To see the other types of publications on this topic, follow the link: Signal processing for network security.

Dissertations / Theses on the topic 'Signal processing for network security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Signal processing for network security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Lu, Xiaotao. "Cost-effective signal processing algorithms for physical-layer security in wireless networks." Thesis, University of York, 2016. http://etheses.whiterose.ac.uk/16043/.

Full text
Abstract:
Data privacy in traditional wireless communications is accomplished by cryptography techniques at the upper layers of the protocol stack. This thesis aims at contributing to the critical security issue residing in the physical-layer of wireless networks, namely, secrecy rate in various transmission environments. Physical-layer security opens the gate to the exploitation of channel characteristics to achieve data secure transmission. Precoding techniques, as a critical aspect in pre-processing signals prior to transmission has become an effective approach and recently drawn significant attentio
APA, Harvard, Vancouver, ISO, and other styles
2

Di, Mauro Mario. "Statistical models for the characterization, identification and mitigation of distributed attacks in data networks." Doctoral thesis, Universita degli studi di Salerno, 2018. http://hdl.handle.net/10556/3088.

Full text
Abstract:
2016 - 2017<br>The thesis focuses on statistical approaches to model, mitigate, and prevent distributed network attacks. When dealing with distributed network attacks (and, more in general, with cyber-security problems), three fundamental phases/issues emerge distinctly. The first issue concerns the threat propagation across the network, which entails an "avalanche" effect, with the number of infected nodes increasing exponentially as time elapses. The second issue regards the design of proper mitigation strategies (e.g., threat detection, attacker's identification) aimed at containing t
APA, Harvard, Vancouver, ISO, and other styles
3

Mynampati, Vittal Reddy, Dilip Kandula, Raghuram Garimilla, and Kalyan Srinivas. "Performance and Security of Wireless Mesh Networks." Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2901.

Full text
Abstract:
The thesis aims to find issues that may affect the performance of meshed wireless networks. There is no denying the fact that out of the wireless technologies being used in today’s environment, the wireless meshed technology is one of the most advanced and can be viewed as the technology of the future. This thesis deals closely with aspects like throughput, security and performance as these metrics have a direct influence on the performance of the wireless mesh.The thesis is subdivided into various categories explaining the primary structure of wireless mesh networks. Performance of the networ
APA, Harvard, Vancouver, ISO, and other styles
4

Xu, Jingxin. "Unusual event detection in crowded scenes." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/76365/1/Jingxin_Xu_Thesis.pdf.

Full text
Abstract:
Novel computer vision techniques have been developed to automatically detect unusual events in crowded scenes from video feeds of surveillance cameras. The research is useful in the design of the next generation intelligent video surveillance systems. Two major contributions are the construction of a novel machine learning model for multiple instance learning through compressive sensing, and the design of novel feature descriptors in the compressed video domain.
APA, Harvard, Vancouver, ISO, and other styles
5

Moore, Patrick. "Architectural investigation into network security processing." Thesis, Queen's University Belfast, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492519.

Full text
Abstract:
In this thesis, innovative techniques for accelerating and scaling cryptographic architectures for the provision of network security are presented. The first of these is a novel ASIP based interface, which allows for generic hardware block cipher cores to be used within a 32-bit ASIP platform. An example system consisting of the Altera Nios-II and an AES block cipher is described and how the interface can be extended to support additional encryption modes of operation is discussed. A figure of merit that can be utilised to determine the efficiency of interfaces is proposed. Following on from t
APA, Harvard, Vancouver, ISO, and other styles
6

Zhao, Wentao. "Genomic applications of statistical signal processing." [College Station, Tex. : Texas A&M University, 2008. http://hdl.handle.net/1969.1/ETD-TAMU-2952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Liu, Jinshan. "Secure and reliable deep learning in signal processing." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103740.

Full text
Abstract:
In conventional signal processing approaches, researchers need to manually extract features from raw data that can better describe the underlying problem. Such a process requires strong domain knowledge about the given problems. On the contrary, deep learning-based signal processing algorithms can discover features and patterns that would not be apparent to humans by feeding a sufficient amount of training data. In the past decade, deep learning has proved to be efficient and effective at delivering high-quality results. Deep learning has demonstrated its great advantages in image processing
APA, Harvard, Vancouver, ISO, and other styles
8

Farhat, Md Tanzin. "An Artificial Neural Network based Security Approach of Signal Verification in Cognitive Radio Network." University of Toledo / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=toledo153511563131623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

CARDOSO, LUIZ ALBERTO LISBOA DA SILVA. "ANALYSIS OF PLASTIC NEURAL NETWORK MODELLING APPROACH TO SIGNAL PROCESSING." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1992. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9512@1.

Full text
Abstract:
MARINHA DO BRASIL<br>Os modelos plásticos de redes neurais são estudados e avaliados como uma interessante abordagem da neurocomputação ao processamento de sinais. Dentre estes, o modelo SONN, recentemente proposto por Tenório e Lee, é revisado e adotado como base para a implementação de um ambiente interativo de prototipagem e análise de redes, dada sua reduzida carga heurística. Como ilustração de seu emprego, um problema de detecção e classificação de sinais pulsados é solucionado, com resultados que preliminarmente indicam a adequação do modelo como ferramenta na filtragem não-li
APA, Harvard, Vancouver, ISO, and other styles
10

Harper, Scott Jeffery. "A Secure Adaptive Network Processor." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/28023.

Full text
Abstract:
Network processors are becoming a predominant feature in the field of network hardware. As new network protocols emerge and data speeds increase, contemporary general-purpose network processors are entering their second generation and academic research is being actively conducted into new techniques for the design and implementation of these systems. At the same time, systems ranging from secured military communications equipment to consumer devices are being updated to provide network connectivity. Many of these devices require, or would benefit from, the inclusion of device security in addit
APA, Harvard, Vancouver, ISO, and other styles
11

Montaño-Gutierrez, Luis Fernando. "Dynamic signal processing by the glucose sensing network of Saccharomyces cerevisiae." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/28973.

Full text
Abstract:
Organisms must constantly face and adapt to environmental change. Although unpredictable events may inevitably impose threats, temporally correlated changes may also provide opportunities from which an organism can profit. An evolutionarily successful microbe must collect enough information to distinguish threats from opportunities. Indeed, for nutrient transport, it is not clear how organisms distinguish one from the other. Fluctuations in nutrient levels can quickly render any transporter's capabilities obsolete. Identifying the environment's dynamic identity is therefore a highly valuable a
APA, Harvard, Vancouver, ISO, and other styles
12

Hirotsu, Kenichi. "Neural network hardware with random weight change learning algorithm." Diss., Georgia Institute of Technology, 1993. http://hdl.handle.net/1853/15765.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hloupis, Georgios. "Seismological data acquisition and signal processing using wavelets." Thesis, Brunel University, 2009. http://bura.brunel.ac.uk/handle/2438/3470.

Full text
Abstract:
This work deals with two main fields: a) The design, built, installation, test, evaluation, deployment and maintenance of Seismological Network of Crete (SNC) of the Laboratory of Geophysics and Seismology (LGS) at Technological Educational Institute (TEI) at Chania. b) The use of Wavelet Transform (WT) in several applications during the operation of the aforementioned network. SNC began its operation in 2003. It is designed and built in order to provide denser network coverage, real time data transmission to CRC, real time telemetry, use of wired ADSL lines and dedicated private satellite lin
APA, Harvard, Vancouver, ISO, and other styles
14

Fießler, Andreas Christoph Kurt. "Hybrid Hardware/Software Architectures for Network Packet Processing in Security Applications." Doctoral thesis, Humboldt-Universität zu Berlin, 2019. http://dx.doi.org/10.18452/20023.

Full text
Abstract:
Die Menge an in Computernetzwerken verarbeiteten Daten steigt stetig, was Netzwerkgeräte wie Switches, Bridges, Router und Firewalls vor Herausfordungen stellt. Die Performance der verbreiteten, CPU/softwarebasierten Ansätze für die Implementierung dieser Aufgaben ist durch den inhärenten Overhead in der sequentiellen Datenverarbeitung limitiert, weshalb solche Funktionalitäten vermehrt auf dedizierten Hardwarebausteinen realisiert werden. Diese bieten eine schnelle, parallele Verarbeitung mit niedriger Latenz, sind allerdings aufwendiger in der Entwicklung und weniger flexibel. Nicht jede
APA, Harvard, Vancouver, ISO, and other styles
15

Wang, Zhenzhong. "System Design and Implementation of a Fast and Accurate Bio-Inspired Spiking Neural Network." FIU Digital Commons, 2015. http://digitalcommons.fiu.edu/etd/2227.

Full text
Abstract:
Neuron models are the elementary units which determine the performance of an artificial spiking neural network (ASNN). This study introduces a new Generalized Leaky Integrate-and-Fire (GLIF) neuron model with variable leaking resistor and bias current in order to reproduce accurately the membrane voltage dynamics of a biological neuron. The accuracy of this model is ensured by adjusting its parameters to the statistical properties of the Hodgkin-Huxley model outputs; while the speed is enhanced by introducing a Generalized Exponential Moving Average method that converts the parameterized kerne
APA, Harvard, Vancouver, ISO, and other styles
16

Fukuzono, Hayato. "Spatial Signal Processing on Distributed MIMO Systems." 京都大学 (Kyoto University), 2016. http://hdl.handle.net/2433/217206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Ratiu, Alin. "Continuous time signal processing for wake-up radios." Thesis, Lyon, INSA, 2015. http://www.theses.fr/2015ISAL0078/document.

Full text
Abstract:
La consommation des systèmes de communication pour l'IoT peut être réduite grâce à un nouveau paradigme de réception radio. La technique consiste à ajouter un récepteur supplémentaire à chaque noeud IoT, appelé Wake Up Radio (WU-RX). Le rôle du WU-RX est de surveiller le canal de communication et de réveiller le récepteur principal (aussi appelé récepteur de données) lors de la réception d'une demande de communication. Une analyse des implémentations des WU-RX existants montre que les systèmes de l'état de l'art sont suffisamment sensibles par rapport aux récepteurs de données classiques mais
APA, Harvard, Vancouver, ISO, and other styles
18

Larson, P. T., and D. A. Sheaffer. "TRANSIENT REDUCTION ANALYSIS using NEURAL NETWORKS (TRANN)." International Foundation for Telemetering, 1992. http://hdl.handle.net/10150/608892.

Full text
Abstract:
International Telemetering Conference Proceedings / October 26-29, 1992 / Town and Country Hotel and Convention Center, San Diego, California<br>Our telemetry department has an application for a data categorization/compression of a high speed transient signal in a short period of time. Categorization of the signal reveals important system performance and compression is required because of the terminal nature of our telemetry testing. Until recently, the hardware for the system of this type did not exist. A new exploratory device from Intel has the capability to meet these extreme requirem
APA, Harvard, Vancouver, ISO, and other styles
19

Hussain, A. "Novel artificial neural network architectures and algorithms for non-linear dynamical system modelling and digital communications applications." Thesis, University of Strathclyde, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.263481.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Al-Breiki, Mohamed Ahmed Mohamed Naser. "Digital signal processing extra-tropical cyclones warning system using WiMAX." Thesis, University of Hertfordshire, 2013. http://hdl.handle.net/2299/10628.

Full text
Abstract:
This research project proposed a unique solution to make use of these base stations to keep all subscribers alerted with warning of possible disaster should that be required. As the current, network does not provide a provision for such a noble approach, a new network model has been developed and simulated to interface a sensor (weather station, WeS), with WiMAX weather station. The weather station is based on DSP processor to receive a digitised sensor values, process these values, analyse them and if they fall within the alert zones, packet them according to WiMAX protocol and send them to s
APA, Harvard, Vancouver, ISO, and other styles
21

Wang, Lu. "Task Load Modelling for LTE Baseband Signal Processing with Artificial Neural Network Approach." Thesis, KTH, Signalbehandling, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-160947.

Full text
Abstract:
This thesis gives a research on developing an automatic or guided-automatic tool to predict the hardware (HW) resource occupation, namely task load, with respect to the software (SW) application algorithm parameters in an LTE base station. For the signal processing in an LTE base station it is important to get knowledge of how many HW resources will be used when applying a SW algorithm on a specic platform. The information is valuable for one to know the system and platform better, which can facilitate a reasonable use of the available resources. The process of developing the tool is considere
APA, Harvard, Vancouver, ISO, and other styles
22

Peng, Liangjian. "Applications of artificial neural networks to power systems network reduction and static security assessment." Thesis, University of Strathclyde, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.366090.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Hu, Xi. "Network and sensor management for mulitiple sensor emitter location system." Diss., Online access via UMI:, 2008.

Find full text
Abstract:
Thesis (Ph. D.)--State University of New York at Binghamton, Thomas J. Watson School of Engineering and Applied Science, Department of Electrical and Computer Engineering, 2008.<br>Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
24

Balupari, Ravindra. "Real-time network-based anomaly intrusion detection." Ohio : Ohio University, 2002. http://www.ohiolink.edu/etd/view.cgi?ohiou1174579398.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Ali, Rozniza. "Ensemble classification and signal image processing for genus Gyrodactylus (Monogenea)." Thesis, University of Stirling, 2014. http://hdl.handle.net/1893/21734.

Full text
Abstract:
This thesis presents an investigation into Gyrodactylus species recognition, making use of machine learning classification and feature selection techniques, and explores image feature extraction to demonstrate proof of concept for an envisaged rapid, consistent and secure initial identification of pathogens by field workers and non-expert users. The design of the proposed cognitively inspired framework is able to provide confident discrimination recognition from its non-pathogenic congeners, which is sought in order to assist diagnostics during periods of a suspected outbreak. Accurate identif
APA, Harvard, Vancouver, ISO, and other styles
26

FERRETTI, DANIELE. "Signal Processing algorithms and Learning Systems for Infant Cry Detection." Doctoral thesis, Università Politecnica delle Marche, 2019. http://hdl.handle.net/11566/263671.

Full text
Abstract:
I segnali associati al pianto dei neonati contengono preziose informazioni relative allo stato del bambino. L’estrazione di queste informazioni richiede un algoritmo di rilevazione del pianto in grado di operare in ambienti con condizioni acustiche difficili caratterizzati dalla presenza di fonti di rumore come pianti interferenti, apparecchiature mediche e persone. Il rilevamento del pianto infantile è una funzione importante sia negli ambienti residenziali che in quelli pubblici, in grado di rispondere alle differenti esigenze dei professionisti e degli utenti privati. Nella presente dissert
APA, Harvard, Vancouver, ISO, and other styles
27

Legge, Bruce A. "Code division multiple access local area network communications employing fiber optic signal processing techniques." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA274897.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering) Naval Postgraduate School, September 1993.<br>Thesis advisor(s): Powers, John Patrick. "September 1993." Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
28

Mei, Jonathan B. "Principal Network Analysis." Research Showcase @ CMU, 2018. http://repository.cmu.edu/dissertations/1175.

Full text
Abstract:
Many applications collect a large number of time series, for example, temperature continuously monitored by weather stations across the US or neural activity recorded by an array of electrical probes. These data are often referred to as unstructured. A first task in their analytics is often to derive a low dimensional representation { a graph or discrete manifold { that describes the inter relations among the time series and their intrarelations across time. In general, the underlying graphs can be directed and weighted, possibly capturing the strengths of causal relations, not just the binary
APA, Harvard, Vancouver, ISO, and other styles
29

Brown, Trevor Junior. "Time division multiple access/code division multiple access for the optical local access network." Thesis, Manchester Metropolitan University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.243716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

El-Menhawy, A. El-H. "Computer Aided Design of VLSI algorithms for digital signal processing based on the Residue Number System." Thesis, University of Kent, 1987. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.376344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Kohout, James. "Design and performance analysis of MPI-SHARC a high-speed network service for distributed digital signal processor systems /." [Gainesville, Fla.] : University of Florida, 2001. http://etd.fcla.edu/etd/UF/anp4297/MASTER.pdf.

Full text
Abstract:
Thesis (M.S.)--University of Florida, 2001.<br>Title from first page of PDF file. Document formatted into pages; contains ix, 69 p.; also contains graphics. Vita. Includes bibliographical references (p. 66-68).
APA, Harvard, Vancouver, ISO, and other styles
32

Kalibjian, Jeff. "AN UPDATE ON NETWORK-BASED SECURITY TECHNOLOGIES APPLICABLE TO TELEMETRY POST-PROCESSING AND ANALYSIS ACTIVITIES." International Foundation for Telemetering, 2007. http://hdl.handle.net/10150/604578.

Full text
Abstract:
ITC/USA 2007 Conference Proceedings / The Forty-Third Annual International Telemetering Conference and Technical Exhibition / October 22-25, 2007 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>Networked based technologies (i.e. TCP/IP) have come to play an important role in the evolution of telemetry post processing services. A paramount issue when using networking to access/move telemetry data is security. In past years papers have focused on individual security technologies and how they could be used to secure telemetry data. This paper will review currently available network
APA, Harvard, Vancouver, ISO, and other styles
33

Perry, Stuart William. "Adaptive image restoration perception based neural network models and algorithms /." Connect to full text, 1998. http://hdl.handle.net/2123/389.

Full text
Abstract:
Thesis (Ph. D.)--University of Sydney, 1999.<br>Title from title screen (viewed Apr. 16, 2008). Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy to the School of Electrical and Information Engineering, Faculty of Engineering. Degree awarded 1999; thesis submitted 1998. Includes bibliography. Also available in print form.
APA, Harvard, Vancouver, ISO, and other styles
34

Choi, Hyunjong. "Medical Image Registration Using Artificial Neural Network." DigitalCommons@CalPoly, 2015. https://digitalcommons.calpoly.edu/theses/1523.

Full text
Abstract:
Image registration is the transformation of different sets of images into one coordinate system in order to align and overlay multiple images. Image registration is used in many fields such as medical imaging, remote sensing, and computer vision. It is very important in medical research, where multiple images are acquired from different sensors at various points in time. This allows doctors to monitor the effects of treatments on patients in a certain region of interest over time. In this thesis, artificial neural networks with curvelet keypoints are used to estimate the parameters of registra
APA, Harvard, Vancouver, ISO, and other styles
35

Kalibjian, J. R. "Telemetry Post-Processing in the Clouds: A Data Security Challenge." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595799.

Full text
Abstract:
ITC/USA 2011 Conference Proceedings / The Forty-Seventh Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2011 / Bally's Las Vegas, Las Vegas, Nevada<br>As organizations move toward cloud [1] computing environments, data security challenges will begin to take precedence over network security issues. This will potentially impact telemetry post processing in a myriad of ways. After reviewing how data security tools like Enterprise Rights Management (ERM), Enterprise Key Management (EKM), Data Loss Prevention (DLP), Database Activity Monitoring (DAM), and toke
APA, Harvard, Vancouver, ISO, and other styles
36

Kalibjian, Jeff. "Storage Systems and Security Challenges in Telemetry Post Processing Environments." International Foundation for Telemetering, 2008. http://hdl.handle.net/10150/606206.

Full text
Abstract:
ITC/USA 2008 Conference Proceedings / The Forty-Fourth Annual International Telemetering Conference and Technical Exhibition / October 27-30, 2008 / Town and Country Resort & Convention Center, San Diego, California<br>A common concern in telemetry post-processing environments is adequate disk storage capacity to house captured and post-processed telemetry data. In today's network environments there are many storage solutions that can be deployed to address storage needs. Recent trends in storage systems reveal movement to implement security services in storage systems. After reviewing storage
APA, Harvard, Vancouver, ISO, and other styles
37

Tepvorachai, Gorn. "An Evolutionary Platform for Retargetable Image and Signal Processing Applications." Case Western Reserve University School of Graduate Studies / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=case1209504058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Flowers, Bryse Austin. "Adversarial RFML: Evading Deep Learning Enabled Signal Classification." Thesis, Virginia Tech, 2019. http://hdl.handle.net/10919/91987.

Full text
Abstract:
Deep learning has become an ubiquitous part of research in all fields, including wireless communications. Researchers have shown the ability to leverage deep neural networks (DNNs) that operate on raw in-phase and quadrature samples, termed Radio Frequency Machine Learning (RFML), to synthesize new waveforms, control radio resources, as well as detect and classify signals. While there are numerous advantages to RFML, this thesis answers the question "is it secure?" DNNs have been shown, in other applications such as Computer Vision (CV), to be vulnerable to what are known as adversarial evasio
APA, Harvard, Vancouver, ISO, and other styles
39

Rochford, Matthew. "Visual Speech Recognition Using a 3D Convolutional Neural Network." DigitalCommons@CalPoly, 2019. https://digitalcommons.calpoly.edu/theses/2109.

Full text
Abstract:
Main stream automatic speech recognition (ASR) makes use of audio data to identify spoken words, however visual speech recognition (VSR) has recently been of increased interest to researchers. VSR is used when audio data is corrupted or missing entirely and also to further enhance the accuracy of audio-based ASR systems. In this research, we present both a framework for building 3D feature cubes of lip data from videos and a 3D convolutional neural network (CNN) architecture for performing classification on a dataset of 100 spoken words, recorded in an uncontrolled envi- ronment. Our 3D-CNN ar
APA, Harvard, Vancouver, ISO, and other styles
40

Han, Seon Yeong. "Shadowing effect on ad hoc network." Diss., Online access via UMI:, 2004. http://wwwlib.umi.com/dissertations/fullcit/1422359.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Ruprecht, Nathan Alexander. "Implementation of Compressive Sampling for Wireless Sensor Network Applications." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1157614/.

Full text
Abstract:
One of the challenges of utilizing higher frequencies in the RF spectrum, for any number of applications, is the hardware constraints of analog-to-digital converters (ADCs). Since mid-20th century, we have accepted the Nyquist-Shannon Sampling Theorem in that we need to sample a signal at twice the max frequency component in order to reconstruct it. Compressive Sampling (CS) offers a possible solution of sampling sub-Nyquist and reconstructing using convex programming techniques. There has been significant advancements in CS research and development (more notably since 2004), but still nothing
APA, Harvard, Vancouver, ISO, and other styles
42

Chance, Christopher P. "Designing and implementing a network authentication service for providing a secure communication channel." Thesis, Kansas State University, 1986. http://hdl.handle.net/2097/9903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Bajzík, Jakub. "Rozpoznání zvukových událostí pomocí hlubokého učení." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-401993.

Full text
Abstract:
This paper deals with processing and recognition of events in audio signal. The work explores the possibility of using audio signal visualization and subsequent use of convolutional neural networks as a classifier for recognition in real use. Recognized audio events are gunshots placed in a sound background such as street noise, human voice, animal sounds, and other forms of random noise. Before the implementation, a large database with various parameters, especially reverberation and time positioning within the processed section, is created. In this work are used freely available platforms Ke
APA, Harvard, Vancouver, ISO, and other styles
44

Costa, Pascale. "Contribution à l'utilisation des réseaux de neurones à couches en traitement du signal." Cachan, Ecole normale supérieure, 1996. http://www.theses.fr/1996DENS0030.

Full text
Abstract:
Le travail rapporte dans ce document concerne une étude sur les réseaux de neurones (rn) en vue de leur introduction dans la résolution de certains problèmes classiquement rencontres en traitement du signal. Ce travail est restreint à l'étude des rn à couches qui ont atteint une maturité scientifique qui les rend séduisants. Nous avons pris soins de séparer les idées et principes de base de leur réalisation. Ainsi, nous avons propose une méthodologie de mise en œuvre qui peut intéresser des utilisateurs potentiels des rn. Diverses techniques d'initialisation originales ont été proposées. Cette
APA, Harvard, Vancouver, ISO, and other styles
45

Karunanidhi, Karthikeyan. "ARROS; distributed adaptive real-time network intrusion response." Ohio : Ohio University, 2006. http://www.ohiolink.edu/etd/view.cgi?ohiou1141074467.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Liu, Cheng. "Advanced system design and signal processing techniques for converged high-speed optical and wireless applications." Diss., Georgia Institute of Technology, 2013. http://hdl.handle.net/1853/49058.

Full text
Abstract:
The ever-increasing data traffic demand drives the evolution of telecommunication networks, including the last-mile access networks as well as the long-haul backbone networks. This Ph.D. dissertation focuses on system design and signal processing techniques for next-generation converged optical-wireless access systems and the high-speed long-haul coherent optical communication systems. The convergence of high-speed millimeter-wave wireless communications and high-capacity fiber-optic backhaul networks provides tremendous potential to meet the capacity requirements of future access networks. In
APA, Harvard, Vancouver, ISO, and other styles
47

Björk, Tim. "Exploring Change Point Detection in Network Equipment Logs." Thesis, Karlstads universitet, Institutionen för matematik och datavetenskap (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85626.

Full text
Abstract:
Change point detection (CPD) is the method of detecting sudden changes in timeseries, and its importance is great concerning network traffic. With increased knowledge of occurring changes in data logs due to updates in networking equipment,a deeper understanding is allowed for interactions between the updates and theoperational resource usage. In a data log that reflects the amount of network traffic, there are large variations in the time series because of reasons such as connectioncount or external changes to the system. To circumvent these unwanted variationchanges and assort the deliberate
APA, Harvard, Vancouver, ISO, and other styles
48

Mackenzie, Mark. "Correlation with the hermite series using artificial neural network technology." Access electronically, 2004. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20050202.122218/index.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

D'Alton, S. "A Constructive Neural Network Incorporating Competitive Learning of Locally Tuned Hidden Neurons." Thesis, Honours thesis, University of Tasmania, 2005. https://eprints.utas.edu.au/243/1/D%27Alton05CompetitivelyTrainedRAN.pdf.

Full text
Abstract:
Performance metrics are a driving force in many fields of work today. The field of constructive neural networks is no different. In this field, the popular measurement metrics (resultant network size, test set accuracy) are difficult to maximise, given their dependence on several varied factors, of which the mostimportant is the dataset to be applied. This project set out with the intention to minimise the number of hidden units installed into a resource allocating network (RAN) (Platt 1991), whilst increasing the accuracy by means of application of competitive learning techniques. Three d
APA, Harvard, Vancouver, ISO, and other styles
50

Hümmer, Christian Verfasser], and Walter [Akademischer Betreuer] [Gutachter] [Kellermann. "A Bayesian Network Approach to Selected Problems in Speech Signal Processing / Christian Hümmer ; Gutachter: Walter Kellermann ; Betreuer: Walter Kellermann." Erlangen : Friedrich-Alexander-Universität Erlangen-Nürnberg (FAU), 2019. http://d-nb.info/1180028368/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!