Um die anderen Arten von Veröffentlichungen zu diesem Thema anzuzeigen, folgen Sie diesem Link: Classification of network devices.

Dissertationen zum Thema „Classification of network devices“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Classification of network devices" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.

1

Eis, Pavel. "Datová sada pro klasifikaci síťových zařízení pomocí strojového učení." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445543.

Der volle Inhalt der Quelle
Annotation:
Automatic classification of devices in computer network can be used for detection of anomalies in a network and also it enables application of security policies per device type. The key to creating a device classifier is a quality data set, the public availability of which is low and the creation of a new data set is difficult. The aim of this work is to create a tool, that will enable automated annotation of the data set of network devices and to create a classifier of network devices that uses only basic data from network flows. The result of this work is a modular tool providing automated a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Sleem, Lama. "Design and implementation of lightweight and secure cryptographic algorithms for embedded devices." Thesis, Bourgogne Franche-Comté, 2020. http://www.theses.fr/2020UBFCD018.

Der volle Inhalt der Quelle
Annotation:
Nous vivons actuellement dans une ère avec sans cesse de nouveaux appareils technologiques (smartphone, réseaux de capteurs sans fil, aux caméras haute résolution, etc). En partant des médias sociaux, en passant par des caméras de surveillance très puissantes, et sans oublier la surveillance de la santé en temps réel, on constate qu'une grande quantité de données est stockée dans le cloud et les serveurs. Cela représente un grand défi de stockage et de transmission, en particulier dans les plates-formes aux ressources limitées qui sont caractérisées par : (a) des capacités de calcul limitées,
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Erlandsson, Niklas. "Utilizing machine learning in wildlife camera traps for automatic classification of animal species : An application of machine learning on edge devices." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-104952.

Der volle Inhalt der Quelle
Annotation:
A rapid global decline in biodiversity has been observed in the past few decades, especially in large vertebrates and the habitats supporting these animal populations. This widely accepted fact has made it very important to understand how animals respond to modern ecological threats and to understand the ecosystems functions. The motion activated camera (also known as a camera trap) is a common tool for research in this field, being well-suited for non-invasive observation of wildlife. The images captured by camera traps in biological studies need to be classified to extract information, a tra
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Luckhardt, Christoph [Verfasser]. "Development of thermo-analytical prediction and classification models for food in thermal devices using a multi sensor system and artificial neural networks / Christoph Luckhardt." Kassel : Universitätsbibliothek Kassel, 2013. http://d-nb.info/1043361863/34.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Akarapu, Deepika. "Object Identification Using Mobile Device for Visually Impaired Person." University of Dayton / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1628092619349812.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Wolf, Robert, Niko Joram, Stefan Schumann, and Frank Ellinger. "Dual-band impedance transformation networks for integrated power amplifiers." Cambridge University Press, 2016. https://tud.qucosa.de/id/qucosa%3A70680.

Der volle Inhalt der Quelle
Annotation:
This paper shows that the two most common impedance transformation networks for power amplifiers (PAs) can be designed to achieve optimum transformation at two frequencies. Hence, a larger bandwidth for the required impedance transformation ratio is achieved. A design procedure is proposed, which takes imperfections like losses into account. Furthermore, an analysis method is presented to estimate the maximum uncompressed output power of a PA with respect to frequency. Based on these results, a fully integrated PA with a dual-band impedance transformation network is designed and its functional
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Kühnert, Wolfram. "Dynamic Devices Network Architecture." [S.l. : s.n.], 2003. http://www.bsz-bw.de/cgi-bin/xvms.cgi?SWB10952962.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Alexander, David. "A Network Metadata Infrastructure for Locating Network Devices." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Zenteno, Efrain. "Vector Measurements for Wireless Network Devices." Licentiate thesis, KTH, Signalbehandling, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-111863.

Der volle Inhalt der Quelle
Annotation:
Wireless networks are an iconic technology of today’s modern era, theyare present in our daily activities as can be exemplified by cellular communications,wi-fi, bluetooth, and others. Vector measurements play an importantrole in the design, simulation, and testing of wireless networks and are usedto characterize key devices operating in the radio interface, such as amplifiers,filters, and mixers.Accurate characterization is the key for improving the capacity and efficiencyof wireless networks. As the demand for network capacity continuouslyincreases, the accuracy of vector measurements must a
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Omer, Mahgoub Saied Khalid. "Network Latency Estimation Leveraging Network Path Classification." Thesis, KTH, Network Systems Laboratory (NS Lab), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-229955.

Der volle Inhalt der Quelle
Annotation:
With the development of the Internet, new network services with strict network latency requirements have been made possible. These services are implemented as distributed systems deployed across multiple geographical locations. To provide low response time, these services require knowledge about the current network latency. Unfortunately, network latency among geo-distributed sites often change, thus distributed services rely on continuous network latency measurements. One goal of such measurements is to differentiate between momentary latency spikes from relatively long-term latency changes.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
11

Cardwell, Gregory S. "Residual network data structures in Android devices." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5506.

Der volle Inhalt der Quelle
Annotation:
Approved for public release; distribution is unlimited<br>The emergence and recent ubiquity of Smartphones present new opportunities and challenges to forensic examiners. Smartphones enable new mobile application and use paradigms by being constantly attached to the Internet via one of several physical communication media, e.g. cellular radio, WiFi, or Bluetooth. The Smartphone's storage medium represents a potential source of current and historical network metadata and records of prior data transfers. By using known ground truth data exchanges in a controlled experimental environment, thi
APA, Harvard, Vancouver, ISO und andere Zitierweisen
12

Anderson, Pehr C. (Pehr Christian) 1974. "Filaments : lightweight network interfaces for embedded devices." Thesis, Massachusetts Institute of Technology, 1998. http://hdl.handle.net/1721.1/46249.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1998.<br>Includes bibliographical references (leaf 63).<br>Filaments are low-cost interfaces for attaching devices to an Ethernet network. While most networking research pushes for faster high-end systems, the filament project targets low-end devices with the goal of making networking easy. Filaments wrap the complexity of the network into a simple and convenient package. The vast majority of device communications require only a tiny thread or filament of connectivity. Before filaments
APA, Harvard, Vancouver, ISO und andere Zitierweisen
13

Tan, SiewYeen Agnes. "A Network Measurement Tool for Handheld Devices." Thesis, Virginia Tech, 2003. http://hdl.handle.net/10919/32982.

Der volle Inhalt der Quelle
Annotation:
This thesis describes a performance measurement tool that allows a user to measure network performance using a handheld device. The measurement tool consists of a client program that runs on a Microsoft Pocket PC device and a server program that runs on a regular Microsoft Windows computer. Both programs are Windows applications implemented in C/C++ using the Microsoft Embedded Visual Tool and Microsoft Visual Studio. The use of a Pocket PC device provides mobility to users, which can save time and energy when performing experiments. The thesis describes the design of the performance measureme
APA, Harvard, Vancouver, ISO und andere Zitierweisen
14

Rimer, Michael Edwin. "Improving Neural Network Classification Training." Diss., CLICK HERE for online access, 2007. http://contentdm.lib.byu.edu/ETD/image/etd2094.pdf.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
15

Yusuf, Adewale, Jerry Lartey, and Vilhelm Wareus. "Network Admission Control (NAC)Securing end point devices." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-5507.

Der volle Inhalt der Quelle
Annotation:
<p>There have been remarkable growths in wireless communication networks in</p><p>recent years; this is because of its merits over the wired networks such as</p><p>Mobility and convenience. Wireless networks transmit the signal over the</p><p>open air via radio waves of different frequencies, this makes it to be</p><p>vulnerable to several attacks and anybody on the street can easily intercept the</p><p>wireless data or inject new data into the entire network. There has been</p><p>existence of wired equivalent privacy (WEP) protocol (IEEE 802.11i), which</p><p>was designed for wireless network
APA, Harvard, Vancouver, ISO und andere Zitierweisen
16

Spadavecchia, Ljiljana. "A network-based asynchronous architecture for cryptographic devices." Thesis, University of Edinburgh, 2006. http://hdl.handle.net/1842/860.

Der volle Inhalt der Quelle
Annotation:
The traditional model of cryptography examines the security of the cipher as a mathematical function. However, ciphers that are secure when specified as mathematical functions are not necessarily secure in real-world implementations. The physical implementations of ciphers can be extremely difficult to control and often leak socalled side-channel information. Side-channel cryptanalysis attacks have shown to be especially effective as a practical means for attacking implementations of cryptographic algorithms on simple hardware platforms, such as smart-cards. Adversaries can obtain sensitive in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
17

Krishna, Ashwin. "Composing and connecting devices in animal telemetry network." Kansas State University, 2016. http://hdl.handle.net/2097/32882.

Der volle Inhalt der Quelle
Annotation:
Master of Science<br>Department of Computing and Information Sciences<br>Venkatesh P. Ranganath<br>As the Internet of Things (IoT) continues to grow, the need for services that span multiple application domains will continue to increase to realise the numerous possibilities enabled by IoT. Today, however, heterogeneity among devices leads to interoperability issues while building a system of systems and often give rise to closed ecosystems. The issues with interoperability are driven by the inability of devices and apps from different vendors to communicate with each other. The interoperabilit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
18

Bailer-Jones, Coryn Andreas. "Neural network classification of stellar spectra." Thesis, University of Cambridge, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.627444.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
19

Brophy, Jonathan. "Collective Classification of Social Network Spam." Thesis, University of Oregon, 2017. http://hdl.handle.net/1794/22625.

Der volle Inhalt der Quelle
Annotation:
Unsolicited messages affects virtually every popular social media website, and spammers have become increasingly proficient at bypassing conventional filters, prompting a stronger effort to develop new methods. First, we build an independent model using features that capture the cases where spam is obvious. Second, a relational model is built, taking advantage of the interconnected nature of users and their comments. By feeding our initial predictions from the independent model into the relational model, we can propagate and jointly infer the labels of all comments at the same time. This al
APA, Harvard, Vancouver, ISO und andere Zitierweisen
20

Harris, David Anthony. "Neural network studies of lithofacies classification." Thesis, University of Edinburgh, 1994. http://hdl.handle.net/1842/14001.

Der volle Inhalt der Quelle
Annotation:
Exploration for hydrocarbons and other resources requires that large amounts of data be interpreted and used to infer the geology of extensive regions. Many different types of data are used. They are interpreted by geologists and sedimentologists in the light of experience. Artificial neural network models implemented on computers provide a powerful means of performing tasks such as pattern classification. Such tasks are difficult to perform using rule based methods, as we often do not know how to specify appropriate rules. We show that artificial neural networks can be used to discriminate be
APA, Harvard, Vancouver, ISO und andere Zitierweisen
21

McMahon, Michael J. "An approach for enhanced management of network-attached devices." abstract and full text PDF (free order & download UNR users only), 2007. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1442840.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
22

Lykouropoulos, Efstathios, Andreas Kostoulas, and Zainab Jumaa. "Connect street light control devices in a secure network." Thesis, Högskolan i Halmstad, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-28180.

Der volle Inhalt der Quelle
Annotation:
Wireless communications is a constantly progressing technology in network engineering society, creating an environment full of opportunities that are targeting in financial growth, quality of life and humans prosperity. Wireless security is the science that has as a goal to provide safe data communication between authorized users and prevent unauthorized users from gaining access, deny access, damage or counterfeit data in a wireless environment. In order to success it uses layers of protection that consist of software and hardware mechanisms that are able to monitor network’s behavior and in
APA, Harvard, Vancouver, ISO und andere Zitierweisen
23

Deng, Shuo. "Intelligent network selection and energy reduction for mobile devices." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99819.

Der volle Inhalt der Quelle
Annotation:
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.<br>Cataloged from PDF version of thesis.<br>Includes bibliographical references (pages 137-142).<br>The popularity of mobile devices has stimulated rapid progress in both Wi-Fi and cellular technologies. Before LTE was widely deployed, Wi-Fi speeds dominated cellular network speeds. But that is no longer true today. In a study we conducted with a crowd-sourced measurement tool used by over 1,000 users in 16 countries, we found that 40% of the time LTE outperforms Wi-Fi, and 7
APA, Harvard, Vancouver, ISO und andere Zitierweisen
24

Qian, Xiaolan 1977. "A protocol for a wireless network of mobile devices." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/86494.

Der volle Inhalt der Quelle
Annotation:
Thesis (S.B. and M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.<br>Includes bibliographical references (leaf 53).<br>by Xiaolan Qian.<br>S.B.and M.Eng.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
25

Guulay, Biniam Gebregergs. "CheesePi: Measuring Home Network Performance Using Dedicated Hardware Devices." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-184917.

Der volle Inhalt der Quelle
Annotation:
Internet users may not get the service quality promised by theirproviders, and also may not know what service they can receive.When users experience poor Internet connection performance, itis not easy to identify the source of the problem. We developCheesePi, a distributed measurement system that measures theInternet connection experience of home users based on some net-work performance attributes (e.g. latency, packet loss rate, andWiFi signal quality). The CheesePi runs on a Raspberry Pi (acredit card sized computer) connected to the user’s home networkas a measurement agent. It is important
APA, Harvard, Vancouver, ISO und andere Zitierweisen
26

Nyrönen, P. (Pekka). "Convolutional neural network based super-resolution for mobile devices." Master's thesis, University of Oulu, 2018. http://urn.fi/URN:NBN:fi:oulu-201812083250.

Der volle Inhalt der Quelle
Annotation:
Super-resolution is a challenging problem of restoring details lost to diffraction in the image capturing process. Degradations from the environment and the imaging device increase its difficulty, and they are strongly present in mobile phone cameras. The latest promising approaches involve convolutional neural networks, but little testing has been done on degraded images. Also, sizes of neural networks raise a question of their applicability on mobile devices. A wide review of published super-resolution neural networks is done. Four of the network architectures are chosen, and their TensorFlo
APA, Harvard, Vancouver, ISO und andere Zitierweisen
27

Ammermüller, Sebastian, Oliver Bohl, Oliver Gerstheimer, and Shakib Manouchehri. "Ansätze zur Nutzung Sozialer Netzwerke mittels mobiler Endgeräte." Technische Universität Dresden, 2007. https://tud.qucosa.de/id/qucosa%3A27898.

Der volle Inhalt der Quelle
Annotation:
Die Vernetzung einer Vielzahl unterschiedlicher Nutzergruppen in privaten und beruflichen Kontexten wird durch webbasierte Soziale Netzwerke (Social Networks) wie Myspace, Linkedin und Flickr gefördert. Zahlreiche Personen nutzen zudem so genannte Social Software wie Skype, Del.icio.us, YouTube oder den aktuellen Newcomer twitter. Entsprechende Anwendungen werden durch moderne Informationsund Kommunikationstechnologien (IKT), zumeist durch Internettechnologien, realisiert und ermöglichen es den Nutzern, entweder neue Inhalte zu erstellen, und diese dann mit ausgewählten Personen (oder auch mit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
28

Krkusic, Enis. "Security of the mobile devices in VäxjöKommun and corporation." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6253.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
29

Altrabsheh, Bilal. "Investigation of low cost techniques for realising microwave and millimeter-wave network analysers." Thesis, University of Surrey, 2003. http://epubs.surrey.ac.uk/843309/.

Der volle Inhalt der Quelle
Annotation:
The work presented in this thesis is on the development of reliable low cost measurement systems for measuring microwave and millimetre-wave devices. The purpose of this work is to find techniques which use multiple power detectors and can measure magnitude and phase without the need for expensive superheterodyne receivers. Two novel microwave measurement systems have been designed with the intention of providing a measurement facility which enables the characterisation of both active and passive devices in terms of their scattering parameters. The first method is based on using a multistate r
APA, Harvard, Vancouver, ISO und andere Zitierweisen
30

Coue, Dominique Xavier Henri Leon. "Feedforward artificial neural network design utilising subthreshold mode CMOS devices." Thesis, University of Plymouth, 1997. http://hdl.handle.net/10026.1/1633.

Der volle Inhalt der Quelle
Annotation:
This thesis reviews various previously reported techniques for simulating artificial neural networks and investigates the design of fully-connected feedforward networks based on MOS transistors operating in the subthreshold mode of conduction as they are suitable for performing compact, low power, implantable pattern recognition systems. The principal objective is to demonstrate that the transfer characteristic of the devices can be fully exploited to design basic processing modules which overcome the linearity range, weight resolution, processing speed, noise and mismatch of components proble
APA, Harvard, Vancouver, ISO und andere Zitierweisen
31

Kao, Yi-Hsuan. "Optimizing task assignment for collaborative computing over heterogeneous network devices." Thesis, University of Southern California, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10124490.

Der volle Inhalt der Quelle
Annotation:
<p> The Internet of Things promises to enable a wide range of new applications involving sensors, embedded devices and mobile devices. Different from traditional cloud computing, where the centralized and powerful servers offer high quality computing service, in the era of the Internet of Things, there are abundant computational resources distributed over the network. These devices are not as powerful as servers, but are easier to access with faster setup and short-range communication. However, because of energy, computation, and bandwidth constraints on smart things and other edge devices, it
APA, Harvard, Vancouver, ISO und andere Zitierweisen
32

Lindqvist, Anna. "Threats to smart buildings : Securing devices in a SCADA network." Thesis, Linköpings universitet, Institutionen för datavetenskap, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-176723.

Der volle Inhalt der Quelle
Annotation:
This paper examines the possibilities of performing tests with the aim to ensure that devices in a SCADA network can be deemed secure before deployment. SCADA systems are found in most industries and have recently seen an increased use in building automation, most importantly the healthcare sector, which means that a successful attack toward such a system could endanger lives of patients and healthcare professionals.The method of testing was created to examine whether devices conflicted with the security flaws identified by OWASP IoT Top 10 list, meaning that OWASP IoT Top 10 was the foundatio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
33

Dikme, Altay. "A Quantum Neural Network for Noisy Intermediate Scale Quantum Devices." Thesis, KTH, Tillämpad fysik, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-300394.

Der volle Inhalt der Quelle
Annotation:
Neural networks have helped the field of machine learning grow tremendously in the past decade, and can be used to solve a variety of real world problems such as classification problems. On another front, the field of quantum computing has advanced, with quantum devices publicly available via the cloud. The availability of such systems has led to the creation of a new field of study, Quantum Machine Learning, which attempts to create quantum analogues of classical machine learning techniques. One such method is the Quantum Neural Network (QNN) inspired by classical neural networks. In this the
APA, Harvard, Vancouver, ISO und andere Zitierweisen
34

Nafziger, Jonathan W. "A Novel Cache Migration Scheme in Network-on-Chip Devices." University of Cincinnati / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1282327354.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
35

Phillips, Ian D. "OTDM network processing using all-optical and electro-optical devices." Thesis, Aston University, 1998. http://publications.aston.ac.uk/15370/.

Der volle Inhalt der Quelle
Annotation:
The current optical communications network consists of point-to-point optical transmission paths interconnected with relatively low-speed electronic switching and routing devices. As the demand for capacity increases, then higher speed electronic devices will become necessary. It is however hard to realise electronic chip-sets above 10 Gbit/s, and therefore to increase the achievable performance of the network, electro-optic and all-optic switching and routing architectures are being investigated. This thesis aims to provide a detailed experimental analysis of high-speed optical processing wit
APA, Harvard, Vancouver, ISO und andere Zitierweisen
36

Carela, Español Valentín. "Network traffic classification : from theory to practice." Doctoral thesis, Universitat Politècnica de Catalunya, 2014. http://hdl.handle.net/10803/283573.

Der volle Inhalt der Quelle
Annotation:
Since its inception until today, the Internet has been in constant transformation. The analysis and monitoring of data networks try to shed some light on this huge black box of interconnected computers. In particular, the classification of the network traffic has become crucial for understanding the Internet. During the last years, the research community has proposed many solutions to accurately identify and classify the network traffic. However, the continuous evolution of Internet applications and their techniques to avoid detection make their identification a very challenging task, which is
APA, Harvard, Vancouver, ISO und andere Zitierweisen
37

Lim, Chee Peng. "Autonomous neural network systems for pattern classification." Thesis, University of Sheffield, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.242285.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
38

Van, Heerden Renier Pelser. "A formalised ontology for network attack classification." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1011603.

Der volle Inhalt der Quelle
Annotation:
One of the most popular attack vectors against computers are their network connections. Attacks on computers through their networks are commonplace and have various levels of complexity. This research formally describes network-based computer attacks in the form of a story, formally and within an ontology. The ontology categorises network attacks where attack scenarios are the focal class. This class consists of: Denial-of- Service, Industrial Espionage, Web Defacement, Unauthorised Data Access, Financial Theft, Industrial Sabotage, Cyber-Warfare, Resource Theft, System Compromise, and Runaway
APA, Harvard, Vancouver, ISO und andere Zitierweisen
39

Labarge, Isaac E. "Neural Network Pruning for ECG Arrhythmia Classification." DigitalCommons@CalPoly, 2020. https://digitalcommons.calpoly.edu/theses/2136.

Der volle Inhalt der Quelle
Annotation:
Convolutional Neural Networks (CNNs) are a widely accepted means of solving complex classification and detection problems in imaging and speech. However, problem complexity often leads to considerable increases in computation and parameter storage costs. Many successful attempts have been made in effectively reducing these overheads by pruning and compressing large CNNs with only a slight decline in model accuracy. In this study, two pruning methods are implemented and compared on the CIFAR-10 database and an ECG arrhythmia classification task. Each pruning method employs a pruning phase inter
APA, Harvard, Vancouver, ISO und andere Zitierweisen
40

Shu, Xingliang. "Electrocardiograph Signal Classification By Using Neural Network." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1592395089900722.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
41

Zhou, Wei. "Autonomous smart antenna systems for future mobile devices." Thesis, University of Edinburgh, 2015. http://hdl.handle.net/1842/9959.

Der volle Inhalt der Quelle
Annotation:
Along with the current trend of wireless technology innovation, wideband, compact size, low-profile, lightweight and multiple functional antenna and array designs are becoming more attractive in many applications. Conventional wireless systems utilise omni-directional or sectored antenna systems. The disadvantage of such antenna systems is that the electromagnetic energy, required by a particular user located in a certain direction, is radiated unnecessarily in every direction within the entire cell, hence causing interference to other users in the system. In order to limit this source of inte
APA, Harvard, Vancouver, ISO und andere Zitierweisen
42

Pierfederici, Eugenio. "Inferring the behaviour and security of networked devices via communication analysis." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19418/.

Der volle Inhalt der Quelle
Annotation:
In the last years the number of devices connected to the Internet has been increasing exponentially and it has reached huge numbers, just days ago the RIPE Network Coordination Center announced it run out of IPv4 addresses. As a consequence, it's extremely complex to control what is happening on the network and what, or whom, a device is communicating with. We are losing control over many of our devices. It's becoming everyday more difficult to know what the device is doing and what is it sharing on the Internet. Luckily, in the last years the attention to security, privacy and awareness is
APA, Harvard, Vancouver, ISO und andere Zitierweisen
43

Chu, Guang Yong. "Photonic devices for next generation fiber-to-the-home access network." Doctoral thesis, Universitat Politècnica de Catalunya, 2016. http://hdl.handle.net/10803/386564.

Der volle Inhalt der Quelle
Annotation:
It would be unaffordable if the WDM-PON technologies were directly applied for massive deployment. Hence, the potential WDM-PON is to be integrated and improved in order to adapt it for NGPON and the future 5G. The UDWDM-PON can be considered as an ultimate solution for the next-generation access network capable of providing unlimited bandwidth for each user, thanks to the coherent detection. Plenty of scientists have believed that it is crucial to increase the operating speed and maximum reach of WDM-PON, while it has no sense if people achieve them without a ordable cost. In order to apply
APA, Harvard, Vancouver, ISO und andere Zitierweisen
44

Martínez, Anny. "An ontology-based approach toward the configuration of heterogeneous network devices." Doctoral thesis, Universitat Politècnica de Catalunya, 2015. http://hdl.handle.net/10803/299803.

Der volle Inhalt der Quelle
Annotation:
Despite the numerous efforts of standardization, semantic issues remain in effect in many subfields of networking. The inability to exchange data unambiguously between information systems and human resources is an issue that hinders technology implementation, semantic interoperability, service deployment, network management, technology migration, among many others. In this thesis, we will approach the semantic issues in two critical subfields of networking, namely, network configuration management and network addressing architectures. The fact that makes the study in these areas rather appeali
APA, Harvard, Vancouver, ISO und andere Zitierweisen
45

Mandowara, Piyush. "Live video streaming for handheld devices over an ad hoc network." Manhattan, Kan. : Kansas State University, 2008. http://hdl.handle.net/2097/941.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
46

Larsson, Magnus. "Sanitization of embedded network devices : Investigation of vendor’s factory reset procedure." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-166305.

Der volle Inhalt der Quelle
Annotation:
Embedded devices such as routers, switches, and firewalls commonly have sensitive information stored on them such as passwords, cryptographic keys, and information about the network around them and services that these device(s) provide. When disposing of or reselling this equipment in the secondary market it is crucial to erase this sensitive information. However, there is an important question that must be asked: Do the erase commands and routines offered by the device manufacturers actually erase the sensitive data? This thesis investigates methods and tools to determine the completeness of
APA, Harvard, Vancouver, ISO und andere Zitierweisen
47

Kobezak, Philip D. "Frequent Inventory of Network Devices for Incident Response: A Data-driven Approach to Cybersecurity and Network Operations." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/83375.

Der volle Inhalt der Quelle
Annotation:
Challenges exist in higher education networks with host inventory and identification. Any student, staff, faculty, or dedicated IT administrator can be the primary responsible personnel for devices on the network. Confounding the problem is that there is also a large mix of personally-owned devices. These network environments are a hybrid of corporate enterprise, federated network, and Internet service provider. This management model has survived for decades based on the ability to identify responsible personnel when a host, system, or user account is suspected to have been compromised or is d
APA, Harvard, Vancouver, ISO und andere Zitierweisen
48

San, Pedro Miguel G. "Signal classification using the mean separator neural network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA377744.

Der volle Inhalt der Quelle
Annotation:
Thesis (M.S. in Electrical Engineering) Naval Postgraduate School, March 2000.<br>Thesis advisor(s): Fargues, Monique P. ; Hippenstiel, Ralph D. "March 2000." Includes bibliographical references (p. 193-194). Also available online.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
49

au, P. Kraipeerapun@murdoch edu, and Pawalai Kraipeerapun. "Neural network classification based on quantification of uncertainty." Murdoch University, 2009. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20090526.100525.

Der volle Inhalt der Quelle
Annotation:
This thesis deals with feedforward backpropagation neural networks and interval neutrosophic sets for the binary and multiclass classification problems. Neural networks are used to predict “true” and “false” output values. These results together with the uncertainty of type error and vagueness occurred in the prediction are then represented in the form of interval neutrosophic sets. Each element in an interval neutrosophic set consists of three membership values: truth, indeterminacy, and false. These three membership values are then used in the classification process. For binary classificatio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
50

Kraipeerapun, Pawalai. "Neural network classification based on quantification of uncertainty." Kraipeerapun, Pawalai (2009) Neural network classification based on quantification of uncertainty. PhD thesis, Murdoch University, 2009. http://researchrepository.murdoch.edu.au/699/.

Der volle Inhalt der Quelle
Annotation:
This thesis deals with feedforward backpropagation neural networks and interval neutrosophic sets for the binary and multiclass classification problems. Neural networks are used to predict “true” and “false” output values. These results together with the uncertainty of type error and vagueness occurred in the prediction are then represented in the form of interval neutrosophic sets. Each element in an interval neutrosophic set consists of three membership values: truth, indeterminacy, and false. These three membership values are then used in the classification process. For binary classificatio
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!