Academic literature on the topic 'Network infrastructure'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network infrastructure.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Network infrastructure"

1

Hrabcak, David, Lubomir Dobos, Jan Papaj, and Lubos Ovsenik. "Multilayered Network Model for Mobile Network Infrastructure Disruption." Sensors 20, no. 19 (2020): 5491. http://dx.doi.org/10.3390/s20195491.

Full text
Abstract:
In this paper, the novel study of the multilayered network model for the disrupted infrastructure of the 5G mobile network is introduced. The aim of this study is to present the new way of incorporating different types of networks, such as Wireless Sensor Networks (WSN), Mobile Ad-Hoc Networks (MANET), and DRONET Networks into one fully functional multilayered network. The proposed multilayered network model also presents the resilient way to deal with infrastructure disruption due to different reasons, such as disaster scenarios or malicious actions. In the near future, new network technologies of 5G networks and the phenomenon known as the Internet of Things (IoT) will empower the functionality of different types of networks and interconnects them into one complex network. The proposed concept is oriented on resilient, smart city applications such as public safety and health and it is able to provide critical communication when fixed network infrastructure is destroyed by deploying smart sensors and unmanned aerial vehicles. The provided simulations shows that the proposed multilayered network concept is able to perform better than traditional WSN network in term of delivery time, average number of hops and data rate speed, when disruption scenario occurs.
APA, Harvard, Vancouver, ISO, and other styles
2

Schneiderman, Deborah. "Network/Infrastructure/Interior." Interiors 9, no. 1 (2018): 88–99. http://dx.doi.org/10.1080/20419112.2018.1485383.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hansen, Lesley. "Network infrastructure security." Network Security 1997, no. 6 (1997): 8–12. http://dx.doi.org/10.1016/s1353-4858(97)89529-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Serenbetz, Jim. "Assessing network infrastructure." netWorker 2, no. 4 (1998): 40–46. http://dx.doi.org/10.1145/285293.285302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Truelove, Yaffa. "Gendered infrastructure and liminal space in Delhi’s unauthorized colonies." Environment and Planning D: Society and Space 39, no. 6 (2021): 1009–25. http://dx.doi.org/10.1177/02637758211055483.

Full text
Abstract:
This paper takes an embodied approach to the lived experiences and everyday politics of liminal neighborhoods and infrastructures in Delhi’s unauthorized colonies, which lack official entitlements to networked infrastructures such as water and sewerage. Bringing a feminist political ecology lens to critical infrastructure studies, I show how gendered social relations, subjectivities, and the unequal experience of urban liminality are tied to accessing water and its fragmented infrastructures beyond the network. In particular, liminal infrastructural space is produced in unauthorized colonies through not only these neighborhoods’ quasi-legal status and unequal access to urban water, but also through gendered discourses and the socially differentiated ways water infrastructures are co-produced, managed, and made livable by residents. As water is primarily accessed beyond the network via tubewells and tankers, I demonstrate how these fractured modalities ultimately constitute gendered infrastructural assemblages that enable water’s circulation across neighborhoods but also serve to deepen forms of gendered marginality and differentiation. Here, gendered infrastructural practices and labor to negotiate and supplement fragmented components of water infrastructure shape subjectivities and possibilities for social relations and urban claims-making. These infrastructural assemblages expose both the situated experience of urban liminality, as well as its transcendent possibilities.
APA, Harvard, Vancouver, ISO, and other styles
6

Lin, Jiwei, and Tso-Chien Pan. "Modelling of multi-sectoral critical infrastructure interdependencies for vulnerability analysis." Disaster Prevention and Resilience 1, no. 1 (2022): 2. http://dx.doi.org/10.20517/dpr.2021.05.

Full text
Abstract:
Critical infrastructure such as the transportation, power generation, water supply, telecommunications, security and health services/systems, etc. are essential for providing a reliable flow of goods and services, crucial to the functioning of the economy and society. These infrastructures are closely linked and dependent on one another, and these interdependencies need to be modelled in order to analyse the disruptions and vulnerabilities of critical infrastructure networks as a whole. With increased, investment and complexity in the coupling of gas and electricity network, limitations and vulnerabilities of the coupled networks are becoming increasingly relevant to the operational planning of the critical infrastructures. Current modelling of a coupled gas and electricity network will be used in conjunction with nation input-output interdependency model to model physical critical infrastructures and critical infrastructure interdependencies, respectively. This research work will tackle two possible scenarios that might happen in the gas network while evaluating the cascading impact both in the physical model perspective and input-output interdependency model perspective. The results will provide insights on how disruption in the gas network affects the electricity grid and its corresponding economic impact on all economic sectors in a nation.
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Ke, Yong Li, and Jun Wu. "Identifying multiple vulnerable areas of infrastructure network under global connectivity measure." International Journal of Modern Physics C 30, no. 07 (2019): 1940004. http://dx.doi.org/10.1142/s0129183119400047.

Full text
Abstract:
Infrastructure networks provide significant services for our society. Nevertheless, high dependence on physical infrastructures makes infrastructure networks vulnerable to disasters or intentional attacks which being considered as geographically related failures that happened in specific geographical locations and result in failures of neighboring network components. To provide comprehensive network protection against failures, vulnerability of infrastructure network needs to be assessed with various network performance measures. However, when considering about multiple vulnerable areas, available researches just employ measure of total number of affected edges while neglecting edges’ different topologies. In this paper, we focus on identifying multiple vulnerable areas under global connectivity measure: Size Ratio of the Giant Component (SRGC). Firstly, Deterministic Damage Circle Model and Multiple Barycenters Method are presented to determine damage impact and location of damage region. For solving the HP-hard problem of identifying multiple optimal attacks, we transform the problem into combinational optimization problem and propose a mixed heuristic strategy consisted of both Greedy Algorithm and Genetic Algorithm to attain the optimal solution. We obtain numerical results for real-world infrastructure network, thereby demonstrating the effectiveness and applicability of the presented strategy and algorithms. The distinctive results of SRGC indicate the necessity and significance of considering global connectivity measure in assessing vulnerability of infrastructure networks.
APA, Harvard, Vancouver, ISO, and other styles
8

Dagiral, Éric, and Ashveen Peerbaye. "Making Knowledge in Boundary Infrastructures: Inside and Beyond a Database for Rare Diseases." Science & Technology Studies 29, no. 2 (2016): 44–61. http://dx.doi.org/10.23987/sts.55920.

Full text
Abstract:
This paper provides an ethnographical study of the ways in which infrastructure matters in the production of knowledge in the social worlds of rare diseases. We analyse the role played by a relational database in this respect, which exists at the crossroads of a large and complex network of individuals, institutions, and practices. This database forms part of a “boundary infrastructure”, in which knowledge production constitutes one output of infrastructural work, that needs to be articulated with other kinds of activities and matters of concern. We analyse how members of the network negotiate the place and forms of knowledge production in relation to these other purposes, and highlight the political nature of the distinction between knowledge and information, which frames collective action. We also show how infrastructural inversion serves to articulate knowledge production with other forms of mobilisation, thereby shaping and reconfiguring the boundary infrastructure as a whole.Keywords: knowledge infrastructures, boundary infrastructures, relational databases, rare diseases
APA, Harvard, Vancouver, ISO, and other styles
9

Handayani, Krisna Dwi, and Yogie Risdianto. "The Implementation of Network Infrastructure and Housing Environmental Infrastructure." Ge-STRAM: Jurnal Perencanaan dan Rekayasa Sipil 8, no. 1 (2025): 53–58. https://doi.org/10.25139/jprs.v8i1.9988.

Full text
Abstract:
Housing development in Kabupaten Sidoarjo has not been matched by the development of adequate network infrastructure. Meanwhile, Surabaya City has a high population density, which causes pressure on existing infrastructure. The research objective is to find out how the application of life support and environmental infrastructure in meeting the desires of upper middle class housing users based on applicable standards. Interviews with project manager and field observations were carried out on each housing, for primary data collection which includes clean water networks, wastewater, solid waste, electricity, internet-telephone, local transportation and green spaces. The infrastructure of upper middle class housing has a level of compliance for network completeness and prerequisites with SNI in Surabaya have criteria of 72% and 56% in Sidoarjo. Based on the level of conformity with SNI criteria, some housing clusters do not have an adequate solid waste network. The fulfillment of green space for housing in Sidoarjo was better with an average value of 33% than housing in Surabaya with an average of 30%. However, some housing has not met the minimum requirements for green space area based on the provisions of 30%. Some housing doesn’t have a playgrounds or sports venues even though the minimum requirement of 30% of RTH has been met. Local transportation network is not available in all housing estates due to the one gate system cluster.
APA, Harvard, Vancouver, ISO, and other styles
10

Manbetova, Zhanat, Pavel Dunaev, Manat Imankul, and Zhanybek Kaliev. "PROBLEMS OF ORGANIZING THE 5G NETWORK INFRASTRUCTURE." Вестник КазАТК 126, no. 3 (2023): 443–50. http://dx.doi.org/10.52167/1609-1817-2023-126-3-443-450.

Full text
Abstract:
Trends in the development of the network infrastructure of future wireless networks have been established. The interrelation between the construction of a network information infrastructure and technologies to reduce the environmental impact in 5G networks is noted. The use of vRAN technology, which allows to reduce total carbon dioxide emissions, is considered. 5G network services are presented, leading to an increase in total energy consumption in these networks. The limitations of the 5G network infrastructure associated with the use of slicing technology are shown.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Network infrastructure"

1

Alexander, David. "A Network Metadata Infrastructure for Locating Network Devices." Ohio University / OhioLINK, 2004. http://www.ohiolink.edu/etd/view.cgi?ohiou1088176648.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Case, Michael A. "Network infrastructure essentials course development." [Denver, Colo.] : Regis University, 2006. http://165.236.235.140/lib/MCase2007.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cardoso, Igor Duarte. "Network infrastructure control for virtual campuses." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/14707.

Full text
Abstract:
Mestrado em Engenharia de Computadores e Telemática<br>This dissertation provides a way to merge Cloud Computing infrastructures with traditional or legacy network deployments, leveraging the best in both worlds and enabling a logically centralized control for it. A design/architecture is proposed to extend existing Cloud Computing software stacks so they are able to manage networks outside the Cloud Computing infrastructure, by extending the internal, virtualized network segments. This is useful in a variety of use cases such as incremental Legacy to Cloud network migration, hybrid virtual/ traditional networking, centralized control of existing networks, bare metal provisioning and even offloading of advanced services from typical home gateways into the operator, improving control and reducing maintenance costs. An implementation is presented and tested on top of OpenStack, the principal Open-Source Cloud Computing software stack available. It includes changes to the API, command line interface and existing mechanisms which previously only supported homogeneous vendor equipment, such that they support any hardware and be able to automate their provisioning. By using what is called External Drivers, any organization (an hardware vendor, a Cloud provider or even a telecommunications operator) can develop their own driver to support new, specific networking equipment. Besides this ease of development and extensibility, two drivers are already developed in the context of this work: one for OpenWrt switches/routers and one for Cisco EtherSwitch IOS switching modules. Test results indicate that there are low penalties on latency and throughput, and that provisioning times (for setting up or tearing down networks) are reduced in comparison with similar maintenance operations on traditional computer networks.<br>Esta dissertação apresenta uma forma de juntar infrastruturas Cloud Computing com redes tradicionais ou legadas, trazendo o melhor de ambos os mundos e possibilitando um controlo logicamente centralizado. Uma arquitetura é proposta com o intuito de extender implementações de Cloud Computing para que possam gerir também redes fora da infrastrutura de Cloud Computing, extendendo os segmentos de rede internos, virtualizados. Isto é útil para um variado conjunto de casos de uso, tais como migração incremental de redes legadas para a Cloud, redes híbridas virtuais/tradicionais, controlo centralizado de redes já existentes, aprovisionamento de bare metal e até mesmo a passagem de serviços tipicamente fornecidos por um home gateway para o lado do operador, melhorando o controlo e reduzindo custos de manutenção. Uma implementação da solução é apresentada e testada em cima do OpenStack, a principal solução Open-Source de Cloud Computing disponível. A implementação inclui alterações à API, à interface de linha de comandos e aos mecanismos já existentes, que apenas suportam implementações homogéneas, para que possam suportar qualquer equipamento e automatizar o aprovisionamento dos mesmos. Através daquilo que se chamam drivers externos, qualquer organização (seja um fabricante de equipamentos de rede, um fornecedor de Cloud ou uma operadora de telecomunicações) pode desenvolver o seu próprio drivers para suportar novos, específicos equipamentos de hardware. Para além da facilidade de desenvolvimento e extensibilidade, dois drivers são também fruto deste trabalho: um para switches/routers OpenWrt e outro para os módulos de switching Cisco EtherSwitch, sistema operativo IOS. Testes efetuados indicam que há baixas penalizações na latência e largura de banda, e ainda que os tempos de aprovisionamento são reduzidos em comparação com semelhantes operações de manutenção em redes informáticas tradicionais.
APA, Harvard, Vancouver, ISO, and other styles
4

Thyresson, Love. "Supervision of Equipment in O&M Infrastructure." Thesis, Linköping University, Department of Electrical Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-10277.

Full text
Abstract:
<p>The COMInf network is the infrastructure part of the operation and management system used for guarding the radio access networks developed by Ericsson. This thesis investigates the Ericsson COMInf network; identifies problems covering both functional as well as security aspects of the network and its current monitoring solution, and also presents a set of requirements and recommendations for a future network surveillance solution. As this thesis shows, the COMInf network today has limited functions regarding both network and security supervision.</p><p>However, implementations of such solutions are possible due to the standardized components used in the network today. To improve the COMInf network, this thesis defines requirements and recommends a network surveillance solution which fulfills these requirements. It is also recommended to update some of the hardware currently in place for the COMInf network.</p>
APA, Harvard, Vancouver, ISO, and other styles
5

Kouhbor, Shahnaz University of Ballarat. "Optimal number and placement of network infrastructure in wireless networks." University of Ballarat, 2007. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/12762.

Full text
Abstract:
Wireless Local Area Networks (WLANs) have become a major success in telecommunications during the last few years, due to advantages such as mobility, flexibility, and easier maintenance. A device called an access point (AP) acts as a base station in WLAN for connecting a group of users to the network via radio signal. During the planning of such a network an important problem is to determine the optimal number of these devices and their placement/distribution so that coverage, capacity, and physical security are maximised at minimum cost. In this thesis we are using continuous optimisation techniques to optimise the number of APs and their distribution while cost of deployment is reduced and physical security of the network is enhanced. To find the number and placement of APs, we developed a multi-objective functions model based on path losses and power for free space environments. The two functions in the models are combined by using a balancing parameter. Since it is recognised that some of the objectives can be handled one at a time, in another approach, we followed a step-by-step procedure. We start with a novel optimisation model based on path losses for indoor environments including obstacles. Cost of deployment is saved by finding the minimum number of APs ensuring that the path loss at each test point/receiver is below the given maximum path loss. Next, the physical security of the network is enhanced by placing the APs far from places accessible to unauthorised users to reduce the risk of intrusion into the network. This is achieved in the framework of the model by introducing potential unauthorised users in unauthorised areas for whom coverage is minimised. Due to the presence of obstacles in indoor buildings, the path loss function is discontinuous. Therefore, the objective functions are very complicated and most of the existing optimisation algorithms cannot be applied to solve the problem. We use a global optimisation algorithm that is not used by other researchers to solve the same problem. To validate the accuracy of the optimisation model and performance of the numerical methods, we run tests on several indoor buildings and use wide range of WLAN parameters. The results demonstrate the quality of our model and algorithm. Based on the proposed model and algorithm, we developed a software to assist the network designers in planning wireless LANs.<br>Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
6

Kouhbor, Shahnaz. "Optimal number and placement of network infrastructure in wireless networks." Thesis, University of Ballarat, 2007. http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/65892.

Full text
Abstract:
Wireless Local Area Networks (WLANs) have become a major success in telecommunications during the last few years, due to advantages such as mobility, flexibility, and easier maintenance. A device called an access point (AP) acts as a base station in WLAN for connecting a group of users to the network via radio signal. During the planning of such a network an important problem is to determine the optimal number of these devices and their placement/distribution so that coverage, capacity, and physical security are maximised at minimum cost. In this thesis we are using continuous optimisation techniques to optimise the number of APs and their distribution while cost of deployment is reduced and physical security of the network is enhanced. To find the number and placement of APs, we developed a multi-objective functions model based on path losses and power for free space environments. The two functions in the models are combined by using a balancing parameter. Since it is recognised that some of the objectives can be handled one at a time, in another approach, we followed a step-by-step procedure. We start with a novel optimisation model based on path losses for indoor environments including obstacles. Cost of deployment is saved by finding the minimum number of APs ensuring that the path loss at each test point/receiver is below the given maximum path loss. Next, the physical security of the network is enhanced by placing the APs far from places accessible to unauthorised users to reduce the risk of intrusion into the network. This is achieved in the framework of the model by introducing potential unauthorised users in unauthorised areas for whom coverage is minimised. Due to the presence of obstacles in indoor buildings, the path loss function is discontinuous. Therefore, the objective functions are very complicated and most of the existing optimisation algorithms cannot be applied to solve the problem. We use a global optimisation algorithm that is not used by other researchers to solve the same problem. To validate the accuracy of the optimisation model and performance of the numerical methods, we run tests on several indoor buildings and use wide range of WLAN parameters. The results demonstrate the quality of our model and algorithm. Based on the proposed model and algorithm, we developed a software to assist the network designers in planning wireless LANs.<br>Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
7

Kouhbor, Shahnaz. "Optimal number and placement of network infrastructure in wireless networks." University of Ballarat, 2007. http://archimedes.ballarat.edu.au:8080/vital/access/HandleResolver/1959.17/14597.

Full text
Abstract:
Wireless Local Area Networks (WLANs) have become a major success in telecommunications during the last few years, due to advantages such as mobility, flexibility, and easier maintenance. A device called an access point (AP) acts as a base station in WLAN for connecting a group of users to the network via radio signal. During the planning of such a network an important problem is to determine the optimal number of these devices and their placement/distribution so that coverage, capacity, and physical security are maximised at minimum cost. In this thesis we are using continuous optimisation techniques to optimise the number of APs and their distribution while cost of deployment is reduced and physical security of the network is enhanced. To find the number and placement of APs, we developed a multi-objective functions model based on path losses and power for free space environments. The two functions in the models are combined by using a balancing parameter. Since it is recognised that some of the objectives can be handled one at a time, in another approach, we followed a step-by-step procedure. We start with a novel optimisation model based on path losses for indoor environments including obstacles. Cost of deployment is saved by finding the minimum number of APs ensuring that the path loss at each test point/receiver is below the given maximum path loss. Next, the physical security of the network is enhanced by placing the APs far from places accessible to unauthorised users to reduce the risk of intrusion into the network. This is achieved in the framework of the model by introducing potential unauthorised users in unauthorised areas for whom coverage is minimised. Due to the presence of obstacles in indoor buildings, the path loss function is discontinuous. Therefore, the objective functions are very complicated and most of the existing optimisation algorithms cannot be applied to solve the problem. We use a global optimisation algorithm that is not used by other researchers to solve the same problem. To validate the accuracy of the optimisation model and performance of the numerical methods, we run tests on several indoor buildings and use wide range of WLAN parameters. The results demonstrate the quality of our model and algorithm. Based on the proposed model and algorithm, we developed a software to assist the network designers in planning wireless LANs.<br>Doctor of Philosophy
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Hao. "Toward hardware-oriented defensive network infrastructure." Thesis, State University of New York at Binghamton, 2015. http://pqdtopen.proquest.com/#viewpdf?dispub=3713553.

Full text
Abstract:
<p> The prosperity of the Internet has made it attractive to hackers and malicious attackers. Distributed attacks, such as: DDoS attacks and Internet worms have become major threats towards the network infrastructure. Collaborating existent single-point-deployed security applications over multi-domains for distributed defense is promising. Taking advantage of the small-world network model, a three-layered network modeling platform was developed for exploring behaviors of collaborative defense under the scope of a complex system. Using this platform, a comparison study between two major collaborative defense schemes was conducted. Their performance and eectiveness against signature-embedded worm attacks were evaluated accordingly. </p><p> Given the rapid evolution of attack methods and toolkits, software-based solutions to secure the network infrastructure have become overburdened. The performance gap between the execution speed of security software and the amount of data to be processed is ever widening. A common solution to close this performance gap is through hardware implementation of security functions. After a comprehensive survey on major recongurable hardware-based approaches application on network infrastructure security area, an optimized design of FPGA-based Power Spectral Density (PSD) data converter for online Shrew DDoS attack detection was proposed and prototyped. Combining an innovative component-reusable Auto-Correlation (AC) algorithm and the adapted 2N-point real-valued Discrete Fourier Transform (DFT) algorithm, a maximum reduction of 61.8% processing time from 27471.4 us to 10504.8 us was achieved. These ecient hardware realization enabled the implementation of this design to a Xilinx Virtex2 Pro FGPA. </p><p> The scalability issue against continuously expanding signature databases is another major impediment aecting hardware application for network intrusion detection. With the observation that signature patterns are constructed from combinations of a limited number of primary patterns, a two-stage decomposition approach was developed to solve this issue. The evaluation results show that a reduction in size of over 77% can be achieved on top of signature patterns extracted from the Snort rule database after decomposition.</p>
APA, Harvard, Vancouver, ISO, and other styles
9

Mosley, Lorenza D. "IPv6 network infrastructure and stability inference." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/43958.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>IPv6 deployment is increasing as IPv4 address allocations near exhaustion. Many large organizations, including the Department of Defense (DOD), have mandated the transition to IPv6. With the transition to IPv6, new techniques need to be developed to accurately measure, characterize, and map IPv6 networks. This thesis presents a method of profiling the uninterrupted system availability, or uptime, of IPv6 addressable devices. The techniques demonstrated in this study infer system restarts and the operational uptime for IPv6 network devices with a specific focus on IPv6 routers on the Internet. Approximately 50,000 IPv6 addresses were probed continuously from March to June 2014, using the Too Big Trick (TBT) to induce the remote targets to return fragmented responses. By evaluating the responses, the uptime for approximately 35% of the IPv6 addresses can be inferred.
APA, Harvard, Vancouver, ISO, and other styles
10

Stewart, Richard. "An infrastructure for neural network construction." Thesis, Brunel University, 2005. http://bura.brunel.ac.uk/handle/2438/5586.

Full text
Abstract:
After many years of research the area of Artificial Intelligence is still searching for ways to construct a truly intelligent system. One criticism is that current models are not 'rich' or complex enough to operate in many and varied real world situations. One way to tackle this criticism is to look at intelligent systems that already exist in nature and examine these to determine what complexities exist in these systems and not in the current Al models. The research begins by presenting an overview of the current knowledge of Biological Neural Networks, as examples of intelligent systems existing in nature, and how they function. Artificial Neural networks are then discussed and the thesis examines their similarities and dissimilarities with their biological counterparts. The research suggests ways that Artificial Neural Networks may be improved by borrowing ideas from Biological Neural Networks. By introducing new concepts drawn from the biological realm, the construction of the Artificial Neural Networks becomes more difficult. To solve this difficulty, the thesis introduces the area of Evolutionary Algorithms as a way of constructing Artificial Neural Networks. An intellectual infrastructure is developed that incorporates concepts from Biological Neural Networks into current models of Artificial Neural Networks and two models are developed to explore the concept that increased complexity can indeed add value to the current models of Artificial Neural Networks. The outcome of the thesis shows that increased complexity can have benefits in terms of learning speed of an Artificial Neural Network and in terms of robustness to damage.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Network infrastructure"

1

Yeung, Alan, and Angus Wong. Network Infrastructure Security. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-0166-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Angus, Wong, and SpringerLink (Online service), eds. Network Infrastructure Security. Springer-Verlag US, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Brian, Kahin, John F. Kennedy School of Government. Science, Technology, and Public Policy Program., and John F. Kennedy School of Government. Strategic Computing and Telecommunications in the Public Sector Program., eds. Building information infrastructure. McGraw-Hill Primis, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Will, Schmied, ed. Windows Server 2003 network infrastructure. Que, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Daneshvar, Mohammadreza, Somayeh Asadi, and Behnam Mohammadi-Ivatloo. Grid Modernization ─ Future Energy Network Infrastructure. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-64099-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lundqvist, Lars, Lars-Göran Mattsson, and Tschangho John Kim, eds. Network Infrastructure and the Urban Environment. Springer Berlin Heidelberg, 1998. http://dx.doi.org/10.1007/978-3-642-72242-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

McCaw, Rory. MCSE windows 2000 network infrastructure administration. McGraw-Hill/Osborne, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jeroen, Van Schaick, Klaasen, I. T. (Ina T.), and Technische Universiteit Delft. Faculteit der Bouwkunde, eds. Urban networks: Network urbanism. Techne Press, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hegering, Heinz-Gerd. Ethernet: Building a communications infrastructure. Addison-Wesley, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Friesz, Terry L., ed. Network Science, Nonlinear Science and Infrastructure Systems. Springer US, 2007. http://dx.doi.org/10.1007/0-387-71134-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Network infrastructure"

1

Süß, Ralf, and Yannik Süß. "Network." In IT Infrastructure. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0077-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nikolik, Dragan. "Network Infrastructure." In A Manager’s Primer on e-Networking. Springer Netherlands, 2003. http://dx.doi.org/10.1007/978-94-007-0862-4_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Garbis, Jason, and Jerry W. Chapman. "Network Infrastructure." In Zero Trust Security. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6702-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mo, John P. T. "Infrastructure Network Applications." In Engineering and Operations of System of Systems. CRC Press, 2018. http://dx.doi.org/10.1201/9781315206684-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Sheng, Qin. "International Infrastructure Network." In The Routledge Handbook of the Belt and Road, 2nd ed. Routledge, 2022. http://dx.doi.org/10.4324/9781003286202-82.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Edwards, Dr Jason. "Network Infrastructure Management." In Critical Security Controls for Effective Cyber Defense. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0506-6_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wong, Angus, and Alan Yeung. "Introduction to Network Infrastructure Security." In Network Infrastructure Security. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-0166-8_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wong, Angus, and Alan Yeung. "Network Infrastructure Security ’ Switching." In Network Infrastructure Security. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-0166-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wong, Angus, and Alan Yeung. "Network Infrastructure Security – Routing." In Network Infrastructure Security. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-0166-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wong, Angus, and Alan Yeung. "Network Infrastructure Security ’ Address Configuration and Naming." In Network Infrastructure Security. Springer US, 2009. http://dx.doi.org/10.1007/978-1-4419-0166-8_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Network infrastructure"

1

Kyryk, Marian, Serhii Zablotskyi, and Andrii Tarasenko. "Hybrid Network Infrastructure for Campus Network." In 2024 IEEE 17th International Conference on Advanced Trends in Radioelectronics, Telecommunications and Computer Engineering (TCSET). IEEE, 2024. http://dx.doi.org/10.1109/tcset64720.2024.10755530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Iqbal, Muhammad, and Akihiro Nakao. "Improving MQTT Performances Through Softwarized 5G Infrastructure Isolation." In 2024 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN). IEEE, 2024. https://doi.org/10.1109/nfv-sdn61811.2024.10807474.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cornelius, Hanno, Sergei Tikhomirov, Alvaro Revuelta, Simon Pierre Vivier, and Aaryamann Challani. "The Waku Network as Infrastructure for dApps." In 2024 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS). IEEE, 2024. http://dx.doi.org/10.1109/dapps61106.2024.00012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Daouda, Kamissoko, Zarate Pascale, and Pérès Francois. "Infrastructure Network Vulnerability." In 2011 20th IEEE International Workshop On Enabling Technologies: Infrastructure For Collaborative Enterprises (WETICE). IEEE, 2011. http://dx.doi.org/10.1109/wetice.2011.56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kumar, Rakesh, Vignesh Babu, and David Nicol. "Network Coding for Critical Infrastructure Networks." In 2018 IEEE 26th International Conference on Network Protocols (ICNP). IEEE, 2018. http://dx.doi.org/10.1109/icnp.2018.00061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Alabbasi, Yahia, Khaled Aboelenen, and Mohammed Sadeq. "New Technique for Flood Risk Assessment of Sub-Networks in Large Networks Using InfoWorks ICM: A Case Study of Qatar's Full Storm Water Network." In The 2nd International Conference on Civil Infrastructure and Construction. Qatar University Press, 2023. http://dx.doi.org/10.29117/cic.2023.0189.

Full text
Abstract:
The elements of the storm water network are made to safely drain most water during a heavy rainstorm. Flood risk modelling (mathematical modelling) with hydraulic software is a good way to check the network's level of service, especially now that technology has changed. Flood risk modelling is an essential method for checking the network sufficiency and adequacy for different kinds of rain. Modelling flood risk should be done for the whole network to ensure that flows are connected and get accurate results. In this study, one-dimensional flood risk modelling is needed for a sub-network that is part of Qatar's full storm water network. The flood risk modelling is conducted using InfoWorks ICM software. Running the whole model takes a lot of computational data processing. Splitting the entire stormwater network to the concerned sub-network without considering the hydraulic effects of upstream and downstream flows at the boundary conditions of the sub-network will lead to erroneous conclusions. In this research, a new method for hydraulically dividing the network into sub-networks is presented, taking into account the characteristics of the boundaries. This method increases the efficiency and viability of hydraulic modelling for sub-networks in big networks. For purposes of validation, the results of the reduced model in terms of flood depths and volumes are compared with those of the full model. The results of the split model are in good agreement with the entire model.
APA, Harvard, Vancouver, ISO, and other styles
7

Rojanakul, Kittichote, and Hu Liang. "Network security infrastructure management." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234673.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Zhao, Xiaoliang. "An Open Network Infrastructure." In 2009 Third International Conference on Next Generation Mobile Applications, Services and Technologies (NGMAST). IEEE, 2009. http://dx.doi.org/10.1109/ngmast.2009.36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chasaki, Danai, Qiang Wu, and Tilman Wolf. "Attacks on Network Infrastructure." In 2011 20th International Conference on Computer Communications and Networks - ICCCN 2011. IEEE, 2011. http://dx.doi.org/10.1109/icccn.2011.6005919.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Marbukh, V. "From Network Microeconomics to Network Infrastructure Emergence." In IEEE INFOCOM 2009 - IEEE Conference on Computer Communications Workshops. IEEE, 2009. http://dx.doi.org/10.1109/infcomw.2009.5072148.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Network infrastructure"

1

Sitzler, D., P. Smith, and A. Marine. Building a Network Information Services Infrastructure. RFC Editor, 1992. http://dx.doi.org/10.17487/rfc1302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mittrick, Mark R. Network Basic Language Translation System: Security Infrastructure. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada469904.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Postel, John, and Joe Bannister. Tera-node Network Technology (TASK 4) Network Infrastructure Activities (NIA) final report. Office of Scientific and Technical Information (OSTI), 2000. http://dx.doi.org/10.2172/802104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lu, Liqun, Xin Wang, Zhaodong Wang, et al. Assessing Socioeconomic Impacts of Cascading Infrastructure Disruptions in a Dynamic Human-Infrastructure Network. Defense Technical Information Center, 2016. http://dx.doi.org/10.21236/ad1012947.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jahanian, Farnam. Detecting and Surviving Large-Scale Network Infrastructure Attacks. Defense Technical Information Center, 2005. http://dx.doi.org/10.21236/ada433781.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chavez, Adrian R., Mitchell Tyler Martin, Jason Hamlet, William M. S. Stout, and Erik Lee. Network Randomization and Dynamic Defense for Critical Infrastructure Systems. Office of Scientific and Technical Information (OSTI), 2015. http://dx.doi.org/10.2172/1179040.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

McKinley, George B. Vehicle Capacity API for Transportation Infrastructure Network Builder (TINet). Defense Technical Information Center, 2004. http://dx.doi.org/10.21236/ada427994.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Morton, A. Considerations for Benchmarking Virtual Network Functions and Their Infrastructure. RFC Editor, 2017. http://dx.doi.org/10.17487/rfc8172.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Das, Abhiman, Ejaz Ghani, Arti Grover Goswami, William Kerr, and Ramana Nanda. Infrastructure and Finance: Evidence from India's GQ Highway Network. National Bureau of Economic Research, 2023. http://dx.doi.org/10.3386/w31590.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wise, Kiersten, Anna Freije, Carl Bradley, et al. Crop Protection Network: An Infrastructure for Multi-state Extension Efforts. Crop Protection Netework, 2017. http://dx.doi.org/10.31274/cpn-20190620-045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!