scheme based on the link shadow price is developed to provide a traffic differentiation module to the optimization formulation. This additional module allows the optimization framework consider traffic connections based on the (monetary) contributions they offer to the network. Like many other telecommunications services, SON is believed to exhibit positive net-work externalities - once the network reaches a "critical mass", it will continue to grow in a self-reinforcing manner. The optimal pricing of the SON services is therefore another crucial piece of information for the SON to achieve success. We study a set of Lagrange i imultipliers and show that the SON service charges are closely related to the set of multipliers. When the service levels are not hard requirements, by using the multipliers as the service charges, the resulting network will be on the Pareto frontier of a multi-criteria optimization problem that maximizes both the operator utility and the user utility. This piece of work provides information from the problem formulation, to the actual design process, to the simplication and enhancement of the design process, and finally to the set of optimal prices which the operator could charge. It essentially provides comprehensive information for deploying the SON network.
En raison de son caractere decentralise et le manque de cooperations necessaires entre les l'Internet des systemes autonomes, l'Internet actuel est incapable de fournir de bout en bout QoS garantit a la couche application. L'Overlay Service Network (SON) est une solution proposee a ce QoS de bout-en-bout probleme. Grace a sa structure speciale de recouvrement, l'Overlay Service Network est en mesure de fournir des informations ables de bout en bout la qualite de service support au-dessus de l'infrastructure Internet. En considerant la SON en reseau avec des connexions virtuelles et la bande passante allocations, nous obtenons une serie de nouveaux resultats pour le SON. Tout d'abord, en se referant a la theorie de la abilite, nous obtenons une forme generale pour la fin-en-bout fonction de blocage. Avec l'general fonction de blocage, nous examinons les deux approches d'optimisation pour la conception une SON, soit le maximum Profit (MP) approche qui maximise le profit et le Cout minimum (MC) approche qui minimise l'investissement. Notre etude revele que si les deux approches se sont revelees etre l'equivalent dans de nombreux autres parametres, ils sont differents dans l'environnement SON. Nos resultats montrent que l'approche MP est une approche plus appropriee pour la conception d'un SON, et le resultat est independant de l'algorithme de routage utilise. Deuxiemement, nous developpons un nouvel evenement depend regime de routage qui est assez efficace pour etre incorpores dans le probleme d'allocation de la capacite optimale. Cela permet au probleme de conception Fils pour etre formule et resolu comme un probleme d'optimisation MP. Ensuite, nous avons d'ameliorer la methodologie d'optimisation en decomposant le probleme de conception principale fils dans un certain nombre de sous problemes et nous resolvons le probleme de conception principale en resolvant les problemes sous-qui impliquent la constatation du prix fictifs lien des liens du reseau. C'est justement parce que nous utilisons la recherche du profit maximum, l'idee de prix fictif lien pourrait etre constituee pour resoudre le probleme de conception. Un schema de convolution rapide macro-etat base sur le prix fictif lien est developpe pour fournir une differenciation du trafic module d'optimisation de la formulation. Ce module additionnel permet l'optimisation examiner le cadre des connexions de trafic sur la base des contributions (monetaires), ils offrent au reseau. Comme beaucoup d'autres services de telecommunications, SON est estime a exposer nette positive externalites de travail - une fois que le reseau atteint une "masse critique", il va continuer a croitre dans un auto-renforcement maniere. La tarification optimale des services de SON est donc un autre element crucial de l'information pour le SON pour reussir. Nous etudions une serie de multiplicateurs Lagrange et montrent que les frais de service SON sont etroitement liees a l'ensemble des multiplicateurs. Lorsque les niveaux de service ne sont pas des exigences dur, en utilisant les multiplicateurs que les frais de service, le reseau qui en resulte sera sur la frontiere de Pareto d'un probleme d'optimisation multi-criteres qui maximise la fois l'utilite operateur et l'utilite de l'utilisateur. Ce travail fournit des informations a partir de la formulation du probleme, a l'actuel la conception de processus, de la simplification et l'amelioration du processus de conception, et enfin a l'ensemble des prix optimal o l'operateur peut charger. Il fournit essentiellement des informations completes pour le deploiement du reseau SON. Ce travail fournit des informations a partir de la formulation du probleme, a l'actuel la conception de processus, de la simplification et l'amelioration du processus de conception, et enfn a l'ensemble des prix optimal o l'operateur peut charger. Il fournit essentiellement des informations completes pour le deploiement du reseau SON.
APA, Harvard, Vancouver, ISO, and other styles
37

Kandekar, Kunal. "TAO a topology-adaptive overlay framework /." NCSU, 2006. http://www.lib.ncsu.edu/theses/available/etd-05162006-141449/.

Full text
Abstract:
Large-scale distributed systems rely on constructing overlay networks in which nodes communicate with each other through intermediate overlay neighbors. Organizing nodes in the overlay while preserving its congruence with the underlying IP topology (the underlay) is important to reduce the communication cost between nodes. In this thesis, we study the state-of-the-art approaches to match the overlay and underlay topologies and pinpoint their limitations in Internet-like setups. We also introduce a new Topology-Adaptive Overlay organization framework, TAO, which is scalable, accurate and lightweight. As opposed to earlier approaches, TAO compiles information resulting from traceroute packets to a small number of landmarks, and clusters nodes based on (1) the number of shared hops on their path towards the landmarks, and (2) their proximity to the landmarks. TAO is also highly flexible and can complement all existing structured and unstructured distributed systems. Our experimental results, based on actual Internet data, reveal that with only five landmarks, TAO identifies the closest node to any node with 85% - 90% accuracy and returns nodes that on average are within 1 millisecond from the closest node if the latter is missed. As a result, TAO overlays enjoy very low stretch (between 1.15 and 1.25). Our results also indicate that shortest-path routing on TAO overlays result in shorter end-to-end delays than direct underlay delays in 8-10% of the overlay paths.
APA, Harvard, Vancouver, ISO, and other styles
38

Streuer, Thomas. "Simulation der Quantenchromodynamik mit Overlap-Fermionen." [S.l.] : [s.n.], 2006. http://www.diss.fu-berlin.de/2006/395/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kwan, Tin-man Tony. "Scalable content distribution in overlay networks." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B3847900X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kwan, Tin-man Tony, and 關天文. "Scalable content distribution in overlay networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B3847900X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Prahatheesan, Vicknarajah. "A lattice filter for CDMA overlay." Thesis, Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B20665684.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Liu, Xiaomei. "Building reliable applications in overlay networks." Diss., Connect to online resource - MSU authorized users, 2008.

Find full text
Abstract:
Thesis (Ph. D.)--Michigan State University. Computer Science and Engineering Dept., 2008.
Title from PDF t.p. (viewed on Apr. 8, 2009) Includes bibliographical references (p. 176-184). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
43

Yip, Alexander Siumann 1979. "NATRON : overlay routing to oblivious destinations." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29724.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (p. 51-53).
This thesis presents NATRON, a system in which an overlay network of nodes cooperates to improve unicast routing to non-participating hosts. Previous overlay systems have used overlay routing to improve communication between participating hosts; they were unable to exploit overlay routing to non-participating hosts. NATRON uses a combination of IP tunneling and network address translation to allow members of the overlay to communicate with hosts outside the overlay network via other overlay members. In order to estimate the potential performance improvement a system like NATRON might provide, we performed an exhaustive test on a multi-site Internet testbed. Our results show that a system that always guesses the best intermediate node could reduce the average HTTP transfer time by 18% and reduce the number of downloads lasting longer than 30 seconds by 16%. We implemented a working NATRON and a heuristic for choosing intermediate overlay nodes, but we find that our heuristic can only exploit 22% of the potential performance gains. We conclude that overlay routing to oblivious hosts has good potential for performance enhancement but further work is needed to develop a path choice heuristic.
by Alexander Siumann Yip.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
44

Jannotti, John 1974. "Network layer support for overlay networks." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/29274.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (p. 98-103).
Overlay networks are virtual networks formed by cooperating nodes that share an underlying physical network. They represent a flexible and deployable approach for applications to obtain new network semantics without modification of the underlying network, but they suffer from efficiency concerns. This thesis presents two new primitives for implementation in the network layer (i.e., the routers of the physical network). These primitives support the efficient operation and construction of overlay networks. Packet Reflection allows end hosts to request that routers perform specialized routing and duplication for certain packets. Path Painting allows multiple end hosts to determine where their disparate paths to a rendezvous point meet, in order to facilitate overlay topology building that reflects the topology of the underlying network. Both primitives can be incrementally deployed for incremental benefit. This thesis describes a variety applications of these primitives: application level multicast systems with various semantics, an extended Internet Indirect Infrastructure with latency benefits over the original proposal, and an extension to Chord which would allows faster lookups. Experimental results on simulated topologies indicate that when all routers support the proposed primitives, less that 5% overhead (in terms of link usage and latency) remains in two common overlay network usage scenarios. In addition, the benefits gained from deployment are significant even at low deployment levels. At approximately 25% deployment, the primitives have reduced overhead by over 50%. When intelligent deployment strategies are used, link usage overhead is less than 30% at less than 10% deployment. Finally, the results indicate that these benefits affect the area local to the deployed routers, providing a deployment incentive to independent networks.
by John Jannotti.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
45

Zhao, Sherry Yi 1980. "Gestural overlap of stop-consonant sequences." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/29728.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2003.
Includes bibliographical references (p. 79).
This study used an analysis-by-synthesis approach to discover possible principles governing the coordination of oral and laryngeal articulators in the production of English stop-consonant sequences. Recorded utterances containing stop-consonant sequences were analyzed acoustically, with focus on formant movements, closure durations, release bursts, and spectrum shape at low frequencies. The results of the acoustic analysis were translated into general gestural timing estimates. From these estimates, a set of possible principles was derived. Both the general gestural estimates and the derived principles were verified and refined through quasi-articulatory synthesis using HLsyn. Perception tests composed of synthetic sequences with varying degrees of overlap were administered. From acoustic analysis, synthesis verification, and perception testing, two principles emerged. First, V1Cl#C2V2 stop-consonant sequences with front-to-back order of place of articulation have more overlap of articulators than those with back-to-front order; this agrees with past research findings (Chitoran, Goldstein, and Byrd, 2002). The extent of the overlapping usually does not go beyond the obliteration of the Cl release burst. Second, gestural overlap involving laryngeal articulators exists but varies from individual to individual. The voicing of C1 usually affects the voicing of C2 in V1CI#C2V2 sequences.
by Sherry Yi Zhao.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
46

Jackson, Chloe. "Modeling the Hillside Development Overlay Zone." The University of Arizona, 2016. http://hdl.handle.net/10150/622779.

Full text
Abstract:
Sustainable urban growth can be achieved in part by increasing density through infill development. Done right, infill development encourages already developed areas to become more diverse and livable, while limiting urban sprawl and all the public health, environmental, and infrastructure problems that accompany it. In Pima County’s 2015 update to the Comprehensive Plan, infill development is identified as a goal for land use policy. This study utilizes a Python script to build a model of the Hillside Development Overlay Zone (HDZ) to aid in removing zoning barriers to this goal. This a) improves the permitting process; b) encourages purchase of parcels outside of hillside areas and; c) encourages innovative design on hillside areas. The visualization is available on Pima County’s MapGuide website, allowing developers to make informed decisions about purchasing, permitting, and designing on HDZ parcels. In addition, this study uses a Kernel Density analysis to suggest areas where HDZ can be removed, without losing protection for mountainous areas. These suggestions are submitted to Pima County Development Services.
APA, Harvard, Vancouver, ISO, and other styles
47

Yue, Xi. "Rapid Overlay Builder for Xilinx FPGAs." Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/50907.

Full text
Abstract:
A field-programmable gate array (FPGA) is a type of programmable hardware, where a logic designer must create a specific hardware design and then "compile" it into a bitstream that "configures" the device for a specific function at power-up. This compiling process, known as place-and-route (PAR), can take hours or even days, a duration which discourages the use of FPGAs for solving compute-oriented problems. To help mitigate this and other problems, overlays are emerging as useful design patterns in solving compute-oriented problems. An overlay consists of a set of compiler-like tools and an architecture written in a hardware design language like VHDL or Verilog. This cleanly separates the compiling problem into two phases: at the front end, high-level language compilers can quickly map a compute task into the overlay architecture, which is now serving as an intermediate layer. Unfortunately, the back-end of the process, where an overlay architecture is compiled into an FPGA device, remains a very time-consuming task. Many attempts have been made to accelerate the PAR process, ranging from using multicore processors, making quality/runtime tradeoffs, and using hard macros, with limited success. We introduce a new hard-macro methodology, called Rapid Overlay Builder, and demonstrate a run-time improvement up to 22 times compared to a regular unaccelerated flow using Xilinx ISE. In addition, compared to prior work, ROB continues to work well even with high logic utilization levels of 89%, and it consistently maintains high clock rates. By applying this methodology, we anticipate that overlays can be implemented much more quickly and with lower area and speed overheads than would otherwise be possible. This will greatly improve the usability of FPGAs, allowing them to be used as a replacement for CPUs in a greater variety of applications.
Applied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
48

Zhong, Yiming. "Modelling sediment transportation and overland flow." Thesis, University of Oxford, 2013. http://ora.ox.ac.uk/objects/uuid:a45eefae-5a0f-4917-9abb-261ae792f2ee.

Full text
Abstract:
The erosion and transport of fertile topsoil is a serious problem in the U.S., Australia, China and throughout Europe. It results in extensive environmental damage, reduces soil fertility and productivity, and causes significant environmental loss. It is as big a threat to the future sustainability of global populations as climate change, but receives far less attention. With both chemicals (fertilizers, pesticides, herbicides) and biological pathogens (bacteria, viruses) preferentially sorbing to silt and clay sized soil particles, estimating contaminant fluxes in eroded soil also requires predicting the transported soils particle size distribution. The Hairsine-Rose (HR) erosion model is considered in this thesis as it is one of the very few that is specifically designed to incorporate the effect of particle size distribution, and differentiates between non-cohesive previously eroded soil compared with cohesive un-eroded soil. This thesis develops a new extended erosion model that couples the HR approach with the one-dimensional St Venant equations, and an Exner bed evolution equation to allow for feedback effects from changes in the local bed slope on surface hydraulics and erosion rates to be included. The resulting system of 2I +3 (where I = number of particle size classes) nonlinear hyperbolic partial differential equations is then solved numerically using a Liska-Wendroff predictor corrector finite difference scheme. Approximate analytical solutions and series expansions are derived to overcome singularities in the numerical solutions arising from either boundary or initial conditions corresponding to a zero flow depth. Three separate practical applications of the extended HR model are then considered in this thesis, (i) flow through vegetative buffer strips, (ii) modelling discharge hysteresis loops and (iii) the growth of antidunes, transportational cyclic steps and travelling wave solutions. It is shown by comparison against published experimental flume data that predictions from the extended model are able to closely match measurements of deposited sediment distribution both upstream and within the vegetative buffer strip. The experiments were conducted with supercritical inflow to the flume which due to the increased drag from the vegetative strip, resulted in a hydraulic jump just upstream of the vegetation. As suspended sediment deposited at the jump, this resulted in the jump slowly migrating upstream. The numerical solutions were also able to predict the position and hydraulic jump and the flow depth throughout the flume, including within the vegetative strip, very well. In the second application, it is found that the extended HR model is the first one that can produce all known types of measured hysteresis loops in sediment discharge outlet data. Five main loop types occur (a) clockwise, (b) counter-clockwise, (c,d) figure 8 of both flow orientations and (e) single curve. It is clearly shown that complicated temporal rainfall patterns or bed geometry are not required to developed complicated hysteresis loops, but it is the spatial distribution of previously eroded sediment that remains for the start of a new erosion event, which primarily governs the form of the hysteresis loop. The role of the evolution of the sediment distribution in the deposited layer therefore controls loop shape and behavior. Erosion models that are based solely on suspended sediment are therefore unable to reproduce these hysteretic loops without a priori imposing a hysteretic relationship on the parameterisations of the erosion source terms. The rather surprising result that the loop shape is also dominated by the suspended concentration of the smallest particle size is shown and discussed. In the third application, a linear stability analysis shows that instabilities, antidunes, will grow and propagate upstream under supercritical flow conditions. Numerical simulations are carried out that confirm the stability analysis and show the development and movement of antidunes. For various initial parameter configurations a series of travelling antidunes, or transportational cyclic steps, separated by hydraulic jumps are shown to develop and evolve to a steady form and wave speed. Two different forms arise whereby (a) the deposited layer completely shields the underlying original cohesive soil so that the cohesive layer plays no role in the speed or shape of the wave profile or (b) the cohesive soil is exposed along the back of the wave such that both the non-cohesive and cohesive layers affect the wave profile. Under (a) the solutions are obtained up to an additive constant as the actual location of the boundary of the cohesive soil is not required, whereas for (b) this constant must be determined in order to find the location on the antidune from where the cohesive soil becomes accessible. For single size class soils the leading order travelling wave equations are fairly straightforward to obtain for both cases (a) and (b). However for multi-size class soils, this becomes much more demanding as up to 2I + 3 parameters must be found iteratively to define the solution as each size class has its own wave profile in suspension and in the antidune.
APA, Harvard, Vancouver, ISO, and other styles
49

Maciel, Danilo Leal. "Sherlock N-Overlap: normalization invasive and overlap coefficient for analysis of similarity between source code in programming disciplines." Universidade Federal do CearÃ, 2014. http://www.teses.ufc.br/tde_busca/arquivo.php?codArquivo=12195.

Full text
Abstract:
CoordenaÃÃo de AperfeÃoamento de Pessoal de NÃvel Superior
This work is contextualized in the problem of plagiarism detection among source codes in programming classes. Despite the wide set of tools available for the detection of plagiarism, only few tools are able to effectively identify all lexical and semantic similarities between pairs of codes, because of the complexity inherent to this type of analysis. Therefore to the problem and the scenario in question, it was made a study about the main approaches discussed in the literature on detecting plagiarism in source code and as a main contribution, conceived to be a relevant tool in the field of laboratory practices. The tool is based on Sherlock algorithm, which has been enhanced as of two perspectives: firstly, with changes in the similarity coefficient used by the algorithm in order to improve its sensitivity for comparison of signatures; secondly, proposing intrusive techniques preprocessing that, besides eliminating irrelevant information, are also able to overemphasize structural aspects of the programming language, or gathering separating strings whose meaning is more significant for the comparison or even eliminating sequences less relevant to highlight other enabling better inference about the degree of similarity. The tool, called Sherlock N-Overlap was subjected to rigorous evaluation methodology, both in simulated scenarios as classes in programming, with results exceeding tools currently highlighted in the literature on plagiarism detection.
Este trabalho se contextualiza no problema da detecÃÃo de plÃgio entre cÃdigos-fonte em turmas de programaÃÃo. Apesar da ampla quantidade de ferramentas disponÃveis para a detecÃÃo de plÃgio, poucas sÃo capazes de identificar, de maneira eficaz, todas as semelhanÃas lÃxicas e semÃnticas entre pares de cÃdigos, o que se deve à complexidade inerente a esse tipo de anÃlise. Fez-se, portanto, para o problema e o cenÃrio em questÃo, um estudo das principais abordagens discutidas na literatura sobre detecÃÃo de plÃgio em cÃdigo-fonte e, como principal contribuiÃÃo, concebeu-se uma ferramenta aplicÃvel no domÃnio de prÃticas laboratoriais. A ferramenta tem por base o algoritmo Sherlock, que foi aprimorado sob duas perspectivas: a primeira, com modificaÃÃes no coeficiente de similaridade usado pelo algoritmo, de maneira a melhorar a sua sensibilidade para comparaÃÃo de assinaturas; a segunda, propondo tÃcnicas de prÃ-processamento invasivas que, alÃm de eliminar informaÃÃo irrelevante, sejam tambÃm capazes de sobrevalorizar aspectos estruturais da linguagem de programaÃÃo, reunindo ou separando sequÃncias de caracteres cujo significado seja mais expressivo para a comparaÃÃo ou, ainda, eliminando sequÃncias menos relevantes para destacar outras que permitam melhor inferÃncia sobre o grau de similaridade. A ferramenta, denominada Sherlock N-Overlap, foi submetida a rigorosa metodologia de avaliaÃÃo, tanto em cenÃrios simulados como em turmas de programaÃÃo, apresentando resultados superiores a ferramentas atualmente em destaque na literatura sobre detecÃÃo de plÃgio.
APA, Harvard, Vancouver, ISO, and other styles
50

Henke, Petra [Verfasser], and Jörg [Akademischer Betreuer] Overmann. "Mechanisms of bacterial interaction in phototrophic consortia / Petra Henke ; Betreuer: Jörg Overmann." Braunschweig : Technische Universität Braunschweig, 2016. http://d-nb.info/1175818844/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography