Dissertations / Theses on the topic 'Realistic Scenario'

To see the other types of publications on this topic, follow the link: Realistic Scenario.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 19 dissertations / theses for your research on the topic 'Realistic Scenario.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Maho, Thibault. "Neural networks security under realistic scenario." Electronic Thesis or Diss., Université de Rennes (2023-....), 2023. http://www.theses.fr/2023URENS121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
L'Intelligence Artificielle est aujourd'hui sur toutes les lèvres, porté par la révolution des réseaux de neurones qui ont fait leurs preuves dans diverses tâches. Ils ont notamment surpassé les capacités humaines en vision par ordinateur. Cette thèse se concentre ainsi sur les réseaux de neurones, en mettant l'accent sur les tâches de classification d'images. Cependant, ce succès remarquable s'accompagne de certaines failles. Les réseaux de neurones présentent des faiblesses en termes de confidentialité, d'intégrité et de disponibilité de leurs composants. Les données d'entraînement, le modèle et les données d'inférence sont exposés à des attaques. Même dans le scénario réaliste considéré dans cette thèse, où le modèle fonctionne dans un environnement boîte noire avec des limitations sur le nombre de requêtes, il est possible de voler et de reconstruire le modèle et les données d'entraînement, ainsi que de manipuler les données d'inférence. Cette thèse met l'accent sur la protection de la confidentialité du modèle compromise l'extraction de modèle et l'extraction de paramètres. Elle explore également le domaine des exemples adverses. Ces perturbations soigneusement conçues entraînent des erreurs de classification, menaçant l'intégrité du modèle à l'inférence. Par conséquent, une partie de cette thèse est dédiée à l'exploration de leurs origines, de leur création et des stratégies de défense contre eux.Cependant, ce succès remarquable s'accompagne de certaines failles. Les réseaux de neurones présentent des faiblesses en termes de confidentialité, d'intégrité et de disponibilité de leurs composants. Les données d'entraînement, le modèle et les données d'inférence sont exposés à des attaques. Même dans le scénario réaliste considéré dans cette thèse, où le modèle fonctionne dans un environnement boîte noire avec des limitations sur le nombre de requêtes, il est possible de voler et de reconstruire le modèle et les données d'entraînement, ainsi que de manipuler les données d'inférence.Cette thèse met l'accent sur la protection de la confidentialité du modèle compromise l'extraction de modèle et l'extraction de paramètres. Elle explore également le domaine des exemples adverses. Ces perturbations soigneusement conçues entraînent des erreurs de classification, menaçant l'intégrité du modèle à l'inférence. Par conséquent, une partie de cette thèse est dédiée à l'exploration de leurs origines, de leur création et des stratégies de défense contre eux
Artificial Intelligence is a hot topic today, driven by the revolution of neural networks that have shown impressive performances across various tasks. Notably, in Computer Vision, they have even outperformed humans. This thesis centers on neural networks applied to image classification tasks. Yet, this remarkable success is not without its vulnerabilities. Neural networks exhibit weaknesses in terms of confidentiality, integrity, and availability of their components. The training data, the model, and the inference data, are susceptible to potential attacks. Even in the realistic scenario considered in this thesis where the model operates in a black-box setup with limitations on the number of queries, it remains possible for an attacker to steal and reconstruct the model and training data, as well as manipulate inference data. This thesis places a particular emphasis on safeguarding the confidentiality of the model, which can be compromised through techniques such as model extraction and parameter extraction. Additionally, it delves into the realm of adversarial examples, which pose threats to the integrity of model inference. The deliberate introduction of small, well-crafted perturbations can result in misclassifications. Consequently, a significant portion of this thesis is dedicated to exploring the origins of adversarial examples, their creation, and strategies for defending against them
2

Das, Choudhury Sruti. "Uniscale and multiscale gait recognition in realistic scenario." Thesis, University of Warwick, 2013. http://wrap.warwick.ac.uk/59649/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The performance of a gait recognition method is affected by numerous challenging factors that degrade its reliability as a behavioural biometrics for subject identification in realistic scenario. Thus for effective visual surveillance, this thesis presents five gait recog- nition methods that address various challenging factors to reliably identify a subject in realistic scenario with low computational complexity. It presents a gait recognition method that analyses spatio-temporal motion of a subject with statistical and physical parameters using Procrustes shape analysis and elliptic Fourier descriptors (EFD). It introduces a part- based EFD analysis to achieve invariance to carrying conditions, and the use of physical parameters enables it to achieve invariance to across-day gait variation. Although spatio- temporal deformation of a subject’s shape in gait sequences provides better discriminative power than its kinematics, inclusion of dynamical motion characteristics improves the iden- tification rate. Therefore, the thesis presents a gait recognition method which combines spatio-temporal shape and dynamic motion characteristics of a subject to achieve robust- ness against the maximum number of challenging factors compared to related state-of-the- art methods. A region-based gait recognition method that analyses a subject’s shape in image and feature spaces is presented to achieve invariance to clothing variation and carry- ing conditions. To take into account of arbitrary moving directions of a subject in realistic scenario, a gait recognition method must be robust against variation in view. Hence, the the- sis presents a robust view-invariant multiscale gait recognition method. Finally, the thesis proposes a gait recognition method based on low spatial and low temporal resolution video sequences captured by a CCTV. The computational complexity of each method is analysed. Experimental analyses on public datasets demonstrate the efficacy of the proposed methods.
3

Normando, Paulo Garcia. "Spatial interference alignment under realistic scenarios." reponame:Repositório Institucional da UFC, 2013. http://www.repositorio.ufc.br/handle/riufc/11051.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
MORMANDO, P. G. Spatial interference alignment under realistic scenarios. 2013. 65 f. Dissertação (Mestrado em Engenharia de Teleinformática) – Centro de Tecnologia, Universidade Federal do Ceará, Fortaleza, 2013.
Submitted by Marlene Sousa (mmarlene@ufc.br) on 2015-03-05T18:30:21Z No. of bitstreams: 1 2013_dis_pgmormando.pdf: 993520 bytes, checksum: 5ab14e795c4ba9291b53267352f954ef (MD5)
Approved for entry into archive by Marlene Sousa(mmarlene@ufc.br) on 2015-03-24T11:01:20Z (GMT) No. of bitstreams: 1 2013_dis_pgmormando.pdf: 993520 bytes, checksum: 5ab14e795c4ba9291b53267352f954ef (MD5)
Made available in DSpace on 2015-03-24T11:01:20Z (GMT). No. of bitstreams: 1 2013_dis_pgmormando.pdf: 993520 bytes, checksum: 5ab14e795c4ba9291b53267352f954ef (MD5) Previous issue date: 2013-08-02
Due to the rapid growth and the aggressive throughput requirements of current wireless networks, such as the 4th Generation (4G) cellular systems, the interference has become an issue that cannot be neglected anymore. In this context, the Interference Alignment (IA) arises as a promising technique that enables transmissions free of interference with high-spectral efficiency. However, while recent works have focused mainly on the theoretical gains that the technique could provide, this dissertation aims to go a step further and clarify some of the practical issues on the implementation of this technique in a cellular network, as well as compare it to other well-established techniques. As an initial evaluation scenario, a 3-cell network was considered, for which several realistic factors were taken into account in order to perform different analyses. The first analysis was based on channel imperfections, for which the results showed that IA is more robust than Block Diagonalization (BD) regarding the Channel State Information (CSI) errors, but both are similarly affected by the correlation among transmit antennas. The impact of uncoordinated interference was also evaluated, by modeling this interference with different covariance matrices in order to mimic several scenarios. The results showed that modifications on the IA algorithms can boost their performance, with an advantage to the approach that suppresses one stream, when the Bit Error Rate (BER) is compared. To combine both factors, the temporal channel variations were taken into account. At these set of simulations, besides the presence of an external interference, the precoders were calculated using a delayed CSI, leading to results that corroborate with the previous analyses. A recurring fact on the herein considered analyses was the dilemma of weather to apply the Joint Processing (JP)-based algorithms in order to achieve higher sum capacities or to send the information through a more reliable link by using IA. A reasonable step towards solving this dilemma is to actually perform the packet transmissions, which was accomplished by employing a system-level simulator composed by a large number of Transmission Points (TPs). As a result, all analyses conducted with this simulator showed that the IA technique can provide an intermediate performance between the non-cooperation and the full cooperation scheme. Concluding, one of the main contributions of this work has been to show some scenarios/cases where the IA technique can be applied. For instance, when the CSI is not reliable it can be better to use IA than a JP-based scheme. Also, the modifications on the algorithms to take into account the external interference can boost their performance. Finally, the IA technique finds itself in-between the conventional transmissions and Coordinated Multi-Point (CoMP). IA achieves an intermediate performance, while requiring a certain degree of cooperation among the neighboring sectors, but demanding less infrastructure than the JP-based schemes.
Devido ao rápido crescimento e os agressivos requisitos de vazão nas atuais redes sem fio, como os sistemas celulares de 4 a Geração, a interferência se tornou um problema que não pode mais ser negligenciado. Neste contexto, o Alinhamento de Interferência (IA) tem surgido como uma técnica promissora que possibilita transmissões livres de interferência com elevada eficiência espectral. No entanto, trabalhos recentes têm focado principalmente nos ganhos teóricos que esta técnica pode prover, enquanto esta dissertação visa dar um passo na direção de esclarecer alguns dos problemas práticos de implementação da técnica em redes celulares, bem como compará-la com outras técnicas bem estabelecidas. Uma rede composta por três células foi escolhida como cenário inicial de avaliação, para o qual diversos fatores realistas foram considerados de modo a realizar diferentes análises. A primeira análise foi baseada em imperfeições de canal, cujos resultados mostraram que o IA é mais robusto aos erros de estimação de canal que o BD (do inglês, Block Diagonalization), enquanto as duas abordagens são igualmente afetadas pela correlação entre as antenas. O impacto de uma interferência externa não-coordenada, que foi modelada por diferentes matrizes de covariância de modo a emular vários cenários, também foi avaliado. Os resultados mostraram que as modificações feitas nos algoritmos de IA podem melhorar bastante seus desempenho, com uma vantagem para o algoritmo que suprime um único fluxo de dados, quando são comparadas as taxas de erro de bit alcançadas por cada um. Para combinar os fatores das análises anteriores, as variações temporais de canal foram consideradas. Neste conjunto de simulações, além da presença da interferência externa, os pré-codificadores são calculados através de medidas atrasadas de canal, levando a resultados que corroboraram com as análises anteriores. Um fato recorrente percebido em todas as análises anteriores é o dilema entre aplicar os algoritmos baseados em BD, para que se consiga alcançar maiores capacidades, ou enviar a informação através de um enlace mais confiável utilizando o IA. Uma maneira de esclarecer este dilema é efetivamente realizar simulações a nível sistêmico, para isto foi aplicado um simulador sistêmico composto por um grande número de setores. Como resultado, todas as análises realizadas neste simulador mostraram que a técnica de IA atinge desempenhos intermediários entre a não cooperação e os algoritmos baseados na pré-codificação conjunta. Uma das principais contribuições deste trabalho foi mostrar alguns cenários em que a técnica do IA pode ser aplicada. Por exemplo, quando as estimações dos canais não são tão confiáveis é melhor aplicar o IA do que os esquemas baseados no processamento conjunto. Também mostrou-se que as modificações nos algoritmos de IA, que levam em consideração a interferência externa, podem melhorar consideravelmente o desempenho dos algoritmos. Finalmente, o IA se mostrou uma técnica adequada para ser aplicada em cenários em que a interferência é alta e não é possível ter um alto grau de cooperação entre os setores vizinhos.
4

Miranda, Carlos Miguel dos Santos. "Implementation of realistic scenarios for ground truth purposes." Master's thesis, Universidade de Aveiro, 2009. http://hdl.handle.net/10773/2093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Mestrado em Engenharia Electrónica e Telecomunicações
A segurança em redes de telecomunicações é um tópico que desde sempre gerou preocupação em todos os meios (instituições, empresas e outros) que utilizam estas redes. Novas ameaças ou mutações de ameaças já existentes surgem a uma elevada velocidade e os meios disponíveis parecem não ser suficientes para uma detecção positiva das mesmas. As respostas actuais para combater estas ameaças baseiam-se numa análise em tempo real do tráfego ou num treino prévio que muitas vezes tem que ser supervisionado por um ser humano que, dependendo da sua experiência na área pode estar a criar uma falha de segurança no sistema sem se aperceber do sucedido. Novas técnicas surgem para uma detecção eficaz de muitos ataques ou anomalias. No entanto, estas técnicas devem ser testadas de modo a validar o seu correcto funcionamento e, nesse sentido, são precisos fluxos de tráfego gerados na rede que possam ser utilizados sem comprometer a confidencialidade dos utilizadores e que obedeçam a critérios préestabelecidos. Com esta dissertação pretende-se constituir um conjunto de dados fiável e o mais abrangente possível de um conjunto de cenários realistas de rede, através da emulação em ambiente controlado de diferentes topologias, diferentes serviços e padrões de tráfego. Um outro objectivo fundamental deste trabalho passa por disponibilizar os dados obtidos à comunidade científica de modo a criar uma base de dados uniforme que permita avaliar o desempenho de novas metodologias de detecção de anomalias que venham a ser propostas. ABSTRACT: Security in telecommunication networks is a topic that has caused a lot of worries to network users (institutions, enterprises and others). New threats or mutations of existing ones appear at a very fast rate and the available solutions seem not to be enough for a positive detection of these threats. The solutions that are nowadays used to fight these threats require the realtime analysis of the network traffic or have to be previously trained. Most of the times, this training has to be supervised by a human being that, depending on his experience, can create a security breach in the system without knowing it. New techniques have been proposed in order to more efficiently detect many security attacks or threats. However, these techniques need to be tested in order to validate their correct functioning and, in order to do that, network traffic flows that can be used without compromising the users confidentiality and that obey to a pre-established criteria are needed. This dissertation intends to establish a set of trustworthy data as extensive as possible from a set of realistic network scenarios. Network emulation techniques will be used in a controlled environment, building different network topologies, with different services and traffic patterns. Another main objective of this work it is to make all this obtained data available to the scientific community in order to create a uniform data base that will allow the performance evaluation of new anomaly detection methodologies that can be proposed in the future.
5

Axholt, Magnus, and Stephen Peterson. "Modelling Traffic Scenarios for Realistic Air Traffic Control Environment Testing." Thesis, Linköping University, Department of Science and Technology, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2672.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:

As air traffic is forecasted to increase, air traffic control software subsequently needs to be more sophisticated. To efficiently push development forward, testing is important in order to determine usability. The tests need to be adapted to fit a particular purpose and carried out with methods that preserve the validity of the results.

This thesis describes an implementation project carried out at the EUROCONTROL Experimental Centre, Bretigny-sur-Orge, France. The purpose of the project is to create an application that enables a user to create datasets of air traffic to be used for these tests. The application allows for manual work or bulk imports from external data sources. Furthermore it compiles scenarios as output datasets intended for prototype air traffic control software developed at Linköping University.

The application design rationale and development process is described. Some time is spent on demonstrating the flexibility of the application and how its usage fits in a bigger picture.

6

Afridi, Ayaz Khan. "MACRO AND FEMTO NETWORK ASPECTS FOR REALISTIC LTE USAGE SCENARIOS." Thesis, KTH, Kommunikationsnät, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-53752.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Argudo, Medrano Oscar. "Realistic reconstruction and rendering of detailed 3D scenarios from multiple data sources." Doctoral thesis, Universitat Politècnica de Catalunya, 2018. http://hdl.handle.net/10803/620733.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
During the last years, we have witnessed significant improvements in digital terrain modeling, mainly through photogrammetric techniques based on satellite and aerial photography, as well as laser scanning. These techniques allow the creation of Digital Elevation Models (DEM) and Digital Surface Models (DSM) that can be streamed over the network and explored through virtual globe applications like Google Earth or NASA WorldWind. The resolution of these 3D scenes has improved noticeably in the last years, reaching in some urban areas resolutions up to 1m or less for DEM and buildings, and less than 10 cm per pixel in the associated aerial imagery. However, in rural, forest or mountainous areas, the typical resolution for elevation datasets ranges between 5 and 30 meters, and typical resolution of corresponding aerial photographs ranges between 25 cm to 1 m. This current level of detail is only sufficient for aerial points of view, but as the viewpoint approaches the surface the terrain loses its realistic appearance. One approach to augment the detail on top of currently available datasets is adding synthetic details in a plausible manner, i.e. including elements that match the features perceived in the aerial view. By combining the real dataset with the instancing of models on the terrain and other procedural detail techniques, the effective resolution can potentially become arbitrary. There are several applications that do not need an exact reproduction of the real elements but would greatly benefit from plausibly enhanced terrain models: videogames and entertainment applications, visual impact assessment (e.g. how a new ski resort would look), virtual tourism, simulations, etc. In this thesis we propose new methods and tools to help the reconstruction and synthesis of high-resolution terrain scenes from currently available data sources, in order to achieve realistically looking ground-level views. In particular, we decided to focus on rural scenarios, mountains and forest areas. Our main goal is the combination of plausible synthetic elements and procedural detail with publicly available real data to create detailed 3D scenes from existing locations. Our research has focused on the following contributions: - An efficient pipeline for aerial imagery segmentation - Plausible terrain enhancement from high-resolution examples - Super-resolution of DEM by transferring details from the aerial photograph - Synthesis of arbitrary tree picture variations from a reduced set of photographs - Reconstruction of 3D tree models from a single image - A compact and efficient tree representation for real-time rendering of forest landscapes
Durant els darrers anys, hem presenciat avenços significatius en el modelat digital de terrenys, principalment gràcies a tècniques fotogramètriques, basades en fotografia aèria o satèl·lit, i a escàners làser. Aquestes tècniques permeten crear Models Digitals d'Elevacions (DEM) i Models Digitals de Superfícies (DSM) que es poden retransmetre per la xarxa i ser explorats mitjançant aplicacions de globus virtuals com ara Google Earth o NASA WorldWind. La resolució d'aquestes escenes 3D ha millorat considerablement durant els darrers anys, arribant a algunes àrees urbanes a resolucions d'un metre o menys per al DEM i edificis, i fins a menys de 10 cm per píxel a les fotografies aèries associades. No obstant, en entorns rurals, boscos i zones muntanyoses, la resolució típica per a dades d'elevació es troba entre 5 i 30 metres, i per a les corresponents fotografies aèries varia entre 25 cm i 1m. Aquest nivell de detall només és suficient per a punts de vista aeris, però a mesura que ens apropem a la superfície el terreny perd tot el realisme. Una manera d'augmentar el detall dels conjunts de dades actuals és afegint a l'escena detalls sintètics de manera plausible, és a dir, incloure elements que encaixin amb les característiques que es perceben a la vista aèria. Així, combinant les dades reals amb instàncies de models sobre el terreny i altres tècniques de detall procedural, la resolució efectiva del model pot arribar a ser arbitrària. Hi ha diverses aplicacions per a les quals no cal una reproducció exacta dels elements reals, però que es beneficiarien de models de terreny augmentats de manera plausible: videojocs i aplicacions d'entreteniment, avaluació de l'impacte visual (per exemple, com es veuria una nova estació d'esquí), turisme virtual, simulacions, etc. En aquesta tesi, proposem nous mètodes i eines per ajudar a la reconstrucció i síntesi de terrenys en alta resolució partint de conjunts de dades disponibles públicament, per tal d'aconseguir vistes a nivell de terra realistes. En particular, hem decidit centrar-nos en escenes rurals, muntanyes i àrees boscoses. El nostre principal objectiu és la combinació d'elements sintètics plausibles i detall procedural amb dades reals disponibles públicament per tal de generar escenes 3D d'ubicacions existents. La nostra recerca s'ha centrat en les següents contribucions: - Un pipeline eficient per a segmentació d'imatges aèries - Millora plausible de models de terreny a partir d'exemples d’alta resolució - Super-resolució de models d'elevacions transferint-hi detalls de la fotografia aèria - Síntesis d'un nombre arbitrari de variacions d’imatges d’arbres a partir d'un conjunt reduït de fotografies - Reconstrucció de models 3D d'arbres a partir d'una única fotografia - Una representació compacta i eficient d'arbres per a navegació en temps real d'escenes
8

Ahmad, Muhammad Bilal. "Macro and Femto Network Aspectsfor Realistic LTE usage scenarios with Interference Management." Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116601.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Brualdi, Carlo. "Un algoritmo 2D per vehicular warning in scenari urbani realistici." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/1906/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hahn, Sören [Verfasser]. "Mobile Radio Network Management in the Context of Realistic Heterogeneous Scenarios / Sören Hahn." Aachen : Shaker, 2017. http://d-nb.info/1149272163/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Martínez, Domínguez Francisco José. "Improving Vehicular ad hoc Network Protocols to Support Safety Applications in Realistic Scenarios." Doctoral thesis, Universitat Politècnica de València, 2011. http://hdl.handle.net/10251/9195.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
La convergencia de las telecomunicaciones, la informática, la tecnología inalámbrica y los sistemas de transporte, va a facilitar que nuestras carreteras y autopistas nos sirvan tanto como plataforma de transporte, como de comunicaciones. Estos cambios van a revolucionar completamente cómo y cuándo vamos a acceder a determinados servicios, comunicarnos, viajar, entretenernos, y navegar, en un futuro muy cercano. Las redes vehiculares ad hoc (vehicular ad hoc networks VANETs) son redes de comunicación inalámbricas que no requieren de ningún tipo de infraestructura, y que permiten la comunicación y conducción cooperativa entre los vehículos en la carretera. Los vehículos actúan como nodos de comunicación y transmisores, formando redes dinámicas junto a otros vehículos cercanos en entornos urbanos y autopistas. Las características especiales de las redes vehiculares favorecen el desarrollo de servicios y aplicaciones atractivas y desafiantes. En esta tesis nos centramos en las aplicaciones relacionadas con la seguridad. Específicamente, desarrollamos y evaluamos un novedoso protocol que mejora la seguridad en las carreteras. Nuestra propuesta combina el uso de información de la localización de los vehículos y las características del mapa del escenario, para mejorar la diseminación de los mensajes de alerta. En las aplicaciones de seguridad para redes vehiculares, nuestra propuesta permite reducir el problema de las tormentas de difusión, mientras que se mantiene una alta efectividad en la diseminación de los mensajes hacia los vehículos cercanos. Debido a que desplegar y evaluar redes VANET supone un gran coste y una tarea dura, la metodología basada en la simulación se muestra como una metodología alternativa a la implementación real. A diferencia de otros trabajos previos, con el fin de evaluar nuestra propuesta en un entorno realista, en nuestras simulaciones tenemos muy en cuenta tanto la movilidad de los vehículos, como la transmisión de radio en entornos urbanos, especialmente cuando los edificios interfieren en la propagación de la señal de radio. Con este propósito, desarrollamos herramientas para la simulación de VANETs más precisas y realistas, mejorando tanto la modelización de la propagación de radio, como la movilidad de los vehículos, obteniendo una solución que permite integrar mapas reales en el entorno de simulación. Finalmente, evaluamos las prestaciones de nuestro protocolo propuesto haciendo uso de nuestra plataforma de simulación mejorada, evidenciando la importancia del uso de un entorno de simulación adecuado para conseguir resultados más realistas y poder obtener conclusiones más significativas.
Martínez Domínguez, FJ. (2010). Improving Vehicular ad hoc Network Protocols to Support Safety Applications in Realistic Scenarios [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/9195
Palancia
12

Croce, Andrea. "Allocazione ottima delle risorse in scenari IoV realistici attraverso modelli UFLP." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22654/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Le Smart City stanno ricoprendo un ruolo essenziale per promuovere una migliore qualità di vita ai propri cittadini. Tecnologie come il 5G e i veicoli smart garantiscono nuove ed importanti possibilità in ambito ICT. Per gestire al meglio in real-time il gran numero di veicoli presenti all’interno di una Smart City, sono necessari degli algoritmi rapidi ed efficienti. In questo elaborato viene analizzata una variante dello scenario Internet of Vehicles, il Multi-Period Internet of Vehicles Problem (MPIoVP), nella quale è necessario trovare una configurazione near-optimal di RSU al fine di minimizzare alcuni costi. Nel seguente elaborato viene proposto un algoritmo agile. Sono stati condotti degli esperimenti utilizzando un set di istanze benchmark per evidenziare i miglioramenti apportabili dal suo potenziale utilizzo.
13

Hiller, Thomas [Verfasser]. "Modelling the evolution of karst aquifers in three dimensions : Conceptual models and realistic scenarios / Thomas Hiller." Berlin : Freie Universität Berlin, 2013. http://d-nb.info/1032899360/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hahn, Sören [Verfasser], and Thomas [Akademischer Betreuer] Kürner. "Mobile Radio Network Management in the Context of Realistic Heterogeneous Scenarios / Sören Hahn ; Betreuer: Thomas Kürner." Braunschweig : Technische Universität Braunschweig, 2017. http://d-nb.info/1175816744/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Pendleton, Richard McCall. "Investigating Realistic Scenarios of Biodiversity Loss on Ecosystem Functioning: Extirpation of Rare Species and Food Web Collapse in Tropical Floodplain Lagoons." Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc115137/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This thesis investigates the influence of nonrandom species loss on the structure and functioning of trophic floodplain lagoons. Two experiments were conducted based on different realistic scenarios of biodiversity loss using multitrophic fish assemblages derived from long-term survey data. Loss of fish diversity influenced overall ecosystem multifunctionality of these lagoons through complex multitrophic interactions throughout the aquatic food web. These results indicate that biodiversity loss from diverse multitrophic ecosystems can influence ecosystem structure and function and likely deviate from simplified food chain dynamics or patterns that emerged from single trophic level studies.
16

Messineo, Graziano. "Simulatore di Rete NS3 per la valutazione delle prestazioni del sistema LTE." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
La tesi si incentra sullo studio del simulatore Network Simulator 3 per la simulazione di reti LTE. Si inizia con l'introduzione allo standard LTE, definendone le tecnologie utilizzate e le innovazioni apportate alle reti di comunicazione. Si introduce, quindi, il simulatore ns-3 e ci si sofferma sulle funzionalità utilizzate. Si prosegue con la presentazione e la valutazione di simulazioni del sistema LTE in scenari con uno o due eNodeB e uno o due utenti mobili per verificare il funzionamento del simulatore e del sistema LTE in termini di throughput, ritardi e di funzionalità di handover. Infine, si presentano simulazioni della rete LTE nello scenario di Bologna tramite l'utilizzo del route mobility model per la generazione di traffico realistico. I risultati mostrano il throughput medio percepito da ciascun utente in funzione della copertura effettuata e suggeriscono potenziali sviluppi futuri in termini di copertura e sviluppo di rete.
17

Lu, Chao-wei, and 呂兆威. "Implementation and verification of CR-MAC protocals in realistic scenario." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/73393284505687963952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
碩士
國立中央大學
資訊工程研究所
100
Medium Access Control (MAC) protocol play a vital role in cognitive radio (CR). It is well-known that implementation of CR MAC is rare in this issue. There has been some papers which are implement CR MAC with different testbed and test it in different scenario. In our work, we propose a lightweight MAC protocol without complexity mechanism and it can verify various spectrum access algorithm which contains channel hopping algorithm or clustering algorithm in synchronous or not. With implementing on GNU Radio and Universal Software Radio Peripheral (USRP) platform, we discuss various design considerations and challenges of our MAC in experiment. Our experimental results presents the performance of each spectrum access algorithm which is running under PU which is run in 802.11 protocol.
18

Pai, Vishwesh. "Effects of VANETs on vehicle transit time and average speed in realistic scenarios." 2009. http://www.lib.ncsu.edu/theses/available/etd-08182009-133859/unrestricted/etd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Chen, Yu-Ming, and 陳昱銘. "A Deep Learning and Aggregation Network Based Face Surveillance System, Tested by Realistic Scenarios." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/8rdfyh.

Full text
APA, Harvard, Vancouver, ISO, and other styles

To the bibliography