• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1101
  • 379
  • 210
  • 133
  • 95
  • 75
  • 37
  • 19
  • 18
  • 18
  • 15
  • 15
  • 15
  • 15
  • 12
  • Tagged with
  • 2449
  • 610
  • 607
  • 376
  • 324
  • 321
  • 267
  • 257
  • 252
  • 234
  • 226
  • 215
  • 209
  • 204
  • 185
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

How IP VPN Affects Strategy for Company X

TSAI, TUN-CHI 16 July 2003 (has links)
The purpose of this article is to identify how Internet Protocol Virtual Private Network (IP VPN) affects the business strategy for Taiwan Internet Service Provider, using X Company as an example. With the change in technology, the world¡¦s business environment change from day to day. The break though development such as Internet Protocol Virtual Private Network, create a whole new era of communication. With the pressure coming from both the fixed network carrier (Type 1 telecommunications enterprises) and the existing Internet service provider competitors. X Company needs to find a new market niche to maintain its competition. Strategy becomes most important when the existing business model is coming into a mature stage. A partnership with other service carriers or an innovation within the same business filed becomes the crucial decision. Through X Company¡¦s internal data, this thesis will analyzed the strength and weakness compare to its current competitors. With the data from the customer survey, X Company can also identify the need of its customers. At the end, this thesis will prove X Company¡¦s trend toward IP VPN transformations is the right strategy. As data traffic expected to outgrow voice traffic in the coming year, X Company¡¦s transformation to IP-based Virtual Private Networks is the right strategy. IP VPN setup will be the trend of increasing dependence on the corporate network as a way of interconnecting users with enterprise software, business process, databases, and intellectual capital. Companies are transferring more enterprise applications between sites, as well as data replication and transfer. But enterprises are aiming at the same time to combine the effectiveness of information sharing with the network with the need to make sure security, manageability, functionality and privacy while being paying attention on cost control. X Company IP VPNs offer a more reasonable mean of doing so without the necessity for expensive leased line dedicated connections.
142

A Low Overhead Transport Protocol for Linux Networking

Chiu, Shih-Yang 29 July 2008 (has links)
In this thesis, a low overhead transport protocol for Linux networking is proposed. This proposed protocol is motivated by the observation that the transport protocol for Linux requires more than a single memory copy for both the receiving and transmission of a packet, which is essentially redundant. In this thesis, we show that all but one of the memory copies can be eliminated, thus reducing the number of memory copies to one and only one, which is in general referred to as zero copy.
143

Carbon Trading and the Opportunities for Financial Services Sector

Hsu, Che-wei 14 July 2009 (has links)
none
144

An Adjustable Load Balancing Cluster-based Routing for Wireless Sensor Networks

Lin, Yan-lin 24 July 2009 (has links)
Wireless sensor networks consist of hundreds to thousands of low-power multifunctioning sensor nodes, operating in an unattended environment, with limited computational and sensing capabilities. Since the sensor nodes are equipped with small, often irreplaceable, batteries with limited power capacity, it is essential that the network be energy efficient in order to maximize the life span of the network. Hierarchical routing is an efficient way to lower energy consumption within a cluster, performing data aggregation and fusion.Within a clustering organization, intra-cluster communication can be single hop or multihop, as well as inter-cluster communication. Multihop communication between a data source and a data sink is usually more energy efficient than direct transmission because of the characteristics of wireless channel. However, the hot-spots problem arises when using the multihop forwarding model in inter-cluster communication. Because the cluster heads closer to the data sink are burdened with heavy relay traffic, they will die much faster than the other cluster heads. This paper presents an cluster-based routing protocol named An Adjustable Load Balancing Cluster-based Routing for Wireless Sensor Networks(ALBAC).The aim of the work is to let the cluster size be small nearby base station because cluster heads closer to the base station need relay more data.We wnat to let every cluster heads consume same energy. Simulation results show that our unequal clustering mechanism clearly improves the network lifetime over LEACH and BCDCP.
145

AODV-Based Backup Routing Scheme in Mobile Ad Hoc Networks

Huang, Sheng-yu 01 February 2010 (has links)
As effective routing is critical in mobile ad hoc networks (MANETs), the Ad Hoc On-demand Distance Vector (AODV) has been extensively studied in recent years. AODV is a single path routing protocol that requires a new route discovery procedure whenever a link breaks, such frequent route discoveries incur a high routing overhead and increase end-to-end delay. Therefore, by modifying the AODV protocol, this work presents a novel backup routing scheme capable of repairing disrupted links locally without activating a route re-discovery procedure. Additionally, backup paths are established based on 2-hop neighbor knowledge. These backup paths are geographically close to the primary path in order to provide efficient recovery from route failure and maintain an adequate routing length. Simulation results indicate that the proposed backup routing scheme obtains a lower average end-to-end delay and less routing overhead than those of the Ad hoc On-demand Multipath Distance Vector (AOMDV) and the conventional AODV.
146

TCP-Carson a loss-event based adaptive AIMD algorithm for long-lived flows.

Kannan, Hariharan. January 2002 (has links)
Thesis (M.S.)--Worcester Polytechnic Institute. / Keywords: Loss; TFRC; AIMD; TCP. Includes bibliographical references (p. 147-155).
147

WLAN over GSM for IP access in African rural areas

Chatelain, D 01 March 2007 (has links)
In general, rural areas in Africa are seen as unprofitable by operators and hence these areas do not benefit from typical wired Internet access. Due to the cost involved, only a small number of people in Africa benefit from the Internet. On the other hand, the Global System for Mobile communications (GSM) has thoroughly penetrated Africa and in many cases unutilized capacity exists in rural areas. Since the cost of GSM services is still extremely high when compared to the average income of African communities, many organizations are now considering alternative business models for the provision of Internet access to disadvantaged populations. To try to bridge the digital divide, the aim of this contribution is to show that basic but affordable Internet Protocol (IP) connectivity can be provided to rural communities by using spare capacity on GSM networks to carry Wireless Local Area Network (WLAN) traffic. Since the main problem with WLAN in Africa is not the last mile, but rather finding a way to connect the wireless access point to an existing backbone network, a solution to integrate WLAN with GSM is proposed.
148

Implementing Effective Biocuration Process, Training, and Quality Management Protocols on Undergraduate Biocuration of Amyotrophic Lateral Sclerosis

True, Rachel Wilcox 18 August 2015 (has links)
Biocuration is manual scientific collection, annotation and validation of literary information of biological and model organisms into a single database. Successful biocuration processes involve those with an extensive collection of literature, a user-friendly database interfaces for entering and analyzing data from published papers, and highly regulated training and quality assurance protocols. Due to the rapid expansion of biomedical literature, an efficient and accurate biocuration process has become more valuable due to the magnitude of data available in published literature. As the biocuration process incorporates undergraduates, it is critical that the medium for data collection is simple, ergonomic, and infallible. A reconstructed FileMaker Pro database was introduced to previously trained undergraduate students for process evaluation. Streamlining the biocuration process and grouping data structure to be more intuitive were two goals the new database interface hoped to achieve. The creation of a rigorous training program and strict quality management protocol is needed to prepare the lab for the introduction of efficient biocuration processes. Through the database designing process, training protocols were drafted to effectively call the biocurator’s attention to important changes in the interface design. Upon prototyping the database, entry errors were reviewed, training protocols were adjusted, and the quality protocols were drafted. When the combination of undergraduate biocurators and the reconstructed database under these new protocols was compared to statistics in the biocuration field, results proved to show increase in both productivity rates as well as accuracy rates. By having such efficiency at the undergraduate level, subject matter experts will no longer be required to perform this type of research and can focus on analysis. This will increase research productivity and reduce costs in the overall biocuration process. With over 12,000 published papers regarding Amyotrophic Lateral Sclerosis on Pubmed in 2014 alone, this revolutionary combination could lead to quickly finding a suitable cure for these patients.
149

The impact of the African Charter on Human and Peoples' Rights and the protocol on the Rights of Women on the South African judiciary

Ayalew, Getachew Assefa January 2011 (has links)
No description available.
150

Wireless Communication in Smart Housing

Liu, Luyan January 2014 (has links)
With the development of computer and information technology, information and network will be the inevitable trend of smart home which aims to offer a comfortable, efficient, and convenient home. In this thesis, the background, developments and limitations of smart home systems will be described. Wired and wireless technologies applied on the smart home network will be analyzed and a comparison of them will be made. Finally, the ZigBee technology is selected to design the wireless communication network. For the system design, the thesis describes an idea where cluster topology is chosen to design the smart home system and demonstrates the process of networking as well. Based on the Labview platform, a smart home system will be simulated to achieve the functions included in data acquisition, analysis, display and storage. More specially, I will focus on temperature monitoring and control of heating and cooling systems. Finally, an analysis of the advantages and disadvantages of the smart home system is given.

Page generated in 0.0319 seconds