To see the other types of publications on this topic, follow the link: Internet acces.

Dissertations / Theses on the topic 'Internet acces'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Internet acces.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Ylikoski, Teemu. "Acces denied : patterns of consumer Internet information search and the effects of Internet search expertise /." Helsinki : Helsinki School of Economics, 2003. http://aleph.unisg.ch/hsgscan/hm00085002.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Robinson, John Walton. "A first access internet tutorial." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA304238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Pagliusi, Paulo Sergio. "Internet authentication for remote access." Thesis, Royal Holloway, University of London, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.500040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Arunachalam, Subbiah. "Public access to the Internet." C & F Editions, 2005. http://hdl.handle.net/10150/105364.

Full text
Abstract:
This text is an extract from the book Word Matters: multicultural perspectives on information societies. This book, which has been coordinated by Alain Ambrosi, Valérie Peugeot and Daniel Pimienta was released on November 5, 2005 by C & F à ditions. The text is under the Creative Commons licence, by, non commercial. Knowledge should be shared in free access... But authors and editors need an economy to keep on creating and working. If you can afford it, please buy the book on line.
APA, Harvard, Vancouver, ISO, and other styles
5

Chatziioannidis, Ioannis. "High speed internet access using cellular infrastructure." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FChatziioannidis.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Uzunay, Yusuf. "Design And Implementation Of An Unauthorized Internet Access Blocking System Validating The Source Information In Internet Access Logs." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607628/index.pdf.

Full text
Abstract:
Internet Access logs in a local area network are the most prominent records when the source of an Internet event is traced back. Especially in a case where an illegal activity having originated from your local area network is of concern, it is highly desirable to provide healthy records to the court including the source user and machine identity of the log record in question. To establish the validity of user and machine identity in the log records is known as source authentication. In our study, after the problem of source authentication in each layer is discussed in detail, we argue that t
APA, Harvard, Vancouver, ISO, and other styles
7

Ascenuik, Catrina. "Exploration of Newcomers’ Access to Internet Literacy." Thesis, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/20498.

Full text
Abstract:
The purpose of this study was two fold: (1) to examine how the distribution of resources within and outside an Enhanced Language Training Program (ELT) affected a group of newcomers’ access to Internet literacy development; and (2) to discuss ensuing pedagogical and curricular implications for the ELT Program. The relationship between the distribution of resources and a group of newcomers’ access to Internet literacy development was studied through a hybrid of two frameworks: van Dijk’s (2005) digital divide and Warschauer’s (2004) social inclusion. The key findings were that the distribut
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Chengqiang. "Object access control to enable internet commerce." FIU Digital Commons, 1997. http://digitalcommons.fiu.edu/etd/2128.

Full text
Abstract:
Object-Orientation defines components (objects) that encapsulate data and functionality. Modern 00 programming languages have features that specify the degree of encapsulation in much detail. This thesis extends the access control specification capabilities to objects and puts more emphasis on the objects of Internet commerce. A simple and flexible framework of access control is introduced based on the concept of "token". A prototype implemented in Java demonstrates the feasibility of the ideas and related issues.
APA, Harvard, Vancouver, ISO, and other styles
9

Sitenkov, Denis. "Access Control in the Internet of Things." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177205.

Full text
Abstract:
The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. The global connectivity provides great opportunities for data collection and analysis as well as for interaction of objects that cannot be connected to the same local area network. Many of application scenarios have high requirements to security and privacy of transmitted data. At the same time security solutions that are utilized for gener
APA, Harvard, Vancouver, ISO, and other styles
10

Mahalingam, Gayathri. "Natural language access to Internet search engines." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq30514.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Denis, Sitenkov. "Access Control in the Internet of Things." Thesis, SICS, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:ri:diva-24325.

Full text
Abstract:
The new generation of Wireless Sensor Networks, that is known as the Internet of Things enables the direct connection of physical objects to the Internet using microcontrollers. In most cases these microcontrollers have very limited computational resources. The global connectivity provides great opportunities for data collection and analysis as well as for interaction of objects that cannot be connected to the same local area network. Many of application scenarios have high requirements to security and privacy of transmitted data. At the same time security solutions that are utilized for gener
APA, Harvard, Vancouver, ISO, and other styles
12

Togun, Kehinde. "Impact of internet access in Rwandan schools." CONNECT TO ELECTRONIC THESIS, 2008. http://hdl.handle.net/1961/6991.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zhang, Rui. "Resource Access in the Internet-of-Things." Thesis, University of Sydney, 2020. https://hdl.handle.net/2123/23211.

Full text
Abstract:
The Internet-of-Things (IoT) refers to the networked interconnection of massive objects in daily life. With the ability of data collection, information sharing, and task computing, the IoT bridges diverse technologies to provide ubiquitous services with intelligence. However, in the coming years, the IoT devices are facing challenges coming from their inherent features. Generally speaking, the IoT devices are deployed massively and usually in mobile scenarios. This makes the wired power supply hard to be implemented. Meanwhile, the small size of IoT devices restricts their computational capabi
APA, Harvard, Vancouver, ISO, and other styles
14

Bürger, Thomas. "Alles ins Internet?!" Saechsische Landesbibliothek- Staats- und Universitaetsbibliothek Dresden, 2011. http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-81654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Maruatona, Omaru. "Internet banking fraud detection using prudent analysis." Thesis, University of Ballarat, 2013. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/59631.

Full text
Abstract:
The threat posed by cybercrime to individuals, banks and other online financial service providers is real and serious. Through phishing, unsuspecting victims’ Internet banking usernames and passwords are stolen and their accounts robbed. In addressing this issue, commercial banks and other financial institutions use a generically similar approach in their Internet banking fraud detection systems. This common approach involves the use of a rule-based system combined with an Artificial Neural Network (ANN). The approach used by commercial banks has limitations that affect their efficiency in cur
APA, Harvard, Vancouver, ISO, and other styles
16

Alford, Linda. "Incorporating Internet access into a home/hospital program." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq31177.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Fournier, Luc A. "Internet et démocratie : accès, contrôle et liberté d'expression." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape15/PQDD_0034/MQ38748.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Firouzbakhsh, Navid, and Karchegani Arash Mokhtari. "Internet to WSN configuration and access using 6LoWPAN." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-26607.

Full text
Abstract:
The Internet of Things mission is to connect any objects to the Internet, in order to provide the ability to access everything, everywhere. It will enable people to control and monitor their environment in a very convenient way. In order to fulfill the Internet of Things mission, one idea is to wrap a non-IP based protocol stack in the objects equipped with sensors, actuators and computing resources to enable them to be connected to the Internet through a protocol translation gateway. An alternative and competing idea, is to embed the TCP/IP stack into such smart objects, enabling them to inte
APA, Harvard, Vancouver, ISO, and other styles
19

Li, Chunsheng. "Spatial data : access and usability across the Internet." Thesis, Manchester Metropolitan University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.247486.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Simões, João Filipe Teixeira. "New paradigms for access control on internet hosts." Master's thesis, Universidade de Aveiro, 2016. http://hdl.handle.net/10773/18460.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática<br>Network services make use of the Internet to exchange information with requesting clients. This information follows a path of naturally unsecured and unknown networks. As such, there is no certainty that traffic flowing between clients and service providers is authentic and is actually originated on known and legitimate entities. Also there are no clearly defined networklevel policies that authorize users, instead of hosts, to access remote services. In order to mitigate the unauthorized access to network services, two conceptual ap
APA, Harvard, Vancouver, ISO, and other styles
21

Høiland-Jørgensen, Toke. "On the Bleeding Edge : Debloating Internet Access Networks." Licentiate thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-47001.

Full text
Abstract:
As ever more devices are connected to the internet, and applications turn ever more interactive, it becomes more important that the network can be counted on to respond reliably and without unnecessary delay. However, this is far from always the case today, as there can be many potential sources of unnecessary delay. In this thesis we focus on one of them: Excess queueing delay in network routers along the path, also known as bufferbloat. We focus on the home network, and treat the issue in three stages. We examine latency variation and queueing delay on the public internet and show that signi
APA, Harvard, Vancouver, ISO, and other styles
22

Pérez, Méndez Alejandro. "Proporcionando acceso federado y SSO a servicios de internet mediante kerberos e infraestructuras AAA = Providing federated access and SSO to internet services by means of kerberos and AAA infrastructures." Doctoral thesis, Universidad de Murcia, 2015. http://hdl.handle.net/10803/287163.

Full text
Abstract:
A día de hoy las federaciones de identidad para servicios web y para el acceso a la red están bastante asentadas y aceptadas. Pero, ¿qué ocurre con otros tipos de servicio que no soportan estas tecnologías? El objetivo de esta tesis es diseñar soluciones que permitan el establecimiento de federaciones de identidad más allá del Web, evitando los problemas que presentan las soluciones disponibles en el estado del arte. Para ello se han analizado y seleccionado un conjunto de tecnologías asociadas al control de acceso que, una vez integradas, proporcionan la funcionalidad completa deseada: • Kerb
APA, Harvard, Vancouver, ISO, and other styles
23

Font, Brevis Giselle Alejandra. "Privacidad de ubicación para un sistema de monitoreo de la calidad de acceso a internet móvil: Location privacy for a monitoring system of the quality of access to mobile internet." Tesis, Universidad de Chile, 2015. http://repositorio.uchile.cl/handle/2250/132852.

Full text
Abstract:
Magíster en Ciencias, Mención Computación<br>Ingeniera Civil en Computación<br>Con el objeto de medir la calidad de acceso a Internet móvil, NIC Chile Research Labs desarrolló Adkintun Mobile, un monitor pasivo instalado en los celulares de usuarios voluntarios. Periódicamente, la aplicación registra datos relativos al estado de la red, los que son enviados a un servidor que los recolecta. Los investigadores del laboratorio tienen acceso a los datos almacenados por el colector. A partir de la conexión a las antenas de celulares, la ubicación del dispositivo puede ser deducida, por lo que
APA, Harvard, Vancouver, ISO, and other styles
24

Watson, Roger. "Evolving trends in Open Access." Universität Leipzig, 2019. https://ul.qucosa.de/id/qucosa%3A33909.

Full text
Abstract:
With the growth of open access publishing there has been a concomitant growth in the number of predatory publishers. This article considers why open access has arisen and the various models under which it operates before considering the nature of predatory publishers and what can be done to stop them.
APA, Harvard, Vancouver, ISO, and other styles
25

Sonon, Marcia S. "IT-21 compliant controlled access to Internet web pages." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA355950.

Full text
Abstract:
Thesis (M.S. in Systems Engineering) Naval Postgraduate School, September 1998.<br>Thesis advisor(s): Gus K. Lott. "September 1998." Includes bibliographical references (p. 103-104). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
26

Grape, Felix. "Designing an Access Control System for Internet of Things." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217507.

Full text
Abstract:
For many Internet of Things (IoT) devices security have not been a priority during the development, but what happens if the makers of IoT devices use a secure framework for developing their devices? In this thesis a number of such frameworks have been evaluated for their suitability to build an access control system around. Both Vanadium and Protocol of Things (PoT) were found to be suitable candidates. Both frameworks employ a distributed access control model where the owner of a device can grant other users access to the device by generating a signed authorization. PoT was ultimately chosen
APA, Harvard, Vancouver, ISO, and other styles
27

Talakala, Pavan. "INTEGRATION OF REAL – TIME EXPERIMENTS WITH INTERNET ACCESS." Master's thesis, University of Central Florida, 2005. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3293.

Full text
Abstract:
The revolution of Internet &#150; enabled instrumentation is emerging as a revolution in Measurement and Automation. New standards are being developed for transmitting data and connecting instruments to the Internet. The main purpose of this thesis is to design and develop a system to Integrate various Real &#150; time experiments and be able to monitor and control them over Internet using LabVIEW. LabVIEW is a graphical programming package capable of data acquisition, data analysis, data presentation and real time remote control. In this thesis a Real &#150; time system is developed which int
APA, Harvard, Vancouver, ISO, and other styles
28

Hudson, Ben H. (Ben Hugh) 1974. "Private sector provision of Internet access in rural India." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/67548.

Full text
Abstract:
Thesis (M.C.P.)--Massachusetts Institute of Technology, Dept. of Urban Studies and Planning, 2002.<br>Includes bibliographical references (leaves 44-46).<br>In South India today, a number of ongoing projects seek to provide internet access to rural areas by combining computer, internet, and other telecommunications technologies in a profitable business model. Yet, in spite of growing interest in this work, few formal evaluations have been performed on specific projects and little progress has been made toward increasing discussion of the strengths and weakness of each. Though public, private,
APA, Harvard, Vancouver, ISO, and other styles
29

Badasyan, Narine. "Game Theoretic Models of Connectivity Among Internet Access Providers." Diss., Virginia Tech, 2004. http://hdl.handle.net/10919/11193.

Full text
Abstract:
The Internet has a loosely hierarchical structure. At the top of the hierarchy are the backbones, also called Internet Access Providers (hereafter IAPs). The second layer of the hierarchy is comprised of Internet Service Providers (hereafter ISPs). At the bottom of the hierarchy are the end users, consumers, who browse the web, and websites. To provide access to the whole Internet, the providers must interconnect with each other and share their network infrastructure. Two main forms of interconnection have emerged â peering under which the providers carry each otherâ s traffic without any p
APA, Harvard, Vancouver, ISO, and other styles
30

Greve, Holger [Verfasser]. "Access-Blocking – Grenzen staatlicher Gefahrenabwehr im Internet. / Holger Greve." Berlin : Duncker & Humblot, 2012. http://d-nb.info/1238427294/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Hayden, Linda J. "How has the Internet touched you?, the impact of Internet access on a NWT community." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape9/PQDD_0002/MQ41805.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Quarnberg, Tisah M. "Community Satisfaction, Community Attachment, Community Experience, Internet Use and Internet Access in Rural Utah Communities." BYU ScholarsArchive, 2011. https://scholarsarchive.byu.edu/etd/2790.

Full text
Abstract:
This study examines the impact of the Internet on rural community satisfaction, attachment and overall experience. With the geographic dispersion of social networks, the majority of the population has a greater need for long-distance social networking. The Internet has the potential to mitigate distance and connect social networks much faster than letter writing or face-to-face visits. While the Internet is available, to at least some extent, in rural communities in Utah, does it positively affect overall perceptions of community life? This study finds that this is not the case. There is a neg
APA, Harvard, Vancouver, ISO, and other styles
33

Buurman, Benjamin. "Intelligent sewer blockage detection system using Internet of Things." Thesis, Federation University Australia, 2019. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/169289.

Full text
Abstract:
Despite being a common issue in both developed and developing countries, wastewater blockages have severe potential consequences. Blockages can be located at sewer mains or individual properties and can also be classified as partial or full. Full blockages completely obstruct a wastewater asset, and partial blockages will often develop into full blockages if left unattended. Currently, blockages are managed by routine manual inspections to wastewater assets on a round-robin schedule. This is highly inefficient and costly, as blockages that form between these inspections and progress to effluen
APA, Harvard, Vancouver, ISO, and other styles
34

Khraisat, Ansam. "Intelligent zero-day intrusion detection framework for internet of things." Thesis, Federation University Australia, 2020. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/179729.

Full text
Abstract:
Zero-day intrusion detection system faces serious challenges as hundreds of thousands of new instances of malware are being created every day to cause harm or damage to the computer system. Cyber-attacks are becoming more sophisticated, leading to challenges in intrusion detection. There are many Intrusion Detection Systems (IDSs), which are proposed to identify abnormal activities, but most of these IDSs produce a large number of false positives and low detection accuracy. Hence, a significant quantity of false positives could generate a high-level of alerts in a short period of time as the n
APA, Harvard, Vancouver, ISO, and other styles
35

Cooke, Louise. "Regulating the Internet : policy and practice with reference to the control of Internet access and content." Thesis, Loughborough University, 2004. https://dspace.lboro.ac.uk/2134/3283.

Full text
Abstract:
Organisations, national governments and supranational bodies have all been active in formulating policy measures to regulate access to, and use of, Internet content. The research investigated policy responses formulated and implemented within the European Union, the Council of Europe, the UK government and three UK academic institutions during a five-year period from 1998 to 2003. This investigation took place from a perspective of concern for the potential impact on freedom of expression and freedom of enquiry of such policy initiatives. On a theoretical level, the study aimed to illuminate t
APA, Harvard, Vancouver, ISO, and other styles
36

Vicks, Mary E. "An Examination of Internet Filtering and Safety Policy Trends and Issues in South Carolina's K-12 Public Schools." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/329.

Full text
Abstract:
School districts have implemented filtering and safety policies in response to legislative and social mandates to protect students from the proliferation of objectionable online content. Subject related literature suggests these policies are more restrictive than legal mandates require and are adversely affecting information access and instruction. There is limited understanding of how filtering and safety policies are affecting teaching and learning because no comprehensive studies have investigated the issues and trends surrounding filtering and safety policy implementation. In order to impr
APA, Harvard, Vancouver, ISO, and other styles
37

Taaghol, Pouya. "Multiple access protocols for mixed services wireless packet communications." Thesis, University of Surrey, 1999. http://epubs.surrey.ac.uk/844476/.

Full text
Abstract:
Packet communications have increasingly become popular since the launch of the first ever packet-switched network, the ARPANET. Evolution of such networks resulted in creation of the Internet, the global packet-switched network. Amongst the well-known advantages of packet-switching are service transparency, cost-effectiveness, and high system capacity. A natural pathway will incorporate tetherless mobility features to packet services. The key component to realisation of wireless packet communication is the multiple access technology (the subject of this thesis), capable of optimum sharing of s
APA, Harvard, Vancouver, ISO, and other styles
38

Trenkelbach, Holger. "Internetfreiheit : die Europäische Menschenrechtskonvention als "Living Instrument" vor neuen Herausforderungen? /." Berlin : Logos-Verl, 2005. http://www.gbv.de/dms/spk/sbb/recht/toc/488038561.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Cushnie, John. "QoS charging for Internet access networks : the wireless QoS gateway." Thesis, Lancaster University, 2003. http://eprints.lancs.ac.uk/12300/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Alvarado, Ávalos Francisco Daniel. "Internet y las fuentes de acceso público a datos personales." Tesis, Universidad de Chile, 2013. http://repositorio.uchile.cl/handle/2250/115312.

Full text
Abstract:
Autorizada por el autor, pero con restricción para ser publicada a texto completo hasta el año 2014.<br>Memoria (licenciado en ciencias jurídicas y sociales)<br>Las fuentes de acceso público a datos personales constituyen una de las excepciones al principio del consentimiento que contiene nuestra legislación con premisa para llevar a cabo un tratamiento de datos personales. Dichas bases de datos son usadas con habitualidad en nuestro sistema legal, amparadas además por una definición amplia que permitiría encuadrar un sinnúmero de bases de datos dentro de esta figura.
APA, Harvard, Vancouver, ISO, and other styles
41

Näder, Johannes. "Open Access: Wissenschaftliches Publizieren im Zeitalter von Digitalität und Internet." Thelem Verlag, 2010. https://tud.qucosa.de/id/qucosa%3A28540.

Full text
Abstract:
Seit der Jahrtausendwende prägt das Schlagwort Open Access die Debatten um wissenschaftliches Publizieren. Je nach Kontext geht es dabei um handfeste Strategien angesichts der Zeitschriftenkrise, um ein mehr oder weniger einheitliches Programm zur Verabschiedung des Gutenberg-Zeitalters oder um visionäre Vorstellungen digitaler Wissenskulturen. Die Untersuchung verfolgt zwei Ziele: Zunächst erklärt sie, auf welche Konzepte sich der Begriff Open Access bezieht, wie sich diese Konzepte entwickelt haben und wie sie zusammenfassend beschrieben werden können. Diese Betrachtungsweise ermöglicht es,
APA, Harvard, Vancouver, ISO, and other styles
42

Whitacre, Brian E. "Bridging the Rural - Urban Digital Divide in Residential Internet Access." Diss., Virginia Tech, 2005. http://hdl.handle.net/10919/29102.

Full text
Abstract:
This dissertation explores the persistent gap between rural and urban areas in the percentage of households that access the Internet at home (a discrepancy commonly known as the "digital divide"). The theoretical framework underlying a household's Internet adoption decision is examined, with emphasis on the roles that household characteristics, network externalities, and digital communication technology (DCT) infrastructure potentially play. This framework is transferred into a statistical model of household Internet access, where non-linear decomposition techniques are employed to estimate
APA, Harvard, Vancouver, ISO, and other styles
43

Garrett, Galen. "Equity of access: Exploring Internet connectivity within Oklahoma public schools." Thesis, University of North Texas, 2004. https://digital.library.unt.edu/ark:/67531/metadc4663/.

Full text
Abstract:
The purpose of this study was to ascertain if conditions or combinations of conditions existed within Oklahoma public schools that created inequities in the availability of classroom Internet connections. A stratified random sample of the 471 school districts was used to identify 300 specific schools for the purpose of data analysis. Data was gathered utilizing a database provided by the Oklahoma State Department of Education and a researcher developed questionnaire. The database provided data relating to four independent variables (region, district size, school type, and school size,).
APA, Harvard, Vancouver, ISO, and other styles
44

Gao, Qiang. "Connection tree based mobility management for wireless internet access networks /." Diss., Connect to a 24 p. preview or request complete full text in PDF format. Access restricted to UC campuses, 2001. http://wwwlib.umi.com/cr/ucsd/fullcit?p3022208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Yan, Zun. "Resource Access and Allocation Strategies in the Internet-of-Things." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/24688.

Full text
Abstract:
The Internet-of-Things (IoT) is envisioned as a transformative network paradigm to carry the massive interconnections among ubiquitous physical objects in real life. With the rapid advance in computing hardware industry and the ubiquity of wireless communication networks, the IoT has the potentials to greatly revolutionize the application scenarios and service types of our daily-used devices. However, with billions of devices anticipated to be connected, constructing the future IoT networks faces a series of significant challenges in diverse technical aspects. On one hand, due to the scarcity
APA, Harvard, Vancouver, ISO, and other styles
46

Islam, Mohammad. "Measuring trustworthiness of image data in the internet of things environment." Thesis, Federation University Australia, 2021. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/177521.

Full text
Abstract:
Internet of Things (IoT) image sensors generate huge volumes of digital images every day. However, easy availability and usability of photo editing tools, the vulnerability in communication channels and malicious software have made forgery attacks on image sensor data effortless and thus expose IoT systems to cyberattacks. In IoT applications such as smart cities and surveillance systems, the smooth operation depends on sensors’ sharing data with other sensors of identical or different types. Therefore, a sensor must be able to rely on the data it receives from other sensors; in other words, d
APA, Harvard, Vancouver, ISO, and other styles
47

Chelle, Hugo. "Contrôle de charge des réseaux IoT : D'une étude théorique à une implantation réelle." Thesis, Toulouse, INPT, 2018. http://oatao.univ-toulouse.fr/24349/1/Chelle_hugo.pdf.

Full text
Abstract:
Prenons en exemple une salle de classe composée d’un professeur et de nombreux élèves, lorsque trop d’élèves s’adressent en même temps au professeur ce dernier n’est plus en mesure de comprendre les paroles transmisses par les élèves. Cette illustration s’étend évidemment aux systèmes de communications sans fil (la 4G par exemple). Dans ces systèmes, les terminaux (les élèves par analogie) transmettent sur un canal, nommé canal en accès aléatoire, des messages qui sont potentiellement réceptionnés par la station de base (le professeur par analogie). Ces canaux ne sont habituellement pas surcha
APA, Harvard, Vancouver, ISO, and other styles
48

Varma, Nitesh. "Secure Network-Centric Application Access." Thesis, Virginia Tech, 1998. http://hdl.handle.net/10919/46318.

Full text
Abstract:
In the coming millennium, the establishment of virtual enterprises will become increasingly common. In the engineering sector, global competition will require corporations to create agile partnerships to use each other’s engineering resources in mutually profitable ways. The Internet offers a medium for accessing such resources in a globally networked environment. However, remote access of resources require a secure and mutually trustable environment, which is lacking in the basic infrastructure on which the Internet is based. Fortunately, efforts are under way to provide the required security
APA, Harvard, Vancouver, ISO, and other styles
49

Uddin, Md Ashraf. "A patient agent controlled customized blockchain based framework for internet of things." Thesis, Federation University Australia, 2021. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/177119.

Full text
Abstract:
Although Blockchain implementations have emerged as revolutionary technologies for various industrial applications including cryptocurrencies, they have not been widely deployed to store data streaming from sensors to remote servers in architectures known as Internet of Things. New Blockchain for the Internet of Things models promise secure solutions for eHealth, smart cities, and other applications. These models pave the way for continuous monitoring of patient’s physiological signs with wearable sensors to augment traditional medical practice without recourse to storing data with a trusted a
APA, Harvard, Vancouver, ISO, and other styles
50

Jia, Long. "Optimization based methods for solving some problems in telecommunications and the internet." Thesis, University of Ballarat, 2005. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/44593.

Full text
Abstract:
The purpose of this thesis is to develop some new algorithms based on optimization techniques for solving some problems in some areas of telecommunications and the Internet. There are two main parts to this thesis. In the first part we discuss optimization based stochastic and queueing models in telecommunications network corrective maintenance. In the second part we develop optimization based clustering (OBC) algorithms for network evolution and multicast routing. The most typical scenario encountered during mathematical optimization modelling in telecommunications, for example, is to minimiz
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!