Rozprawy doktorskie na temat „NODE DETECTION”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „NODE DETECTION”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Resul, Hulya. "Node replication detection in sensor networks". College Park, Md. : University of Maryland, 2005. http://hdl.handle.net/1903/3253.
Pełny tekst źródłaThesis research directed by: Dept. of Electrical and Computer Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Chen, Wan Qing. "Predictors of Auxillary Lymph Node Involvement in Screen Detected Breast Cancer". Thesis, The University of Sydney, 2004. http://hdl.handle.net/2123/676.
Pełny tekst źródłaChen, Wan Qing. "Predictors of Auxillary Lymph Node Involvement in Screen Detected Breast Cancer". University of Sydney. Public Health, 2004. http://hdl.handle.net/2123/676.
Pełny tekst źródłaSchleip, Christoph. "Climate change detection in natural systems by Bayesian methods". kostenfrei, 2009. http://mediatum2.ub.tum.de/node?id=805580.
Pełny tekst źródłaKotari, Ravi Teja. "Node failure detection and data retrieval in wireless sensor networks". Thesis, California State University, Long Beach, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10108190.
Pełny tekst źródłaThis project presents a method for detecting node failure in a wireless sensor network. The defective node is identified using round-trip delay measurements. Data transfer from the transmitter section to the receiver section is accomplished via the ZigBee protocol. As soon as a node has been identified as defective, the node is removed from the sensor network. Information about the failed node is provided to users with registered mobile device through the Global System for Mobile (GSM) module. The proposed method has been successfully implemented and tested experimentally on a small sensor network using the LPC2148 ARM7 microcontroller.
Pettersson, Christopher. "Automatic fault detection and localization in IPnetworks : Active probing from a single node perspective". Thesis, Linköpings universitet, Programvara och system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-120414.
Pełny tekst źródłaAl-Riyami, Ahmed. "Towards an adaptive solution to data privacy protection in hierarchical wireless sensor networks". Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/towards-an-adaptive-solution-to-data-privacy-protection-in-hierarchical-wireless-sensor-networks(a096db2a-251c-4e9e-a4ff-8bfe4c6f1bf4).html.
Pełny tekst źródłaBarrus, Joseph D. "Intrusion detection in real-time in a multi-node, multi-host environment". Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1997. http://handle.dtic.mil/100.2/ADA341406.
Pełny tekst źródła"September 1997." Thesis advisor(s): Neil C. Rowe, Ronald Broersma. Includes bibliography references (p. 77). Also available online.
Khanapure, Vishal. "Memory efficient distributed detection of node replication attacks in wireless sensor networks". [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0025072.
Pełny tekst źródłaThekedar, Bhushan. "Investigations on the use of breath gas analysis with Proton Transfer Reaction Mass Spectrometry (PTR-MS) for a non-invasive method of early lung cancer detection". kostenfrei, 2009. https://mediatum2.ub.tum.de/node?id=821780.
Pełny tekst źródłaHoblos, Jalaa. "Selfish Node Misbehaving Statistical Detection with Active MAC Layer NAV Attack in Wireless Networks}". [Kent, Ohio] : Kent State University, 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=kent1164119272.
Pełny tekst źródłaKano, Masato. "Detection of Lymph Node Metasatasis of Oesophageal Cancer by RT-nested PCR for SCC antigen mRNA". Kyoto University, 2001. http://hdl.handle.net/2433/150176.
Pełny tekst źródłaJauhar, Ahmad Shujauddin. "A CMA-FRESH Whitening Filter for Blind Interference Rejection". Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/85389.
Pełny tekst źródłaMaster of Science
Wireless communication is complicated by the fact that multiple radios may be attempting to transmit at the same frequency, time and location concurrently. This scenario may be a due to malicious intent by certain radios (jamming), or mere confusion due to a lack of knowledge that another radio is transmitting in the same channel. The latter scenario is more common due to congested wireless spectrum, as the number of devices increases exponentially. In either case, interference results. We present a novel interference rejection method in this work, one that is blind to the properties of the interferer and adapts to cancel it. It follows the philosophy of property restoration as extolled by the constant modulus algorithm (CMA) and is a frequency shift (FRESH) filter, hence the name. The process of restoring the wireless spectrum to white noise is what makes it a whitening filter, and is also how it adapts to cancel interference. Such a filter has myriad possible uses, and we examine the use case of rejecting interference to detect or recover the signal-of-interest (SOI) that we are attempting to receive. We present performance results in both cases and compare with conventional time-invariant filters and state of the art FRESH filters.
Marits, Per. "On CD4+ T Lymphocytes in Solid Tumours". Doctoral thesis, Uppsala : Acta Universitatis Upsaliensis, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-8325.
Pełny tekst źródłaZia, Tanveer. "A Security Framework for Wireless Sensor Networks". University of Sydney, 2008. http://hdl.handle.net/2123/2258.
Pełny tekst źródłaSensor networks have great potential to be employed in mission critical situations like battlefields but also in more everyday security and commercial applications such as building and traffic surveillance, habitat monitoring and smart homes etc. However, wireless sensor networks pose unique security challenges. While the deployment of sensor nodes in an unattended environment makes the networks vulnerable to a variety of potential attacks, the inherent power and memory limitations of sensor nodes makes conventional security solutions unfeasible. Though there has been some development in the field of sensor network security, the solutions presented thus far address only some of security problems faced. This research presents a security framework WSNSF (Wireless Sensor Networks Security Framework) to provide a comprehensive security solution against the known attacks in sensor networks. The proposed framework consists of four interacting components: a secure triple-key (STKS) scheme, secure routing algorithms (SRAs), a secure localization technique (SLT) and a malicious node detection mechanism. Singly, each of these components can achieve certain level of security. However, when deployed as a framework, a high degree of security is achievable. WSNSF takes into consideration the communication and computation limitations of sensor networks. While there is always a trade off between security and performance, experimental results prove that the proposed framework can achieve high degree of security with negligible overheads.
Jafarian, Javad. "Modelling and analysis of wireless MAC protocols with applications to vehicular networks". Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/modelling-and-analysis-of-wireless-mac-protocols-with-applications-to-vehicular-networks(3695e637-12eb-4fde-9c31-08b3b46e8f55).html.
Pełny tekst źródłaCochran, Travis. "Ultra Low Power Wake-up Receiver with Unique Node Addressing for Wireless Sensor Nodes". Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/76909.
Pełny tekst źródłaMaster of Science
Sabo, Jozef. "Aplikace metody učení bez učitele na hledání podobných grafů". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445517.
Pełny tekst źródłaRu, Jifeng. "Adaptive estimation and detection techniques with applications". ScholarWorks@UNO, 2005. http://louisdl.louislibraries.org/u?/NOD,285.
Pełny tekst źródłaTitle from electronic submission form. "A dissertation ... in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Engineering and Applied Science"--Dissertation t.p. Vita. Includes bibliographical references.
Rinne, Vidar. "A Zoomable 3D User Interface using Uniform Grids and Scene Graphs". Thesis, Mälardalens högskola, Akademin för innovation, design och teknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-13360.
Pełny tekst źródłaYang, Ling. "Nodes failure detection in large scale network". Thesis, The University of Sydney, 2005. https://hdl.handle.net/2123/27923.
Pełny tekst źródłaNilsson, Kent. "Detection of wood decay using an electronic nose /". Uppsala : Swedish Univ. of Agricultural Sciences (Sveriges lantbruksuniv.), 1998. http://epsilon.slu.se/avh/1998/91-576-5602-9.gif.
Pełny tekst źródłaKumar, Kavitha. "Intrusion Detection in Mobile Adhoc Networks". Connect to full text in OhioLINK ETD Center, 2009. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1260232844.
Pełny tekst źródłaTypescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Bibliography: leaves 80-84.
Bhamidipati, Harini. "SINGLE TROJAN INJECTION MODEL GENERATION AND DETECTION". Case Western Reserve University School of Graduate Studies / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=case1253543191.
Pełny tekst źródłaSingamsetty, Ratna Sireesha. "Detection of Malicious Nodes in Mobile Ad hoc Networks". University of Toledo / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1321043030.
Pełny tekst źródłaMegahed, Mohamed Helmy Mostafa. "SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure". Thèse, Université d'Ottawa / University of Ottawa, 2014. http://hdl.handle.net/10393/31154.
Pełny tekst źródłaWestling, Magnus. "Microbial Processes and Volatile Metabolites in Cheese Detection of Bacteria Using an Electronic Nose". Thesis, Örebro universitet, Institutionen för naturvetenskap och teknik, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-42412.
Pełny tekst źródłaBarr, Elaine Lewis. "Acoustic sampling considerations for bats in the post-white-nose syndrome landscape". Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/104232.
Pełny tekst źródłaMaster of Science
Bat populations across North America are either facing new threats from white-nose syndrome (WNS) and wind energy development or have already experienced devastating declines. Accordingly, wildlife biologists need to know how to best monitor bats to document population and distribution changes, as well as where to look for remaining populations. Landscape-scale WNS impacts to summer bat populations are not well understood, and although acoustic technology is commonly used to monitor these populations, there is limited information about differences among acoustic detectors and the implications to managers thereof. My objectives were to model the relationship between WNS impact, influence of available bat hibernation caves, and environmental factors for summer nightly presence of three WNS-affected bats and to compare how multiple models of acoustic detectors perform in terms of detection probability and nightly recorded bat activity. I collected acoustic data from 10 study areas across Virginia, West Virginia, Ohio and Kentucky to describe changes in nightly presence of WNS-affected bat species during summer 2017. During the same period of time, I compared five types of acoustic detectors at Fort Knox, Kentucky. My results show potential viability of a WNS impact-year metric to predict summer bat presence, and highlight which environmental variables are relevant for large-scale acoustic monitoring. Additionally, my findings suggest that each of the detector types tested would suit most research and monitoring activities, but standardization of detector type within the scope of a project or study should be encouraged.
Liu, Hongxun. "Hardware assisted misbehaving nodes detection in mobile ad hoc networks". Online access for everyone, 2007. http://www.dissertations.wsu.edu/Dissertations/Summer2007/h_liu_072507.pdf.
Pełny tekst źródłaSahbai, Samine [Verfasser]. "Scintigraphic detection of sentinel nodes in endometrial cancer / Samine Sahbai". Tübingen : Universitätsbibliothek Tübingen, 2019. http://d-nb.info/1227963939/34.
Pełny tekst źródłaSharma, Nikita. "Detection of Similarly-structured Anomalous sets of nodes in Graphs". University of Cincinnati / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1627665644265336.
Pełny tekst źródłaMartinez, Rebecca L. "Chemosensory Evaluation of Prostate Cancer Cells". Thesis, Virginia Tech, 2010. http://hdl.handle.net/10919/46316.
Pełny tekst źródłaMaster of Science
Albert, Keith J. "Microbead array-based artificial nose : explosives detection and simple/complex odor discrimination /". Thesis, Connect to Dissertations & Theses @ Tufts University, 2001.
Znajdź pełny tekst źródłaAdviser: David R. Walt. Submitted to the Dept. of Chemistry. Includes bibliographical references. Access restricted to members of the Tufts University community. Also available via the World Wide Web;
Kershri, G. "Novel food applications of electronic nose technology for detection of spoilage fungi". Thesis, Cranfield University, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.392743.
Pełny tekst źródłaZaidi, Syed. "Detecting rogue nodes in vehicular ad-hoc networks (DETER)". Thesis, City, University of London, 2016. http://openaccess.city.ac.uk/17029/.
Pełny tekst źródłaMcDonald, Louise Ann. "A Comparison Of The Detection Of Tumour Cells In Cervical Lymph Nodes Of Patients With Head And Neck Squamous Cell Carcinoma By Testing For Spliced Transcripts Of Cytokeratin 5 Immunohistochemistry Or Light Microscopy; And The Prognostic Effect Compared With That Of Other Factors". Thesis, The University of Sydney, 2002. http://hdl.handle.net/2123/4456.
Pełny tekst źródłaNeedham, Rachel. "Early detection and differentiation of microbial spoilage of bread using electronic nose technology". Thesis, Cranfield University, 2004. http://hdl.handle.net/1826/786.
Pełny tekst źródłaRamzi, Ammari. "DESIGN AND DEVELOPMENT OF A FALL DETECTION DEVICE WITH INFRARED RECEIVING CAPABILITIES". Wright State University / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=wright1314139225.
Pełny tekst źródłaMishra, Alekha Kumar. "Node replica detection in wireless sensor networks". Thesis, 2014. http://ethesis.nitrkl.ac.in/6562/1/509CS103_thesis.pdf.
Pełny tekst źródłaLi, Wei, i 李威. "A Novel Node Movement Detection Scheme in Wireless Sensor Networks". Thesis, 2010. http://ndltd.ncl.edu.tw/handle/58345508926363398455.
Pełny tekst źródła國立中央大學
資訊工程研究所
98
The location information of sensors is significant in Wireless Sensor Network (WSN). However, after deploying and localizing the sensors, the location of sensors has to maintain constantly. Sensors may be moved from their original location by the depredation of the enemy or natural phenomena, and further, sensors return the inconsistent information with their incorrect location to sink or spread the incorrect location to the network resulted in arising problem with geographic protocol or applications. Consequently, in this paper, we proposed a new light-weight distributed scheme which is utilized the movement before and after with different topology to detect moved nodes. The simulation results show that our scheme can cost a bit of communication overhead and has high detection rate especially with large scale node movement.
FARUK, SYED MD OMAR. "Variants of the Critical Node/Edge Detection Problem on a tree". Doctoral thesis, 2021. http://hdl.handle.net/11577/3407812.
Pełny tekst źródłachen, stanley, i 陳嘉融. "The Malicious Node Detection and Identification Mechanisms for Wireless Sensor Networks". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/63265720978978639169.
Pełny tekst źródła長庚大學
資訊管理研究所
94
Wireless Sensor Network (WSN) is a new developing type of wireless networks. Comparing with Wireless Local Area Network (WLAN), WSN has more restrictions on hardware specification of sensor node and deployment environment. The application of WSN has been growing in recent years. Many security protocols that designed for this particular network had been developed, simulated, verified and successfully implemented. However, the security challenge and difficulty that WSN has to faced will not be able to be solved completely in a few years. This study will begin with improving the whole of security of WSN to propose a suite of malicious node detection and identification mechanisms for WSN. These mechanisms include key pre-load mechanism, neighbor discovery mechanism, authentication key distribution mechanism and node authentication mechanism. The first three mechanisms may be regard as pre-processing to execute the last mechanism. After pre-processing, node in the network can easily detect whether malicious node in its communication range exists. If malicious node exists, it could be identified simultaneously.
Yang, Shih-An, i 楊世安. "A Log-Only Node Fault Detection Method in Wireless Sensor Network". Thesis, 2011. http://ndltd.ncl.edu.tw/handle/40470148701113594855.
Pełny tekst źródłaHsieh, Kuan-Yu, i 謝冠宇. "Automatic Mediastinal Lymph Node Computer-aided Detection System in Chest CT". Thesis, 2013. http://ndltd.ncl.edu.tw/handle/28385362800471174861.
Pełny tekst źródła國立臺灣大學
資訊工程學研究所
101
Computed tomography (CT) plays an important role in the assessment of involvement of mediastinal lymph nodes for cancer staging. In the present clinical workflow, the radiologists need to examine all the slice of a CT scan manually for finding the enlarged lymph nodes which are possibly abnormal and this process is time-consuming and error-prone. Hence, in this study, a fully automatic system for detecting enlarged mediastinal lymph node in CT is proposed. First, two blob detectors are utilized for detecting the possible centers of lymph nodes following by a series of candidate reduction steps based on the intensity, size, and anatomical knowledge such as the extractions of mediastinum, airway tree and aortic arch. Second, the watershed transform is performed to segment the detected blobs for obtaining the lymph node candidate regions. Finally, two classifiers trained by the proposed feature sets including statistic, geometry, texture, and histogram in two different reduction phases are utilized for removing false positive detections. 25 contrast enhanced 3-D lung CT volumes are used to evaluate our proposed method. The proposed system achieved the sensitivities of 98.70%, 90.90%, 80.51%, 70.12%, and 61.00% with 22.04, 16.28, 10.56, 7.60, and 4.64 false positives per volume, respectively.
Eleutério, Ricardo Jorge Neves. "Microwave imaging of the axilla to aid breast cancer diagnosis". Master's thesis, 2014. http://hdl.handle.net/10362/13658.
Pełny tekst źródłaLuke, Geoffrey Patrick. "Functional and molecular photoacoustic imaging for the detection of lymph node metastasis". Thesis, 2013. http://hdl.handle.net/2152/28713.
Pełny tekst źródłatext
Li, Zhijun. "Efficient Authentication, Node Clone Detection, and Secure Data Aggregation for Sensor Networks". Thesis, 2010. http://hdl.handle.net/10012/5739.
Pełny tekst źródłaJAINT, BHAVNESH. "STUDY ON EMBEDDED SENSOR NETWORKS". Thesis, 2020. http://dspace.dtu.ac.in:8080/jspui/handle/repository/18112.
Pełny tekst źródłaLin, Christy. "Unsupervised random walk node embeddings for network block structure representation". Thesis, 2021. https://hdl.handle.net/2144/43083.
Pełny tekst źródła2023-09-24T00:00:00Z
Lee, Yi-Chang, i 李宜昌. "A Distributed Protocol for the Detection of Node Replication Attacks in Wireless Sensor Networks". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/13353818875293089256.
Pełny tekst źródła國立中正大學
資訊管理所暨醫療資訊管理所
97
The applications for wireless sensor networks (WSNs) were originally motivated by military applications like battlefield surveillance. Today, wireless sensor networks are widely used in civilian application areas, such as home security monitoring, healthcare applications, traffic control. However, a novel attack, named node replication attacks are proved to be a harmful attack. The node replication attack is an attack that the adversary captures a node and replicates the node in a large number of clones. After that, the adversary will insert the replicated nodes in the network. At last the adversary will control the network gradually. A few solutions have recently been proposed. Nevertheless, these solutions are still unable to solve following issues- First, the large memory overhead and high computational complexity are unsuitable for WSNs. The communication cost and probabilities of detection are important issues as well. Further, a detection could be used in mobile sensor networks is more satisfactory. The contributions of this paper include (1) an efficient memory overhead and communication cost of detection protocol is suggested, (2) mobile sensor nodes are concerned in our protocol. It is possible for the sensor nodes to be mobile, not only stationary. (3) The security analysis and simulation experiments are also proposed. The results show that the probability of deletion is high, our protocol is useful.