To see the other types of publications on this topic, follow the link: Network model.

Dissertations / Theses on the topic 'Network model'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Network model.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Xiaodan, Xie. "Network Interdiction Model on Interdependent Incomplete Network." Ohio University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1593537784177702.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mao, Ai-sheng. "A Theoretical Network Model and the Incremental Hypercube-Based Networks." Thesis, University of North Texas, 1995. https://digital.library.unt.edu/ark:/67531/metadc277860/.

Full text
Abstract:
The study of multicomputer interconnection networks is an important area of research in parallel processing. We introduce vertex-symmetric Hamming-group graphs as a model to design a wide variety of network topologies including the hypercube network.
APA, Harvard, Vancouver, ISO, and other styles
3

Kuehn, Daniel, and Sofia Ljunggren. "Refining a Network Model Concerning Network Security Risk Analysis." Thesis, KTH, Data- och elektroteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-154355.

Full text
Abstract:
P²CySeMoL is a framework in which security risks are calculated and presented with a value referring to the probability that an attack will succeed in a system, mainly SCADA systems. This thesis covers the creation of a more granular network module for the P²CySeMoL security riskanalysis framework to better be able to represent a network in concrete modules and to enable security riskanalysis on a network infrastructure at a greater detail. This paper outlines the creation of a network module with the base in the OSI model. It is replicated in a way that the network module is an extension to t
APA, Harvard, Vancouver, ISO, and other styles
4

Gammelgård, Magnus. "The network performance assessment model." Licentiate thesis, KTH, Electrical Systems, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-1746.

Full text
Abstract:
<p>The electricity distribution in Sweden is experiencing aconsiderable change in conditions by the radical change inregulation policy. The Swedish Energy Agency(Energimyndigheten) is introducing a new regulatory model, theNetwork Performance Assessment Model, as the main tool forsupervising the natural monopolies of local electricitydistribution. The new model has interesting and far-reachingconsequences for the involved parties.</p><p>This thesis investigates the implications of the newregulation and the regulatory tool, in particularly related toIT-investments evaluations in the distributio
APA, Harvard, Vancouver, ISO, and other styles
5

Arulselvan, Ashwin. "Network model for disaster management." [Gainesville, Fla.] : University of Florida, 2009. http://purl.fcla.edu/fcla/etd/UFE0024855.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lundy, G. M. "Systems of communicating machines : a model for communication protocols." Diss., Georgia Institute of Technology, 1988. http://hdl.handle.net/1853/8210.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Yao, Ye. "Ad Hoc Networks Measurement Model and Methods Based on Network Tomography." Phd thesis, Université de Technologie de Belfort-Montbeliard, 2011. http://tel.archives-ouvertes.fr/tel-00636282.

Full text
Abstract:
The measurability of Mobile ad hoc network (MANET) is the precondition of itsmanagement, performance optimization and network resources re-allocations. However, MANET is an infrastructure-free, multi-hop, andself-organized temporary network, comprised of a group of mobile nodes with wirelesscommunication devices. Not only does its topology structure vary with time going by, butalso the communication protocol used in its network layer or data link layer is diverse andnon-standard.In order to solve the problem of interior links performance (such as packet loss rate anddelay) measurement in MANET
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Musawi, Ahmad Jr. "COMPLEX NETWORK GROWING MODEL USING DOWNLINK MOTIFS." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/3088.

Full text
Abstract:
Understanding the underlying architecture of gene regulatory networks (GRNs) has been one of the major goals in systems biology and bioinformatics as it can provide insights in disease dynamics and drug development. Such GRNs are characterized by their scale-free degree distributions and existence of network motifs, which are small subgraphs of specific types and appear more abundantly in GRNs than in other randomized networks. In fact, such motifs are considered to be the building blocks of GRNs (and other complex networks) and they help achieve the underlying robustness demonstrated by most
APA, Harvard, Vancouver, ISO, and other styles
9

Draai, Kevin. "A model for assessing and reporting network performance measurement in SANReN." Thesis, Nelson Mandela Metropolitan University, 2017. http://hdl.handle.net/10948/16131.

Full text
Abstract:
The performance measurement of a service provider network is an important activity. It is required for the smooth operation of the network as well as for reporting and planning. SANReN is a service provider tasked with serving the research and education network of South Africa. It currently has no structure or process for determining network performance metrics to measure the performance of its network. The objective of this study is to determine, through a process or structure, which metrics are best suited to the SANReN environment. This study is conducted in 3 phases in order to discover an
APA, Harvard, Vancouver, ISO, and other styles
10

Jones, Thomas Carroll Jr. "JigCell Model Connector: Building Large Molecular Network Models from Components." Thesis, Virginia Tech, 2017. http://hdl.handle.net/10919/78277.

Full text
Abstract:
The ever-growing size and complexity of molecular network models makes them difficult to construct and understand. Modifying a model that consists of tens of reactions is no easy task. Attempting the same on a model containing hundreds of reactions can seem nearly impossible. We present the JigCell Model Connector, a software tool that supports large-scale molecular network modeling. Our approach to developing large models is to combine together smaller models, making the result easier to comprehend. At the base, the smaller models (called modules) are defined by small collections of reactions
APA, Harvard, Vancouver, ISO, and other styles
11

Ikhalia, Ehinome. "A malware threat avoidance model for online social network users." Thesis, Brunel University, 2017. http://bura.brunel.ac.uk/handle/2438/16039.

Full text
Abstract:
The main purpose of this thesis is to develop a malware threat avoidance model for users of online social networks (OSNs). To understand the research domain, a comprehensive and systematic literature review was conducted and then the research scope was established. Two design science iterations were carried out to achieve the research aim reported in this thesis. In the first iteration, the research extended the Technology Threat Avoidance Theory (TTAT) to include a unique characteristic of OSN - Mass Interpersonal Persuasion (MIP). The extended model (TTAT-MIP), focused on investigating the f
APA, Harvard, Vancouver, ISO, and other styles
12

Long, Weili. "On the topology design of hose-model VPN networks /." View abstract or full-text, 2008. http://library.ust.hk/cgi/db/thesis.pl?ECED%202008%20LONG.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Pitts, Robert A. "A simulation model of an Ethernet with network partitioning." Thesis, The University of Arizona, 1988. http://hdl.handle.net/10150/276740.

Full text
Abstract:
One of the local area network medium access control standards created by the Institute of Electrical and Electronic Engineers in IEEE Project 802 is the carrier sense multiple access with collision detection (CSMA/CD) medium access control. Numerous studies have been reported in the literature on the performance of CSMA/CD. These studies show that CSMA/CD performs well under light network load but not well at heavy load. To improve the performance of CSMA/CD under heavy load, a new concept called network partitioning is presented. Network partitioning allows the network to be partitioned into
APA, Harvard, Vancouver, ISO, and other styles
14

Wongthatsanekorn, Wuthichai. "Strategic Network Growth with Recruitment Model." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14636.

Full text
Abstract:
In order to achieve stable and sustainable systems for recycling post-consumer goods, it is frequently necessary to concentrate the flows from many collection points to meet the volume requirements for the recycler. This motivates the importance of growing the collection network over time to both meet volume targets and keep costs to a minimum. This research addresses a complex and interconnected set of strategic and tactical decisions that guide the growth of reverse supply chain networks over time. This dissertation has two major components: a tactical recruitment model and a strategic i
APA, Harvard, Vancouver, ISO, and other styles
15

Tong, C. O. (Chung On) 1945. "A schedule-based transit network model." Monash University, Dept. of Civil Engineering, 1986. http://arrow.monash.edu.au/hdl/1959.1/7935.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Yotter, Rachel A. "A network model of the hippocampus /." Thesis, Connect to this title online; UW restricted, 2007. http://hdl.handle.net/1773/5887.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Velu, Chander K. "Business model innovations in network markets." Thesis, University of Cambridge, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.439063.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Chiang, Nhan Tu. "Mesh network model for urban area." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/44698.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2008.<br>Includes bibliographical references (p. 52, 2-7 (2nd group)).<br>Decreasing population, high crime rate, and limited economic opportunities are all symptoms of urban decline. These characteristics are, unfortunately, evident in major cities and small towns. Local municipalities in these cities and towns with the aid of state and federal government have attempted to reverse urban decline through the traditional approach of urban renewal. Their idea was to create low cost housing to attract peopl
APA, Harvard, Vancouver, ISO, and other styles
19

Loh, Kai-Chee. "A network model for perfusion chromatography." Thesis, Massachusetts Institute of Technology, 1995. http://hdl.handle.net/1721.1/11375.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chang, Su Eun. "A bid-rent network equilibrium model." Thesis, University College London (University of London), 2004. http://discovery.ucl.ac.uk/1446893/.

Full text
Abstract:
This thesis discusses the development of a new model for investigating the relationship between transport and the location of activities. The research consists of three stages. In the first phase, the structural features of the relationship, which are the characteristics of locations, the decision-making processes of households, and the interaction between transport and land-use, are identified. Existing approaches are reviewed using these three components. The review shows that no existing framework satisfactorily represents the requirements in modelling the relationship. Secondly, a bid-rent
APA, Harvard, Vancouver, ISO, and other styles
21

Rice, O. "A network model of financial markets." Thesis, University College London (University of London), 2015. http://discovery.ucl.ac.uk/1464036/.

Full text
Abstract:
This thesis introduces a network representation of equity markets. The model is based on the premise that assets share dependencies on abstract ‘factors’ resulting in exploitable patterns among asset price levels. The network model is a collection of long-run market trends estimated by a 3 layer machine learning framework. The network model’s comprehensive validity is established with 2 simulations in the fields of algorithmic trading, and systemic risk. The algorithmic trading validation applies expectations derived from the network model to estimating expected future returns. It further util
APA, Harvard, Vancouver, ISO, and other styles
22

Ozkok, Ozlem. "A realistic model of network survivability." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03sep%5FOzkok.pdf.

Full text
Abstract:
Thesis (M.S. in Information Technology Management and M.S. in Computer Science)--Naval Postgraduate School, September 2003.<br>Thesis advisor(s): Geoffrey Xie, Alex Bordetsky. Includes bibliographical references (p. 47-48). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
23

Van, der Merwe Zuann Stephanus. "A network traffic model for wireless mesh networks / Z.S. van der Merwe." Thesis, North-West University, 2013. http://hdl.handle.net/10394/9229.

Full text
Abstract:
Design and management decisions require an accurate prediction of the performance of the network. Network performance estimation techniques require accurate network traffic models. In this thesis we are concerned with the modelling of network traffic for the wireless mesh network (WMN) environment. Queueing theory has been used in the past to model the WMN environment and we found in this study that queueing theory was used in two main methods to model WMNs. The first method is to consider each node in the network in terms of the number of hops it is away from the gateway. Each node is then co
APA, Harvard, Vancouver, ISO, and other styles
24

Wing, Peter D. "Enhancements to the XNS authentication-by-proxy model /." Online version of thesis, 1990. http://hdl.handle.net/1850/10613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Argyropoulos, Dimitris S. "Synthesis and degradation of model network polymers." Thesis, McGill University, 1985. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=72032.

Full text
Abstract:
Theoretical expressions essentially based on the Flory-Stockmayer statistics of gelation were experimentally examined for their applicability beyond the gel point. By studying the crosslinking process of a polyester network formed from 1,3,5-benzenetriacetic acid and 1,10-decamethylene glycol beyond the gel point, the validity of the expressions was quantitatively confirmed, and their limitations were delineated.<br>On stepwise degradation of a similar network, increasingly large soluble fractions were obtained at each step, and their weight-average molecular weights increased as the degelatio
APA, Harvard, Vancouver, ISO, and other styles
26

Brooks, Clarence A. "Network model of a concentrator solar cell." Virtual Press, 1989. http://liblink.bsu.edu/uhtbin/catkey/562781.

Full text
Abstract:
Solar concentrating systems are often used to decrease the cost of solar energy by redirecting the incident sunlight from a relatively large area onto a photovoltaic cell of smaller area. In addition to the convergence characteristics of the concentrator, indices of refraction and reflectivities which are functions of wavelength can result in an illumination which varies both spatially and spectrally on the solar cell. Nonuniformity can also be induced by concentrator tracking error. The effects of such nonuniform illumination on solar cell performance are of interest.In this investigation, a
APA, Harvard, Vancouver, ISO, and other styles
27

FARINAS, MAYTE SUAREZ. "THE LINEAR LOCAL-GLOBAL NEURAL NETWORK MODEL." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2003. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=3694@1.

Full text
Abstract:
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO<br>Nesta tese apresenta-se o Modelo de Redes Neurais Globais- Locais (RNGL) dentro do contexto de modelos de séries temporais. Esta formulação abrange alguns modelos não- lineares já existentes e admite também o enfoque de Mistura de Especialistas. Dedica-se especial atenção ao caso de especialistas lineares, e são discutidos extensivamente aspectos teóricos do modelo: condições de estacionariedade, identificabilidade do modelo, existência, consistência e normalidade assintótica dos estimadores dos parâmetros. Considera-se tamb
APA, Harvard, Vancouver, ISO, and other styles
28

Gonzalez, Pinto Jose Maria 1975. "A knowledge-network model of scientific communities." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8517.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2002.<br>Includes bibliographical references (p. 68-69).<br>The amount of information organizations possess now days is overwhelming and the need of being capable of extracting valuable knowledge from such large amount of information is imperative. This thesis presents a software tool capable of extracting valuable knowledge (e.g. expertise) of a scientific community, generating relationships among community members automatically and revealing these relationships throu
APA, Harvard, Vancouver, ISO, and other styles
29

Krohn, J. P. "A gene regulatory network model for control." Thesis, University College London (University of London), 2013. http://discovery.ucl.ac.uk/1416287/.

Full text
Abstract:
The activity of a biological cell is regulated by interactions between genes and proteins. In artificial intelligence, this has led to the creation of developmental gene regulatory network (GRN) models which aim to exploit these mechanisms to algorithmically build complex designs. The emerging field of GRNs for control aims to instead exploit these natural mechanisms and this ability to encode a large variety of behaviours within a single evolvable genetic program for the solution of control problems. This work aims to extend the application domain of GRN models to previously unsolved control
APA, Harvard, Vancouver, ISO, and other styles
30

Winqvist, Rebecka. "Neural Network Approaches for Model Predictive Control." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-284323.

Full text
Abstract:
Model Predictive Control (MPC) is an optimization-based paradigm forfeedback control. The MPC relies on a dynamical model to make predictionsfor the future values of the controlled variables of the system. It then solvesa constrained optimization problem to calculate the optimal control actionthat minimizes the difference between the predicted values and the desiredor set values. One of the main limitations of the traditional MPC lies in thehigh computational cost resulting from solving the associated optimizationproblem online. Various offline strategies have been proposed to overcomethis, ra
APA, Harvard, Vancouver, ISO, and other styles
31

Yellapragada, Ramani. "Probabilistic Model for Detecting Network Traffic Anomalies." Ohio University / OhioLINK, 2004. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1088538020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Surasani, Vikranth Kumar. "A non-isothermal pore network drying model." Magdeburg Docupoint-Verl, 2008. http://d-nb.info/992455790/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Walker, David Lennox. "Towards a Model of Large Network Cooperation." Thesis, The University of Sydney, 2021. https://hdl.handle.net/2123/25784.

Full text
Abstract:
An insurgency is a clandestine movement seeking to overthrow a government using a combination of violence, intimidation, and peaceful means. Defeating an insurgency requires re-shaping the civilian social networks within which the insurgency is operating. Over the last 70 years, attempts by militaries and other government agencies to do this have often been counterproductive, destroying trust and generated conflict. Infrastructure projects have been used to provide a context for network development and shaping activities, but they carry a high risk of corruption and fraud. This research deve
APA, Harvard, Vancouver, ISO, and other styles
34

Brown, Douglas Graeme. "Formal network behaviour analysis using model checking." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/93693/1/Douglas_Brown_Thesis.pdf.

Full text
Abstract:
In this research we modelled computer network devices to ensure their communication behaviours meet various network standards. By modelling devices as finite-state machines and examining their properties in a range of configurations, we discovered a flaw in a common network protocol and produced a technique to improve organisations' network security against data theft.
APA, Harvard, Vancouver, ISO, and other styles
35

Weng, Huibin. "A Social Interaction Model with Endogenous Network Formation." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin159317152899108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Chen, Yao-Hsuan. "Network modeling of sexually transmitted diseases." Diss., Georgia Institute of Technology, 2014. http://hdl.handle.net/1853/51883.

Full text
Abstract:
We create a dynamic network model to replicate more closely the population network structures of interest. Network, Norms and HIV/STI Risk Among Youth (NNAHRAY) is a community relationship survey data set, which provides a rare sample of a human risky-behavior contact network. Combining disease compartmental models with our dynamic network model, we simulate the spread of Human Immunodeficiency Virus (HIV) and Herpes Simplex Type 2 Virus (HSV2) with consideration of HSV2's synergistic impact on HIV's transmission. Our model reproduces HIV prevalence, HSV-2 prevalence, and the contact network c
APA, Harvard, Vancouver, ISO, and other styles
37

Viduto, Valentina. "A risk assessment and optimisation model for minimising network security risk and cost." Thesis, University of Bedfordshire, 2012. http://hdl.handle.net/10547/270440.

Full text
Abstract:
Network security risk analysis has received great attention within the scientific community, due to the current proliferation of network attacks and threats. Although, considerable effort has been placed on improving security best practices, insufficient effort has been expanded on seeking to understand the relationship between risk-related variables and objectives related to cost-effective network security decisions. This thesis seeks to improve the body of knowledge focusing on the trade-offs between financial costs and risk while analysing the impact an identified vulnerability may have on
APA, Harvard, Vancouver, ISO, and other styles
38

Stanczyk, Jacek P. "Distributed programming model for networks." Thesis, University of Salford, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.308381.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Junuthula, Ruthwik Reddy. "Modeling, Evaluation and Analysis of Dynamic Networks for Social Network Analysis." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1544819215833249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Martorello, Cristiane Dias de Souza. "Epidemiology in complex networks - modified heterogeneous mean-field model." Universidade de São Paulo, 2018. http://www.teses.usp.br/teses/disponiveis/100/100132/tde-16012019-173906/.

Full text
Abstract:
The study of complex networks presented a huge development in last decades. In this dissertation we want to analyze the epidemic spread in scale-free networks through the Susceptible - Infected - Susceptible (SIS) model. We review the fundamental concepts to describe complex networks and the classical epidemiological models. We implement an algorithm that produces a scale-free network and explore the Quenched Mean-Field (QMF) dynamics in a scale-free network. Moreover, we simulate a change on the topology of the network according to the states of the nodes, and it generates a positive epidemic
APA, Harvard, Vancouver, ISO, and other styles
41

Mahajan, Harshad S. "Filtering engine model for VIMNet." Toledo, Ohio : University of Toledo, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1271388865.

Full text
Abstract:
Thesis (M.S.)--University of Toledo, 2010.<br>Typescript. "Submitted to the Graduate Faculty as partial fulfillment of the requirements for the Master of Science Degree in Engineering." "A thesis entitled"--at head of title. Title from title page of PDF document. Bibliography: p. 77-78.
APA, Harvard, Vancouver, ISO, and other styles
42

Khanal, Sandarva. "Aeronautical Channel Modeling for Packet Network Simulators." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595747.

Full text
Abstract:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada<br>The introduction of network elements into telemetry systems brings a level of complexity that makes performance analysis difficult, if not impossible. Packet simulation is a well understood tool that enables performance prediction for network designs or for operational forecasting. Packet simulators must however be customized to incorporate aeronautical radio channels and other effects unique to the telemet
APA, Harvard, Vancouver, ISO, and other styles
43

Waterbury, L. A. "A mathematical model of biological signaling networks and network characteristics correlated with signaling behavior." Connect to online resource, 2007. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1446094.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ma, Yong. "A network model for heterogeneous sensor networks /." 2004. http://wwwlib.umi.com/dissertations/fullcit/3131409.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Liu, JangJeng, and 劉正章. "Model for Evaluating Netwotks under Interface Effect-base onNETCOR Network Model." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/29383103117498696144.

Full text
Abstract:
碩士<br>國立交通大學<br>土木工程系<br>89<br>Interface is a common uncertainty factor in construction region. An idea of that interface management is related completing construction is generally accepted and respected by constructors. But existing technology of schedule and tools, for example, bar char, CPM, PERT, Monte-Carlo simulation, all base on take account of time of single activity. And by the way constructor calculate the finish time of project. So thinking of uncertain factor is also set measure to single activity. However the same uncertainty in different activities may have correlation that is al
APA, Harvard, Vancouver, ISO, and other styles
46

Tsai, Po-Feng, and 蔡柏灃. "Model predictive control with artificial neural network models." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/83061253206770147339.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Sappidi, Rajasekhar Reddy. "In-network computation in sensor networks." Thesis, 2012. http://hdl.handle.net/10012/7142.

Full text
Abstract:
Sensor networks are an important emerging class of networks that have many applications. A sink in these networks acts as a bridge between the sensor nodes and the end-user (which may be automated and/or part of the sink). Typically, convergecast is performed in which all the data collected by the sensors is relayed to the sink, which in turn presents the relevant information to the end-user. Interestingly, some applications require the sink to relay just a function of the data collected by the sensors. For instance, in a fire alarm system, the sinks needs to monitor the maximum of the temper
APA, Harvard, Vancouver, ISO, and other styles
48

Nanda, Ashish. "Adaptive secure network model for dynamic wireless mesh network." Thesis, 2018. http://hdl.handle.net/10453/129428.

Full text
Abstract:
University of Technology Sydney. Faculty of Engineering and Information Technology.<br>We as an advanced civilization rely on communication networks for a lot of important tasks. They are used to share information between vital systems, provide us with our pin-point location, access various digital resources and to stay connected with each other. Due to its necessity and enormity, maintaining and securing such a communication medium is an important task. As most communication networks rely on centralized systems, they are bound by the control of a central entity and are unable to keep up with
APA, Harvard, Vancouver, ISO, and other styles
49

Paladugu, Bharath. "North Carolina truck network model." 2007. http://www.lib.ncsu.edu/theses/available/etd-07092007-094756/unrestricted/etd.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Chen, Chou-chuan, and 陳周全. "Attack Model of Network Security." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/q83j2s.

Full text
Abstract:
碩士<br>大同大學<br>資訊工程學系(所)<br>95<br>Many existing academic researches and empirical studies show that, network attacking is composite by multiple steps of attacks. The attacker should consider and combine multiple various attacking skills and do stepwise attacking to approach the objective. On the other hand, the defender must take care of many possible attacked paths simultancely to defense the system. However, this multiple aspects situation is difficult to approach since the real case of network environment is complex and changeable and the integrated complexity of multiple aspects situation i
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!