Dissertations / Theses on the topic 'Network behavior mechanisms'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 21 dissertations / theses for your research on the topic 'Network behavior mechanisms.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bland, James Travis. "Front-Line Participatory Behavior in the Era of Networks." Diss., Virginia Tech, 2011. http://hdl.handle.net/10919/30002.
Full textPh. D.
Blakeslee, Jennifer E. "Exploring Support Network Structure, Content, and Stability as Youth Transition from Foster Care." PDXScholar, 2012. https://pdxscholar.library.pdx.edu/open_access_etds/620.
Full textYu, Xiaoyang. "Dynamic acoustic emission for the characterization of the nonlinear behavior of complex materials." Thesis, Le Mans, 2020. http://www.theses.fr/2020LEMA1019.
Full textAcoustic emission (AE) is well known to be an efficient structural health monitoring technique to detect the creation and propagation of micro-cracks within structural materials such as concrete or composites when submitted to quasi-static stresses. Based on adequate signal processing methods, different research studies have established links between the detected AE hits and the created micro-damages. Other works have shown that it is possible to correlate the relaxation time in composites and the energy of the damage mechanisms measured during the quasi-static loading using the recorded AE hits. This thesis proposes to use an original experimental protocol to probe the nonlinear relaxation of concrete samples at the intact and damaged states. This protocol is based on the use of AE to passively probe the nonlinear relaxation of concrete samples instead of the weak amplitude signal usually used in slow dynamics experiments. Results show that passive and active probing methods lead to equivalent relaxation times. Furthermore, AE probing reveals the existence of a ‘silence period’ during the first minutes of the nonlinear relaxation after which AE hits start to be detected. In addition, the characteristics of AE hits recorded during the passive relaxation showed a clear resemblance to those obtained during the damaging of the same samples, where shear and compression mechanisms are involved. For the clustering of the AE hits, in addition to use of an unsupervised pattern recognition approach to cluster the detected AE hits, this work proposes a novel ‘image- based AE classification’ approach based on continuous wavelet transform (CWT) and convolutional neural network (CNN). Results related to the nonlinear dynamic and quasi-static AE data show that both signal processing approaches have high classification accuracy, which represents a great interest in the development of dynamic AE methods in the presence of micro-cracks
Gerdzhikov, Petko. "Behaviour of Port-knocking authentication mechanism." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-60929.
Full textIbarra, Olivares Rebeca. "Social mechanisms of tax behaviour." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:2893069a-a2bf-46ff-a769-e9ec4ec58b48.
Full textHu, Qiang. "Effects of nano structure on the deformation behavior of polymeric networks." Diss., Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/10179.
Full textShen, Xi. "Emergent behaviour of neural network models with learning mechanisms coupled with astrocyte and vascular dynamics." Thesis, Imperial College London, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.438196.
Full textEvans, Dominic Andrew. "A midbrain mechanism for computing escape decisions in the mouse." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/274871.
Full textMacNamara, Kailey. "Behavioral and Neural Mechanisms of Social Heterogeneity in Attention Deficit/Hyperactivity Disorder." FIU Digital Commons, 2017. http://digitalcommons.fiu.edu/etd/3390.
Full textde, Freitas Edison Pignaton, Tales Heimfarth, Armando Morado Ferreira, Flávio Rech Wagner, Carlos Eduardo Pereira, and Tony Larsson. "An agent framework to support sensor networks’ setup and adaptation." Högskolan i Halmstad, Inbyggda system (CERES), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-14691.
Full textAshraf, Naeem. "Social and strategic dynamics of carbon market actors' behaviors." Thesis, Aix-Marseille, 2013. http://www.theses.fr/2013AIXM1067.
Full textThe main objectives of the dissertation are to explore social and strategic motivations and consequences, and to model and disentangle relational and rational-instrumental mechanisms of carbon market strategies of organizations. To achieve these objectives, three empirical studies were conducted in the context of carbon market that operates under the Kyoto Protocol’s Clean Development Mechanism (CDM). The first inductive case study based exploratory research was carried out in a developing country. Findings suggest that institutional and competitive concerns motivate carbon market strategy of organizations. Treating social influence as operating through relational structure, the next two papers then analyze dynamics of organization’s behavior and its relational network. Results suggest that in the CDM market, firm’s network embeddedness, and centrality affect firms’ behaviors. However, while controlling for certain actor level and relational-structural contingencies, network and behavior co-evolutionary dynamics suggest that firm’s instrumental motivations are more pronounced in influencing the behavior of firms. This dissertation contributes to the climate strategy literature by explicating the social and strategic dynamics of behavior, and network structural characteristics, of the carbon market actors
Dreser, Melanie. "Design, Fun and Sustainability: Utilizing Design Research Methods to Develop an Application to Inform and Motivate Students to Make Sustainable Consumer Choices." The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1322669294.
Full textGerraty, Raphael Thomas. "Brain network mechanisms in learning behavior." Thesis, 2018. https://doi.org/10.7916/D84J1Z0R.
Full textZhang, Zhitong. "Cycle length distribution and hamming distance behavior of time-reversible boolean network model /." 2000. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:9990520.
Full textLin, Chun-Yu, and 林峻宇. "Dynamic homologous mapping networks reveal cell behaviors and disease mechanisms." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/29vb6k.
Full text國立交通大學
生物資訊及系統生物研究所
102
As an increasing number of genomic, proteomic, signaling and metabolomic data become available, the construction of networks is valuable for understanding the molecular mechanisms and disease mechanism. Many large-scale experimental methods have been proposed to identify the protein-protein interactions (PPIs) for constructing PPI networks, but these experimental PPIs were often studied on some species with high false-positive rates. In addition, dynamic cooperation between proteins for assembly of protein modules in time and space is essential to execute biological processes in networks of cells. Therefore, the construction of dynamic networks and dynamic modules are urgently required to reveal cell behaviors and disease mechanisms. To address these issues, we first proposed PPI and module family to construct (enlarge) the PPI networks through homologous mapping (across multiple species). For example, we derived homologous mapping human network, 17,343 proteins and 100,788 PPIs, which is much more complete than the previous works, ~12,121 proteins and 66,057 PPIs. For analysis of complex PPI networks, we proposed the organizational principles of modules for identifying the modules, homologous modules (called module family), and module-module interaction (MMI) networks. Moreover, we also developed a server (MoNetFamily) to provide the network annotations; the profiles of proteins and PPIs in module families; GO annotations of neighboring modules and module families. Our MMI network inferred two modules, JAK2-PAFR-TYK2 and IL-6/IL6Rα/gp130, to explore the mechanism of HIV-associated psoriasis. Next, we used these networks integrated with human gene expression data across 21 diverse cancer types to explore nicotine-induced cancer mechanisms regulated by nicotinic acetylcholine receptor subunit alpha-9 (α9-nAChR). Currently, all databases lack the records of interaction partners of α9-nAChR. For the α9-nAChR, our strategies successfully identified 9 novel interacting proteins, including EGFR, ERBB2, CSNK1D, COPS6, and NCLN. Our network shows that EGFR, ERBB2, CSNK1D, and COPS6 are involved in the MAPK signaling pathway to regulate cell proliferation and apoptosis. Based on the dynamic networks combined with gene expression profiling of 58 breast tumor tissues and 147 corresponding normal tissues, we observed the activations of these interacting proteins may increase when they disassociated from the interactions with α9-nAChR during tumorigenesis. Interestingly, ERBB2 seems to associate with α9-nAChR both in normal tissues and tumor tissues of basal-like subtype. Therefore, patients with active and passive smoking would induce disassociation between ERBB2 and α9-nAChR to increase activation of ERBB2 signalling, and result in promotion and progression of breast cancer cells, especially in basal-like cancers. In addition, we collected over 7,000 human gene expression data sets from Gene Expression Omnibus and integrated them into modules/networks to construct dynamic modules/networks for reflecting the cellular processes, driving phenotypic variations, in different cells and states; for example, exploring tumor heterogeneity in 21 diverse cancer types among 983 clinical samples. We believe that the dynamic modules in homologous mapping networks are useful for discovering cell behaviors and disease mechanisms.
Jhang, Zong-Cyuan, and 張宗銓. "An Network Behavior-Based Botnet Detection Mechanism Using PSO and K-means." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/11251804354229107211.
Full text大同大學
事業經營學系(所)
100
Nowadays, Botnet has become one of the greatest threats to the network security. Network attackers can use Botnet to launch the distributed denial of service (DDoS) to paralyze the important websites or to steal the confidential data from infected computer, use fishing attacking to steal the sensitive information such as the account and password, send bulk email advertising or conduct click fraud. Even though the detection technology has got improved and some solutions to Internet security have been proposed, the threat of Botnet still exists. Most previous studies used the packet contents or the features of network flows to analyze to detect Botnet. However, there are still some problems with packet encryption and privacy, i.e., Botnet can easily change the packet contents and flow features to avoid the detection system. This study proposes a solution to those problems and develops a mechanism of Botnet detection step-by-step. First of all, three important network behaviors including long communication behavior (ActBehavior), connection failure behavior (FailBehavior), and network scanning behavior (ScanBehavior) are defined in this study by reviewing the related literatures and analyzing the network activities of infected computer. Secondly, the features of network behaviors are extracted from the flow records of Network-Layer and Transport-layer in the network equipment. Finally, Particle Swarm Optimization (PSO) and K-means algorithm are used to detect the members of Botnet in the organization's network. This study uses campus network as a case study. The experimental results show that this mechanism can find out the Botnet members on the network of an organization even the packet encryption or changed features of flows, find out the Botnet members prior to the detection of the other information security systems. Moreover, the mechanism in this study is and simple to implement and can be used in student dormitory network, home network and mobile 3G network as well.
Lei, Che-Hao, and 雷哲豪. "A Channel Allocation Mechanism Using Real-time Traffic Information and User Behavior for Cellular Networks." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/82078314118782145543.
Full text國立交通大學
資訊管理研究所
99
In cellular networks, when the Base Station (BS) has no the extra available channels, the handover procedure of communicating Mobile Station (MS) will be failed. As a result, it caused to call blocking which will decrease the customer satisfaction and result in financial loss. Therefore, the channel allocation for call block avoidance is an important issue of resource management in cellular networks. In this paper, we propose a mechanism which considers the real-time traffic information (e.g., traffic flow and vehicle speed) and the user behaviors (e.g., call inter-arrival time and call holding time) to analyze the adaptable amount of communication calls in the specific cell for channel allocation. In conducting the experiments of Call Block Probabilities (CBP), we simulate two cases by the situations of the whole day and traffic accident. The simulation results show that the CBP proposed by our scheme in the case of the whole day can decrease 3.37% CBP, compared to that of SCA scheme. Moreover, the CBP proposed by our scheme in the case of traffic accident can decrease 30.23% CBP, compared to that of SCA scheme. Therefore, our proposed mechanism is more effective that can decrease the number of CBP.
CHEN, SHIH-NAN, and 陳世楠. "A study on the mechanism of the phase transition behavior observed in the model of computer network traffic." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/69034110826877601717.
Full text國立臺灣大學
物理學研究所
90
In a recent study, Ohira and Sawatari [Phys. Rev. E 58, 193 (1998)] presented a simple model of computer network traffic, which exhibits a phase transition between a low-traffic and congestion phase when the packets creation rate is increased. We further investigate the dynamics of this model by simplifying it into a random walk. It is shown that the packets clogged up around the midpoint of the boundary trigger the phase transition. Besides, the universal features observed among lattices of different sizes are analyzed quantitatively: the similarity may result from the average lifetime (steps taken from the host to destination) varying in proportion to the square of the creation rate; the saturation-like behavior occurring in the later period of congestion phase seems to come from the quantization in the number of nodes with cumulated queue. Finally, the relevance between different routing strategies and the performance of traffic is also discussed.
Jing-ShiuanChen and 陳靜暄. "On the Design and Implementation of a Tracking and Evidence Preserving Mechanism for the Behavior of Network Users." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/32293836998045955055.
Full text國立成功大學
電腦與通信工程研究所
101
In the view of the recent amendments of the Personal Information Protection Act triggered a lot of discussion on the issue of the transfer the burden of proof. We will develop a Network Behavior Tracking Admin System (NBTAS) based on network forensics. That is to say all of the log file which NBTAS analyzed will be preserved and authenticated. The method of preserving and authenticating is Modified Hash-based Message Authentication Code (Modified HMAC, MH), which is the study will propose. MH is based on HMAC, but we will modify the generated rules of the secret key. In order to increase the difficulty of cracking the message authentication codes which the attacker wants to do. Therefore, we could effectively control and reduce the events by the people with bad intention. Besides, MH will integrate the concept of Hash Tree, to reduce the authentication time in the face of judicial litigation. To enhancement of detecting the user suspicious network behavior, we will setup up blacklist and map with log file. If one of the connection is matched the blacklist, then we will record it.
(9183650), Andrea Acuna. "Characterizing the mechanical behavior of extracellular matrix networks in situ." Thesis, 2020.
Find full textThe extracellular matrix (ECM) plays a significant role in defining the mechanical properties of biological tissues. The proteins, proteoglycans, and glycosaminoglycans that constitute the ECM are arranged into highly organized structures (e.g. fibrils and networks). Cellular behavior is affected by the stiffness of the microenvironment and influenced by the composition and organization of the ECM. Mechanosensing of ECM stiffness by cells occurs at the fibrillar (mesoscale) level between the single molecule (microscale) and the bulk tissue (macroscale) levels. However, the mechanical behavior of ECM proteins at the mesoscale are not well defined. Thus, better understanding of the ECM building blocks responsible for functional tissue assembly is critical in order to recapitulate in vivo conditions. There is a need for the mechanical characterization of the ECM networks formed by proteins synthesized in vivo while in their native configuration.
To address this gap, my goals highlighted in this dissertation were to develop appropriate experimental and computational methodologies and investigate the 3D organization and mechanical behavior of ECM networks in situ. The ECM of developing mouse tissues was used as a model system, taking advantage of the low-density networks present at this stage. First, we established a novel decellularization technique that enhanced the visualization of ECM networks in soft embryonic tissues. Based on this technique, we then quantified tissue-dependent strain of immunostained ECM networks in situ. Next, we developed mesoscale and macroscale testing systems to evaluate ECM networks under tension. Our systems were used to investigate tendon mechanics as a function of development, calculating tangent moduli from stress - strain plots. Similarly, we characterized ECM network deformation while uniaxially loading embryonic tissues, since this testing modality is ideal for fibril and network mechanics. Taken together, this information can facilitate the fabrication of physiologically relevant scaffolds for regenerative medicine by establishing mechanical guidelines for microenvironments facilitate functional tissue assembly.
Garaga, Arunakumari. "Factors Affecting The Static And Dynamic Response Of Jointed Rock Masses." Thesis, 2008. http://hdl.handle.net/2005/772.
Full text