Dissertations / Theses on the topic 'Distance vectors'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Distance vectors.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Shaik, Abdul Ameer Basha. "SVM Classification and Analysis of Margin Distance on Microarray Data." University of Akron / OhioLINK, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=akron1302618924.
Full textHjelm, Andersson Patrick. "Binär matchning av bilder med hjälp av vektorer från deneuklidiska avståndstransformen." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2440.
Full textThis thesis shows the result from investigations of methods that use distance vectors when matching pictures. The distance vectors are available in a distance map made by the Euclidean Distance Transform. The investigated methods use the two characteristic features of the distance vector when matching pictures, length and direction. The length of the vector is used to calculate a value of how good a match is and the direction of the vector is used to predict a transformation to get a better match. The results shows that the number of calculation steps that are used during a search can be reduced compared to matching methods that only uses the distance during the matching.
Visa, Sofia. "Comparative Study of Methods for Linguistic Modeling of Numerical Data." University of Cincinnati / OhioLINK, 2002. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1043254774.
Full textThomson, R. G. W. "Vector acoustic miss distance indication." Master's thesis, University of Cape Town, 1985. http://hdl.handle.net/11427/21868.
Full textGirard, Jean-François. "Failure tolerant alternate-path distance-vector routing." Thesis, McGill University, 1992. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=61200.
Full textFang, Xiao Ph D. Massachusetts Institute of Technology. "Bayesian distance metric learning on i-vector for speaker verification." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/84870.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 63-66).
This thesis explores the use of Bayesian distance metric learning (Bayes_dml) for the task of speaker verification using the i-vector feature representation. We propose a framework that explores the distance constraints between i-vector pairs from the same speaker and different speakers. With an approximation of the distance metric as a weighted covariance matrix of the top eigenvectors from the data covariance matrix, variational inference is used to estimate a posterior distribution of the distance metric. Given speaker labels, we select different-speaker data pairs with the highest cosine scores to form a different-speaker constraint set. This set captures the most discriminative between-speaker variability that exists in the training data. This system is evaluated on the female part of the 2008 NIST SRE dataset. Cosine similarity scoring, as the state-of-the-art approach, is compared to Bayes-dml. Experimental results show the comparable performance between Bayes_dml and cosine similarity scoring. Furthermore, Bayes-dml is insensitive to score normalization, as compared to cosine similarity scoring. Without the requirement of the number of labeled examples, Bayes_dml performs better in the context of limited training data
by Xiao Fang.
S.M.
Miško, Lukáš. "Optimalizace směrování v protokolu Ad hoc On-Demand Distance Vector." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413102.
Full textEerla, Vishwa Shanthi. "Multi-Criteria Mapping Based on Support Vector Machine and Cluster Distance." Master's thesis, Universitätsbibliothek Chemnitz, 2016. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-qucosa-212565.
Full textDu, Plessis Johan. "ACODV : Ant Colony Optimisation Distance Vector routing in ad hoc networks." Diss., University of Pretoria, 2005. http://hdl.handle.net/2263/23923.
Full textDissertation (MSc)--University of Pretoria, 2005.
Computer Science
Unrestricted
Trhlík, Jiří. "Modelování distance-vektor směrovacích protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2013. http://www.nusl.cz/ntk/nusl-235460.
Full textAlexandropoulos, Ioannis M. "Uncooled infrared imaging face recognition using kernel-based feature vector selection." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FAlexandropoulos.pdf.
Full textThesis Advisor(s): Monique P. Furgues, Roberto Cristi, Carlos Borges. "September 2006." Includes bibliographical references (p. 133-136). Also available in print.
Tang, Siu-shing. "Integrating distance function learning and support vector machine for content-based image retrieval /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?CSED%202006%20TANG.
Full textBalagam, Satya. "Enhancement of ad hoc On-Demand Distance Vector protocol security using Secure Message Transmission." Thesis, Wichita State University, 2011. http://hdl.handle.net/10057/5160.
Full textThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science.
Jayakeerthy, Arunkumar Thippur Lim Alvin S. "Query-localized route repair mechanism for ad-hoc on-demand distance vector routing algorithm." Auburn, Ala, 2009. http://hdl.handle.net/10415/1608.
Full textZahary, Ammar Thabit. "Improving routing performance of multipath ad hoc on-demand distance vector in mobile add hoc networks." Thesis, De Montfort University, 2008. http://hdl.handle.net/2086/4277.
Full textSama, Aravind Reddy. "AOD²V : Ad Hoc On Demand and Delay Constrained Distance Vector Routing for mobile sensor/actor networks /." Available to subscribers only, 2008. http://proquest.umi.com/pqdweb?did=1619624051&sid=12&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Full textTamrakar, Sandeep. "Study of TCP friendliness of CEAS routing system in comparison with Distance Vector Routing and Link State Routing." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-9043.
Full textWith the continuous development of the Internet technologies new routing requirements have surfaced. In response, several adaptive, stochastic routing algorithms have been purposed. The Cross Entropy Ant System (CEAS) is an adaptive, robust and distributed routing and management system based on the swarm intelligence. Several prototype implementations and enhancements have been made on this system, however the level of TCP friendliness the CEAS may provide is yet an important issue. In order to investigate the level of TCP friendliness, the behavior of the CEAS system during different network dynamics needs to be understood. For this reason, the behavior of the CEAS system under different network event and its corresponding effects on TCP performance is examined first using a simple network. Later the level of TCP performance is measured on complex networks. Also the load sharing capabilities of the CEAS system is investigated the efficiency of the system to manage and update according to the network load. Additionally the results are compared against the results obtained from the standard Link State Routing protocol and the Distance Vector Routing protocol under similar conditions. In this work, we find that the update process in response to the change in network dynamics is slower on CEAS compared to the other systems. However, the update process speeds up with the increase in the ant rates. During such period the use of multiple path reduces the TCP performance. We also find that large amount of packets loop around some links during link failures. Such looping reduces the TCP performance significantly. However, implementing previous hop memory technique removes such loops and also help TCP resume transmission immediately after the link failure. Compare to the LSRP and the DVR, we find that CEAS manages network resources more efficiently to produce higher TCP performance. We find that the CEAS diverts the data traffic on the basis of the quality of the path rather than the length of the path. We also find that the CEAS system handles multiple TCP stream independently with equal priority. But the smaller transition delay on the ants compared to the data packet reduces the TCP performance to some extent. However, forcing the ants to experience longer queuing delay according to the traffic load improves the TCP performance as well as helps CEAS update more accurately.
Krishnan, Ravikiran. "Generalized Conditional Matching Algorithm for Ordered and Unordered Sets." Thesis, University of South Florida, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3666203.
Full textDesigning generalized data-driven distance measures for both ordered and unordered set data is the core focus of the proposed work. An ordered set is a set where time-linear property is maintained when distance between pair of temporal segments. One application in the ordered set is the human gesture analysis from RGBD data. Human gestures are fast becoming the natural form of human computer interaction. This serves as a motivation to modeling, analyzing, and recognition of gestures. The large number of gesture categories such as sign language, traffic signals, everyday actions and also subtle cultural variations in gesture classes makes gesture recognition a challenging problem. As part of generalization, an algorithm is proposed as part of an overlap speech detection application for unordered set.
Any gesture recognition task involves comparing an incoming or a query gesture against a training set of gestures. Having one or few samples deters any class statistic learning approaches to classification, as the full range of variation is not covered. Due to the large variability in gesture classes, temporally segmenting individual gestures also becomes hard. A matching algorithm in such scenarios needs to be able to handle single sample classes and have the ability to label multiple gestures without temporal segmentation.
Each gesture sequence is considered as a class and each class is a data point on an input space. A pair-wise distances pattern between to gesture frame sequences conditioned on a third (anchor) sequence is considered and is referred to as warp vectors. Such a process is defined as conditional distances. At the algorithmic core we have two dynamic time warping processes, one to compute the warp vectors with the anchor sequences and the other to compare these warp vectors. We show that having class dependent distance function can disambiguate classification process where the samples of classes are close to each other. Given a situation where the model base is large (number of classes is also large); the disadvantage of such a distance would be the computational cost. A distributed version combined with sub-sampling anchor gestures is proposed as speedup strategy. In order to label multiple connected gestures in query we use a simultaneous segmentation and recognition matching algorithm called level building algorithm. We use the dynamic programming implementation of the level building algorithm. The core of this algorithm depends on a distance function that compares two gesture sequences. We propose that, we replace this distance function, with the proposed distances. Hence, this version of level building is called as conditional level building (clb). We present results on a large dataset of 8000 RGBD sequences spanning over 200 gesture classes, extracted from the ChaLearn Gesture Challenge dataset. The result is that there is significant improvement over the underlying distance used to compute conditional distance when compared to conditional distance.
As an application of unordered set and non-visual data, overlap speech segment detection algorithm is proposed. Speech recognition systems have a vast variety of application, but fail when there is overlap speech involved. This is especially true in a meeting-room setting. The ability to recognize speaker and localize him/her in the room is an important step towards a higher-level representation of the meeting dynamics. Similar to gesture recognition, a new distance function is defined and it serves as the core of the algorithm to distinguish between individual speech and overlap speech temporal segments. The overlap speech detection problem is framed as outlier detection problem. An incoming audio is broken into temporal segments based on Bayesian Information Criterion (BIC). Each of these segments is considered as node and conditional distance between the nodes are determined. The underlying distances for triples used in conditional distances is the symmetric KL distance. As each node is modeled as a Gaussian, the distance between the two segments or nodes is given by Monte-Carlo estimation of the KL distance. An MDS based global embedding is created based on the pairwise distance between the nodes and RANSAC is applied to compute the outliers. NIST meeting room data set is used to perform experiments on the overlap speech detection. An improvement of more than 20% is achieved with conditional distance based approach when compared to a KL distance based approach.
Wesolkowski, Slawomir. "Color Image Edge Detection and Segmentation: A Comparison of the Vector Angle and the Euclidean Distance Color Similarity Measures." Thesis, University of Waterloo, 1999. http://hdl.handle.net/10012/937.
Full textPanascí, Marco. "Vliv dlouhých optovláknových tras na polarizační stav světla a jejich využití pro napájení polarizačních senzorů." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2021. http://www.nusl.cz/ntk/nusl-442367.
Full textTheriot, Tyrone P. "Simulation and performance analysis of the AD HOC On-Demand Distance Vector Routing Protocol for tactical mobile ad hoc networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA388021.
Full textThesis advisor(s): Tummala, Murali. "December 2000." Includes bibliographical references (p. 81-82). Also available in print.
Seibel, Roman [Verfasser], Dieter [Akademischer Betreuer] Hogrefe, and Andreas [Akademischer Betreuer] Kassler. "Route Record Distance Vector Protocol for Minimization of Intra-Flow Interference / Roman Seibel. Gutachter: Dieter Hogrefe ; Andreas Kassler. Betreuer: Dieter Hogrefe." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2013. http://d-nb.info/104487063X/34.
Full textEl, Moutia Abdallah. "Energy-aware Ad Hoc on-demand distance vector routing protocol and optimizing the blocking problem induced in wireless Ad Hoc networks." FIU Digital Commons, 2004. http://digitalcommons.fiu.edu/etd/3124.
Full textChang, Chuan. "Authentification biométrique par dynamique de frappe pour évaluation à distance utilisant SVM à une classe." Master's thesis, Université Laval, 2016. http://hdl.handle.net/20.500.11794/27194.
Full textOne-Class Support Vector Machine is an unsupervised algorithm that learns a decision function from only one class for novelty detection. By training the data with only one class, this method is able to classify new data as similar (inlier) or different (outlier) from the training set. In this thesis, we have applied the One-Class Support Vector Machine to Keystroke Dynamics pattern recognition for user authentication in a remote evaluation system at Laval University. Since all of their students have a short and unique identifier at Laval University, this particular static text is used as the Keystroke Dynamics input for a user to build our own dataset. After training a model for each student with his or her keystroke data, we then use this model to detect imposters in the later phase. Three methods were tried and discussed for the classification. Then, we were able to identify weaknesses of each method in such a system by evaluating the recognition accuracy depending on the number of signatures and as a function of their number of characters. Finally, we were able to show some correlations between the dispersion and mode of distributions of features characterizing the keystroke signatures and the recognition rate.
Guilbert, Laure. "Activités, temps et lieux de vie des cadres : la problématique des technologies et vecteurs d'information et de communication à distance : une approche systémique." Amiens, 2005. http://www.theses.fr/2005AMIE0007.
Full textTran, Anh Tuyet. "1p spaces." CSUSB ScholarWorks, 2002. https://scholarworks.lib.csusb.edu/etd-project/2238.
Full textBonada, i. Cruells Eduard. "Building ethernet connectivity services for provider networks." Doctoral thesis, Universitat Pompeu Fabra, 2012. http://hdl.handle.net/10803/85413.
Full textEls proveïdors de xarxa estan motivats per implementar Ethernet en les seves infraestructures. No obstant, això representa una nova aplicació per Ethernet que comporta nous requeriments. En les xarxes Ethernet, el protocol de Rapid Spanning Tree (RSTP) crea un arbre actiu per evitar cicles i permetre que les xarxes Ethernet funcionin correctament. Hi ha però algunes implicacions de l'ús de RSTP per transformar la topologia física en un arbre actiu: alguns enllaços no utilitzats i la creació de rutes sub-òptimes. A més, RSTP pateix count-to-infinity i tarda massa temps per recuperar-se de caigudes crítiques. En aquesta tesi es proposa una solució completa basada en extensions d’RSTP que aborda les seves deficiències. Dissenyem i avaluem dues extensions: RSTP-Conf per proporcionar una ràpida recuperació i RSTP-SP per operar amb comunicacions per camins òptims.
Bsalis, Elias. "Commande modale d'un avion sans pilote par retour dynamique de sortie." Toulouse, ENSAE, 1992. http://www.theses.fr/1992ESAE0002.
Full textRelovský, Josef. "Zjištění fyzické pozice počítače v Internetu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217301.
Full textAymak, Onur. "Ad Hoc Packet Routing Simulation And Tactical Picture Display Tool For Navy." Master's thesis, METU, 2004. http://etd.lib.metu.edu.tr/upload/2/12605266/index.pdf.
Full textsayah, nahla K. "A study of errors for 4D lung dose calculation." VCU Scholars Compass, 2015. http://scholarscompass.vcu.edu/etd/3730.
Full textGunay, Melih. "Representation Of Covariance Matrices In Track Fusion Problems." Master's thesis, METU, 2007. http://etd.lib.metu.edu.tr/upload/12609026/index.pdf.
Full textTan, Teewoon. "HUMAN FACE RECOGNITION BASED ON FRACTAL IMAGE CODING." University of Sydney. Electrical and Information Engineering, 2004. http://hdl.handle.net/2123/586.
Full textPeng, Wendi Surveying & Spatial Information Systems Faculty of Engineering UNSW. "Roles of factors in simulation of parking guidance and information systems." Publisher:University of New South Wales. Surveying & Spatial Information Systems, 2008. http://handle.unsw.edu.au/1959.4/42788.
Full textArendt, Christopher D. "Adaptive Pareto Set Estimation for Stochastic Mixed Variable Design Problems." Ft. Belvoir : Defense Technical Information Center, 2009. http://handle.dtic.mil/100.2/ADA499860.
Full textBatista, Leandro Candido. "Teoria isomorfa dos espaços de Banach C0(K,X)." Universidade de São Paulo, 2012. http://www.teses.usp.br/teses/disponiveis/45/45131/tde-17072013-113811/.
Full textFor a locally compact Hausdorff space K and a Banach space X, we denote by C0(K,X) the space of X-valued continuous functions on K which vanish at infinity, endowed with the supremum norm. In the spirit of the classical 1937 Banach-Stone theorem, we prove that if C0(K1,X) is isomorphic to C0(K2,X), where X is a Banach space having finite cotype and such that X is separable or X* has the Radon-Nikodým property, then either K1 and K2 are finite or K1 and K2 have the same cardinality. It is a vector-valued extension of a 1978 Cengiz result, the scalar case X = R or X = C. We also prove that if K1 and K2 are compact ordinal spaces and X is Banach space having finite cotype, then the existence of an isomorphism T from C(K1,X) onto C(K2,X) with ||T||||T-1|| < 3 implies that some finite topological sum of K1 is homeomorphic to some finite topological sum of K2. Moreover, if Xn contains no subspace isomorphic to Xn+1 for every n ∈ N, then K1 is homeomorphic to K2. In other words, we obtain a vector-valued Banach-Stone theorem which is an extension of a 1970 Gordon theorem and at same time an improvement of a 1988 Behrends and Cambern theorem. We show that if there is an embedding T of a C(K1) into C(K2,X) with ||T||||T-1|| < 3, then the cardinality of the α-th derivative of K2 is either finite or greater than the cardinality of the α-th derivative of K1, for every ordinal α. Next, let n be a positive integer, Γ an infinite set with the discrete topology and X is a Banach space having finite cotype. We prove that if the n-th derivative of K is not empty, then the Banach Mazur distance between C0(K,X) and C0(Γ,X) is greater than or equal to 2n + 1. Thus, we also show that for every positive integers n and k, the Banach Mazur distance between C([1,ωnk],X) and C0(N,X) is exactly 2n+1. These results provide vector-valued versions of some 1970 Cambern theorems. For a countable ordinal α, writing C(α) for the Banach space of continuous functions on the interval of ordinal [1, α], we give lower bounds H(n, k) and upper bounds G(n, k) on the Banach- Mazur distances between C(ω) and C(ωnk), 1 < n, k < ω, such that H(n, k) - G(n, k) < 2. These estimates provide an answer to a 1960 Bessaga and Peczynski question on the Banach-Mazur distances between C(ω) and each of the C(α) spaces, ω<α<ωω.
Proença, Patrícia Aparecida. "Recuperação de imagens digitais com base na distribuição de características de baixo nível em partições do domínio utilizando índice invertido." Universidade Federal de Uberlândia, 2010. https://repositorio.ufu.br/handle/123456789/12500.
Full textThe main goal of a images retrieval system is to obtain images from a collection that assist a need of the user. To achieve this objective, in generally, the systems of retrieval of images calculate the similarity between the user's need represented by a query and representations of the images of the collection. Such an objective is dicult of being obtain due to the subjectivity of the similarity concept among images, because a same image can be interpreted in dierent ways by dierent people. In the attempt of solving this problem the content based image retrieval systems explore the characteristics of low level color, forms and texture in the calculation of the similarity among the images. A problem of this approach is that in most of the systems the calculation of the similarity is accomplished being compared the query image with all of the images of the collection, turning the dicult and slow processing. Considering the indexation of characteristics of low level of partitions of digital images mapped to an inverted index, this work looks for improvements in the acting of the processing of querys and improve in the precision considering the group of images retrieval in great bases of data. We used an approach based in inverted index that is here adapted for partitions images. In this approach the concept of term of the retrieval textual, main element of the indexation, it is used in the work as characteristic of partitions of images for the indexation. Experiments show improvement in the quality of the precision using two collections of digital images.
O principal objetivo de um sistema de recuperação de imagens é obter imagens de uma coleção que atendam a uma necessidade do usuário. Para atingir esse objetivo, em geral, os sistemas de recuperação de imagens calculam a similaridade entre a necessidade do usuário, representada por uma consulta, e representações das imagens da coleção. Tal objetivo é difícil de ser alcançado devido à subjetividade do conceito de similaridade entre imagens, visto que uma mesma imagem pode ser interpretada de formas diferentes por pessoas distintas. Na tentativa de resolver este problema os sistemas de recuperação de imagens por conteúdo exploram as características de baixo nível cor, forma e textura no cálculo da similaridade entre as imagens. Um problema desta abordagem é que na maioria dos sistemas o cálculo da similaridade é realizado comparando-se a imagem de consulta com todas as imagens da coleção, tornando o processamento difícil e lento. Considerando a indexação de características de baixo nível de partições de imagens digitais mapeadas para um índice invertido, este trabalho busca melhorias no desempenho do processamento de consultas e ganho na precisão considerando o conjunto de imagens recuperadas em grandes bases de dados. Utilizamos uma abordagem baseada em índice invertido, que é aqui adaptada para imagens particionadas. Nesta abordagem o conceito de termo da recuperação textual, principal elemento da indexação, é utilizado no trabalho como característica de partições de imagens para a indexação. Experimentos mostram ganho na qualidade da precisão usando duas coleções de imagens digitais.
Mestre em Ciência da Computação
Heutte, Laurent. "Reconnaissance de caractères manuscrits : application a la lecture automatique des chèques et des enveloppes postales." Rouen, 1994. http://www.theses.fr/1994ROUES049.
Full textJarolím, Jordán. "Analýza a získávání informací ze souboru dokumentů spojených do jednoho celku." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385929.
Full textMekyska, Jiří. "Identifikace osob pomocí otisku hlasu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218235.
Full textTeissier, Yoann. "Metapopulation dynamics of dengue epidemics in French Polynesia." Thesis, Sorbonne Paris Cité, 2017. http://www.theses.fr/2017USPCB008.
Full textDengue has been epidemic in French Polynesia for the past 35 years. Despite the relatively small population size in French Polynesia, dengue does not disappear and can persist at low levels for many years. In light of the large number of islands comprising French Polynesia, this thesis addresses the extent to which a metapopulation context may be the most appropriate to describe the epidemiology and persistence of dengue in this case. After compiling a database of dengue cases over the last 35 years, we used a number of descriptive and statistical epidemiological analyses that revealed distinct spatio-temporal disparity in dengue incidence for archipelago and islands. But the global structure of the epidemics of the same serotype were not affected. Metapopulation analyses revealed asynchronous dengue incidence among many of the islands and most notably larger islands lagged behind the smaller islands. The critical community size, which determines dengue persistence, was found to exceed even the largest island of Tahiti, suggesting that dengue can only exist by island-hopping. Incorporation of island connectedness through patterns of human migration into a mathematical model enabled a much better fit to the observed data than treating the population as a whole. The metapopulation model was able to capture to some extent the epidemic and low level transmission dynamics observed for the period of 2001-2008. Further analyses on differentiating incidence of disease and infection will likely prove informative for the metapopulation model of dengue epidemiology in French Polynesia
Pospíšil, Petr. "Optimalizace predikce pozice v síti." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217436.
Full textMarchi, Tommaso. "Position and singularity analysis of a class of n-RRR planar parallel robots." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2020.
Find full textEssid, Slim. "Classification automatique des signaux audio-fréquences : reconnaissance des instruments de musique." Phd thesis, Université Pierre et Marie Curie - Paris VI, 2005. http://pastel.archives-ouvertes.fr/pastel-00002738.
Full textJou, Pei-Yuan, and 周培元. "Adaptive Weighted Distance for Feature Vectors of Biological Sequences." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/47274308615858302312.
Full text國立嘉義大學
資訊工程學系研究所
95
Study on biological sequence database similarity searching has received substantial attention in the past decade. The similarity search in the biological databases is an important issue. Similarity search in biology sequences has attention in the recent studies. Sequence alignment is the essential task for searching of similar sequence in bioinformatics. The biological sequence databases have getting larger in past decade. Finding sequences that similar to the query sequence is a time consuming task. By transforming sequences into numeric feature vectors, we can quickly filter out sequences whose feature vectors are far to the feature vector of the query sequence. The numeric feature vector contains three groups of features: Count, Extensible-Relative Position Dispersion (XRPD), and Extensible-Absolute Position Dispersion (XAPD) of a DNA sequence. Each group has four dimensions for A, C, T, and G. When computing distance between two feature vectors, Euclidean distance and L1 distance are commonly used. The author proposed an adaptive weighting distance. The adaptive weighting derives from the four nucleotides from the Count group. And the weighting applied on both XRPD and XAPD. In other words, if a certain kind of nucleotide appears much frequent than the other kinds of nucleotides, the weight for the kind of nucleotide should also be large in XRPD and XAPD groups. Experiments show that such distance of feature vectors helps reflect the distance between sequences.
Lin, Jyh-Shyan, and 林志賢. "Construction and Analysis of Distance-Preserving Mappings from Vectors to Permutations." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/13269627485999501868.
Full text國立交通大學
資訊科學與工程研究所
96
A mapping from the set of all q-ary vectors of length n to the set of all permutations of {1, 2, … , N} where N �d n is called a distance-preserving mapping (DPM) if every two vectors are mapped to permutations with the same or even larger Hamming distance than that of the vectors. A distance-increasing mapping (DIM) is a special DPM such that the distances of mapped permutations are strictly increased except when that is obviously not possible. In this dissertation, we propose several constructions of DIMs from binary vectors. These constructions possess some advantages over previous proposed constructions. In addition, we also propose constructions of DPMs and DIMs from ternary vectors. This is the first time that constructions of DPMs and DIMs from ternary vectors are proposed in the literature. A contribution of these constructions is their application to the improvement of the lower bounds on the maximal size of permutation arrays (or permutation codes), which are useful in the design of a power line communication system.
Yang, Hsin-Yun, and 楊心運. "Multipath 6LoWPAN Ad Hoc On-Demand Distance Vector Routing." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/09944727246416524200.
Full text國立宜蘭大學
資訊工程研究所碩士班
97
In order to move towards the current development of ubiquitous network environment. To integrate the different types of network environment is going on. The IEEE 802.15.4 standard is a low cost, low-rate, Low-power Wireless Personal Area Network technology. IP for Smart Objects seeks to extend the use of IP networking into resource-constrained devices over a low-power network. IPv6 over Low-power Wireless Personal Area Network (6LoWPAN) are specified by the IETF Working Group, and advanced by the IPSO alliance. 6LoWPAN Ad Hoc On-Demand Distance Vector Routing (LOAD) is based on AODV , and simplify the routing protocol for 6LoWPAN mesh network . Although the LOAD simplify the AODV for 6LoWPAN mesh network, but the route discovery by broadcasting route request(RREQ) still huge whole network overhead . So we would like to use the concept of Ad-Hoc On-Demand Multipath Distance Vector Routing (AOMDV) for LOAD to find multipath routes during the route discovery. If the path fail we still have alternate path can be used for reducing the overhead of route discovery for the network.
Huang, Yuan-Chih, and 黃元志. "Fault Management for Networks with Distance Vector Routing Protocols." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/69654420046517846954.
Full text逢甲大學
資訊電機工程碩士在職專班
94
With the increasing complexity of enterprise networks and Internet, in which losts of large scale, distributed, and heterogeneous applications have been deployed. To guarantee the high reliability of service upper layer of the network, on one hand, redundant link is built in the backbone network to avoid from stopping the service and operation losses. On the other hand, when the network flow increasing can make load-balancing across the multiple available paths appealing. But a lot of critical applications; such as the VOIP, its quality of the network demands to be higher than normal datagram transmitting far, and its end-to-end delay time must be shorter than 150ms in order to achieve the standard of VOIP QOS. Once the primary path fails, the traffic is routed through a backup path, if available. And they will increase centralization rapidly, the conversation quality of the VOIP will be deteriorated certainly. Our motivation is to present a new fault management of networks that can localize the possible fault position correctly and fast in complicated with the fault-tolerant backbone network, and then clear fault and restore immediately in addition to guarantee the high availability of the network service. Therefore, we decide to research, develop and practice a new system for online fault management of networks running distance vector routing protocol in backbone network. This system can be put in any IDC of ISP to ensure the high reliability and availability of backbone network. In order to improve system practicability and scalability, we will also adopt the idea of plug-and-play for our plan. This system only needs to monitor passively any monitored router in backbone network so that it can localize the possible fault position. In order to reach this goal, network fault management will utilize the characteristic of routing protocol that routes exchange each other regarded as tools to detect fault, so we can compare the changes of routing topology. Thereafter, we analyse in detail all the characteristics of possible case systematically (depending on time, place, equipment, characteristic of backbone, layer-2-switch features, and etc.) to exactly localize the fault position.
Lan, Shi-Zhang, and 藍世璋. "Ad-Hoc On-Demand Distance Vector Protocol Simulation and Analysis." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/28754103164283508248.
Full text華梵大學
工業工程與經營資訊學系碩士班
97
With the popularities of mobile devices and their applications, the mobile Ad-Hoc network becomes an important research topic. Different from typical networks that have fixed topologies, the movement of mobile nodes leads to the change of network topology that influences the network’s behavior. This research uses simulation models to study the parameters that affect the network’s stability and performance. Network structures and routing protocols were first investigated to establish the basis of simulation infrastructure and the Ad-Hoc On-Demand Distance Vector communication protocol was selected to develop the models. The simulation platform was developed using AnyLogic which is object-oriented simulation development software in Java language. Speed, mobility and distribution of mobile nodes were used as parameters in the simulation. The simulation results indicate that the topology change is the most important parameter that affects the data transmission performance of Ad-Hoc On-Demand Distance Vector protocol. In order to maintain a certain degree of stability these parameters must be within a proper range.
Seibel, Roman. ""Route Record Distance Vector Protocol for Minimization of Intra-Flow Interference"." Doctoral thesis, 2013. http://hdl.handle.net/11858/00-1735-0000-0001-BC21-F.
Full text