Rozprawy doktorskie na temat „Realistic Scenario”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 19 najlepszych rozpraw doktorskich naukowych na temat „Realistic Scenario”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Maho, Thibault. "Neural networks security under realistic scenario". Electronic Thesis or Diss., Université de Rennes (2023-....), 2023. http://www.theses.fr/2023URENS121.
Pełny tekst źródłaArtificial Intelligence is a hot topic today, driven by the revolution of neural networks that have shown impressive performances across various tasks. Notably, in Computer Vision, they have even outperformed humans. This thesis centers on neural networks applied to image classification tasks. Yet, this remarkable success is not without its vulnerabilities. Neural networks exhibit weaknesses in terms of confidentiality, integrity, and availability of their components. The training data, the model, and the inference data, are susceptible to potential attacks. Even in the realistic scenario considered in this thesis where the model operates in a black-box setup with limitations on the number of queries, it remains possible for an attacker to steal and reconstruct the model and training data, as well as manipulate inference data. This thesis places a particular emphasis on safeguarding the confidentiality of the model, which can be compromised through techniques such as model extraction and parameter extraction. Additionally, it delves into the realm of adversarial examples, which pose threats to the integrity of model inference. The deliberate introduction of small, well-crafted perturbations can result in misclassifications. Consequently, a significant portion of this thesis is dedicated to exploring the origins of adversarial examples, their creation, and strategies for defending against them
Das, Choudhury Sruti. "Uniscale and multiscale gait recognition in realistic scenario". Thesis, University of Warwick, 2013. http://wrap.warwick.ac.uk/59649/.
Pełny tekst źródłaNormando, Paulo Garcia. "Spatial interference alignment under realistic scenarios". reponame:Repositório Institucional da UFC, 2013. http://www.repositorio.ufc.br/handle/riufc/11051.
Pełny tekst źródłaSubmitted by Marlene Sousa (mmarlene@ufc.br) on 2015-03-05T18:30:21Z No. of bitstreams: 1 2013_dis_pgmormando.pdf: 993520 bytes, checksum: 5ab14e795c4ba9291b53267352f954ef (MD5)
Approved for entry into archive by Marlene Sousa(mmarlene@ufc.br) on 2015-03-24T11:01:20Z (GMT) No. of bitstreams: 1 2013_dis_pgmormando.pdf: 993520 bytes, checksum: 5ab14e795c4ba9291b53267352f954ef (MD5)
Made available in DSpace on 2015-03-24T11:01:20Z (GMT). No. of bitstreams: 1 2013_dis_pgmormando.pdf: 993520 bytes, checksum: 5ab14e795c4ba9291b53267352f954ef (MD5) Previous issue date: 2013-08-02
Due to the rapid growth and the aggressive throughput requirements of current wireless networks, such as the 4th Generation (4G) cellular systems, the interference has become an issue that cannot be neglected anymore. In this context, the Interference Alignment (IA) arises as a promising technique that enables transmissions free of interference with high-spectral efficiency. However, while recent works have focused mainly on the theoretical gains that the technique could provide, this dissertation aims to go a step further and clarify some of the practical issues on the implementation of this technique in a cellular network, as well as compare it to other well-established techniques. As an initial evaluation scenario, a 3-cell network was considered, for which several realistic factors were taken into account in order to perform different analyses. The first analysis was based on channel imperfections, for which the results showed that IA is more robust than Block Diagonalization (BD) regarding the Channel State Information (CSI) errors, but both are similarly affected by the correlation among transmit antennas. The impact of uncoordinated interference was also evaluated, by modeling this interference with different covariance matrices in order to mimic several scenarios. The results showed that modifications on the IA algorithms can boost their performance, with an advantage to the approach that suppresses one stream, when the Bit Error Rate (BER) is compared. To combine both factors, the temporal channel variations were taken into account. At these set of simulations, besides the presence of an external interference, the precoders were calculated using a delayed CSI, leading to results that corroborate with the previous analyses. A recurring fact on the herein considered analyses was the dilemma of weather to apply the Joint Processing (JP)-based algorithms in order to achieve higher sum capacities or to send the information through a more reliable link by using IA. A reasonable step towards solving this dilemma is to actually perform the packet transmissions, which was accomplished by employing a system-level simulator composed by a large number of Transmission Points (TPs). As a result, all analyses conducted with this simulator showed that the IA technique can provide an intermediate performance between the non-cooperation and the full cooperation scheme. Concluding, one of the main contributions of this work has been to show some scenarios/cases where the IA technique can be applied. For instance, when the CSI is not reliable it can be better to use IA than a JP-based scheme. Also, the modifications on the algorithms to take into account the external interference can boost their performance. Finally, the IA technique finds itself in-between the conventional transmissions and Coordinated Multi-Point (CoMP). IA achieves an intermediate performance, while requiring a certain degree of cooperation among the neighboring sectors, but demanding less infrastructure than the JP-based schemes.
Devido ao rápido crescimento e os agressivos requisitos de vazão nas atuais redes sem fio, como os sistemas celulares de 4 a Geração, a interferência se tornou um problema que não pode mais ser negligenciado. Neste contexto, o Alinhamento de Interferência (IA) tem surgido como uma técnica promissora que possibilita transmissões livres de interferência com elevada eficiência espectral. No entanto, trabalhos recentes têm focado principalmente nos ganhos teóricos que esta técnica pode prover, enquanto esta dissertação visa dar um passo na direção de esclarecer alguns dos problemas práticos de implementação da técnica em redes celulares, bem como compará-la com outras técnicas bem estabelecidas. Uma rede composta por três células foi escolhida como cenário inicial de avaliação, para o qual diversos fatores realistas foram considerados de modo a realizar diferentes análises. A primeira análise foi baseada em imperfeições de canal, cujos resultados mostraram que o IA é mais robusto aos erros de estimação de canal que o BD (do inglês, Block Diagonalization), enquanto as duas abordagens são igualmente afetadas pela correlação entre as antenas. O impacto de uma interferência externa não-coordenada, que foi modelada por diferentes matrizes de covariância de modo a emular vários cenários, também foi avaliado. Os resultados mostraram que as modificações feitas nos algoritmos de IA podem melhorar bastante seus desempenho, com uma vantagem para o algoritmo que suprime um único fluxo de dados, quando são comparadas as taxas de erro de bit alcançadas por cada um. Para combinar os fatores das análises anteriores, as variações temporais de canal foram consideradas. Neste conjunto de simulações, além da presença da interferência externa, os pré-codificadores são calculados através de medidas atrasadas de canal, levando a resultados que corroboraram com as análises anteriores. Um fato recorrente percebido em todas as análises anteriores é o dilema entre aplicar os algoritmos baseados em BD, para que se consiga alcançar maiores capacidades, ou enviar a informação através de um enlace mais confiável utilizando o IA. Uma maneira de esclarecer este dilema é efetivamente realizar simulações a nível sistêmico, para isto foi aplicado um simulador sistêmico composto por um grande número de setores. Como resultado, todas as análises realizadas neste simulador mostraram que a técnica de IA atinge desempenhos intermediários entre a não cooperação e os algoritmos baseados na pré-codificação conjunta. Uma das principais contribuições deste trabalho foi mostrar alguns cenários em que a técnica do IA pode ser aplicada. Por exemplo, quando as estimações dos canais não são tão confiáveis é melhor aplicar o IA do que os esquemas baseados no processamento conjunto. Também mostrou-se que as modificações nos algoritmos de IA, que levam em consideração a interferência externa, podem melhorar consideravelmente o desempenho dos algoritmos. Finalmente, o IA se mostrou uma técnica adequada para ser aplicada em cenários em que a interferência é alta e não é possível ter um alto grau de cooperação entre os setores vizinhos.
Miranda, Carlos Miguel dos Santos. "Implementation of realistic scenarios for ground truth purposes". Master's thesis, Universidade de Aveiro, 2009. http://hdl.handle.net/10773/2093.
Pełny tekst źródłaA segurança em redes de telecomunicações é um tópico que desde sempre gerou preocupação em todos os meios (instituições, empresas e outros) que utilizam estas redes. Novas ameaças ou mutações de ameaças já existentes surgem a uma elevada velocidade e os meios disponíveis parecem não ser suficientes para uma detecção positiva das mesmas. As respostas actuais para combater estas ameaças baseiam-se numa análise em tempo real do tráfego ou num treino prévio que muitas vezes tem que ser supervisionado por um ser humano que, dependendo da sua experiência na área pode estar a criar uma falha de segurança no sistema sem se aperceber do sucedido. Novas técnicas surgem para uma detecção eficaz de muitos ataques ou anomalias. No entanto, estas técnicas devem ser testadas de modo a validar o seu correcto funcionamento e, nesse sentido, são precisos fluxos de tráfego gerados na rede que possam ser utilizados sem comprometer a confidencialidade dos utilizadores e que obedeçam a critérios préestabelecidos. Com esta dissertação pretende-se constituir um conjunto de dados fiável e o mais abrangente possível de um conjunto de cenários realistas de rede, através da emulação em ambiente controlado de diferentes topologias, diferentes serviços e padrões de tráfego. Um outro objectivo fundamental deste trabalho passa por disponibilizar os dados obtidos à comunidade científica de modo a criar uma base de dados uniforme que permita avaliar o desempenho de novas metodologias de detecção de anomalias que venham a ser propostas. ABSTRACT: Security in telecommunication networks is a topic that has caused a lot of worries to network users (institutions, enterprises and others). New threats or mutations of existing ones appear at a very fast rate and the available solutions seem not to be enough for a positive detection of these threats. The solutions that are nowadays used to fight these threats require the realtime analysis of the network traffic or have to be previously trained. Most of the times, this training has to be supervised by a human being that, depending on his experience, can create a security breach in the system without knowing it. New techniques have been proposed in order to more efficiently detect many security attacks or threats. However, these techniques need to be tested in order to validate their correct functioning and, in order to do that, network traffic flows that can be used without compromising the users confidentiality and that obey to a pre-established criteria are needed. This dissertation intends to establish a set of trustworthy data as extensive as possible from a set of realistic network scenarios. Network emulation techniques will be used in a controlled environment, building different network topologies, with different services and traffic patterns. Another main objective of this work it is to make all this obtained data available to the scientific community in order to create a uniform data base that will allow the performance evaluation of new anomaly detection methodologies that can be proposed in the future.
Axholt, Magnus, i Stephen Peterson. "Modelling Traffic Scenarios for Realistic Air Traffic Control Environment Testing". Thesis, Linköping University, Department of Science and Technology, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2672.
Pełny tekst źródłaAs air traffic is forecasted to increase, air traffic control software subsequently needs to be more sophisticated. To efficiently push development forward, testing is important in order to determine usability. The tests need to be adapted to fit a particular purpose and carried out with methods that preserve the validity of the results.
This thesis describes an implementation project carried out at the EUROCONTROL Experimental Centre, Bretigny-sur-Orge, France. The purpose of the project is to create an application that enables a user to create datasets of air traffic to be used for these tests. The application allows for manual work or bulk imports from external data sources. Furthermore it compiles scenarios as output datasets intended for prototype air traffic control software developed at Linköping University.
The application design rationale and development process is described. Some time is spent on demonstrating the flexibility of the application and how its usage fits in a bigger picture.
Afridi, Ayaz Khan. "MACRO AND FEMTO NETWORK ASPECTS FOR REALISTIC LTE USAGE SCENARIOS". Thesis, KTH, Kommunikationsnät, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-53752.
Pełny tekst źródłaArgudo, Medrano Oscar. "Realistic reconstruction and rendering of detailed 3D scenarios from multiple data sources". Doctoral thesis, Universitat Politècnica de Catalunya, 2018. http://hdl.handle.net/10803/620733.
Pełny tekst źródłaDurant els darrers anys, hem presenciat avenços significatius en el modelat digital de terrenys, principalment gràcies a tècniques fotogramètriques, basades en fotografia aèria o satèl·lit, i a escàners làser. Aquestes tècniques permeten crear Models Digitals d'Elevacions (DEM) i Models Digitals de Superfícies (DSM) que es poden retransmetre per la xarxa i ser explorats mitjançant aplicacions de globus virtuals com ara Google Earth o NASA WorldWind. La resolució d'aquestes escenes 3D ha millorat considerablement durant els darrers anys, arribant a algunes àrees urbanes a resolucions d'un metre o menys per al DEM i edificis, i fins a menys de 10 cm per píxel a les fotografies aèries associades. No obstant, en entorns rurals, boscos i zones muntanyoses, la resolució típica per a dades d'elevació es troba entre 5 i 30 metres, i per a les corresponents fotografies aèries varia entre 25 cm i 1m. Aquest nivell de detall només és suficient per a punts de vista aeris, però a mesura que ens apropem a la superfície el terreny perd tot el realisme. Una manera d'augmentar el detall dels conjunts de dades actuals és afegint a l'escena detalls sintètics de manera plausible, és a dir, incloure elements que encaixin amb les característiques que es perceben a la vista aèria. Així, combinant les dades reals amb instàncies de models sobre el terreny i altres tècniques de detall procedural, la resolució efectiva del model pot arribar a ser arbitrària. Hi ha diverses aplicacions per a les quals no cal una reproducció exacta dels elements reals, però que es beneficiarien de models de terreny augmentats de manera plausible: videojocs i aplicacions d'entreteniment, avaluació de l'impacte visual (per exemple, com es veuria una nova estació d'esquí), turisme virtual, simulacions, etc. En aquesta tesi, proposem nous mètodes i eines per ajudar a la reconstrucció i síntesi de terrenys en alta resolució partint de conjunts de dades disponibles públicament, per tal d'aconseguir vistes a nivell de terra realistes. En particular, hem decidit centrar-nos en escenes rurals, muntanyes i àrees boscoses. El nostre principal objectiu és la combinació d'elements sintètics plausibles i detall procedural amb dades reals disponibles públicament per tal de generar escenes 3D d'ubicacions existents. La nostra recerca s'ha centrat en les següents contribucions: - Un pipeline eficient per a segmentació d'imatges aèries - Millora plausible de models de terreny a partir d'exemples d’alta resolució - Super-resolució de models d'elevacions transferint-hi detalls de la fotografia aèria - Síntesis d'un nombre arbitrari de variacions d’imatges d’arbres a partir d'un conjunt reduït de fotografies - Reconstrucció de models 3D d'arbres a partir d'una única fotografia - Una representació compacta i eficient d'arbres per a navegació en temps real d'escenes
Ahmad, Muhammad Bilal. "Macro and Femto Network Aspectsfor Realistic LTE usage scenarios with Interference Management". Thesis, KTH, Kommunikationsnät, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-116601.
Pełny tekst źródłaBrualdi, Carlo. "Un algoritmo 2D per vehicular warning in scenari urbani realistici". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2011. http://amslaurea.unibo.it/1906/.
Pełny tekst źródłaHahn, Sören [Verfasser]. "Mobile Radio Network Management in the Context of Realistic Heterogeneous Scenarios / Sören Hahn". Aachen : Shaker, 2017. http://d-nb.info/1149272163/34.
Pełny tekst źródłaMartínez, Domínguez Francisco José. "Improving Vehicular ad hoc Network Protocols to Support Safety Applications in Realistic Scenarios". Doctoral thesis, Universitat Politècnica de València, 2011. http://hdl.handle.net/10251/9195.
Pełny tekst źródłaMartínez Domínguez, FJ. (2010). Improving Vehicular ad hoc Network Protocols to Support Safety Applications in Realistic Scenarios [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/9195
Palancia
Croce, Andrea. "Allocazione ottima delle risorse in scenari IoV realistici attraverso modelli UFLP". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/22654/.
Pełny tekst źródłaHiller, Thomas [Verfasser]. "Modelling the evolution of karst aquifers in three dimensions : Conceptual models and realistic scenarios / Thomas Hiller". Berlin : Freie Universität Berlin, 2013. http://d-nb.info/1032899360/34.
Pełny tekst źródłaHahn, Sören [Verfasser], i Thomas [Akademischer Betreuer] Kürner. "Mobile Radio Network Management in the Context of Realistic Heterogeneous Scenarios / Sören Hahn ; Betreuer: Thomas Kürner". Braunschweig : Technische Universität Braunschweig, 2017. http://d-nb.info/1175816744/34.
Pełny tekst źródłaPendleton, Richard McCall. "Investigating Realistic Scenarios of Biodiversity Loss on Ecosystem Functioning: Extirpation of Rare Species and Food Web Collapse in Tropical Floodplain Lagoons". Thesis, University of North Texas, 2012. https://digital.library.unt.edu/ark:/67531/metadc115137/.
Pełny tekst źródłaMessineo, Graziano. "Simulatore di Rete NS3 per la valutazione delle prestazioni del sistema LTE". Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2016.
Znajdź pełny tekst źródłaLu, Chao-wei, i 呂兆威. "Implementation and verification of CR-MAC protocals in realistic scenario". Thesis, 2012. http://ndltd.ncl.edu.tw/handle/73393284505687963952.
Pełny tekst źródła國立中央大學
資訊工程研究所
100
Medium Access Control (MAC) protocol play a vital role in cognitive radio (CR). It is well-known that implementation of CR MAC is rare in this issue. There has been some papers which are implement CR MAC with different testbed and test it in different scenario. In our work, we propose a lightweight MAC protocol without complexity mechanism and it can verify various spectrum access algorithm which contains channel hopping algorithm or clustering algorithm in synchronous or not. With implementing on GNU Radio and Universal Software Radio Peripheral (USRP) platform, we discuss various design considerations and challenges of our MAC in experiment. Our experimental results presents the performance of each spectrum access algorithm which is running under PU which is run in 802.11 protocol.
Pai, Vishwesh. "Effects of VANETs on vehicle transit time and average speed in realistic scenarios". 2009. http://www.lib.ncsu.edu/theses/available/etd-08182009-133859/unrestricted/etd.pdf.
Pełny tekst źródłaChen, Yu-Ming, i 陳昱銘. "A Deep Learning and Aggregation Network Based Face Surveillance System, Tested by Realistic Scenarios". Thesis, 2018. http://ndltd.ncl.edu.tw/handle/8rdfyh.
Pełny tekst źródła