Thèses sur le sujet « Analysis of encrypted network flow »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 50 meilleures thèses pour votre recherche sur le sujet « Analysis of encrypted network flow ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
Toure, Almamy. « Collection, analysis and harnessing of communication flows for cyber-attack detection ». Electronic Thesis or Diss., Valenciennes, Université Polytechnique Hauts-de-France, 2024. http://www.theses.fr/2024UPHF0023.
Texte intégralThe increasing complexity of cyberattacks, characterized by a diversification of attack techniques, an expansion of attack surfaces, and growing interconnectivity of applications with the Internet, makes network traffic management in a professional environment imperative. Companies of all types collect and analyze network flows and logs to ensure the security of exchanged data and prevent the compromise of information systems. However, techniques for collecting and processing network traffic data vary from one dataset to another, and static attack detection approaches have limitations in terms of efficiency and precision, execution time, and scalability. This thesis proposes dynamic approaches for detecting cyberattacks related to network traffic, using feature engineering based on the different communication phases of a network flow, coupled with convolutional neural networks (1D-CNN) and their feature detector. This double extraction allows for better classification of network flows, a reduction in the number of attributes and model execution times, and thus effective attack detection. Companies also face constantly evolving cyber threats, and "zero-day" attacks that exploit previously unknown vulnerabilities are becoming increasingly frequent. Detecting these zero-day attacks requires constant technological monitoring and thorough but time-consuming analysis of the exploitation of these vulnerabilities. The proposed solutions guarantee the detection of certain attack techniques. Therefore, we propose a detection framework for these attacks that covers the entire attack chain, from the data collection phase to the identification of any type of zero-day, even in a constantly evolving environment. Finally, given the obsolescence of existing datasets and data generation techniques for intrusion detection, and the fixed, non-evolving, and non-exhaustive nature of recent attack scenarios, the study of an adapted synthetic data generator while ensuring data confidentiality is addressed. The solutions proposed in this thesis optimize the detection of known and zero-day attack techniques on network flows, improve the accuracy of models, while ensuring the confidentiality and high availability of data and models, with particular attention to the applicability of the solutions in a company network
Izadinia, Vafa Dario. « Fingerprinting Encrypted Tunnel Endpoints ». Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/25351.
Texte intégralDissertation (MSc (Computer Science))--University of Pretoria, 2005.
Computer Science
unrestricted
Heller, Mark D. « Behavioral analysis of network flow traffic ». Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5108.
Texte intégralNetwork Behavior Analysis (NBA) is a technique to enhance network security by passively monitoring aggregate traffic patterns and noting unusual action or departures from normal operations. The analysis is typically performed offline, due to the huge volume of input data, in contrast to conventional intrusion prevention solutions based on deep packet inspection, signature detection, and real-time blocking. After establishing a benchmark for normal traffic, an NBA program monitors network activity and flags unknown, new, or unusual patterns that might indicate the presence of a potential threat. NBA also monitors and records trends in bandwidth and protocol use. Computer users in the Department of Defense (DoD) operational networks may use Hypertext Transport Protocol (HTTP) to stream video from multimedia sites like youtube.com, myspace.com, mtv.com, and blackplanet.com. Such streaming may hog bandwidth, a grave concern, given that increasing amounts of operational data are exchanged over the Global Information Grid, and introduce malicious viruses inadvertently. This thesis develops an NBA solution to identify and estimate the bandwidth usage of HTTP streaming video traffic entirely from flow records such as Cisco's NetFlow data.
McClenney, Walter O. « Analysis of the DES, LOKI, and IDEA algorithms for use in an encrypted voice PC network ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA297919.
Texte intégralKattadige, Chamara Manoj Madarasinghe. « Network and Content Intelligence for 360 Degree Video Streaming Optimization ». Thesis, The University of Sydney, 2023. https://hdl.handle.net/2123/29904.
Texte intégralDandachi, Najib H. « Network flow method for power system analysis ». Thesis, Imperial College London, 1989. http://hdl.handle.net/10044/1/47398.
Texte intégralMartin, Kevin M. « A geographic and functional network flow analysis tool ». Thesis, Monterey, California : Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42679.
Texte intégralCritical infrastructure systems, such as water and electricity, are important for society and national defense. There is a need for network analysis tools that allow analysts to study potential scenarios to discover vulnerabilities, assess consequences, and evaluate effective solutions to overcome network weaknesses. In order to be useful, models of critical infrastructure systems need to be realistic, both geospatially and functionally. The objective of this thesis is to bridge the gap between geospatial and functional network analysis by developing a software tool that allows users to create and edit networks in a Graphical Information System (GIS) visual environment, and then also run and view the results of functional network models. Our primary contribution is to provide an easy-to-use, graphical interface in the form of a plugin that allows users, regardless of their network expertise, to create networks and exercise network flow models on them. We demonstrate the usefulness of our plugin through the analysis of a fictional case study with a realistic Internet infrastructure. We run several minimum cost flow models with simulated network attacks to assess the robustness of the network.
Zickel, Michael J. « Using ecosystem network analysis to quantify fluid flow ». College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/2987.
Texte intégralThesis research directed by: Marine, Estuarine, Environmental Sciences Graduate Program. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Herbert, Alan. « Bolvedere : a scalable network flow threat analysis system ». Thesis, Rhodes University, 2019. http://hdl.handle.net/10962/71557.
Texte intégralGlockner, Gregory D. « Dynamic network flow with uncertain arc capacities ». Diss., Georgia Institute of Technology, 1997. http://hdl.handle.net/1853/30734.
Texte intégralHuang, Henna Priscilla. « Hybrid flow data center network architecture design and analysis ». Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/108998.
Texte intégralCataloged from PDF version of thesis.
Includes bibliographical references (pages 127-132).
In this thesis, we propose a hybrid flow network architecture for future data center. The hybrid flow architecture has its origins in the early 1990s with studies on all-optical networks and fiber-optical computer networks. Research in optical flow switching has spanned over two decades. Our contribution to the study of all-optical networks is on the performance of hybrid flow data center networks. We compare the delay performance of hybrid flow architectures and traditional packet switched networks in future data center. We present a simplified data center traffic model, where data center traffic is categorized into mice traffic and elephant flows. The electronic packet switched architecture allows for low overhead and complexity for small transactions. However, mice traffic suffers as the size, fraction, and arrival rates of elephant flows increase. In the hybrid flow architecture, elephant flows are transmitted on an all-optical flow-switched data plane, where wavelength channels are reserved for the duration of a flow. In addition, the hybrid flow architecture allows for the dynamic allocation of optical wavelengths. In electronic packet switched networks, wavelength assignments are static, where traditional networking protocols do not consider the optical domain in routing decisions. We show that the hybrid flow architecture allows for superior delay performance compared to the electronic packet switched architecture as data rates and data volume increase in future data center networks.
by Henna Huang.
Ph. D.
Wang, Shentao. « Supply chain planning using network flow optimization ». online access from Digital Dissertation Consortium access full-text, 2003. http://libweb.cityu.edu.hk/cgi-bin/er/db/ddcdiss.pl?MQ89164.
Texte intégralCassir, C. « A flow model for the analysis of transport network reliability ». Thesis, University of Newcastle Upon Tyne, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.364764.
Texte intégralLam, Yan-yan, et 林欣欣. « Algorithms for the minimum cost flow problem ». Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30246052.
Texte intégralNOGUEIRA, GIOVANE BARROSO LIMA. « ANALYSIS OF EMULSION FLOW THROUGH POROUS MEDIA USING CAPILLARY NETWORK MODEL ». PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2011. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=18104@1.
Texte intégralEmulsões podem ser utilizadas como agentes de controle de mobilidade em diferentes processos de recuperação melhorada de petróleo e armazenamento de carbono em reservatórios porosos. A aplicação desta técnica, com a escolha correta das características das emulsões injetadas e a determinação das condições de operação ótimas, requer um entendimento adequado do escoamento de emulsões em meios porosos. As características macroscópicas do fluxo de emulsões através de meios porosos estão diretamente ligadas ao escoamento bifásico na escala de poros. Modelos de rede de capilares permitem a implementação dos mecanismos de fluxo das gotas nas gargantas de poros e fornecem parâmetros macroscópicos do escoamento. Neste trabalho, o escoamento de emulsões em meios porosos é analisado através de um modelo dinâmico de rede de capilares tridimensional e não-estruturada. A distribuição de pressão nos poros, e consequentemente o fluxo em cada capilar da rede, é determinada pelo balanço de massa em cada poro. O efeito das gotas da fase dispersa no comportamento do escoamento em cada elemento da rede é descrito por um fator de bloqueio de fluxo baseado em resultados experimentais de escoamento de emulsões através de micro capilares com gargantas. O fator de bloqueio descreve a mudança da condutividade de cada elemento e é uma função da geometria da garganta, do tamanho e concentração volumétrica da fase dispersa e do número de capilaridade local. A distribuição de concentração da fase dispersa ao longo da rede é descrita através de uma equação de transporte de massa, permitindo assim o estudo do processo de filtragem de gotas nos poros e o estudo da injeção alternada de água e emulsão. A integração no tempo do modelo dinâmico é feita por um método semi-implícito e o sistema de equações não linear obtido a cada passo de tempo é resolvido através de um método iterativo. Os resultados apresentam a evolução da redução da permeabilidade e concentração de gotas na saída do meio poroso em função do tamanho das gotas, da vazão de injeção, da concentração da emulsão injetada e do volume injetado de emulsão. A análise da injeção alternada de água-emulsão mostra claramente o bloqueio de poros por gotas da emulsão e a alteração no padrão de escoamento após reiniciada a injeção de água.
Emulsions can be used as mobility control agents in different enhanced oil recovery and carbon storage methods in oil reservoirs. The application of this technique, with the correct choice of the injected emulsion characteristics and the determination of optimal operating conditions, requires an adequate understanding of the emulsion flow in porous media. The macroscopic characteristics of the emulsion flow through porous media are directly linked to the two-phase flow at the pore scale. Capillary network models allow the implementation of the drop flow mechanisms in the pore throats and the determination of macroscopic flow parameters. In this work, emulsion flow in porous media is analyzed through an unstructured 3D dynamic network model. The pressure distribution, and consequently the flow rate in each capillary of the network, isdetermined by mass balance equation in each pore. The effects of the drops of dispersed phase in the flow behavior within each element of the network is described by a flow blocking factor based on experimental results on emulsion flow through single microcapillary tubes with throats. The blocking factor describes the changes in the conductivity of each element and it is a function of the throat geometry, the size and volumetric concentration of the dispersed phase and the local capillary number. The concentration distribution of the dispersed phase along the network is described by a mass transport equation, allowing the study of the filtration process of the drops in the pores and the analysis of the alternate injection of water and emulsion.Time integration in the dynamic model is performed by a semi-implicit method and the non-linear system of equations obtained in each time step is solved by an iterative method. The results illustrate the evolution of the permeability reduction and the effluent concentration of drops as a function of the drops size, injection flow rate, concentration of the injected emulsion and injected volume of emulsion. The analysis of the emulsion/water alternate injection clearly shows the pore blockage by the emulsion drops and the change in the flow pattern after the reinjection of water.
PISA, GIULIA. « Evaluation of ecological network effectiveness by means of gene flow analysis ». Doctoral thesis, Università degli Studi di Milano-Bicocca, 2014. http://hdl.handle.net/10281/51785.
Texte intégralZhang, Pengfei, et Neng Fan. « Analysis of budget for interdiction on multicommodity network flows ». Springer, 2016. http://hdl.handle.net/10150/623040.
Texte intégralFeinauer, Lynn Ralph. « Generic Flow Algorithm for Analysis of Interdependent Multi-Domain Distributed Network Systems ». Diss., Virginia Tech, 2009. http://hdl.handle.net/10919/40010.
Texte intégralPh. D.
Azab, Ahmad. « Classification of network information flow analysis (CONIFA) to detect new application versions ». Thesis, Federation University Australia, 2015. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/97576.
Texte intégralDoctor of Philosophy
Chong, Yew Chuan. « Thermal analysis and air flow modelling of electrical machines ». Thesis, University of Edinburgh, 2015. http://hdl.handle.net/1842/10466.
Texte intégralBrown, Douglas Graeme. « Formal network behaviour analysis using model checking ». Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93693/1/Douglas_Brown_Thesis.pdf.
Texte intégralLiu, Dan. « Computational analysis of blood flow and oxygen transport in the retinal arterial network ». Thesis, Imperial College London, 2010. http://hdl.handle.net/10044/1/6033.
Texte intégralGülpinar, Nalân. « Analysis of large scale linear programming problems with embedded network structures : detection and solution algorithms ». Thesis, Brunel University, 1998. http://bura.brunel.ac.uk/handle/2438/7123.
Texte intégralHaiba, Mohamed Salem. « A study and implementation of the network flow problem and edge integrity of networks ». Virtual Press, 1991. http://liblink.bsu.edu/uhtbin/catkey/834644.
Texte intégralDepartment of Computer Science
Pretorius, Johannes Jacobus. « A network approach for the prediction of flow and flow splits within a gas turbine combustor ». Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/26712.
Texte intégralDissertation (MEng (Mechanical Engineering))--University of Pretoria, 2005.
Mechanical and Aeronautical Engineering
unrestricted
Azhar, Maryam. « Design optimisation of a CO2 pipeline network in Australia under variable flow ». Thesis, The University of Sydney, 2022. https://hdl.handle.net/2123/28856.
Texte intégralRaini, Rebecca Kemunto. « IPM information network analysis case study on information flow in integrated tomato pest management in Kenya ». Weikersheim Margraf, 2006. http://deposit.d-nb.de/cgi-bin/dokserv?id=2849928&prov=M&dok_var=1&dok_ext=htm.
Texte intégralTrussell, Larry V. « Segflow : a new object-oriented load flow which uses trace methods and affiliation objects ». Diss., Virginia Tech, 1994. http://hdl.handle.net/10919/40082.
Texte intégralGautier, Antoine. « Singly-constrained monotropic network flow problems : a linear time transformation to unconstrained problems and qualitative sensitivity analysis ». Thesis, University of British Columbia, 1990. http://hdl.handle.net/2429/30879.
Texte intégralBusiness, Sauder School of
Graduate
Jadidi, Zahra. « Flow-based Anomaly Detection in High-Speed Networks ». Thesis, Griffith University, 2016. http://hdl.handle.net/10072/367890.
Texte intégralThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Cmmunication Technology
Science, Environment, Engineering and Technology
Full Text
Wang, Zhuoyang. « Application of Complex Network Theory in Power System Security Assessment ». Thesis, The University of Sydney, 2016. http://hdl.handle.net/2123/17367.
Texte intégralKuo, Hsien-Chih. « Applying network flow and simulated annealing in job shop rescheduling due to machine breakdowns ». Ohio : Ohio University, 1996. http://www.ohiolink.edu/etd/view.cgi?ohiou1178224749.
Texte intégralMin, Liang. « Decomposition algorithms for multi-area power system analysis ». Texas A&M University, 2003. http://hdl.handle.net/1969.1/5919.
Texte intégralLópez, Claudio David. « Shortening time-series power flow simulations for cost-benefit analysis of LV network operation with PV feed-in ». Thesis, Uppsala universitet, Elektricitetslära, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-242099.
Texte intégralBard, Ari. « Modeling and Predicting Heat Transfer Coefficients for Flow Boiling in Microchannels ». Case Western Reserve University School of Graduate Studies / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=case1619091352188123.
Texte intégralAkbar, Ghanadian Sara. « A Framework Based on Social Network Analysis (SNA) to Evaluate Facilities and Alternative Network Designs for Closed Loop Supply Chains ». Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1596583638602018.
Texte intégralMartin, Mogamat Noer. « Optimal placement and effect of a wind farm on load flow and protection systems in a municipal distribution network ». Master's thesis, Faculty of Engineering and the Built Environment, 2019. http://hdl.handle.net/11427/31005.
Texte intégralConley, Thomas A. « Effective Programmatic Analysis of Network Flow Data for Security and Visualization using Higher-order Statistics and Domain Specific Embedded Languages ». Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1336482912.
Texte intégralStansberry, Kathleen, et Kathleen Stansberry. « One-Step, Two-Step, or Multi-Step Flow : The Role of Influencers in Information Processing and Dissemination in Online, Interest-Based Publics ». Thesis, University of Oregon, 2012. http://hdl.handle.net/1794/12416.
Texte intégralSikdar, Kieran Jonah. « Material Flow Optimization And Systems Analysis For Biosolids Management : A Study Of The City Of Columbus Municipal Operations ». Columbus, Ohio : Ohio State University, 2008. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1218074193.
Texte intégralIsik, Zerrin. « Network Structure Based Pathway Enrichment System To Analyze Pathway Activities ». Phd thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12612951/index.pdf.
Texte intégralWan, Yen-Tai. « Material transport system design in manufacturing ». Diss., Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-03282006-231022/.
Texte intégralDr. Yih-Long Chang, Committee Member ; Dr. Martin Savelsbergh, Committee Member ; Dr. Leon McGinnis, Committee Co-Chair ; Dr. Gunter Sharp, Committee Chair ; Dr. Doug Bodner, Committee Member ; Dr. Joel Sokol, Committee Member.
Yeates, Christopher. « Multi-Scale Study of Foam Flow Dynamics in Porous Media ». Thesis, Sorbonne université, 2019. http://www.theses.fr/2019SORUS023/document.
Texte intégralIn this work, we use of a high-complexity micromodel of fixed structure on which we perform a series of experiments with varying injection rates, foam qualities, inlet bubble size distributions and injection methods. We perform individual bubble tracking and associate flow properties with bubble size properties and structural characteristics of the medium. We propose new tools describing the local and global flow in different ways. We establish specific behaviors for different bubble sizes, demonstrating that trapped foams are more likely to have smaller than average bubble sizes, while flowing bubbles also tend to segregate in different flow paths according to bubble size. Larger bubbles tend to flow in high-velocity preferential paths that are generally more aligned with pressure gradient, but smaller bubbles tend to access in supplement transversal paths linking the different preferential paths. Furthermore, for our data we establish the pre-eminence of the trapped foam fraction over bubble density within the microscopic explanation of apparent viscosity, although both contribute to some degree. We structurally characterize consistently trapped zones as areas with either low pore coordination, low entrance throat size, unfavorable throat orientation or a combination thereof. High-flow zones however cannot be characterized in terms of local structural parameters and necessitate integration of complete path information from the entire model. In this regard, in order to capture the high-flow zones, we develop a path-proposing model that makes use of a graph representation of the model, from an initial decomposition into pores and throats, that uses only local throat size and throat orientation relative to pressure gradient to characterize paths
Lei, Peng. « A Linear Programming Method for Synthesizing Origin-Destination (O-D) Trip Tables from Traffic Counts for Inconsistent Systems ». Thesis, Virginia Tech, 1998. http://hdl.handle.net/10919/36860.
Texte intégralMaster of Science
Zhang, Lei Ph D. Massachusetts Institute of Technology Department Electrical Engineering and Computer Science fl 2014. « Network management and control of flow-switched optical networks : joint architecture design and analysis of control plane and data plane with physical-layer impairments ». Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/100879.
Texte intégralCataloged from PDF version of thesis.
Includes bibliographical references (pages 175-178).
Optical Flow Switching (OFS) that employs agile end-to-end lightpath switching for users with large transactions has been shown to be cost-effective and energy-efficient. However, whether it is possible to coordinate lightpath switching and scheduling at a global scale on a per-session basis, and how the control plane and data plane performance correlate remained un-answered. In this thesis, we have addressed the network management and control aspect of OFS, and designed a network architecture enabling both a scalable control plane and an efficient data plane. We have given an overview of essential network management and control entities and functionalities. We focused on the scheduling problem of OFS because its processing power and generated control traffic increase with traffic demand, network size, and closely correlate with data network architecture, while other routine maintenance type of control plane functionalities contribute either a fixed amount or negligibly to the total efforts. We considered two possible Wide Area Network architectures: meshed or tunneled, and developed a unified model for data plane performance to provide a common platform for the performance comparison of the control plane. The results showed that with aggregation of at least two wavelengths of traffic and allowing about two transactions per wavelength to be scheduled to the future, the tunneled architecture provides comparable data plane performance as the meshed architecture. We have developed a framework to analyze the processing complexity and traffic of the control plane as functions of network architecture, and traffic demand. To guarantee lightpath quality in presence of physical-layer impairments, we developed models for quality of EDFA-amplified optical links and impairment-aware scheduling algorithms for two cases, a) the known worst case of channel quality is when there is no "On" channel in a fiber, and b) detailed channel configuration of a fiber is needed to determine channel quality. Without physical-layer impairments, tunneled architecture reduces control plane traffic and processing complexity by orders of magnitude. With impairment-aware scheduling, detailed channel configuration information reporting leads to heavy control traffic (~250 Gbps/edge); while known worst case and tunneling leads to manageable control traffic (~36 Gbps/edge) and processing power (1-4 i7 CPUs).
by Lei Zhang.
Ph. D.
Meredith, Gwendŵr R. « Boundaries and Bridges in Rangeland Social-Ecological Systems : Studies of Collaboration, Innovation, and Information Flow ». DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7688.
Texte intégralElfstadius, Martin, et Daniel Gecer. « Method to Detect and Measure Potential Market Power Caused by Transmission Network Congestions on Electricity Markets ». Thesis, Linköping University, Department of Electrical Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-12133.
Texte intégralThis thesis is based on studies of the deregulated electricity markets located in the United States of America. The problem statement of the thesis evolved continuously throughout our initial period of research. Focus was finally put on monitoring and detection of potential market power caused by congestion in the transmission network. The existence of market power is a serious concern in today’s electric energy markets. A system that monitors the trading is needed and much research and many proposals on how to deal with this problem have been introduced over the years. We focus on some of these approaches and develop an approach of our own, which we call “Monopolistic Energy Calculation”. We adopt the idea to identify participants with the ability to raise prices without losing market share. An ability that should not be present on a competitive market. We take this idea further by identifying participants with the ability to make considerable price raises without losing all market shares. We propose a way to calculate the remaining market shares (Monopolistic Energy Levels) after a large price raise. These calculated levels of energy, that are only deliverable by a certain participant or by a certain group of participants, are caused by the active congestions in the network.
The approach detects the amounts of these energy levels and the location in the network at which they are present. This is a prospective method if used with a prediction of the following day’s demand, which is regularly available with high accuracy. The method can also be used for monitoring purposes to identify critical situations in real-time. The method is implemented and two sets of simulations are done in which we explain and evaluate the approach. The results are promising and the correlation between “Monopolistic Energy” and market power is confirmed.
Detta examensarbete är baserat på studier av de deregulerade electricitsmarknaderna i USA. Problemformuleringen var i början av detta arbete inte definitiv, utan utvecklades under en längre inledande fas av forskningsarbete. Slutligen kunde vi faställa att detektion av potentiell marknadskraft på elektricitetsmarknaden, orsakat av överbelastningar i transmissionnätverket, var av särskilt intresse. Ett system som övervakar handeln och förekomster av orättvisor orsakat av detta är nödvändigt. Det har de senaste åren gjorts mycket forskning inom detta område. Baserat på denna forskning utvecklades sedan ett eget förslag, som vi kallar ”Monopolistic Energy Calculations”. Vissa tidigare förslag på hur problemet kan angripas blev av särskilt intresse. En idé från dessa var att identifiera marknadsaktörer med förmågan att höja priser utan att förlora marknadsandelar, en icke önskvärd egenskap hos aktörer då en konkurrenskraftig marknad är eftertraktad.
Vi tar denna idé ett steg längre genom att identifiera marknadsaktörer med förmågan att höja priser signifikant utan att förlora alla marknadsandelar. Vi föreslår ett sätt att beräkna dessa energinivåer som endast är möjliga att levereras av en eller ett fåtal särskilda aktörer, som direkt följd av de aktiva stockningarna i nätverket, under antagandet av en inelastisk efterfrågan. Vi föreslår ett sätt att beräkna de återstående marknadsandelarna (Monopolistic Energy Levels) efter en stor prishöjning. Vår metod beräknar mängden av denna energi och var i nätverket dessa mängder förekommer. Denna metod kan sia om framtida problem om en estimering av morgondagens efterfråga används. Sådana estimeringar görs idag
regelbundet med hög träffsäkerhet. Metoden kan även användas i realtid för upptäckt av kritiska marknadssituationer. Simuleringar av detta görs som förklarar vår lösning och utvärderar den. Resultaten är lovande och korrelationen mellan ”Monopolistisk Energi” och marknadskraft är bekräftade.
Högstedt, Malin, et MIKAELA KENNE. « En effektiv etablering av kundinfomation för att öka värdet i produktutveckling ». Thesis, KTH, Maskinkonstruktion (Inst.), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-192525.
Texte intégralNowadays, it is well known that it is highly important to involve the customers in the product development in order to better understand the needs of the market, increase the relations to customers and maximize the value creation of the products. This will result in a higher innovation capacity for the organization. This case study intends to answer the research questions, how to allocate the customer information flow in a systematic approach at a medium size high technology company in order to increase the innovation capacity. The research methodology consists of three different parts including pre study, social network analysis, and internal and external benchmarking. The pre study consists of 21 interviews internally in the organization and the social network analysis is based on a survey, which 49 individuals have answered. The benchmarking involves six employees from another department and two interviews with external companies within the same business. The results indicate that the amount of customer interactions with external parties must be decreased in order to systematically receive and maintain customer information. In order to increase the information flow within the organization a specific department, that have daily contacts with almost all departments, should act as a transmitting function as they would connect marketing with research and development. Furthermore, the customer information should be included in the daily working process as it is easier for the employees to embrace and jointly utilize this information.
Portelli, Rebecca. « CheesePi : Delay Characterization through TCP-based Analysis from End-to-End Monitoring ». Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-194244.
Texte intégralMed ökande tillgång till den sammankopplade IP-nätet, krävs det en snabbare responstid från Internettjänster. Trafik från surfning, den näst mest populära tjänsten är särskilt tidskänsliga. Detta kräver tillförlitlighet och en garanti för data leverans med en god servicekvalitet från Internetleverantörer. Dessutom har de flesta av befolkningen inte den tekniska bakgrunden för att övervaka fördröjning sig från sina hemmanätverk, och deras Internetleverantörer har ingen utsiktspunkt för att övervaka och diagnostisera nätverksproblem från användarnas perspektiv. Därför syftet med denna forskning är att karakterisera “in-protokoll” fördöljingen i nätet, som påträffas under surfning inifrån ett LAN. Denna forskning visar TCP-trafik monitoring som utförs på en klientenhet, samt separat TCP-trafik monitoring över både klient-end och serve-end enheter, för att observera en automatiserad webbklient / server-kommunikation. Detta följs av offline analys av de infångade tracer där varje TCP flöde dissekerades in: handskakning, dataöverföring, och nedkoppling faser. Syftet bakom sådan utvinning är att möjliggöra karakterisering av nätverk fördröjning samt nätverkets fysiska fördröjning, behandlingsfördröjning, webböverföringsfördröjning och förlorade paket som uppfattas av end-device under dataöverföring. The outcome of measuring from both end devices showed that monitoring from both ends of a client/server communication results to a more accurate measurement of the genuine delay encountered when packets traverse the network than when measuring from the client-end only. Primarily, this was concluded through the ability to distinguish between the pure network delay and the kernel processing delay experienced during the TCP handshake and teardown. Secondly, it was confirmed that the two RTTs identified in a TCP handshake are not symmetrical and that a TCP teardown RTT takes longer than the TCP handshake RTT within the same TCP flow since a server must take measures to avoid SYN flooding attacks. Thirdly, by monitoring from both end devices, it was possible to identify routing path asymmetries by calculating the physical one-way delay a packet using the forward path in comparison to the physical delay of a packet using the reverse path. Lastly, by monitoring from both end devices, it is possible to distinguish between a packet that was actually lost and a packet that arrived with a higher delay than its subsequent packet during data transfer. Furthermore, utilizing TCP flows to measure the RTT delay excluding end host processing gave a better characterisation of the RTT delay as opposed to using ICMP traffic. Resultatet av mätningarna från både slut-enheter visar att övervakning från båda ändar av en klient / server-kommunikation resulterar en noggrannare mätning av fördröjningar som uppstår när paketen färdas över nätverket än vid mätning från den enda klienten. Främst avslutades detta genom förmågan att skilja mellan den rena nätfördröjningen och kernel bearbetning under TCP handskakning och nedkoppling. För det andra bekräftades att de två RTT som identifierats i en TCP handskakning inte är symmetriska och att TCP nedkoppling RTT är längre än TCP handskakning RTT inom samma TCP flödet, eftersom servern måste vidta åtgärder för att undvika SYN översvämning attacker. För det tredje, genom att övervaka från båda avancerade enheter, var det möjligt att identifiera path asymmetrier genom att beräkna den fysiska envägsfördröjningen av ett paket på framåtriktade banan i jämförelse med den fysiska fördröjningen för ett paket på den omvända banan. Slutligen genom att övervaka från båda end enheter, är det möjligt att skilja mellan ett paket som faktiskt förlorades och ett paket som kom med en högre fördröjning än dess efterföljande paket under dataöverföring. Dessutom utnyttjande av TCP flöden för att mäta RTT exkluderat end-nod porocessering gav en bättre karakterisering av RTT fördröjning jämfört med att ICMP-trafik.
Facó, Renata Tilemann. « Análise de papéis, formas de comunicação e fluxos de informação para o atendimento ao usuário na assistência farmacêutica : um estudo pela percepção do serviço de farmácia ». reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/135399.
Texte intégralThe Pharmaceutical Services consists of a set of people with different relations among them, exchanging lots of information on a daily basis. Thus, it cannot be seen as just a function of dispensing drugs, but as a resource complementing healthcare actions, with a wide approach that incorporates a multidisciplinary and integrality. The success of this process depends on the participation of different classes of healthcare professionals, besides users. The aim of this paper is to study the roles, the forms of communication and information flows that influence multidisciplinary operations of service to users in Pharmaceutical Services. Therefore, the city of Arroio do Tigre/RS was chosen and interviews occurred with professionals such as doctors, nurses, nursing technicians, pharmacists, health workers, dentists, psychologists and social workers involved in the city’s Pharmaceutical Services multidisciplinary network. The data obtained from the interviews were qualitatively analyzed, with the support of Microsoft Excel’s spreadsheets for the identification of patterns among the interviewed. The communication/information flows were analyzed with the aid of NodeXL, a social network analysis tool. The study concluded that there is a need of communication and information flow improvement as well as a more clarity regarding the system concept among the professionals involved in the user service network, clarifying the accountabilities and roles of each one inserted in the network for a more effective drug management.