• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 2
  • Tagged with
  • 11
  • 11
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Análise da viabilidade de aplicações de monitoramento e controle utilizando redes acústicas submarinas. / Analysis the feasibility of monitoring and control applications using underwater acoustic networks.

Felipe Duarte dos Santos 24 April 2012 (has links)
A acústica submarina vem sendo estudada por décadas, mas redes submarinas com transmissão acústica e protocolos específicos para a comunicação neste meio são campos de pesquisa que estão iniciando. Recentemente alguns simuladores, baseados no NS-2, foram desenvolvidos para o estudo destas redes. Este trabalho avalia através de simulações a viabilidade de aplicações genéricas de monitoramento e controle em redes acústicas submarinas. São propostas e utilizadas três topologias básicas para redes acústicas submarinas: linha, quadro e cubo e dois protocolos MAC: Broadcast e R-MAC. Em nossas análises comparamos esses dois protocolos em relação ao consumo total de energia e o atraso total na rede. Os resultados mostram que essas topologias associadas aos protocolos MAC atendem as necessidades e as peculiaridades da grande maioria das aplicações de monitoramento e controle que utilizam redes acústicas submarinas. O objetivo deste estudo não foi determinar qual a melhor topologia ou o melhor tipo de protocolo de acesso ao meio, mais sim determinar qual a configuração de rede mais indicada para determinada aplicação levando em consideração as características da cada uma delas. / Underwater acoustics has been studied for decades, but underwater networks with acoustic transmission and protocols designed for this environment are just beginning as a research field. Recently some simulators, based on NS-2 have been developed to study these networks. This study evaluates the feasibility through simulations of generic applications for monitoring and control in underwater acoustic networks. Are proposed and used three basic topologies for underwater acoustic networks: line, frame and hub and two MAC protocols: Broadcast and R-MAC. In our analysis we compare these two protocols in relation to the total energy consumption and total delay in the network. The results show that topologies associated with the MAC protocols meet the needs and peculiarities of most monitoring and control applications that use underwater acoustic networks. The objective of this study did not determine the best topology or the best type of MAC protocol, but rather determine which network configuration best suited to particular application taking into account the characteristics of each.
2

Análise da viabilidade de aplicações de monitoramento e controle utilizando redes acústicas submarinas. / Analysis the feasibility of monitoring and control applications using underwater acoustic networks.

Felipe Duarte dos Santos 24 April 2012 (has links)
A acústica submarina vem sendo estudada por décadas, mas redes submarinas com transmissão acústica e protocolos específicos para a comunicação neste meio são campos de pesquisa que estão iniciando. Recentemente alguns simuladores, baseados no NS-2, foram desenvolvidos para o estudo destas redes. Este trabalho avalia através de simulações a viabilidade de aplicações genéricas de monitoramento e controle em redes acústicas submarinas. São propostas e utilizadas três topologias básicas para redes acústicas submarinas: linha, quadro e cubo e dois protocolos MAC: Broadcast e R-MAC. Em nossas análises comparamos esses dois protocolos em relação ao consumo total de energia e o atraso total na rede. Os resultados mostram que essas topologias associadas aos protocolos MAC atendem as necessidades e as peculiaridades da grande maioria das aplicações de monitoramento e controle que utilizam redes acústicas submarinas. O objetivo deste estudo não foi determinar qual a melhor topologia ou o melhor tipo de protocolo de acesso ao meio, mais sim determinar qual a configuração de rede mais indicada para determinada aplicação levando em consideração as características da cada uma delas. / Underwater acoustics has been studied for decades, but underwater networks with acoustic transmission and protocols designed for this environment are just beginning as a research field. Recently some simulators, based on NS-2 have been developed to study these networks. This study evaluates the feasibility through simulations of generic applications for monitoring and control in underwater acoustic networks. Are proposed and used three basic topologies for underwater acoustic networks: line, frame and hub and two MAC protocols: Broadcast and R-MAC. In our analysis we compare these two protocols in relation to the total energy consumption and total delay in the network. The results show that topologies associated with the MAC protocols meet the needs and peculiarities of most monitoring and control applications that use underwater acoustic networks. The objective of this study did not determine the best topology or the best type of MAC protocol, but rather determine which network configuration best suited to particular application taking into account the characteristics of each.
3

Monitoring thermal comfort in the built environment using a wired sensor network

Pitt, Luke January 2016 (has links)
This thesis documents a sensor networking project with an interest in internal environment monitoring in relation to thermal comfort. As part of this project sensor nodes were designed, built and deployed. Data was collected from the nodes via a wired Ethernet network and was stored in a database. The network remains operational several years after its initial deployment. The collected data was analyzed in conjunction with data from a local meteorological station and the building's smart fiscal energy meters. The analysis suggests the possibility of automated thermal comfort classification using data from a sensor network.
4

Online boiler convective heat exchanger monitoring: a comparison of soft sensing and data-driven approaches

Prinsloo, Gerto 07 May 2019 (has links)
Online monitoring supports plant reliability and performance management by providing real time information about the condition of equipment. However, the intricate geometries and harsh operating environment of coal fired power plant boilers inhibit the ability to do online measurements of all process related variables. A low-cost alternative lies in the possibility of using knowledge about boiler operation to extract information about its condition from standard online process measurements. This approach is evaluated with the aim of enhancing online condition monitoring of a boiler’s convective pass heat exchanger network by respectively using a soft sensor and a data-driven method. The soft sensor approach is based on a one-dimensional thermofluid process model which takes measurements as inputs and calculates unmeasured variables as outputs. The model is calibrated based on design information. The data-driven method is one developed specifically in this study to identify unique fault signatures in measurement data to detect and quantify changes in unmeasured variables. The fault signatures are initially constructed using the calibrated one-dimensional thermofluid process model. The benefits and limitations of these methods are compared at the hand of a case study boiler. The case study boiler has five convective heat exchanger stages, each composed of four separate legs. The data-driven method estimates the average conduction thermal resistance of individual heat exchanger legs and the flue gas temperature at the inlet to the convective pass. In addition to this, the soft sensor estimates the average fluid variables for individual legs throughout the convective pass and therefore provides information better suited for condition prognosis. The methods are tested using real plant measurements recorded during a period which contained load changes and on-load heat exchanger cleaning events. The cleaning event provides some basis for validating the results because the qualitative changes of some unmeasured monitored variables expected during this event are known. The relative changes detected by both methods are closely correlated. The data-driven method is computationally less expensive and easily implementable across different software platforms once the fault signatures have been obtained. Fault signatures are easily trainable once the model has been developed. The soft sensors require the continuous use of the modelling software and will therefore be subject to licencing constraints. Both methods offer the possibility to enhance the monitoring resolution of modern boilers without the need to install any additional measurements. Implementation of these monitoring frameworks can provide a simple and low-cost contribution to optimized boiler performance and reliability management.
5

Concentrated network tomography and bound-based network tomography

Feng, Cuiying 17 September 2020 (has links)
Modern computer networks pose a great challenge for monitoring the network performance due to their large scale and high complexity. Directly measuring the performance of internal network elements is prohibitive due to the tremendous overhead. Alternatively, network tomography, a technique that infers the unobserved network characteristics (e.g., link delays) from a small number of measurements (e.g., end-to-end path delays), is a promising solution for monitoring the internal network state in an e cient and e ective manner. This thesis initiates two variants of network tomography: concentrated network tomography and bound-based network tomography. The former is motivated by the practical needs that network operators normally concentrate on the performance of critical paths; the latter is due to the need of estimating performance bounds whenever exact performance values cannot be determined. This thesis tackles core technical di culties in concentrated network tomography and bound- based network tomography, including (1) the path identi ability problem and the monitor deploy- ment strategy for identifying a set of target paths, (2) strategies for controlling the total error bound as well as the maximum error bound over all network links, and (3) methods of constructing measure- ment paths to obtain the tightest total error bound. We evaluate all the solutions with real-world Internet service provider (ISP) networks. The theoretical results and the algorithms developed in this thesis are directly applicable to network performance management in various types of networks, where directly measuring all links is practically impossible. / Graduate
6

Automatic Network Traffic Anomaly Detection and Analysis using SupervisedMachine Learning Techniques

Syal, Astha January 2019 (has links)
No description available.
7

NON-CONTACT WEARABLE BODY AREA NETWORK FOR DRIVER HEALTH AND FATIGUE MONITORING

Sun, Ye 02 September 2014 (has links)
No description available.
8

Network and Middleware Security for Enterprise Network Monitoring

Gopalakrishnan, Aravind 19 July 2012 (has links)
No description available.
9

Dynamics of cognitive control and flexibility in the anterior cingulate and prefrontal cortices

Boschin, Erica January 2013 (has links)
The body of work hereby presented aims at better defining the specific mechanisms underlying cognitive control and flexibility, and to investigate the neural substrates that might support these dynamics. More specifically, the anterior cingulate (ACC), dorsolateral prefrontal (dlPFC) and frontopolar (FPC) cortices have been proposed to play a fundamental role in monitoring and detecting the presence of environmental contingencies that require the recruitment of cognitive control (such as competition between responses in the presence of conflicting information), implementing cognitive control, and supporting higher-order cognitive processing, respectively. This thesis investigates the effects of damage to these regions, and of interference with their activity, on these processes. It also argues for the importance of dissociating possible separate cognitive control components that might differently contribute to behavioural adjustments (such as caution and attention/task-relevant processing), and provides one of the first attempts to quantify them within the parameters of a mathematical model of choice response-time, the Linear Ballistic Accumulator (LBA). The results confirm the crucial role of the dlPFC in modulating behavioural adjustments, as both damage and interference with this region’s activity significantly affect measures of conflict-induced behavioural adaptation. It is hypothesized that dlPFC might drive behavioural adjustments by encoding recent conflict history and/or supporting the automatization of a newly advantageous behavioural strategy during the early stages after a change in conflict levels. When a task does not involve competition between a habit and instructed behaviour, lesions or interference with ACC’s activity do not appear to affect behaviour in a manner that is consistent with the classic conflict-monitoring framework. It is suggested that its role might be better described as a more general monitoring and confirmatory mechanism that evaluates both actual and potential outcomes of an action, in order to proactively guide adjustments away from contextually disadvantageous responses. Finally, lesions to the FPC do not affect abstract-rule integration, but do impair the early stages of acquisition of a new abstract rule, when a previously rewarded rule stops being rewarded, and specifically when acquisition is dependent on self-initiated exploration. This suggests a role for FPC in the evaluation of multiple concurrent options in order to aid the development of new behavioural strategies.
10

A DISTRIBUTED NETWORK MANAGEMENT AGENT FOR FAULT TOLERANT INDUSTRIAL NETWORKS

Leclerc, Sebastian, Ekrad, Kasra January 2024 (has links)
Within industrial systems, dependability is critical to keep the system reliable and available. Faults leading to failures of the whole system must be mitigated by a laborious design, testing, and verification process. This thesis aims to build a Network Management Agent (NMA), capable of fault detection, localization, and recovery in an Ethernet environment. The chosen NMA environment was a distributed industrial system using a redundant controller pair, where the controllers must determine when the roles should switch in case of primary failure. In the industrial context, this role-switching must be bounded and robust enough to withstand mixed traffic classes competing for network resources. An NMA was built to monitor the network with the help of Media Redundancy Protocol (MRP), heartbeats, and industrial switch queue status queries. The NMA could distinguish between node and link failure by localizing the fault while adjusting the network's Quality of Service (QoS). The controllers could safely switch roles after an average difference of 29.7065 ms from the moment the primary failed, and the secondary took over. Link failure was detected in three possible locations within 31.297 ms and the location was found within 373.419 ms. To the authors' best knowledge, other solutions mainly target L3 networks or require specialized supporting technology, whereas MRP was found in the majority of the investigated industrial switches. The proposed solution requires any heartbeat-like function sent from the switch, which MRP offers, and can be generalized to any environment where distinguishing a link from a node failure is important. QoS anomaly detection however requires capable switches and configuration of rules to prioritize the traffic accordingly.

Page generated in 0.1177 seconds