Dissertations / Theses on the topic 'MAC'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'MAC.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Kulkarni, Santosh B. Umphress David A. Agrawal Prathima. "Synergy MAC a cooperative MAC protocol /." Auburn, Ala, 2009. http://hdl.handle.net/10415/1609.
Full textGrepl, Miroslav. "MAC řízení přístupu." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217509.
Full textMac, Lochlainn Antain. "Aindrias Mac Cruitin : Danta." Thesis, University of Ulster, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.241992.
Full textЗолотова, Світлана Григорівна, Светлана Григорьевна Золотова, Svitlana Hryhorivna Zolotova, and Y. Prokhnenko. "Comparing Mac and PC." Thesis, Видавництво СумДУ, 2008. http://essuir.sumdu.edu.ua/handle/123456789/16054.
Full textMcElroy, Mathew S. "Fannie Mae and Freddie Mac lending patterns along the Texas-Mexico border." To access this resource online via ProQuest Dissertations and Theses @ UTEP, 2008. http://0-proquest.umi.com.lib.utep.edu/login?COPT=REJTPTU0YmImSU5UPTAmVkVSPTI=&clientId=2515.
Full textIdland, Christer. "Detecting MAC Spoofing Attacks in 802.11 Networks through Fingerprinting on the MAC Layer." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2011. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-14093.
Full textBalakrishnan, Manikanden, Subah Ramakrishnan, and Hong Huang. "ENERGY-AWARE SENSOR MAC PROTOCOLS." International Foundation for Telemetering, 2004. http://hdl.handle.net/10150/605793.
Full textSensor network applications typically require continuous monitoring of physical phenomena for extended periods of time under severe energy resource constraints. Accordingly, design considerations for sensor Media Access Control (MAC) protocols depart significantly from those of traditional wireless MAC protocols that largely ignore the energy factor. In this paper, we reexamine the design space of wireless sensor MAC protocols and modify IEEE 802.11 Distributed Coordination Function (DCF) to incorporate energy-adaptive contention mechanisms for prolonging sensor lifetime. Performance of the proposed schemes is evaluated with DCF as a baseline and results indicate the benefits of energy-aware mechanisms for sensor MAC protocols.
Vermillac, Michel. "Mac Luhan et la modernité." Nice, 1993. http://www.theses.fr/1993NICE2021.
Full textHistory of ideas works like a riddle : some authors are selected, some not. Thinking of this, Bateson talks about a real ecology of mind. Herbert Marshall Mac Luhan (1911-1980) was a living paradox : introducing modernity with his concept of marconi galaxy, he was ignored by french thinkers of the late sixties. Or, the same ideas will be taken again, without refering to him, by post modernity philosophers. What are the reasons of such a contempt ? Why an essayist as famous as Mac Luhan was not accepted by the french intelligentzia of 1968 ? Was he a prophet, when he was annoucing the future of technology ? Not with standing his attacks against rationality, mac luhan was an humanist, maybe a fideist : if it's difficult to build a clear vision of the world, because of the stength of illusion, relationship between men must give a meaning to modern life
Silva, Pedro Miguel Oliveira da. "MAC protocol for location systems." Master's thesis, Universidade de Aveiro, 2009. http://hdl.handle.net/10773/2082.
Full textNa ultima década as redes de comunicações sem fios sofreram uma evolução sem precedentes, e as suas características particulares potenciaram a sua aplicação em vários contextos. No caso caso específico da localização em ambientes interiores, pretende-se que através de dados recolhidos por um conjunto de sensores sem fios, seja possível detectar com relativa precisão um objecto móvel devidamente identificado. Este tipo de sistemas permitem por exemplo, monitorizar um paciente de risco num hospital, dando informação precisa do seu paradeiro no momento da ocorrência de algum incidente. Outra possível aplicação será, por exemplo, dentro de uma empresa ou instituição, recolher informação precisa sobre o paradeiro de cada trabalhador, visitante ou produto. Isto permite melhorar a logística a gestão dos recursos. As soluções comuns de localização não endereçam devidamente a problemática de acesso ao meio para a realização de transmissões. Isto tem impacto na eficiência de utilização do canal de comunicações e resulta num número inferior de localizações por unidade de tempo. Estes sistemas revelam assim a necessidade de um protocolo de acesso ao meio específico que permita reduzir o tempo necessário à localização de cada dispositivo móvel permitindo a integração de um número mais elevado dispositivos móveis ou fixos numa rede de localização. Esta tese explora a utilização de Zigbee para implementar um protocolo master/multi-slave (FTT-L) aplicado a um sistema de localização. Este protocolo bem como a sua implementação é descrita neste documento. São também conduzidos vários testes para determinar alguns parâmetros chave. Os resultados são utilizados para derivar o tempo mínimo de localização que é validado experimentalmente. ABSTRACT: In the last decade the proliferation of wireless communication networks has reached unprecedented values, and their features empowered the application of wireless networks to the most varied contexts. In the specific case of indoor location, the target is to detect with relative precision an identified mobile object with the data collected from a wireless sensor network. This system allows us to monitor a risk patient in an hospital, giving the precise information about its location at the moment of a possible accident. Other possible application is, for example, to gather inside a company or institution the precise location of every worker, visitor or product. This can improve the logistics and the management of the personnel. The common location solutions do not address the problematic of medium access for transmitting messages. This has impact on the transmission channel occupation and indirectly lowers the system efficiency, which results on a smaller number of locations per unit of time. These systems reveal the necessity of a specific protocol for accessing the medium to reduce the necessary time to locate each mobile device, allowing the integration of a larger number of mobile devices or fixed devices in a location network. This thesis explores the use of ZigBee to implement a master/multi-slave protocol (FTT-L) supporting a localization system. This protocol as well as its implementation are described throughout the thesis and an assessment of several key parameters is conducted. Results are used to derive the delay of a localization round, which was validated experimentally.
García, Long Sergio Alonso. "Un Big MAC por favor : la cláusula MAC en las operaciones de fusiones y adquisiciones." Bachelor's thesis, Pontificia Universidad Católica del Perú, 2015. http://tesis.pucp.edu.pe/repositorio/handle/123456789/6925.
Full textDiab, Rana. "HMC-MAC : un protocole MAC hybride et multi-canal pour les réseaux de capteurs sans fil." Thesis, Clermont-Ferrand 2, 2015. http://www.theses.fr/2015CLF22580/document.
Full textThe use of multi-channel significantly improves the overall network performance of wireless sensor networks (WSNs) by allowing parallel transmissions over multiple channels. However, the design of a multi-channel MAC protocol in a multi-hop network requires an efficient channel allocation method that allows the coordination between the nodes in order to share available channels. In this thesis, we focus on the conception of a multi-channel MAC protocol that meets the requirements of high data collection applications in a multi-hop network. In order to achieve this goal, we first present the main techniques to use multiple channels to realize medium access sharing. Then, we propose a multi-channel MAC protocol that meets the requirements of high data rate WSNs, which combines three techniques TDMA, FDMA and CSMA. Indeed, we use a new channel assignment method that enables nodes to choose the most convenient channel in their 3-hop neighborhood in a distributed manner in order to minimize the effects of interferences and collisions. Finally, we evaluate by simulation the performance of our protocol and we compare it to other protocols proposed in the literature. The results show the efficiency of our proposition in the different studied scenarios
Khoulani, Amer, and Ramaz Samhan. "Performance Analysis of WLAN MAC Algorithms." Thesis, Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3200.
Full textAli, Mohammad Tariq. "MAC alternatives for LMCS/LMDS networks." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/mq36883.pdf.
Full textJang, Beakcheol. "Wireless MAC Protocol Design and Analysis." NCSU, 2009. http://www.lib.ncsu.edu/theses/available/etd-05262009-175059/.
Full textGu, Yuzhou. "Zero-error communication over adder MAC." Thesis, Massachusetts Institute of Technology, 2018. http://hdl.handle.net/1721.1/120387.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 53-54).
Adder MAC is a simple noiseless multiple-access channel (MAC), where if users send messages X₁, . . . ,X[subscript h] [epsilon] {0, 1}[superscript n], then the receiver receives Y = X₁ + · · · + X[subscript h] with addition over Z. Communication over the noiseless adder MAC has been studied for more than fifty years. There are two models of particular interest: uniquely decodable code tuples, and B[subscript h]-codes. In spite of the similarities between these two models, lower bounds and upper bounds of the optimal sum rate of uniquely decodable code tuple asymptotically match as number of users goes to infinity, while there is a gap of factor two between lower bounds and upper bounds of the optimal rate of B[subscript h]-codes. The best currently known B[subscript h]-codes for h >/- 3 are constructed using random coding. In this thesis, we study variants of the random coding method and related problems, in hope of achieving B[subscript h]-codes with better rate. Our contribution include the following. 1. We determine the rate achieved by changing the underlying distribution used in random coding. 2. We determine the rate of a list-decoding version of B[subscript h]-codes achieved by the random coding method. 3. We study several related problems about Rényi entropy.
by Yuzhou Gu.
M. Eng.
Tomas, Ilda. "Mac orlan au carrefour des arts." Paris 3, 1988. http://www.theses.fr/1989PA030109.
Full textAn attentive reading of p. Mac orlan based on the development of obsessionnel themes reveals some features which can not become obvious with a hasty approach. A sharp visual perception, an amazing analysis and foreknowledge, numerous directions taken by a creation the substance of which is made of memories and imagination : these are the main ways laid out by this writer who is as brilliant in songs as in novels, in poems as in essays. In this complex work, the concrete always interferes with metaphysical implications; the omnipresence of mystery breeds the conscience of a substantial unity of reality, binding life to vision and abstraction to perceptible material. So, it is possible to connect this work with a baroque tradition from which it takes the essential matter. By the painting, the poetry and the writing, the relationship is established with the ontological modalities, and thanks to it, the finite and the infinite keep close : it is the meaning of mac orlan's litterary adventure
Majeed, Adnan. "TARMAC timing analysis resilient MAC protocol /." Diss., Online access via UMI:, 2007.
Find full textMaher, Martina. "The death of Finn mac Cumaill." Thesis, University of Glasgow, 2018. http://theses.gla.ac.uk/30591/.
Full textLiu, Shuyang. "Movable frame hybrid MAC : a multi-MAC protocol for wireless software radios in multi-rate multimedia applications." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0016/MQ54319.pdf.
Full textAlbrecht, Michael. "Das System der US-amerikanischen Wohnungsfinanzierung : Fannie Mae und Freddie Mac als Instrumente staatlicher Wohnungspolitik /." Frankfurt am Main [u.a.] : Lang, 2004. http://www.gbv.de/dms/zbw/372974007.pdf.
Full textKatila, Charles Jumaa. "Mac protocols for linear wireless (sensor) networks." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7626/.
Full textNorén, Per. "Physical layer interface for IEEE 802.11 MAC." Thesis, Linköping University, Department of Electrical Engineering, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1383.
Full textThere are several standards for wireless communication. People that are involved in computers and networking recognize names like Bluetooth, HiperLAN and IEEE 802.11. A fundamental part of an IEEE 802.11 node is the Medium Access Controller. It establishes and controls communication with other nodes, using a physical layer unit. This is the work that was carried out as a master thesis project at Ericsson Microelectronics. The main goal was to design, implement and evaluate a hardware interface between the MAC and the physical layer. An important part of the work was to find a suitable partition scheme for hardware and software and to achieve this, an investigation of processor-cycles usage was carried out to support design decisions. The hardware/software partition resulted in hardware-functionality for decode of received frames and automatic transmission of acknowledge frames.
Alhakami, Wajdi. "Secure MAC protocols for cognitive radio networks." Thesis, University of Bedfordshire, 2016. http://hdl.handle.net/10547/621831.
Full textElshabrawy, Tallal O. "MAC architecture for broadband satellite access systems." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape4/PQDD_0020/MQ47825.pdf.
Full textCheng, Liang. "IEEE 802.15.4 MAC Protocol Study and Improvement." Digital Archive @ GSU, 2007. http://digitalarchive.gsu.edu/cs_diss/25.
Full textKoh, Kenneth Johannesen. "Analysis of Key Industrial WSN MAC Protocols." Thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2014. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-27346.
Full textO, Machain Padraig Carthach. "Poems by Fearghal Og Mac an Bhaird." Thesis, University of Edinburgh, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314414.
Full textXi, Weihua. "MAC enhancements for high speed wireless LANs." Thesis, University of Bristol, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.446178.
Full textGuibovich, Pérez Pedro M. "Felipe Mac Gregor, S.J.: una aproximación biobibliográfica." Pontificia Universidad Católica del Perú - Departamento de Humanidades, 2013. http://repositorio.pucp.edu.pe/index/handle/123456789/112951.
Full textBasadre, Grohmann Jorge. "En honor del P. Felipe Mac Gregor." Pontificia Universidad Católica del Perú - Departamento de Humanidades, 2013. http://repositorio.pucp.edu.pe/index/handle/123456789/112737.
Full textNikolaïdou, Margarita-Matthildi. "L'exotisme dans l'œuvre de Pierre Mac Orlan." Paris 4, 1997. http://www.theses.fr/1997PA040117.
Full textPierre Mac Orlan does not arouse the exotic feeling based on distance, despite the diversity of cities and the plurality of geographical names figuring in his works. For him the picturesque resides within the familiar itself characterized by "fantastique social" exoticism depicts the inner adventures of his contemporaries conforming to an irrational unknown that exists in the souls of his characters as well as in the places where the actions take place. It is about an exploration of the world of the 20s and 30s which is at the same time fascinating and threatening, about an imaginary journey taken by means of a poetic writing that serves as an exorcism
Světlík, Martin. "Integrace počítačů Apple Mac do firemního prostředí." Master's thesis, Vysoká škola ekonomická v Praze, 2016. http://www.nusl.cz/ntk/nusl-261954.
Full textBrownfield, Michael I. "Energy-efficient Wireless Sensor Network MAC Protocol." Diss., This resource online, 2006. http://scholar.lib.vt.edu/theses/available/etd-04102006-170423/.
Full textGe, Ye. "QoS provisioning for IEEE 802.11 MAC protocols." Connect to this title online, 2004. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1095441321.
Full textTitle from first page of PDF file. Document formatted into pages; contains xiii, 97 p.; also includes graphics (some col.). Includes bibliographical references (p. 94-97).
Toldov, Viktor. "Adaptive MAC layer for interference limited WSN." Thesis, Lille 1, 2017. http://www.theses.fr/2017LIL10002/document.
Full textIn the era of the Internet of Things, the number of connected devices is growing dramatically. Often, connected objects use Industrial, Scientific and Medical radio bands for communication. These kinds of bands are available without license, which facilitates development and implementation of new connected objects. However, it also leads to an increased level of interference in these bands. Interference not only negatively affects the Quality of Service, but also causes energy losses, which is especially unfavorable for the energy constrained Wireless Sensor Networks (WSN). In the present thesis the impact of the interference on the energy consumption of the WSN nodes is studied experimentally. The experimental results were used to estimate the lifetime of WSN nodes under conditions of different levels of interference. Then, a Thompson sampling based Cognitive Radio (CR) adaptive solution is proposed and evaluated via both, simulation and hardware implementation. Results show that this approach finds the best channel quicker than other state of the art solutions. An extension for multihop WSN was proposed for this CR solution and evaluated by hardware implementation in the framework of EWSN Dependability Competition. Finally, an adaptive WildMAC MAC layer protocol is proposed for the usecase of the LIRIMA PREDNET wildlife animal tracking project. Obtained field range test data were used to theoretically estimate cell densities and deployment zone coverage in this Low Power Widea Area Network (LPWAN). Then performance of the protocol was evaluated in WSNet simulation. The results show performance that allows to respect PREDNET project requirements with the given coverage
Michálek, Tomáš. "Vývoj MAC protokolu pro bezdrátové senzorové sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-242186.
Full textLong, Hua. "Research routing and MAC based on LEACH and S-MAC for energy efficiency and QoS in wireless sensor network." Thesis, University of Huddersfield, 2013. http://eprints.hud.ac.uk/id/eprint/23739/.
Full textAl-Mousa, Yamin Samir. "MAC/routing design for under water sensor networks /." Online version of thesis, 2007. http://hdl.handle.net/1850/4496.
Full textMasrub, Abdullah Ashur. "Cognitive MAC protocols for mobile ad-hoc networks." Thesis, Brunel University, 2013. http://bura.brunel.ac.uk/handle/2438/7621.
Full textMajid, M. I. "Frequency planning for clustered joint processing cellular MAC." Thesis, University of Surrey, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.529428.
Full textShah, Munam Ali. "A novel MAC protocol for cognitive radio networks." Thesis, University of Bedfordshire, 2013. http://hdl.handle.net/10547/301090.
Full textBaines, Roger W. "'Inquietude' in the work of Pierre Mac Orlan." Thesis, University of Nottingham, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243664.
Full textSaÌmano-Robles, Ramiro. "MAC/PHY cross-layer design for wireless networks." Thesis, University of Leeds, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.445844.
Full textWaters, Margaret Fiona. "Enzymes of RNA metabolism in Nostoc sp. MAC." Thesis, University of Liverpool, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.329409.
Full textMalik, Hassan. "Distributed MAC protocol for full-duplex wireless networks." Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/846235/.
Full textFerreira, Patrícia Alexandra Mendes. "MAC." Dissertação, 2014. http://hdl.handle.net/10216/77114.
Full textNaito, Hisashi, and 久資 内藤. "Mac OS X - Mac OS X のネットワーク -." 2004. http://hdl.handle.net/2237/108.
Full textTunc, Muharrem Ali Cetinkaya Coskun. "Service differentiation via cooperative MAC protocol (SD-MAC)." Diss., 2005. http://il.proquest.com/products_umi/dissertations.
Full text"December 2005." Title from PDF title page (viewed on April 19, 2007). Thesis adviser: Coscun Cetinkaya. UMI Number: AAT 1436584 Includes bibliographic references (leaves 57-60).
Tunc, Muharrem Ali. "Service differentiation via cooperative MAC protocol (SD-MAC)." Thesis, 2005. http://hdl.handle.net/10057/774.
Full textThesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering.
"December 2005."
Naito, Hisashi, and 久資 内藤. "Mac OS X - Mac OS X Serverのススメ -." 2004. http://hdl.handle.net/2237/113.
Full text