• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 15
  • 8
  • 7
  • 4
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 47
  • 47
  • 10
  • 8
  • 7
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

台灣上市網路設備製造商在中國大陸發展之競爭與瓶頸 / The rising competition and developmental bottleneck of Taiwan’s public listed networking equipment manufacturers in mainland China

蔡德豐, Tsai (T.T.),TeFeng Unknown Date (has links)
網路通訊設備製造業是屬於台灣大宗出口的產業之一。 近年來廠商逐漸的將工廠搬遷至中國大陸。 經過多年的成長, 競爭和瓶頸也都一一的浮現。 我的研究初始是點出這些廠商所面臨的瓶頸, 包括了台灣內部和中國大陸外部的因素。 其它如政府過渡的管制, 技術的瓶頸對廠商所造成成長上的限制等。 進而研究到中國大陸網路通訊產業新興的競爭廠商。 最後希望以我個人的見解提議兩岸應當不是競爭對立, 而是一起提出世界級的技術規格進而提高產品的利潤, 製造雙贏的局面。 讓我先從介紹網路通訊業所生產製造的產品開始。 / The networking equipment manufacturing is an important industry in Taiwan, it accounts for a great portion of the net export. Over the years, these manufacturing facilities had been gradually moved to mainland China. After years of development, there are some bottlenecks appear and competitors arise. My study will be identifying these bottlenecks, both internally in Taiwan and external factors in China. Others like over regulation or technology barrier that may hinder the growth of industry. Further on the studying of emerging mainland networking manufacturers. Despite of competition, eventually I hope to suggest the industry in joint developing the world class standard to create a win-win situation for this industry on both side of strait. I will start with an introduction of what is this industry making to sell.
12

Effect of Ultrasound on Neuronal Network Communication

Popli, Divyaratan January 2017 (has links) (PDF)
Low intensity and low frequency ultrasound has been shown to modulate ion channel currents, membrane capacitive currents, and as a result, neuronal activity. Ultrasound has been used as a non-invasive way to modulate neuronal activity in vivo using mice as well as human subjects. Ultrasound with acoustic frequency as low as 0.35 MHz can be focussed on a region as small as 2 mm with reversible effects and no increase in temperature. In this study, two ultrasound transducers with different resonant frequency have been used to excite neuronal cultures. The resulting changes in the network properties such as synchronised network burst frequency, density, clustering and path length have been analysed. The study shows that ultrasound stimulation at acoustic frequency 450 kHz (ISPPA =11.3 mW/cm2) significantly modulates the above mentioned parameters and causes deviations from small world network properties of the control network.
13

Nätverkskommunikation för jämställdhet

Good, Hillevi January 2007 (has links)
<p>Abstract</p><p>Title: Network communication for equal opportunities (Nätverkskommunikation för jämställdhet)</p><p>Number of pages: 47 (54 with enclosures)</p><p>Author: Hillevi Good</p><p>Tutor: Ylva Ekström</p><p>Course: Media and Communication Studies D</p><p>Period: Spring Semester 2007</p><p>University: Division of Media and Communication, Department of Information Science, Uppsala University</p><p>Aim: The aim of this essay is to study the possibilities to bring about change by the means of communication in two networks, focusing on the implementation of the Swedish Equal Opportunities Act.</p><p>Material and method: The study draws on data collected in an electronic survey among representatives of two networks consisting of representatives from trade unions and employer’s associations. The material is analyzed using descriptive tools, cross tables and correlation matrices in which general characteristics as well as individual understandings of the network communication are presented and discussed.</p><p>Main results: The general results indicate that the network communication serves important purposes, such as providing support and motivation for the members and changing attitudes towards equal opportunities. The analysis suggests that the network members have good communicative possibilities to serve as agents of change within their organisations. Moreover, there is an observed relation between, on the one hand, organizational context and, on the other hand, the network members’ own communicational behaviour and their experienced possibility to influence their organizations.</p><p>Keywords: network communication, diffusion of innovations, behaviour change, Equal Opportunities Act</p>
14

Nätverkskommunikation för jämställdhet

Good, Hillevi January 2007 (has links)
Abstract Title: Network communication for equal opportunities (Nätverkskommunikation för jämställdhet) Number of pages: 47 (54 with enclosures) Author: Hillevi Good Tutor: Ylva Ekström Course: Media and Communication Studies D Period: Spring Semester 2007 University: Division of Media and Communication, Department of Information Science, Uppsala University Aim: The aim of this essay is to study the possibilities to bring about change by the means of communication in two networks, focusing on the implementation of the Swedish Equal Opportunities Act. Material and method: The study draws on data collected in an electronic survey among representatives of two networks consisting of representatives from trade unions and employer’s associations. The material is analyzed using descriptive tools, cross tables and correlation matrices in which general characteristics as well as individual understandings of the network communication are presented and discussed. Main results: The general results indicate that the network communication serves important purposes, such as providing support and motivation for the members and changing attitudes towards equal opportunities. The analysis suggests that the network members have good communicative possibilities to serve as agents of change within their organisations. Moreover, there is an observed relation between, on the one hand, organizational context and, on the other hand, the network members’ own communicational behaviour and their experienced possibility to influence their organizations. Keywords: network communication, diffusion of innovations, behaviour change, Equal Opportunities Act
15

GROUP KEY SCHEMES FOR SECURITY IN MOBILE AD HOC NETWORKS

Li, Depeng 06 April 2010 (has links)
In dynamic peer group communications, security has been in high demand by many applications in recent years. One of the more popular mechanisms to satisfy these security requirements is the group key scheme in which the group key is to be shared by each group communication participant. However, how to establish and manage the group key efficiently in order to protect such communications imposes new challenges - especially when such schemes are to be deployed on resource-limited networks such as Mobile Ad hoc Networks (MANETs). The basic needs of such network settings require that the group key schemes must demonstrate not only high performance but also fault-tolerance. Furthermore, to encrypt group communication messages efficiently is essential. Therefore, it is anticipated that the contributions of this thesis will address the development of lightweight and high performance key management protocols for group communications while guaranteeing the same level of security as other approaches. These contributions are listed below: First, two efficient individual rekey schemes, in which most group members process one-way hash functions and other members perform Diffie-Hellman operations, are proposed to obtain performance efficiency. Second, a periodic batch rekey scheme is proposed to handle the out-of-sync problem resulting from individual rekeying schemes in cases where there is a high rate of group member requests for joining/leaving. Third, scalable maximum matching algorithms (M2) are designed to incorporate a tree-based group key generation scheme to forward the partial keys to other group members. Fourth, a hybrid group key management architecture is proposed as well to combine the advantages of centralized and contributory group key schemes. Fifth, a Fast Encryption Algorithm for Multimedia (FEA-M) is enhanced to overcome the vulnerabilities of its original solution and its former improved variant. Performance analyses and experimental results indicate that the proposed approaches reduce computational costs and communication overhead as compared to other popular protocols.
16

Správa nákladů na provoz automobilu pro Android / Costs of Running a Car Administration - an Android Application

Kleštinec, Vladimír January 2011 (has links)
This work deals with creation of an application for an Android operating system, which will provide effective management of car costs. The important part of this work is communication and synchronization with a remote server.Whole application aims to provide friendly user inteface, which will be very effective to use.
17

Simulátor průmyslové komunikace standardu IEC 61850 / IEC 61850 industrial communication simulator

Srp, Jakub January 2020 (has links)
This thesis is focused on IEC 61850 communication protocols SMV, GOOSE and MMS and their implementation in SCADA systems. There is a simulator, run on Raspberry Pi, that generates data according to IEC 61850 and transmits the data using protocols in question. The simulation consist of various virtual devices e.g. surge protection, undervoltage protection, circuit breaker, disconnector, HMI. The MMS protocol is used for station control. Simulation can be user-defined from textual configuration file.
18

Protokol XMPP Jabber a jeho využití pro přenos multimediálních dat / XMPP protocol Jabber features and its utilization for multimedia transmission

Havlena, Petr January 2009 (has links)
Master’s thesis is trying to create opensource IM application for communication in Jabber network. In nowadays it is getting more and more popularity as at providers, so mainly at end users. In first half of thesis are explained basics of whole issues and in second half is described resulting application, which has been created by using of object oriented programming language Java. Java is very extended between programmers for her simplicity and great support. Thanks this is available a many external libraries and extensions. Application has been written on Smack library in version 3.04 and VoIP module on JMF (Java Media Framework). Graphic interface has been created by using of standard Java visual components (javax.swing).
19

Senzorická síť po silových rozvodech / Sensor network over power line systems

Plachý, Martin January 2012 (has links)
This semestral thesis contains information about a construction of a senzor network over power line systems. Those are divided with the reference to bandwidth. After the general description of the network there is the whole realisation of a drive unit and a sensor unit described and the design of data and power circuits is solved separately. The description of both units programs written in the ANSI C language is presented in the next chapter. The description of the network control by PC and a quantitative evaluation of the network reliability are also included.
20

Aplikace pro sběr dat ze sítě bezdrátových senzorů relativní vlhkosti vzduchu / Data Collecting Application in Wireless Sensor Network for Measuring Relative Humidity of Air

Procházka, Stanislav January 2014 (has links)
The master work is focused on the design and implementation of two parts of the system for measuring temperature and relative humidity. The system for measuring temperature and relative humidity consists of a network of wireless sensors, a ISM/Wifi converter and application which will collect, analyze and archive data. The design and implementation of ISM/Wifi converter as well as the design and implementation of application are described in this work. ISM/Wifi converter will be able to communicate with the network of wireless sensors through ISM/Wifi protocol and end device (the device with Android operating system) by means of IEEE 802.11 protocol. The application will be able to evaluate, to save and to present user the received data very clearly.

Page generated in 0.1177 seconds