• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 306
  • 291
  • 118
  • 94
  • 51
  • 50
  • 37
  • 22
  • 19
  • 10
  • 9
  • 7
  • 5
  • 5
  • 4
  • Tagged with
  • 1118
  • 305
  • 294
  • 219
  • 156
  • 149
  • 127
  • 125
  • 124
  • 120
  • 115
  • 112
  • 104
  • 103
  • 100
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
681

Estimating Optimal Checkpoint Intervals Using GPSS Simulation

Savatovic, Anita, Cakic, Mejra January 2007 (has links)
<p>In this project we illustrate how queueing simulation may be used to find the optimal interval for checkpointing problems and compare results with theoretical computations for simple systems that may be treated analytically.</p><p>We consider a relatively simple model for an internet banking facility. From time to time, the application server breaks down. The information at the time of the breakdown has to be passed onto the back up server before service may be resumed. To make the change over as efficient as possible, information of the state of user’s accounts is saved at regular intervals. This is known as checkpointing.</p><p>Firstly, we use GPSS (a queueing simulation tool) to find, by simulation, an optimal checkpointing interval, which maximises the efficiency of the server. Two measures of efficiency are considered; the availability of the server and the average time a customer spends in the system. Secondly, we investigate how far the queueing theory can go to providing an analytic solution to the problem and see whether or not this is in line with the results obtained through simulation.</p><p>The analysis shows that checkpointing is not necessary if breakdowns occur frequently and log reading after failure does not take much time. Otherwise, checkpointing is necessary and the analysis shows how GPSS may be used to obtain the optimal checkpointing interval. Relatively complicated systems may be simulated, where there are no analytic tools available. In simple cases, where theoretical methods may be used, the results from our simulations correspond with the theoretical calculations.</p>
682

Estimating Optimal Checkpoint Intervals Using GPSS Simulation

Savatovic, Anita, Cakic, Mejra January 2007 (has links)
In this project we illustrate how queueing simulation may be used to find the optimal interval for checkpointing problems and compare results with theoretical computations for simple systems that may be treated analytically. We consider a relatively simple model for an internet banking facility. From time to time, the application server breaks down. The information at the time of the breakdown has to be passed onto the back up server before service may be resumed. To make the change over as efficient as possible, information of the state of user’s accounts is saved at regular intervals. This is known as checkpointing. Firstly, we use GPSS (a queueing simulation tool) to find, by simulation, an optimal checkpointing interval, which maximises the efficiency of the server. Two measures of efficiency are considered; the availability of the server and the average time a customer spends in the system. Secondly, we investigate how far the queueing theory can go to providing an analytic solution to the problem and see whether or not this is in line with the results obtained through simulation. The analysis shows that checkpointing is not necessary if breakdowns occur frequently and log reading after failure does not take much time. Otherwise, checkpointing is necessary and the analysis shows how GPSS may be used to obtain the optimal checkpointing interval. Relatively complicated systems may be simulated, where there are no analytic tools available. In simple cases, where theoretical methods may be used, the results from our simulations correspond with the theoretical calculations.
683

On The Efficiency Of Authentication Protocols, Digital Signatures And Their Applications In E-health: A Top-down Approach

Bicakci, Kemal 01 September 2003 (has links) (PDF)
Choosing an authentication protocol or a digital signature algorithm becomes more challenging when performance constraints are of concern. In this thesis, we discuss the possible options in a top-down approach and propose viable alternatives for the efficiency criteria. Before all the technical discussions, we argue that identifying prerequisites, threats and risks on an organizational context has utmost importance so that effective solutions can be delivered at a reasonable cost. For instance, one approach to solve the performance problem is to relax the security requirements if it is allowable and use one-time passwords as the more efficient entity authentication protocol. SCOTP is the first protocol proposed in this study which improves the security and flexibility of one-time passwords. After requirements are set up, another high-efficiency solution is based on new designs of improved protocols. These new protocols might utilize the trade-offs between efficiency of distinct system parameters such as communication versus computational load. SAOTS is our new protocol designed to improve the performance and increase the round efficiency of server-assisted signature protocols. With an example in e-health, we also demonstrate that efficiency can be provided on the implementation level as well, the last step in the chain. EVEREST is the third proposal in this thesis which improves the real-time efficiency of digital signatures concerning the fact that the medical images are huge in size and to verify the signature a considerable amount of time is spent to compute the hash of the image file.
684

Integration of heterogeneous wireless access networks with IP multimedia subsystem

Peyman, Talebifard 05 1900 (has links)
Next generation heterogeneous wireless networks are expected to interwork with Internet Protocol (IP)-based infrastructures. Conventional network services operate like silos in that a specific set of services are offered over a specific type of access network. As access networks evolve to provide IP-based packet access, it becomes attractive to break these “service silos” by offering a converged set of IP-based services to users who may access these services using a number of alternative access networks. This trend has started with third generation cellular mobile networks, which have standardized on the use of the IP Multimedia Subsystem (IMS) to manage user access to a wide variety of multimedia services over the mobile Internet, while facilitating interworking of heterogeneous wireless and landline access networks. The future users of communication systems will subscribe to both IP-based and Circuit Switched (CS) based services and in the foreseeable future a single database that handles user profiles across all domains will be required. Home Subscriber Server (HSS) as an evolved version of Home Location Register (HLR) is one of the key components of IMS. In deploying HSS as a central repository database, in a fully overlapped heterogeneous network setting, changes of access mode are very frequent and conveying this information to HSS imposes excessive signaling load and delay. In our proposed scheme we introduce an Interface Agent (IA) for each location area that caches the location and information about the access mode through which a user can be reached. This method results in significant amount of savings in signaling cost and better delay performance. The existing call delivery approaches in cellular networks may not be well suited for future communication systems because they suffer from unnecessary usage of network resources for call attempts that may fail which adds to excessive signaling delays and queuing costs. Reducing the number of queries and retrievals from the database will have a significant impact on the network performance. We present a new scheme based on Reverse Virtual Call setup (RVC) as a solution to the call delivery problem in heterogeneous wireless networks and evaluate the performance of this framework.
685

An adaptive admission control and load balancing algorithm for a QoS-aware Web system

Gilly de la Sierra-Llamazares, Katja 16 November 2009 (has links)
The main objective of this thesis focuses on the design of an adaptive algorithm for admission control and content-aware load balancing for Web traffic. In order to set the context of this work, several reviews are included to introduce the reader in the background concepts of Web load balancing, admission control and the Internet traffic characteristics that may affect the good performance of a Web site. The admission control and load balancing algorithm described in this thesis manages the distribution of traffic to a Web cluster based on QoS requirements. The goal of the proposed scheduling algorithm is to avoid situations in which the system provides a lower performance than desired due to servers' congestion. This is achieved through the implementation of forecasting calculations. Obviously, the increase of the computational cost of the algorithm results in some overhead. This is the reason for designing an adaptive time slot scheduling that sets the execution times of the algorithm depending on the burstiness that is arriving to the system. Therefore, the predictive scheduling algorithm proposed includes an adaptive overhead control.Once defined the scheduling of the algorithm, we design the admission control module based on throughput predictions. The results obtained by several throughput predictors are compared and one of them is selected to be included in our algorithm. The utilisation level that the Web servers will have in the near future is also forecasted and reserved for each service depending on the Service Level Agreement (SLA). Our load balancing strategy is based on a classical policy. Hence, a comparison of several classical load balancing policies is also included in order to know which of them better fits our algorithm. A simulation model has been designed to obtain the results presented in this thesis.
686

A Java Toolkit for Distributed Evaluation of Hypergeometric Series

Chughtai, Fawad January 2004 (has links)
Hypergoemetric Series are very important in mathematics and come up regularly when dealing with the precise definitions of constants such as <i>e</i>, &pi; and Apery's constant &sigmaf;(3). The evaluation of such series to high precision is traditionally done with multiple divisions, multiplications and factorials, which all takes a long time to compute, especially when the computation is done on a single machine. The interest lies in performing this computation in parallel and in a distributed fashion. In this thesis, we present a simple distributed toolkit for doing such computations by splitting the problem into smaller sub-problems, solving these sub-problems in parallel on distributed machines and then combining the result at the end. Our toolkit takes care of all the networking for the user; connectivity, dropped connections, management of the Clients and the Server. All the user has to provide is the definition of the problem; how to split the problem into sub-problems, how to solve the sub-problems and finally how to combine the sub-problems and produce a result. The toolkit records timings for computation as well as for communication. What is different about our application is that all the code is written in Java (which is completely machine independent) and all the Clients are Java Applets. This means that having a web browser in enough to take part in the computation when it is distributed over the internet. We are almost guaranteed that every computer on the internet has a web browser. The Java Plug-in (if unavailable) can easily be downloaded from Sun's web site. We present a comparison between Java's native BigInteger library and an FFT based Integer Library written by R. Howell of University of Kansas. This study is important since we are doing computations with very large integers. To test our system, we evaluate <i>e</i> to different number of digits of precision and show that our system truly works and is easy for anyone to use.
687

Distribuering av Windows Vista

Nilsson, Martin, Månsson, Peter January 2008 (has links)
Rapporten avser att undersöka vilka olika lösningar det finns att tillgå då Windows Vista skall rullas ut till ett antal klientdatorer. Information om de olika produkterna presenteras samt praktiska laborationer med resultat. Slutligen görs en bedömning av vilken produkt eller lösning som lämpar sig bäst för ett litet företag med få klienter respektive ett stort företag med många klienter. Slutsatsen innehåller våra rekommendationer för hur utrullningen bör ske. Arbetet resulterade i att vi kunde utefter våra laborationer fatta beslutet att Ghost Solution Suite passar bäst för ett mindre företag medan Microsofts lösningar lämpar sig mer när företagen kommer upp i många klienter. Detta grundas främst på priset för produkterna samt hur svåra de är att använda men även hur mycket tid som sparas per installation.
688

Developing a Communication link between Agents and cross Platform IDE

AAMIR, ZEESHAN January 2010 (has links)
The main objective of this thesis work is to develop communication link between Runrev Revolution (IDE) and JADE (Multi-Agent System) through Socket programming using TCP/IP layer. These two independent platforms are connected using socket programming technique. Socket programming is considered to be newly emerging technology among these two platforms, the work done in this thesis work is considered to be a prototype.A Graphical simulation model is developed by salixphere (Company in Hedemora) to simulate logistic problems using Runrev Revolution (IDE). The simulation software/program is called “BIOSIM”. The logistic problems are complex, and conventional optimization techniques are unlikely very successful. “BIOSIM” can demonstrate the graphical representation of logistic problems depending upon the problem domains. As this simulation model is developed in revolution programming language (Transcript) which is dynamically typed and English-like language, it is quite slow compared to other high level programming languages. The object of this thesis work is to add intelligent behaviour in graphical objects and develop communication link between Runrev revolution (IDE) and JADE (Multi-Agent System) using TCP/IP layers.The test shows the intelligent behaviour in the graphical objects and successful communication between Runrev Revolution (IDE) and JADE (Multi-Agent System).
689

Embedded web server remote control and communication

Huo, Weikun, Liu, Lihua January 2012 (has links)
This is a embedded system that designed to achieve the goal of remote control andwireless communication with web page. The embedded web server using uIP whichis TCP/IP stack. Web page are designed using HTML5, JavaScript and CSS languageto format the layout. On the home page, you can see the index of different items.
690

A Java Toolkit for Distributed Evaluation of Hypergeometric Series

Chughtai, Fawad January 2004 (has links)
Hypergoemetric Series are very important in mathematics and come up regularly when dealing with the precise definitions of constants such as <i>e</i>, &pi; and Apery's constant &sigmaf;(3). The evaluation of such series to high precision is traditionally done with multiple divisions, multiplications and factorials, which all takes a long time to compute, especially when the computation is done on a single machine. The interest lies in performing this computation in parallel and in a distributed fashion. In this thesis, we present a simple distributed toolkit for doing such computations by splitting the problem into smaller sub-problems, solving these sub-problems in parallel on distributed machines and then combining the result at the end. Our toolkit takes care of all the networking for the user; connectivity, dropped connections, management of the Clients and the Server. All the user has to provide is the definition of the problem; how to split the problem into sub-problems, how to solve the sub-problems and finally how to combine the sub-problems and produce a result. The toolkit records timings for computation as well as for communication. What is different about our application is that all the code is written in Java (which is completely machine independent) and all the Clients are Java Applets. This means that having a web browser in enough to take part in the computation when it is distributed over the internet. We are almost guaranteed that every computer on the internet has a web browser. The Java Plug-in (if unavailable) can easily be downloaded from Sun's web site. We present a comparison between Java's native BigInteger library and an FFT based Integer Library written by R. Howell of University of Kansas. This study is important since we are doing computations with very large integers. To test our system, we evaluate <i>e</i> to different number of digits of precision and show that our system truly works and is easy for anyone to use.

Page generated in 0.0286 seconds