Tesi sul tema "Mobile networks"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Mobile networks".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Cheng, Jerry. "Collaborative network security for heterogeneous mobile networks". Diss., Restricted to subscribing institutions, 2007. http://proquest.umi.com/pqdweb?did=1472132471&sid=1&Fmt=2&clientId=1564&RQT=309&VName=PQD.
Testo completoGlidden, Todd P. "Privacy for mobile networks via network virtualization". Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FGlidden.pdf.
Testo completoThesis Advisor(s): Singh, Gurminder ; Gibson, John. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Privacy, mobile networks, first responders, mobile file sharing, data dissemination. Includes bibliographical references (p. 47-49). Also available in print.
Suárez, Trujillo Luis Carlos. "Securing network slices in 5th generation mobile networks". Thesis, Brest, 2020. http://www.theses.fr/2020BRES0050.
Testo completoNetwork slicing is a cornerstone in the conception and deployment of enriched communication services for the new use cases envisioned and supported by the new 5G architecture.This document makes emphasis on the challenge of the network slicing isolation and security management according to policy. First, a novel access control model was created, that secures the interactions between network functions that reside inside the 5G system. Then, the management of the interactions between network slices was addressed. We coin the concept of network slice chains, which are conceived after security constraint validation according to policy. Lastly, a method to quantify isolation was developed, permitting to find out how well isolated a communication service is, which is offered via network slices. This enables network operators and customers to measure the isolation level and improve the configuration of the network slices so the isolation level can be enhanced. These components establish a solid framework that contributes to secure, vertically, the communication services of a 5G network and assess how secure they are with respect to their interactions and isolation
Moessner, K. "Reconfigurable mobile communication networks". Thesis, University of Surrey, 2001. http://epubs.surrey.ac.uk/844245/.
Testo completoDengiz, Orhan Smith Alice E. "Maximizing connectivity and performance in mobile ad hoc networks using mobile agents". Auburn, Ala., 2007. http://repo.lib.auburn.edu/2007%20Fall%20Dissertations/Dengiz_Orhan_22.pdf.
Testo completoCullen, Cionaith. "Network and signalling aspects of satellite personal communication networks". Thesis, University of Surrey, 1995. http://epubs.surrey.ac.uk/842984/.
Testo completoTrullols, Cruces Oscar. "Information dissemination in mobile networks". Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/276176.
Testo completoZincir, Ibrahim. "Behavioural profiling in mobile networks". Thesis, University of Plymouth, 2011. http://hdl.handle.net/10026.1/884.
Testo completoHuang, E. "Rethinking mobile ad hoc networks". Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604708.
Testo completoAssasa, Hany. "Service Mobility in Mobile Networks". Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166540.
Testo completoHaghnegahdar, Alireza. "Interference in wireless mobile networks". Thesis, University of British Columbia, 2014. http://hdl.handle.net/2429/46713.
Testo completoGudapati, Supriya. "Securing mobile ad hoc networks". Thesis, California State University, Long Beach, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=1604882.
Testo completoWireless sensor networks has been growing rapidly over the past few decades. Due to their flexibility, wireless sensor networks have been in practice in many areas. Unlike other network architectures, Mobile Ad hoc networks (MANETs) have no central architecture; every node is free to work both as a transmitter and receiver and it depends on neighboring nodes to send relay messages. Due to their advantages, MANETs are used in many different applications like health care and military. However the wide distribution of MANETs makes it vulnerable to malicious attacks. Hence it is necessary to design a secure system for MANETs. In this report, we implement a secure system named Enhanced Adaptive Acknowledgement especially for MANETs. To ensure higher security and reduce the network overhead and delay, we use a different approach called hybrid cryptography in our proposed scheme. Enhanced Adaptive Acknowledgment detects higher malicious attackers without greatly disturbing the network performances. In the simulation we compare the differences within the Enhanced Adaptive Acknowledgment (EAACK) before and after introducing the Hybrid cryptography approach.
Erramilli, Vijay. "Forewarding in Mobile Opportunistic Networks". Boston University Computer Science Department, 2009. https://hdl.handle.net/2144/1722.
Testo completoThomson Research, Paris; National Science Foundation (CCR-0325701, ANI-0322990); HAGGLE FET Project; Erramilli family.
Al-Bayatti, Ali Hilal. "Security management for mobile ad hoc network of networks (MANoN)". Thesis, De Montfort University, 2009. http://hdl.handle.net/2086/2417.
Testo completoWang, Hao. "Performance modelling of network management schemes for mobile wireless networks". Thesis, University of Edinburgh, 2009. http://hdl.handle.net/1842/13192.
Testo completoJeoun, Kristina S. "The tactical network operations communication coordinator in mobile UAV networks". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FJeoun.pdf.
Testo completoHo, Yao Hua. "Connectionless approach--a localized scheme to mobile ad hoc networks". Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002742.
Testo completoShankaran, Rajan, University of Western Sydney, of Science Technology and Environment College e School of Computing and Information Technology. "Security issues in mobile IP and mobile ad hoc networks". THESIS_CSTE_CIT_Shankaran_R.xml, 2004. http://handle.uws.edu.au:8081/1959.7/585.
Testo completoDoctor of Philosophy (PhD)
Cherriman, Peter John. "Mobile video networking". Thesis, University of Southampton, 1998. https://eprints.soton.ac.uk/251962/.
Testo completoChochlidakis, Georgios. "Mobility-aware virtual network embedding techniques for next-generation mobile networks". Thesis, King's College London (University of London), 2018. https://kclpure.kcl.ac.uk/portal/en/theses/mobilityaware-virtual-network-embedding-techniques-for-nextgeneration-mobile-networks(174e714f-2a4a-447a-bcd5-d526170377fd).html.
Testo completoDharne, Avinash Gopal. "Issues in autonomous mobile sensor networks". [College Station, Tex. : Texas A&M University, 2007. http://hdl.handle.net/1969.1/ETD-TAMU-1343.
Testo completoKobosko, Kristoffer, e Henrik Wallentin. "Mobile Groups in Ad-hoc Networks". Thesis, Uppsala University, Department of Information Technology, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-108036.
Testo completoMost current research on Mobile Ad-hoc NETworks (MANETs) concerns one ad-hocnetwork at a time. A common topic is how to handle the merging of new nodesappearing in range of an existing MANET into a new, larger network. CurrentMANET implementations do not define the handling of policies for controllingmembership or routing messages, neither do they support policy-based inter-MANETrouting.
In this thesis, we present an implementation of Mobile Group Protocol (MGP) whichenhances the reactive routing protocol AODV with an administrative framework inwhich Mobile Ad-hoc NETwork (MANET) policies are defined. Such policies are usedto control membership and signaling in a MANET. We define new roles for theMANET members such as nodes, leaders and gateways. We discuss the messageexchange taking place during forming of Mobile Groups (MGs) and study the theparticular implementation by simulating a group of simple MGP scenarios usingNetwork Simulator 2 (NS-2).
We conclude our work by discussing the using of MGP as a base for an inter-MANETrouting protocol providing policy-based routing in MANETs.
Karaminas, Panagiotis D. "Array processing in mobile radio networks". Thesis, Imperial College London, 2001. http://hdl.handle.net/10044/1/11483.
Testo completoBiswas, Subir Kumar. "Handling realtime traffic in mobile networks". Thesis, University of Cambridge, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320943.
Testo completoGiortzis, Athanasios. "Channel assignment in mobile radio networks". Thesis, Imperial College London, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.266017.
Testo completoKong, Chenguang, e 孔臣光. "Collaborative streaming in mobile social networks". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47849897.
Testo completopublished_or_final_version
Computer Science
Master
Master of Philosophy
Fabri, S. N. "Multimedia communications over mobile packet networks". Thesis, University of Surrey, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.343461.
Testo completoPanaousis, Emmanouil A. "Security for mobile ad-hoc networks". Thesis, Kingston University, 2012. http://eprints.kingston.ac.uk/23989/.
Testo completoJiang, Menglan. "Traffic management in heterogeneous mobile networks". Thesis, King's College London (University of London), 2017. https://kclpure.kcl.ac.uk/portal/en/theses/traffic-management-in-heterogeneous-mobile-networks(42f0075f-9433-4593-adf1-9401f7e8276a).html.
Testo completoToh, Chai-Keong. "Protocol aspects of mobile radio networks". Thesis, University of Cambridge, 1996. https://www.repository.cam.ac.uk/handle/1810/273055.
Testo completoPietiläinen, Anna-Kaisa. "Opportunistic mobile social networks at work". Paris 6, 2010. http://www.theses.fr/2010PA066587.
Testo completoWatson, Simon Andrew. "Mobile platforms for underwater sensor networks". Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/mobile-platforms-for-underwater-sensor-networks(00f93130-f9d6-4479-80ab-58a0c60327c0).html.
Testo completoMa, Wenchao. "Mobility management for wireless mobile networks". [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0001252.
Testo completoXu, Ji. "Data caching in wireless mobile networks /". View abstract or full-text, 2004. http://library.ust.hk/cgi/db/thesis.pl?COMP%202004%20XU.
Testo completoIncludes bibliographical references (leaves 57-60). Also available in electronic version. Access restricted to campus users.
Kumar, Kavitha. "Intrusion Detection in Mobile Adhoc Networks". Connect to full text in OhioLINK ETD Center, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1260232844.
Testo completoTypescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Bibliography: leaves 80-84.
Mosko, Marc Elliott. "Routing in mobile ad hoc networks /". Diss., Digital Dissertations Database. Restricted to UC campuses, 2004. http://uclibs.org/PID/11984.
Testo completoShigueta, Roni. "Channel Allocation in Mobile Wireless Networks". Thesis, Université Paris-Saclay (ComUE), 2018. http://www.theses.fr/2018SACLX037/document.
Testo completoThe intensive use of mobile data services has increasingly increased resource consumption over wireless networks. The main resource used for wireless communication is the frequency spectrum. As data traffic rises sharply, new bands of the frequency spectrum are not available in the same proportion, making the frequency spectrum increasingly scarce and saturated. Several proposals have been presented to optimize frequency channel allocation in order to mitigate interference between nearby links that are transmitting data. Many of them use a single criterion and does not consider the user behavior to guide the channel allocation process. Users have routine cycles and social behavior. They routinary move to work, to school, use their mobile devices generating data traffic, and they meet with friends forming clusters. These characteristics can be explored to optimize the channel allocation process.This thesis presents a channel allocation strategy for wireless networks based on user behavior. Our main contribution is to consider some characteristics of the user behavior, such as mobility, traffic, and popularity in the channel allocation process. In this way, we prioritize the channel allocation for the nodes that will remain in the network in a future time window, with higher traffic in the network, and with more popularity. We adopt a distributed approach that allows limiting the number of messages exchanged in the network while quickly responding to changes in the network topology. In our performance evaluation, we consider scenarios in ad hoc and vehicular networks, and we use some synthetic mobility models, such as SLAW and Manhattan grid, and the traces dataset of Cologne city. In the scenarios, we compare our mechanism with different types of approaches: i.e., a centralized (named TABU), a random (named RANDOM), a with largest spectral distance (named LD), and a with single channel (named SC). We evaluate metrics such as aggregated throughput, packet delivery rate, and end-to-end delay. Simulations considering ad hoc scenario with unicast routing show that our strategy presents improvements in terms of throughput at the order of 14.81% than RANDOM and 16.28% than LD channel allocation. In vehicular scenario, our strategy shows gains of packet delivery rate at the order of 11.65% and 17.18% when compared to RANDOM and SC methods, respectively. In both scenarios, the performance of our strategy is close to the upper bound search of the TABU centralized approach, but with lower overhead
Tin, Yiu Shing (Terry). "Secure key establishment for mobile networks". Thesis, Queensland University of Technology, 2005. https://eprints.qut.edu.au/16035/1/Yiu_Shing_Tin_Thesis.pdf.
Testo completoTin, Yiu Shing (Terry). "Secure Key Establishment for Mobile Networks". Queensland University of Technology, 2005. http://eprints.qut.edu.au/16035/.
Testo completoKobo, Hlabishi. "Situation-aware routing for wireless mesh networks with mobile nodes". Thesis, University of the Western Cape, 2012. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_6647_1370594682.
Testo completoZhao, Xiaogeng. "An adaptive approach for optimized opportunistic routing over Delay Tolerant Mobile Ad hoc Networks". Thesis, Rhodes University, 2008. http://hdl.handle.net/10962/d1004822.
Testo completoRogers, Paul Edward. "On robustness in high load mobile ad hoc networks". Diss., Online access via UMI:, 2005.
Cerca il testo completoPedersen, Finn. "Exploring Mobile TV in Sweden using Value Networks". Thesis, University of Gävle, Department of Business Administration and Economics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-4046.
Testo completoMobile TV is an application which has not yet been much described in academic literature. But the media and telecommunications industries are busy with Mobile TV deployment, motivated by for example decrease in revenues from existing products. This study should be seen as an exploratory study in the academia, aiming at a context for the experiences from exploratory work in the industry.
The study of the status of the application Mobile TV focused on legislation, spectra, content and terminals. These areas are of great interest for the telecom and the media industries, and their interests were described with regards to Mobile TV. Large structures like local legislation, spectral resource management on EU level and charging for content becomes visible and are discussed. On a lower level, two differences between the industries were high-lighted. One is the way revenue is collected for content, and the other is information sharing about the Consumers preferences. Overcoming these differences would ease collaboration. Another business topic for the two industries is the relation between the SIM card (which manifest the subscription) and the charging for content.A value network model which satisfies the legal, technical and business requirements is presented. In particular, a new role as Content Site Provider is identified. Since the interviewees suggested a future hybrid solution, both Mobile TV via streaming and via broadcast are included in the model.It is concluded that the telecom industry had all the means and incentive to create Mobile TV. It is also concluded that the process of digitalization is an ongoing process which continues to have an impact on the two industries, in that different offerings can be bundled together. One possible scenario is an Internet-like evolution of the mobile Internet, the Consumers will learn to find the applications closer to the source. This would make a broadcast solution less likely. The higher cost for over-the-air transmission is one obstacle for this scenario, but it might vanish with next generation mobile networks.
Kuhr, Mark Gregory Hamilton John A. "An adaptive jam-resistant cross-layer protocol for mobile ad-hoc networks In noisy environments". Auburn, Ala., 2009. http://hdl.handle.net/10415/1611.
Testo completoBaig, Adeel Computer Science & Engineering Faculty of Engineering UNSW. "Improving throughput and fairness of on-board mobile networks". Awarded by:University of New South Wales. School of Computer Science & Engineering, 2007. http://handle.unsw.edu.au/1959.4/28247.
Testo completoSousa, Ângelo Miguel Raposo Almeida e. "Forecasting key performance indicator of mobile networks: application to mobile cellular networks". Master's thesis, 2019. http://hdl.handle.net/10773/29563.
Testo completoO aumento do tráfego de dados no mundo, aumentou a necessidade dos operadores de redes móveis terem um maior cuidado a planear e gerir as suas infraestruturas. Este trabalho explora o desempenho de vários modelos estatísticos de previsão aplicados a tráfego de voz e de dados. Os dados têm origem numa rede móvel Europeia. Relativamente aos modelos preditivos, foram aplicados modelos clássicos como alisamento exponencial, Holt-Winters, ARIMA, Random-Walk; bem como duas propostas de modelos mais recentes. Em suma, esta dissertação mostra o desempenho de alguns modelos estatísticos clássicos, e como estes se comparam a modelos recentemente propostos. Também mostra que operadores de redes podem usar métodos preditivos estatísticos para tentar obter informações de como a sua rede pode reagir no futuro, dando assim informações valiosas para que estes efetuem uma melhor gestão da sua rede.
Mestrado em Engenharia Eletrónica e Telecomunicações
Chang-Jung, Kao, e 高長榮. "TCP in Mobile Networks". Thesis, 2002. http://ndltd.ncl.edu.tw/handle/29675103936203373345.
Testo completo國立臺灣大學
電機工程學研究所
90
Advent technology of mobile computing devices has accelerated the development of wireless networks in recent years. To date, mobile devices, such as notebooks, mobile phones, and PDAs, can connect to the Internet via specific wireless network system nowadays. However, due to the feature of mobility in the mobile devices, there are different characteristics compared with the wired one, such as higher bit error rate in the wireless link and temporary data disconnection due to handoff between base stations. In wireless environments, the protocols designed for wired network might degrade their performance due to the effects mentioned above. Thus, the issues of TCP in mobile networks will be studied in this thesis. TCP had been designed in wired networks to provide reliable and ordered data transmission service. However, TCP degrades its performance due to the features of high bit error rate and mobility when being adopted in mobile devices. Consequently, this thesis attempts to propose a solution to the problems. The main contribution of this thesis is to propose a new sender-side TCP extension mechanism to solve the inefficient bandwidth utilization resulting from handoff. In addition, we also simulate the performance of the proposed mechanism. The results prove the enhancement of bandwidth efficiency by adopting the proposed mechanism in TCP sender.
Lu, Chang-che, e 呂長哲. "Location-based Network Management System for Heterogeneous Mobile Networks". Thesis, 2007. http://ndltd.ncl.edu.tw/handle/35186404723344553357.
Testo completo國立中央大學
資訊工程研究所
95
With the improvement of society, the technology of internet is growing constantly. New wireless internet agreement like IEEE 802.11 (Wi-Fi) 、 IEEE 802.16 (WiMAX) and 3GPP (3rd Generation Partnership Project) provide internet users have different options for different broadband, different internet field and different prices. Many different wireless internet form an internet environment. We called it Heterogeneous wireless network environment. With new internet agreement getting mature, a variety of broadband wireless equipment is developed. To administer heterogeneous wireless network is becoming a significant issue when we face so many internet equipment at the same time. Traditional internet administration should be improved to manage heterogeneous wireless network environment. The most important problem in the administration of heterogeneous wireless network is how to administer many wireless networks at the same time. And it’s quite difficult to let internet administration center know the status of each wireless internet correctly and fast. Therefore, the essay offers a management system which applied to Heterogeneous wireless network. (Heterogeneous Mobile Network Management System,call the HMNMS). The system uses separated construction to set up a HMNMS on every different mobile wireless network. Every HMNMS will be able to share the information of Mobile Network with neighboring HMNMS. To measure intensity of message for bigger shooting range base with the location of smaller shooting range base. Making good use of several interfaces to decrease unnecessary cost on measurement. The system not only offers a convenient monitoring and manages wireless network equipment under Heterogeneous Mobile Network, but also analyze covering range of base through the intensity of message of the users and the location of users. With proper adjustment and the setting up of base location, to create the environment that internet exists everywhere.
Maji, A. "Load Balancing in Wireless Mobile Ad Hoc Networks". Thesis, 2010. http://ethesis.nitrkl.ac.in/1679/1/LOAD_BALANCING__(2).pdf.
Testo completoDolev, Shlomi, Seth Gilbert, Nancy A. Lynch, Elad Schiller, Alex A. Shvarstman e Jennifer Welch. "Virtual Mobile Nodes for Mobile Ad Hoc Networks". 2004. http://hdl.handle.net/1721.1/30450.
Testo completo