Дисертації з теми "Network analysis"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 дисертацій для дослідження на тему "Network analysis".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Oesterheld, Matthias. "Analysis of biomolecular networks using a generic network analysis suite." kostenfrei, 2008. http://mediatum2.ub.tum.de/doc/646475/646475.pdf.
Повний текст джерелаPost, David L. "Network Management: Assessing Internet Network-Element Fault Status Using Neural Networks." Ohio : Ohio University, 2008. http://www.ohiolink.edu/etd/view.cgi?ohiou1220632155.
Повний текст джерелаLim, Kok Seng. "Analysis of network management protocols in optical networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FLim%5FK.pdf.
Повний текст джерелаSilva, do Monte Lima Jennifer. "Performance analysis of network composition in ambient networks." Universidade Federal de Pernambuco, 2007. https://repositorio.ufpe.br/handle/123456789/2637.
Повний текст джерелаConselho Nacional de Desenvolvimento Científico e Tecnológico
Atualmente, o compartilhamento de recursos e oferta de serviços entre redes são permitidos apenas através de intensa configuração manual e acordos prévios entre as redes envolvidas. Devido às diferentes tecnologias de acesso, à heterogeneidade dos dispositivos e dos serviços e a mobilidade dos usuários, o gerenciamento dos recursos se torna uma tarefa ainda mais complexa. As Redes de Ambiente surgem para permitir a cooperação instantânea e dinâmica de redes heterogêneas pertencentes a diferentes domínios administrativos e tecnológicos, através de um novo conceito chamado de Composição de Redes. A Composição permite a disponibilização de serviços e o compartilhamento de recursos entre redes, via Acordo de Composição. O desempenho da composição tem um fator crucial na viabilidade das Redes de Ambiente, devido à alta demanda por composição em uma interação de um usuário típico com a rede. Estas composições de redes mudam todo o cenário e trazem novas complicações para o processo tornando necessária a avaliação da estabilidade e da escalabilidade das mesmas. Diante da impossibilidade de testar tais conceitos de forma prática e real, optouse por fazê-lo através de simulação. Para atingir este objetivo foi especificado e implementado um simulador para Composições de Redes de Ambiente. Este simulador tem como objetivo principal avaliar o desempenho da composição mostrando que a mesma não representa um gargalo para a implantação das Redes de Ambiente
Woodbury, Nathan Scott. "Network Reconstruction and Vulnerability Analysis of Financial Networks." BYU ScholarsArchive, 2017. https://scholarsarchive.byu.edu/etd/6370.
Повний текст джерелаJunuthula, Ruthwik Reddy. "Modeling, Evaluation and Analysis of Dynamic Networks for Social Network Analysis." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1544819215833249.
Повний текст джерелаHassan, Aamir, and Fida Mohammad. "Network Security Analysis." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4002.
Повний текст джерелаSecurity is the second step after that a successful network has been deployed. There are many types of attacks that could potentially harm the network and an administrator should carefully document and plan the weak areas, where the network could be compromised. Attackers use special tools and techniques to find out all the possible ways of defeating the network security. This thesis addresses all the possible tools and techniques that attackers use to compromise the network. The purpose for exploring these tools will help an administrator to find the security holes before an attacker can. All of these tools in this thesis are only for the forensic purpose. Securing routers and switches in the best possible way is another goal. We in this part try to identify important ways of securing these devices, along with their limitations, and then determine the best possible way. The solution will be checked with network vulnerable tools to get the results. It is important to note that most of the attention in network security is given to the router, but far less attention is given to securing a switch. This thesis will also address some more ways of securing a switch, if there is no router in the network.
The opponent for the thesis was Yan Wang and the presentation time was 60 minutes.
Mei, Jonathan B. "Principal Network Analysis." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1175.
Повний текст джерелаZhou, Lin. "Active network management and uncertainty analysis in distribution networks." Thesis, University of Bath, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.675697.
Повний текст джерела鄧沛權 and Pui-kuen Tang. "Business network: network marketing : analysis of network marketing using business network theories." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1997. http://hub.hku.hk/bib/B31268316.
Повний текст джерелаTang, Pui-kuen. "Business network : network marketing : analysis of network marketing using business network theories /." Hong Kong : University of Hong Kong, 1997. http://sunzi.lib.hku.hk/hkuto/record.jsp?B18840127.
Повний текст джерелаShe, Huimin. "Network-Calculus-based Performance Analysis for Wireless Sensor Networks." Licentiate thesis, KTH, Electronic, Computer and Software Systems, ECS, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-10686.
Повний текст джерелаRecently, wireless sensor network (WSN) has become a promising technologywith a wide range of applications such as supply chain monitoringand environment surveillance. It is typically composed of multiple tiny devicesequipped with limited sensing, computing and wireless communicationcapabilities. Design of such networks presents several technique challengeswhile dealing with various requirements and diverse constraints. Performanceanalysis techniques are required to provide insight on design parametersand system behaviors.
Based on network calculus, we present a deterministic analysis methodfor evaluating the worst-case delay and buffer cost of sensor networks. Tothis end, three general traffic flow operators are proposed and their delayand buffer bounds are derived. These operators can be used in combinationto model any complex traffic flowing scenarios. Furthermore, the methodintegrates a variable duty cycle to allow the sensor nodes to operate at lowrates thus saving power. In an attempt to balance traffic load and improveresource utilization and performance, traffic splitting mechanisms areintroduced for mesh sensor networks. Based on network calculus, the delayand buffer bounds are derived in non-splitting and splitting scenarios.In addition, analysis of traffic splitting mechanisms are extended to sensornetworks with general topologies. To provide reliable data delivery in sensornetworks, retransmission has been adopted as one of the most popularschemes. We propose an analytical method to evaluate the maximum datatransmission delay and energy consumption of two types of retransmissionschemes: hop-by-hop retransmission and end-to-end retransmission.
We perform a case study of using sensor networks for a fresh food trackingsystem. Several experiments are carried out in the Omnet++ simulationenvironment. In order to validate the tightness of the two bounds obtainedby the analysis method, the simulation results and analytical results arecompared in the chain and mesh scenarios with various input traffic loads.From the results, we show that the analytic bounds are correct and tight.Therefore, network calculus is useful and accurate for performance analysisof wireless sensor network.
Ipack VINN Excellence Center
Leung, Ian Xiao Yin. "Fast network analysis and applications in real-world networks." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609931.
Повний текст джерелаDiana, Gary M. "Internetworking : an analysis and proposal /." Online version of thesis, 1990. http://hdl.handle.net/1850/10605.
Повний текст джерелаZhao, Liang. "Multi-area network analysis." Texas A&M University, 2004. http://hdl.handle.net/1969.1/1482.
Повний текст джерелаStone, Larry W. "Local area network analysis." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/27120.
Повний текст джерелаThis thesis focuses on the performance of the Ethernet local area network in Ingersoll Hall, Room 250, Naval Postgraduate School, Monterey, California. The primary research is in performing a cost benefit analysis, using the economic value imputed to a reduction in average response time as the return on investment. The major objective is to find the best configuration for the network, based on integrating user-computer response time guidelines and the cost benefit analysis to indicate what might be economically acceptable response times for processing initial simultaneous requests for software installed on network servers. Word Perfect 5.0 software was chosen because it is typical of the software that is used in the lab under conditions of simultaneous access. Additionally, some of the effects of response time on human performance will be researched and noted in the conclusions along with the results of the feasibility test of user-computer interfaces and related cost benefit values.
Masood, Esa Han Hsien 1979. "Accessible broadband network analysis." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87248.
Повний текст джерелаIncludes bibliographical references (p. 126-127).
by Esa Han Haien Masood.
M.Eng.
Morehead, Heidi Utz. "Rural Health Network Effectiveness: An Analysis at the Network Level." Diss., Virginia Tech, 2008. http://hdl.handle.net/10919/27711.
Повний текст джерелаPh. D.
Xie, Jing. "A Temporal Network Calculus for Performance Analysis of Computer Networks." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for elektronikk og telekommunikasjon, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14619.
Повний текст джерелаCarter, Steven Michael. "Implementation and analysis of the IP measurement protocol (IPMP)." Master's thesis, Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-11152001-090121.
Повний текст джерелаMoore, John David. "Making Sense of Networks: Exploring How Network Participants Understand and Use Information From Social Network Analysis." Diss., Virginia Tech, 2005. http://hdl.handle.net/10919/103640.
Повний текст джерелаDoctor of Philosophy
Many of today's complex public issues are best addressed by multi-sectoral multi-organizational responses that include different types of organizations working together (Kettl, 2008; O'Toole, 1997). Social network analysis (SNA) of interorganizational networks has emerged as a useful tool for network managers to understand the structure and function of the complex networks in which they seek to manage (Human and Provan, 1997, 2000; Provan and Milward, 1995; Provan, Sebastian, and Milward, 1996; Provan, Veazie, Staten, and Teufel-Shone, 2005). The output of an interorganizational SNA typically provides a range of information to network managers including network plots. The network plots provide visual representations of different aspects of the network by showing the kinds of ties between the actors in the network. The information from network analyses can help network managers encourage systems thinking, see the different roles played by organizations, or identify links to outside resources among many other uses, but "will only have practical value to communities if it can be effectively presented, discussed, accepted, and acted on by community leaders and network participants [emphasis added]." (Provan et al., 2005, p. 610). However, little is currently known about if or how the information embedded in network plots is accepted or acted on by network participants. The visual representations of the network (network plots) provided to network participants following a SNA are often open to a range of interpretations that may or may not align with the findings of the analyst or the intended use by network managers, raising many interesting questions. Little is currently known about how differently situated network participants might interpret the same network plots differently. Nor do we understand what factors might influence different individuals or organizations to come up with different interpretations. After conducting a SNA and presenting it to network participants, I conducted interviews with a range of different representatives from participating organizations. I used a particular form of semi-structured interview, a situated micro-element interview from Dervin's Sense Making Methodology (SMM) (Dervin, Foreman-Wernet, and Lauterbach, 2003). I then analyzed the interview transcripts using standard qualitative coding methods (Bailey, 2007) to see if themes emerged that addressed the research questions. I found that most informants had trouble extracting information and meaning from their examination of the plots without that meaning and interpretation being provided by the expert analyst. I posit some potential explanations for why that might be so in the case I studied. I then turn to some interesting methodological considerations that emerged from taking the perspectives of network participants seriously. Finally, I synthesize the subject area and methodological findings into a refined framework for sense-making around network plots and offer propositions and potential approaches for future research.
Moore, John. "Making Sense of Networks: Exploring How Network Participants Understand and Use Information From Social Network Analysis." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103640.
Повний текст джерелаDoctor of Philosophy
Many of today's complex public issues are best addressed by multi-sectoral multi-organizational responses that include different types of organizations working together (Kettl, 2008; O'Toole, 1997). Social network analysis (SNA) of interorganizational networks has emerged as a useful tool for network managers to understand the structure and function of the complex networks in which they seek to manage (Human and Provan, 1997, 2000; Provan and Milward, 1995; Provan, Sebastian, and Milward, 1996; Provan, Veazie, Staten, and Teufel-Shone, 2005). The output of an interorganizational SNA typically provides a range of information to network managers including network plots. The network plots provide visual representations of different aspects of the network by showing the kinds of ties between the actors in the network. The information from network analyses can help network managers encourage systems thinking, see the different roles played by organizations, or identify links to outside resources among many other uses, but "will only have practical value to communities if it can be effectively presented, discussed, accepted, and acted on by community leaders and network participants [emphasis added]." (Provan et al., 2005, p. 610). However, little is currently known about if or how the information embedded in network plots is accepted or acted on by network participants. The visual representations of the network (network plots) provided to network participants following a SNA are often open to a range of interpretations that may or may not align with the findings of the analyst or the intended use by network managers, raising many interesting questions. Little is currently known about how differently situated network participants might interpret the same network plots differently. Nor do we understand what factors might influence different individuals or organizations to come up with different interpretations. After conducting a SNA and presenting it to network participants, I conducted interviews with a range of different representatives from participating organizations. I used a particular form of semi-structured interview, a situated micro-element interview from Dervin's Sense Making Methodology (SMM) (Dervin, Foreman-Wernet, and Lauterbach, 2003). I then analyzed the interview transcripts using standard qualitative coding methods (Bailey, 2007) to see if themes emerged that addressed the research questions. I found that most informants had trouble extracting information and meaning from their examination of the plots without that meaning and interpretation being provided by the expert analyst. I posit some potential explanations for why that might be so in the case I studied. I then turn to some interesting methodological considerations that emerged from taking the perspectives of network participants seriously. Finally, I synthesize the subject area and methodological findings into a refined framework for sense-making around network plots and offer propositions and potential approaches for future research.
Hui, Daniel Hang-Yan. "Protocol validation via reachability analysis : an implementation." Thesis, University of British Columbia, 1985. http://hdl.handle.net/2429/24689.
Повний текст джерелаScience, Faculty of
Computer Science, Department of
Graduate
Gatkowski, Mateusz. "Financial network stability and structure : econometric and network analysis." Thesis, University of Essex, 2015. http://repository.essex.ac.uk/17090/.
Повний текст джерелаKuehn, Daniel, and Sofia Ljunggren. "Refining a Network Model Concerning Network Security Risk Analysis." Thesis, KTH, Data- och elektroteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-154355.
Повний текст джерелаP²CySeMoL är ett ramverk där säkerhetsrisker beräknas och redovisas i form av ett värde som hän-visar till sannolikheten att en attack lyckas i ett system, huvudsakligen SCADA system. Den här avhandlingen behandlar skapandet av en mer detaljerad nätverksmodul för säkerhetsriskramverket P²CySeMoL för att bättre representera ett nätverks konkreta moduler och för att möjliggöra analys av säkerhetsrisker rörande en nätverksinfrastruktur på ett mer detaljerat sätt. Den här rapporten beskriver skapandet av en nätverksmodul med en bas i OSI-modellen. Den är replikerad på ett sätt att den är en extension av P²CySeMoL metamodell, utan att omstrukturera den. Det omfattar även en mindre undersökning för att kontrollera och samla återkoppling på den skapade modulen från säkerhet- och nätverksexperter samt en analys av undersökningen. Slutsatsen fastställer att nätverksmodulen är en bra bas att bygga vidare på och den återspeglar till hög grad en modell som behövs för att göra säkerhetsriskanalyser på en infrastruktur, förslag om ytterligare validering och forskning för att förbättra modulnätet beskrivs. Det här arbetet har producerats i samarbete med Spotify och delar av teamet bakom P²CySeMoL vidICS avdelningen på KTH.
Morley, George David. "Analysis and design of ring-based transport networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/NQ60329.pdf.
Повний текст джерелаBaronikian, Haig. "Modelling and analysis of a computer conferencing system." Thesis, McGill University, 1987. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=63756.
Повний текст джерелаKim, Hyoungshick. "Complex network analysis for secure and robust communications." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610134.
Повний текст джерелаKouhbor, Shahnaz University of Ballarat. "Optimal number and placement of network infrastructure in wireless networks." University of Ballarat, 2007. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/12762.
Повний текст джерелаDoctor of Philosophy
Kouhbor, Shahnaz. "Optimal number and placement of network infrastructure in wireless networks." Thesis, University of Ballarat, 2007. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/65892.
Повний текст джерелаDoctor of Philosophy
Kouhbor, Shahnaz. "Optimal number and placement of network infrastructure in wireless networks." University of Ballarat, 2007. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14597.
Повний текст джерелаDoctor of Philosophy
Yang, Zhenyu. "Network Coding in Multihop Wireless Networks: Throughput Analysis and Protocol Design." Digital WPI, 2011. https://digitalcommons.wpi.edu/etd-dissertations/222.
Повний текст джерелаPrabhu, Haladi Ramanatha Sachin. "A network component analysis based divide and conquer method for transcriptional regulatory network analysis." Thesis, University of Sheffield, 2019. http://etheses.whiterose.ac.uk/22640/.
Повний текст джерелаKozat, Ulaș C. "Heterogeneous wireless networks : an analysis of network and service level diversity /." College Park, Md. : University of Maryland, 2004. http://hdl.handle.net/1903/1404.
Повний текст джерелаThesis research directed by: Electrical Engineering. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
Dunn, Nathan A. "A Novel Neural Network Analysis Method Applied to Biological Neural Networks." Thesis, view abstract or download file of text, 2006. http://proquest.umi.com/pqdweb?did=1251892251&sid=2&Fmt=2&clientId=11238&RQT=309&VName=PQD.
Повний текст джерелаTypescript. Includes vita and abstract. Includes bibliographical references (leaves 122- 131). Also available for download via the World Wide Web; free to University of Oregon users.
Banerji, Pratip K. "An analysis of network management traffic and requirements in wireless networks." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/42744.
Повний текст джерелаCrowley, Patrick. "Design and analysis of architectures for programmable network processing systems /." Thesis, Connect to this title online; UW restricted, 2003. http://hdl.handle.net/1773/6991.
Повний текст джерелаMummaneni, Avanthi. "Analysis of the enzymatic network." Diss., Columbia, Mo. : University of Missouri-Columbia, 2005. http://hdl.handle.net/10355/4285.
Повний текст джерелаThe entire dissertation/thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file (which also appears in the research.pdf); a non-technical general description, or public abstract, appears in the public.pdf file. Title from title screen of research.pdf file viewed on (January 22, 2007) Includes bibliographical references.
Wallis, David C. "Vibration analysis via wireless network." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FWallis.pdf.
Повний текст джерелаThesis Advisor(s): Yun, Xiaoping. "September 2007." Description based on title screen as viewed on October 25, 2007. Includes bibliographical references (p. 65-66). Also available in print.
Liu, Wei 1975. "Network traffic modelling and analysis." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=82613.
Повний текст джерелаThis thesis focuses on traffic modelling and analysis. A novel traffic model is proposed which can capture the traffic behaviours in all-photonic networks. The new model is based on a study of existing traffic modelling literature. It combines the time-varying Poisson model, gravity model and fractional Gaussian noise. This model can be used for the short-range traffic prediction. We examine Long-Range Dependence and test the time constancy of scaling parameters using the tools designed by Abry and Veitch, to analyze empirical and synthesized traffic traces.
Littlewort, G. C. "Neural network analysis and simulation." Thesis, University of Oxford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.292677.
Повний текст джерелаLiu, Mei. "Vulnerability analysis of road network." Thesis, University of Bristol, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.617702.
Повний текст джерелаRay, Gavin Peter. "Computer network analysis and optimisation." Thesis, University of Plymouth, 1993. http://hdl.handle.net/10026.1/1639.
Повний текст джерелаLLANES, KATHRIN RODRIGUEZ. "BUS NETWORK ANALYSIS AND MONITORING." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2017. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=31068@1.
Повний текст джерелаCOORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
PROGRAMA DE EXCELENCIA ACADEMICA
Ônibus, equipados com dispositivos GPS ativos que transmitem continuamente a sua posição, podem ser entendidos como sensores móveis de trânsito. De fato, as trajetórias dos ônibus fornecem uma fonte de dados útil para analisar o trânsito na rede de ônibus de uma cidade, dado que as autoridades de trânsito da cidade disponibilizem as trajetórias de forma aberta, oportuna e contínua. Neste contexto, esta tese propõe uma abordagem que usa os dados de GPS dos ônibus para analisar e monitorar a rede de ônibus de uma cidade. Ela combina algoritmos de grafos, técnicas de mineração de dados geoespaciais e métodos estatísticos. A principal contribuição desta tese é uma definição detalhada de operações e algoritmos para analisar e monitorar o tráfego na rede de ônibus, especificamente: (1) modelagem, análise e segmentaçãoda rede de ônibus; (2) mineração do conjunto de dados de trajetória de ônibus para descobrir padrões de tráfego; (3) detecção de anomalias de trânsito, classificação de acordo com sua gravidade, e avaliação do seu impacto; (4) manutenção e comparação de diferentes versões da rede de ônibus e dos seus padrões de tráfego para ajudar os planejadores urbanos a avaliar as mudanças. Uma segunda contribuição é a descrição de experimentos realizados para a rede de ônibus da Cidade do Rio de Janeiro, utilizando trajetórias de ônibus correspondentes ao período de junho de 2014 até fevereiro de 2017, disponibilizadas pela Prefeitura do Rio de Janeiro. Os resultados obtidos corroboram a utilidade da abordagem proposta para analisar e monitorar a rede de ônibus de uma cidade, o que pode ajudar os gestores do trânsito e as autoridades municipais a melhorar os planos de controle de trânsito e de mobilidade urbana.
Buses, equipped with active GPS devices that continuously transmit their position, can be understood as mobile traffic sensors. Indeed, bus trajectories provide a useful data source for analyzing traffic in the bus network of a city, if the city traffic authority makes the bus trajectories available openly, timely and in a continuous way. In this context, this thesis proposes a bus GPS data-driven approach for analyzing and monitoring the bus network of a city. It combines graph algorithms, geospatial data mining techniques and statistical methods. The major contribution of this thesis is a detailed discussion of key operations and algorithms for modeling, analyzing and monitoring bus network traffic, specifically: (1) modelling, analyzing, and segmentation of the bus network; (2) mining the bus trajectory dataset to uncover traffic patterns; (3) detecting traffic anomalies, classifying them according to their severity, and estimating their impact; (4) maintaining and comparing different versions of the bus network and traffic patterns to help urban planners assess changes. Another contribution is the description of experiments conducted for the bus network of the City of Rio de Janeiro, using bus trajectories obtained from June 2014 to February 2017, which have been made available by the City Hall of Rio de Janeiro. The results obtained corroborate the usefulness of the proposed approach for analyzing and monitoring the bus network of a city, which may help traffic managers and city authorities improve traffic control and urban mobility plans.
Simhairi, Nather Zeki. "Traffic assignment and network analysis." Thesis, Royal Holloway, University of London, 1987. http://repository.royalholloway.ac.uk/items/a3377f99-4ed8-4000-91f8-0384aed4a3c6/1/.
Повний текст джерелаZhang, Wanping. "Power network analysis and optimization." Diss., [La Jolla] : University of California, San Diego, 2009. http://wwwlib.umi.com/cr/ucsd/fullcit?p3369236.
Повний текст джерелаTitle from first page of PDF file (viewed September 17, 2009). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references (p. 91-94).
Engström, Helena. "Network Analysis of Calcium Activity." Thesis, KTH, Tillämpad fysik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-256344.
Повний текст джерелаCURZI, MIRCO. "Content based social network analysis." Doctoral thesis, Università Politecnica delle Marche, 2009. http://hdl.handle.net/11566/242305.
Повний текст джерелаPerissinotto, Alex <1991>. "Rischio sistemico e Network Analysis." Master's Degree Thesis, Università Ca' Foscari Venezia, 2017. http://hdl.handle.net/10579/9663.
Повний текст джерелаSALA, SARA. "Statistical analysis of brain network." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2013. http://hdl.handle.net/10281/43723.
Повний текст джерела