Dissertations / Theses on the topic 'Communication Telecommunication Computer networks'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Communication Telecommunication Computer networks.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Andrag, Walter H. "Reinforcement learning for routing in communication networks." Thesis, Stellenbosch : Stellenbosch University, 2003. http://hdl.handle.net/10019.1/53570.
Full textENGLISH ABSTRACT: Routing policies for packet-switched communication networks must be able to adapt to changing traffic patterns and topologies. We study the feasibility of implementing an adaptive routing policy using the Q-Learning algorithm which learns sequences of actions from delayed rewards. The Q-Routing algorithm adapts a network's routing policy based on local information alone and converges toward an optimal solution. We demonstrate that Q-Routing is a viable alternative to other adaptive routing methods such as Bellman-Ford. We also study variations of Q-Routing designed to better explore possible routes and to take into consideration limited buffer size and optimize multiple objectives.
AFRIKAANSE OPSOMMING:Die roetering in kommunikasienetwerke moet kan aanpas by veranderings in netwerktopologie en verkeersverspreidings. Ons bestudeer die bruikbaarheid van 'n aanpasbare roeteringsalgoritme gebaseer op die "Q-Learning"-algoritme wat dit moontlik maak om 'n reeks besluite te kan neem gebaseer op vertraagde vergoedings. Die roeteringsalgoritme gebruik slegs nabygelee inligting om roeteringsbesluite te maak en konvergeer na 'n optimale oplossing. Ons demonstreer dat die roeteringsalgoritme 'n goeie alternatief vir aanpasbare roetering is, aangesien dit in baie opsigte beter vaar as die Bellman-Ford algoritme. Ons bestudeer ook variasies van die roeteringsalgoritme wat beter paaie kan ontdek, minder geheue gebruik by netwerkelemente, en wat meer as een doelfunksie kan optimeer.
Konta, Kaori. "Computer-mediated communication as the paradigm: Resistance to technology and the new style of human communication." CSUSB ScholarWorks, 1997. https://scholarworks.lib.csusb.edu/etd-project/1481.
Full textKolar, Vinay. "Routing and traffic-engineering in multi-hop wireless networks an optimization based approach /." Diss., Online access via UMI:, 2007.
Find full textGuo, Xingang. "Predictable CPU bandwidth management framework for next-generation operating systems /." Full text (PDF) from UMI/Dissertation Abstracts International, 2000. http://wwwlib.umi.com/cr/utexas/fullcit?p3004274.
Full textHe, Changhua, and 何昌華. "Resource management for handoff control in wireless/mobile networks using artificial neural networks." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2001. http://hub.hku.hk/bib/B31226000.
Full textLee, Tae-jin. "Traffic management and design of multiservice networks : the Internet and ATM networks /." Digital version accessible at:, 1999. http://wwwlib.umi.com/cr/utexas/main.
Full textBaig, Adeel Computer Science & Engineering Faculty of Engineering UNSW. "Improving throughput and fairness of on-board mobile networks." Awarded by:University of New South Wales. School of Computer Science & Engineering, 2007. http://handle.unsw.edu.au/1959.4/28247.
Full textAl-Fuqaha, Ala Isam Chaudhry Ghulam M. "Routing and wavelength assignment in all-optical DWDM networks with sparse wavelength conversion capabilities." Diss., UMK access, 2004.
Find full text"A dissertation in engineering and computer networking." Advisor: Ghulam Chaudhry. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed Feb. 22, 2006. Includes bibliographical references (leaves 135-157). Online version of the print edition.
Barlow, David A. "Router-based traffic engineering in MPLS/DiffServ/HMIP radio access networks." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15362.
Full textSerbest, Yetik. "Resource management of integrated services networks /." Digital version accessible at:, 2000. http://wwwlib.umi.com/cr/utexas/main.
Full textYuen, Kwan Hung. "TCP performance over satellite networks /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20YUEN.
Full textIncludes bibliographical references (leaves 68-71). Also available in electronic version. Access restricted to campus users.
Bohannan, Chad Brian. "Performance evaluation of routing protocols for QOS support in rural mobile ad hoc networks." Thesis, Montana State University, 2008. http://etd.lib.montana.edu/etd/2008/bohannan/BohannanC0508.pdf.
Full textVuza, Xolisa. "Social and technical issues of IP-based multi-modal semi-synchronous communication: rural telehealth communication in South Africa." Thesis, University of the Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&.
Full textHsiao, Hsu-Feng. "Multimedia streaming congestion control over heterogeneous networks : from distributed computation and end-to-end perspectives /." Thesis, Connect to this title online; UW restricted, 2005. http://hdl.handle.net/1773/5946.
Full textPong, Dennis Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Quality of service support in multi-rate wireless networks." Awarded by:University of New South Wales. School of Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/25153.
Full textYuen, Siu Yu. "Routing and time-slot assignment algorithms and connection management in photonic circuit switched networks /." View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20YUEN.
Full textDimitrov, Rossen Petkov. "Overlapping of communication and computation and early binding fundamental mechanisms for improving parallel performance on clusters of workstations /." Diss., Mississippi State : Mississippi State University, 2001. http://library.msstate.edu/etd/show.asp?etd=etd-04092001-231941.
Full textLakshmanan, Sriram. "Securing wireless networks against eavesdropping using smart antennas." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/26698.
Full textCommittee Chair: Raghupathy, Sivakumar; Committee Member: Farmarz Fekri; Committee Member: Mary Ann, Ingram. Part of the SMARTech Electronic Thesis and Dissertation Collection.
Miller, Mark Henry Bruce. "The optimum communications architecture for deep level gold mining." Diss., Pretoria : [s.n.], 2000. http://upetd.up.ac.za/thesis/available/etd-01122007-124105/.
Full textSawant, Uttara. "Grid-based Coordinated Routing in Wireless Sensor Networks." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5437/.
Full textPaliwal, Gaurav. "Convergence : the next big step /." Online version of thesis, 2006. https://ritdml.rit.edu/dspace/handle/1850/1316.
Full textZhu, Jing. "Layer 2 (LL/MAC) performance analysis and improvement of wireless heterogeneous networks /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/5950.
Full textLiu, Kung-Chao. "Information system development and the use of electronic meeting systems." Diss., The University of Arizona, 1991. http://hdl.handle.net/10150/185439.
Full textFarmer, Jason Z. "Multi-objective routing optimization for multiple level priority and preemption in multi-tiered networks." Link to electronic thesis, 2006. http://www.wpi.edu/Pubs/ETD/Available/etd-121806-235007/.
Full textBozek, Matthew Peter. "Express lanes modification to the data vortex photonic all-optical path interconnection network." Thesis, Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24680.
Full textCommittee Chair: Wills, D. Scott; Committee Member: Keezer, David; Committee Member: Yalamanchili, Sudhakar
Zhang, Xin. "Network Formation and Routing for Multi-hop Wireless Ad-Hoc Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/11470.
Full textLee, Myounghwan. "Quality of service with DiffServ architecture in hybrid mesh/relay networks." Diss., Georgia Institute of Technology, 2010. http://hdl.handle.net/1853/34694.
Full textHawkins, William Cory. "Evaluation of the data vortex photonic all-optical path interconnection network for next-generation supercomputers." Available online, Georgia Institute of Technology, 2006, 2006. http://etd.gatech.edu/theses/available/etd-12182006-155304/.
Full textDr. Henry L. Owen III, Committee Member ; Dr. David Keezer, Committee Member ; Dr. D. Scott Wills, Committee Chair.
Lin, Hua. "Performance analysis of multistage interconnection networks with general traffic." Ohio : Ohio University, 2002. http://www.ohiolink.edu/etd/view.cgi?ohiou1174680433.
Full textNg, Hwee Ping. "Performance analysis of management techniques for SONET/SDH telecommunications networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FNg.pdf.
Full textNguyen, Cong Duc. "Creation and distribution of real-time content a case study in provisioning immersive voice communications to networked games /." Access electronically, 2006. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20070110.164837/index.html.
Full textAbidogun, Olusola Adeniyi. "Data mining, fraud detection and mobile telecommunications: call pattern analysis with unsupervised neural networks." Thesis, University of the Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&.
Full textmarketing and fraud detection. One of the strategies for fraud detection checks for signs of questionable changes in user behavior. Although the intentions of the mobile phone users cannot be observed, their intentions are reflected in the call data which define usage patterns. Over a period of time, an individual phone generates a large pattern of use. While call data are recorded for subscribers for billing purposes, we are making no prior assumptions about the data indicative of fraudulent call patterns, i.e. the calls made for billing purpose are unlabeled. Further analysis is thus, required to be able to isolate fraudulent usage. An unsupervised learning algorithm can analyse and cluster call patterns for each subscriber in order to facilitate the fraud detection process.
This research investigates the unsupervised learning potentials of two neural networks for the profiling of calls made by users over a period of time in a mobile telecommunication network. Our study provides a comparative analysis and application of Self-Organizing Maps (SOM) and Long Short-Term Memory (LSTM) recurrent neural networks algorithms to user call data records in order to conduct a descriptive data mining on users call patterns.
Our investigation shows the learning ability of both techniques to discriminate user call patterns
the LSTM recurrent neural network algorithm providing a better discrimination than the SOM algorithm in terms of long time series modelling. LSTM discriminates different types of temporal sequences and groups them according to a variety of features. The ordered features can later be interpreted and labeled according to specific requirements of the mobile service provider. Thus, suspicious call behaviours are isolated within the mobile telecommunication network and can be used to to identify fraudulent call patterns. We give results using masked call data
from a real mobile telecommunication network.
Mazandu, Gaston Kuzamunu. "Traffic Engineering using Multipath Routing Approaches." Thesis, Link to the online version, 2007. http://hdl.handle.net/10019/679.
Full textChavan, Rohit. "JAVA synchronized collaborative multimedia toolkit: A collaborative communication tool." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2549.
Full textThiessen, Christian. "Resilient routing and spectrum assignment in Elastic Optical Networks under Dynamic Traffic." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-155684.
Full textTransparenta Elastiska Optiska Nätverk (EON) ses som en lovande lösning för framtida optiska transportnät för att hänga med Internettrafikens tillväxt, eftersom de möjliggör att tillhandahålla förbindelser med olika krav på bandbredd på ett effektivt sätt. För att uppnå hög spektrumeffektivitet i dessa nätverk är det viktigt att fatta bra beslut vad avser routing, modulering och spektrumtilldelning (Routing, Modulation Level and Spectrum Assignment, RMLSA). Eftersom fiberavbrott är vanliga, så är tåligheten mot enstaka länkfel et annat viktigt ämne. Detta kan ske effektivt genom att skydda gemensamma reservvägar (Shared Path Protection, SPP), vilket dock försvårar RMLSA-problemet. Befintliga routing, modulering och spektrumtilldelningsalgoritmer för SPP fokuserar på strategier i två steg, där först de primära vägarna väljs oberoende av deras backupalternativ. Att välja en annan primär väg, kan dock möjliggöra en bättre reservväg med bättre delning av backupresurser om i stället par av primära och sekundära vägar bedöms tillsammans. Tidigare studier på SPP i EONs anser främst statiska trafikscenarier. I ett dynamiskt trafikscenario, där oförutsägbara anslutningsbegäranden inkommer och avslutas över tiden, så kommer fragmenteringen av spektrala resurser ha en betydande inverkan på nätverkets prestanda. I denna avhandling föreslås en ny algoritm för SPP i EONs för hantering av enskilda länkfel, där par av primära och sekundära vägar väljs gemensamt, vilket minimerar fragmentering och maximerar delning vilket leder till bättre nätverksprestanda i form av minskat blockering. Till skillnad från befintliga algoritmer beslutas den primära och sekundära vägen och spektrum samtidigt från en uppsättning av par av kandidatvägar och spektrumtilldelningen görs med en hybrid-kostnadsfunktion. Funktionen är en viktad kombination av befintliga mått som integrerar fragmentering och delning till en multi-objektiv målfunktion. Med användning av nätverkstrafiksimuleringar i två referensnätverk studeras effekten av olika kostnadsfunktioner på algoritmens beteende och en optimal uppsättning av vikter bestäms. Med dessa parametrar, trafiksimuleringar i en reducerad US-nätverkstopologi med belastningsvärden på 190-240 Erlang, motsvarande blockeringssannolikheter på 0,1 - 1%, visar en genomsnittlig förbättring under referensalgoritmen på 79% i blockeringens sannolikhet, 6.9% i delning och 5,9% i fragmentering. Det visas också att det mesta av denna förbättring beror på det samtidiga tilldelning av primära och reservlänkar. Hybridkostnadsfunktionen minskar blockeringen med ytterligare 10%.
Rais, Rao Naveed Bin. "COMMUNICATION MECHANISMS FOR MESSAGE DELIVERY IN HETEROGENEOUS NETWORKS PRONE TO EPISODIC CONNECTIVITY." Phd thesis, Université de Nice Sophia-Antipolis, 2011. http://tel.archives-ouvertes.fr/tel-00590626.
Full textSellathurai, Mathini. "Turbo-blast : a novel technique for multi-transmit and multi-receive wireless communications /." *McMaster only, 2001.
Find full textCarneiro, Viana Aline. "Putting data delivery into context: Design and evaluation of adaptive networking support for successful communication in wireless self-organizing networks." Habilitation à diriger des recherches, Université Pierre et Marie Curie - Paris VI, 2011. http://tel.archives-ouvertes.fr/tel-00653813.
Full textHachfi, Fakhreddine Mohamed. "Future of asynchronous transfer mode networking." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2639.
Full textMrabet, Radouane. "Reusability and hierarchical simulation modeling of communication systems for performance evaluation: Simulation environment, basic and generic models, transfer protocols." Doctoral thesis, Universite Libre de Bruxelles, 1995. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/212586.
Full textThe main contribution of this thesis is the emphasis made on the reusability concept, on one side, for designing a simulation environment, and on the other side, for defining two different levels of granularity for reusable network component libraries.
The design of our simulation environment, called AMS for Atelier for Modeling and Simulation, was based on existing pieces of software, which proved their usefulness in their respective fields. In order to carry out this integration efficiently, a modular structure of the atelier was proposed. The structure has been divided into four phases. Each phase is responsible of a part of the performance evaluation cycle. The main novelty of this structure is the usage of a dedicated language as a means to define a clear border between the editing and simulation phases and to allow the portability of the atelier upon different platforms. A prototype of the atelier has been developed on a SUN machine running the SunOs operating system. It is developed in C language.
The kernel of the AMS is its library of Detailed Basic Models (DBMs). Each DBM was designed in order to comply with the most important criterion which is reusability. Indeed, each DBM can be used in aeveral network architectures and can be a component of generic and composite models. Before the effective usage of a DBM, it is verified and validated in order to increase the model credibility. The most important contribution of this research is the definition of a methodology for modeling protocol entities as DBMs. We then tried to partly bridge the gap between specification and modeling. This methodology is based on the concept of function. Simple functions are modeled as reusable modules and stored into a library. The Function Based Methodology was designed to help the modeler to build efficiently and rapidly new protocols designed for the new generation of networks where several services can be provided. These new protocols can be dynamically tailored to the user' s requirements.
Doctorat en sciences appliquées
info:eu-repo/semantics/nonPublished
Sharma, Ameeth. "Performance comparison of two dynamic shared-path protection algorithms for WDM optical mesh networks." Diss., Pretoria : [s.n.], 2008. http://upetd.up.ac.za/thesis/available/etd-01262009-141918/.
Full textPereira, Flavio de Melo. "Modelagem, policiamento e escalonamento em redes Ethernet PON." [s.n.], 2006. http://repositorio.unicamp.br/jspui/handle/REPOSIP/260703.
Full textTese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-07T07:59:05Z (GMT). No. of bitstreams: 1 Pereira_FlaviodeMelo_D.pdf: 3025086 bytes, checksum: 2baf4e2cf83a53c366092610c84e1bdc (MD5) Previous issue date: 2006
Resumo: Neste trabalho, apresentamos uma nova proposta de modelagem, policiamento e escalonamento de tráfego em redes Ethernet com elementos ápticos passivos. Esta proposta visa ao suporte a garantias de desempenho individuais para os fluxos. Propomos um processo envelope denominado Processo de Chegada com Limitante Fracionário para a representação de tráfego multimidia com características fractais. Com base neste modelo, propomos o uso do algoritmo do balde furado para o policiamento do tráfego. Para o escalonamento de tráfego, propomos uma nova política em que a rede reserva uma parcela minima de banda para cada fluxo, sendo que os fluxos com demanda reprimida recebem uma parcela justa dos recursos ociosos. Para esta política, denominada Compartilhamento Proporcional com Reserva de Carga, estabelecemos as condições de estabilidade da rede e apresentamos expressões limitantes para a justiça e para o atraso dos fluxos
Abstract: We propose new framework for traffic modelling, policing and scheduling in Ethernet Passive Optical Networks. This framework aims at providing performance guarantees to individual flows in access networks. We propose a new envelope process called Fractional Bounded Arrival Process for selfsimilar 'multimedia traffic representation. The policing of such a kind of traffic by using the leaky bucket algorithm is also proposed. We present a novel discipline for scheduling the upstream flows in EPON networks. In such a discipline, which is calle4 Proportional Sharing with Load Reservation, each flow is guaranteed a minimum share of bandwidth and the unused bandwidth is fairly distributed among them in proportion to their own demands and priorities. We analyze the performance of the proposed discipline and provide fairness and delay bounds on a per-flow basis
Doutorado
Telecomunicações e Telemática
Doutor em Engenharia Elétrica
Spencer, Logan Lemuella C. "Changing from the silo model to the horizontal layers model in public policy regulations : the implications and potential for the telecommunications industry /." Thesis, Available online, Georgia Institute of Technology, 2005, 2005. http://etd.gatech.edu/theses/available/etd-11282005-192311/.
Full textHlungulu, Bulumko. "Building a semantic web-based e-health component for a multipurpose communication centre." Thesis, University of Fort Hare, 2010. http://hdl.handle.net/10353/374.
Full textDe, Vega Rodrigo Miguel. "Modeling future all-optical networks without buffering capabilities." Doctoral thesis, Universite Libre de Bruxelles, 2008. http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/210455.
Full textIn the first part we introduce the basic functionality and structure of OBS and OPS networks. We identify the blocking probability as the main performance parameter of interest.
In the second part we study the statistical properties of the traffic that will likely run through these networks. We use for this purpose a set of traffic traces obtained from the Universidad Politécnica de Catalunya. Our conclusion is that traffic entering the optical domain in future OBS/OPS networks will be long-range dependent (LRD).
In the third part we present the model for bufferless OBS/OPS networks. This model takes into account the results from the second part of the thesis concerning the LRD nature of traffic. It also takes into account specific issues concerning the functionality of a typical bufferless packet-switching network. The resulting model presents scalability problems, so we propose an approximative method to compute the blocking probability from it. We empirically evaluate the accuracy of this method, as well as its scalability.
Doctorat en Sciences de l'ingénieur
info:eu-repo/semantics/nonPublished
Shankar, Arun. "Optimal jammer placement to interdict wireless network services." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483583.
Full textThesis Advisor(s): Alderson, David ; Zhou, Hong. "June 2008." Description based on title screen as viewed on August 22, 2008. Includes bibliographical references (p. 39-40). Also available in print.
Uppoor, Sandesh. "Understanding and Exploiting Mobility in Wireless Networks." Phd thesis, INSA de Lyon, 2013. http://tel.archives-ouvertes.fr/tel-00912521.
Full textSamarasekera, Andawattage Chaminda Janaka. "The Performance of Dual-Hop Decode-and-Forward Underlay Cognitive Relay Networks with Interference Power Constraints over Weibull Fading Channels." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3201.
Full textMutooni, Philip Kyalo. "Telecommunications @ crossroads : the transition from a voice-centric to a data-centric communication network." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43453.
Full textIncludes bibliographical references (leaves 62-64).
by Philip Kyalo Mutooni.
M.S.
Barouni, Ala Eddine. "Drawing algorithms for survivable telecommunication networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/mq20965.pdf.
Full text