• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1616
  • 177
  • 148
  • 128
  • 34
  • 20
  • 20
  • 20
  • 20
  • 20
  • 19
  • 14
  • 11
  • 8
  • 4
  • Tagged with
  • 2417
  • 2417
  • 666
  • 565
  • 442
  • 393
  • 357
  • 293
  • 278
  • 277
  • 268
  • 264
  • 255
  • 251
  • 248
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Distributed image processing in an intranet environment

Van den Berg, Pierre 28 August 2012 (has links)
M.Sc. / Image Processing/Computer Vision and Computer Networks (in particular Intranets) may seem to have very little in common if one only looks at these fields of study superficially. In this dissertation we will look at some fundamentals and characteristics of Image Processing and examine them to see where the problem areas lie, focusing on the problem of computational requirements. We will also examine the fundamental characteristics of Computer Networks and Distributed Processing, looking for areas where we can potentially find a synergy with computational problems inherent in Computer Vision/Image Processing. To accomplish the goals stated above, the dissertation is divided into three parts. The first part examines Computer Vision and Image Processing and is followed by a section examining Distributed Computing models and Computer Networks. The final part is dedicated to suggesting a model to solve the problem of computational load associated with Image Processing. The aim of the model is to take advantage of and use the latent processing power available in an Intranet environment by distributing the processing among the machines on the network. The model is also intended to be flexible and to minimize the network load incurred by distributing the processing. In order to do so, the model is split into units that deliver specialized functionality in order to keep the components small and also to incur the minimum load on a specific machine.
162

Business strategy for the application of internet and intranet technology in Eskom

Moodley, Raj 23 July 2014 (has links)
M.B.A. / Eskom, South Africa's electricity utility, is the electricity supplier for South Africa. It has 20 power stations with a nominal capacity of 39 154 megawatts. Eskom is among the top five electricity utilities in the world in terms of size and sales and strives to remain one of the lowest-cost producers of electricity in the world. Eskom supplies 98% of the country's electricity requirements, which amounts to more than half of the electricity generated on the African continent. Eskom supports the development of a Southern African transmission grod to encourage cooperation and accelerate economic growth in the region. Eskom support employment equity and encourages employees to develop to their full potential through training. Eskom sees itself as a respected corporate citizen and is working towards environmental sustainability and socio-economic improvement (Eskom report, 1997). The growth of Internet technologies (and within Eskom the Intranet) has been phenomenal. On 23 July 1998, after extensive consultation and compilation, an Eskom Internet / Intranet strategy was approved. The strategy defines the way in which Eskom will employ this technology to support their business, to ensure synergy in organisational efforts. This chapter gives an overview of the strategy (Eskom Report, 1997). The strategy positions Eskom to be able to derive significant business benefit. from the technology, and ensures we will not be "left behind" by our competitors and customers, but ensures that our use of the technology and the resulting costs can be properly managed. It accommodates the different cultures in the business groups, from progressive through conservative, in terms of the deployment of the technology ...
163

TCP/IP PROTOCOL BOARD USING SINGLE CHIP PROCESSOR.

Nematbakhsh, Mohammadali. January 1985 (has links)
No description available.
164

DESIGN OF A COMMUNICATION PORT AND IMPLEMENTATION OF A RECONFIGURABLE MEDIA TRANSLATION GATEWAY (COMPUTER, CONNECTION, NETWORK, BRIDGE, COMPATIBLE).

AmirFaiz, Farhad, 1959- January 1986 (has links)
No description available.
165

ENTITY STRUCTURE REPRESENTATION FOR LOCAL AREA NETWORK SIMULATION (SYSTEM, EXPERT).

Seviṇc, Süleyman, 1960- January 1986 (has links)
No description available.
166

Efficient mechanism design for mobile data offloading

Zhang, Yan Guang January 2018 (has links)
University of Macau / Faculty of Science and Technology. / Department of Electrical and Computer Engineering
167

A tunable-channel multi-access wavelength division multiplexed network and surveillance schemes for optical cross-connects.

January 1999 (has links)
by Eddie Ting Pong Kong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1999. / Includes bibliographical references (leaves 61-68). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Optical Network Architecture --- p.1 / Chapter 1.2 --- High-Speed All-Optical Tunable-Channel Multi-Access Networks --- p.3 / Chapter 1.3 --- Fault Surveillance of Optical Cross-Connects in Wavelength Routing Network --- p.3 / Chapter 1.4 --- Outline of the Thesis --- p.5 / Chapter 2 --- Optical Multi-Access Networks --- p.6 / Chapter 2.1 --- All-Optical Networks --- p.6 / Chapter 2.2 --- Optical Multi-Access Schemes --- p.8 / Chapter 2.2.1 --- Wavelength-Division Multi-Access (WDMA) --- p.9 / Chapter 2.2.2 --- Time-Division Multi-Access (TDMA) --- p.12 / Chapter 2.2.3 --- Subcarrier Multi-Access (SCMA) --- p.14 / Chapter 2.3 --- Design Considerations --- p.14 / Chapter 3 --- All-Optical Tunable-Channel Multi-Access Networks --- p.18 / Chapter 3.1 --- Tunable-Channel Multi-Access Networks --- p.19 / Chapter 3.2 --- Protocols for TCMA Networks --- p.20 / Chapter 3.3 --- Photonic Implementation of a Wavelength Division TCMA Network with Time- Slot Access --- p.23 / Chapter 3.3.1 --- Proposed Network Architecture --- p.25 / Chapter 3.3.2 --- Experimental Results --- p.30 / Chapter 3.3.3 --- Discussion --- p.34 / Chapter 3.3.4 --- Summary --- p.35 / Chapter 4 --- Fault Surveillance for Optical Cross-Connects in Wavelength Routing Networks --- p.36 / Chapter 4.1 --- Wavelength Routing Networks --- p.37 / Chapter 4.2 --- Options in Fault Surveillance --- p.39 / Chapter 4.3 --- Optical Path Surveillance of Optical Cross-Connects in Wavelength Routing Networks --- p.41 / Chapter 4.3.1 --- Scanning Amplified Spontaneous Emission Identification Surveillance Scheme --- p.43 / Chapter 4.3.2 --- Pilot-Tone Based Surveillance and Removal Scheme --- p.49 / Chapter 4.4 --- Summary --- p.55 / Chapter 5 --- Conclusion --- p.57 / Chapter 5.1 --- Summary of the Thesis --- p.57 / Chapter 5.2 --- Future Work --- p.60 / Bibliography --- p.61 / Publication List --- p.59
168

Schemes for building an efficient all-optical virtual private network.

January 2006 (has links)
by Tam Scott Kin Lun. / Thesis submitted in: October 2005. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2006. / Includes bibliographical references (leaves 58-64). / Abstracts in English and Chinese. / Chapter 1. --- Introduction --- p.1 / Chapter 1.1. --- Optical Networks --- p.1 / Chapter 1.1.1. --- IP over Optical Networks --- p.1 / Chapter 1.1.2. --- Challenges in Optical Networks --- p.4 / Chapter 1.2. --- Virtual Private Networks (VPN) --- p.5 / Chapter 1.2.1. --- CE Based VPN --- p.6 / Chapter 1.2.2. --- Network Based VPN --- p.7 / Chapter 1.2.2.1. --- MPLS Layer 2 VPN --- p.8 / Chapter 1.2.2.2. --- MPLS Layer 3 VPN --- p.9 / Chapter 1.2.3. --- Optical VPN --- p.9 / Chapter 1.2.4. --- Challenges in VPN Technologies --- p.11 / Chapter 1.3. --- Objective of this Thesis --- p.11 / Chapter 1.4. --- Outline of this Thesis --- p.12 / Chapter 2. --- Architecture of an All-Optical VPN --- p.13 / Chapter 2.1. --- Introduction --- p.13 / Chapter 2.2. --- Networking Vendor Activities --- p.13 / Chapter 2.3. --- Service Provider Activities --- p.15 / Chapter 2.4. --- Standard Bodies Activities --- p.16 / Chapter 2.5. --- Requirements for All-Optical VPN --- p.17 / Chapter 2.6. --- Reconfigurability of an All-Optical VPN --- p.19 / Chapter 2.7. --- Switching Methods in All-Optical VPN --- p.20 / Chapter 2.8. --- Survivability of an All-Optical VPN --- p.23 / Chapter 3. --- Maximizing the Utilization Of A Survivable Multi-Ring WDM Network --- p.25 / Chapter 3.1. --- Introduction --- p.25 / Chapter 3.2. --- Background --- p.25 / Chapter 3.3. --- Method --- p.26 / Chapter 3.3.1. --- Effect on packet based services --- p.28 / Chapter 3.3.2. --- Effect on optical circuit based services --- p.28 / Chapter 3.4. --- Simulation results --- p.29 / Chapter 3.5. --- Chapter Summary --- p.36 / Chapter 4. --- Design of an All-Optical VPN Processing Engine --- p.37 / Chapter 4.1. --- Introduction --- p.37 / Chapter 4.2. --- Concepts of Optical Processors --- p.38 / Chapter 4.3. --- Design Principles of the All-Optical VPN Processing Engine --- p.40 / Chapter 4.3.1. --- Systolic System --- p.41 / Chapter 4.3.2. --- Design Considerations of an Optical Processing Cell --- p.42 / Chapter 4.3.2.1. --- Mach-Zehnder Structures --- p.43 / Chapter 4.3.2.2. --- Vertical Cavity Semiconductor Optical Amplifier --- p.43 / Chapter 4.3.2.3. --- The Optical Processing Cell --- p.44 / Chapter 4.3.3. --- All-Optical VPN Processing Engine --- p.47 / Chapter 4.4. --- Design Evaluation --- p.49 / Chapter 4.5. --- Application Example --- p.50 / Chapter 4.6. --- Chapter Summary --- p.54 / Chapter 5. --- Conclusion --- p.55 / Chapter 5.1. --- Summary of the Thesis --- p.55 / Chapter 5.2. --- Future Works --- p.56 / Chapter 6. --- References --- p.58
169

Real-time network traffic classification.

January 2008 (has links)
Wong, Chi Hang. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 78-80). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.iv / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Overview on traffic classification algorithms --- p.2 / Chapter 1.1.1 --- Port based approach --- p.2 / Chapter 1.1.2 --- Payload based approach --- p.2 / Chapter 1.1.3 --- Transport layer information based approach --- p.3 / Chapter 1.2 --- Operating model of traffic classification algorithms --- p.3 / Chapter 1.3 --- Previous related works --- p.4 / Chapter 2 --- Background --- p.5 / Chapter 2.1 --- Network topology and traffic capturing model --- p.5 / Chapter 2.2 --- Proposed Scheme --- p.6 / Chapter 2.3 --- Analysis on different categories --- p.9 / Chapter 3 --- Objectives --- p.11 / Chapter 3.1 --- Computing Power and Memory --- p.11 / Chapter 3.1.1 --- A rough analysis on the complexity --- p.12 / Chapter 3.2 --- Experiments on the complexity --- p.13 / Chapter 3.2.1 --- Operating Model : batch processing --- p.16 / Chapter 4 --- Computing Power and Memory : parallel processing --- p.22 / Chapter 4.1 --- Goals --- p.22 / Chapter 4.2 --- Parallel processing --- p.23 / Chapter 4.3 --- System Architecture --- p.24 / Chapter 4.4 --- Advantage --- p.26 / Chapter 4.5 --- Practical adjustment --- p.29 / Chapter 4.6 --- The alternative System Architecture --- p.30 / Chapter 5 --- Operating Model : from batch processing to online --- p.34 / Chapter 5.1 --- Goals --- p.34 / Chapter 5.2 --- Proposed model --- p.35 / Chapter 5.3 --- Delay comparasion --- p.35 / Chapter 5.4 --- Performance and accuracy issue --- p.38 / Chapter 5.5 --- Trade off between delay and accuracy --- p.43 / Chapter 6 --- Evaluation --- p.46 / Chapter 6.1 --- Final Prototype --- p.46 / Chapter 6.2 --- Online processing --- p.48 / Chapter 7 --- Others --- p.55 / Chapter 7.1 --- Special cases for network topology --- p.55 / Chapter 7.2 --- Further optimizations for BLINC --- p.56 / Chapter 7.3 --- Study on port-based approach --- p.66 / Chapter 7.4 --- Study on the information used in different algorithms --- p.70 / Chapter 7.5 --- Future works --- p.76 / Chapter 8 --- Conclusion --- p.77 / Bibliography --- p.78
170

Maximum concurrent flow of multiple channels in wireless mesh network.

January 2008 (has links)
Cheung, Kwok Sum. / Thesis submitted in: October 2007. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2008. / Includes bibliographical references (leaves 71-74). / Abstracts in English and Chinese. / Abstract --- p.i / Acknowledgement --- p.ii / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Infrastructure of Wireless Mesh Networks --- p.1 / Chapter 1.2 --- Characteristics and Advantages of WMNs --- p.4 / Chapter 1.3 --- Challenges --- p.7 / Chapter 2 --- Background Study --- p.10 / Chapter 2.1 --- Maximum Concurrent Flow Problem --- p.10 / Chapter 2.2 --- Channel Assignment --- p.12 / Chapter 2.3 --- Congestion Control --- p.13 / Chapter 3 --- Problem Formulation --- p.16 / Chapter 3.1 --- Physical Model --- p.16 / Chapter 3.2 --- MCFP of Multiple Channels --- p.19 / Chapter 3.2.1 --- MCFP Channel Assignment Pattern --- p.19 / Chapter 3.2.2 --- Min-max Spectral Radius Optimization --- p.22 / Chapter 3.2.3 --- Min-max Channel Assignment Problem --- p.24 / Chapter 4 --- Min-max Pattern in Chain Network --- p.26 / Chapter 4.1 --- Chain Network --- p.26 / Chapter 4.2 --- Min-max Channel Assignment Pattern --- p.28 / Chapter 5 --- Bottleneck Assignment Heuristic Algorithm --- p.35 / Chapter 5.1 --- Algorithm Description --- p.35 / Chapter 5.1.1 --- Introduction --- p.35 / Chapter 5.1.2 --- First Part of the BAHA --- p.38 / Chapter 5.1.3 --- Second Part of the BAHA --- p.43 / Chapter 5.2 --- Optimality --- p.47 / Chapter 5.3 --- Simulation of the BAHA --- p.53 / Chapter 5.3.1 --- Performance evaluation --- p.55 / Chapter 6 --- Sequential Assignment Heuristic Algorithm --- p.59 / Chapter 6.1 --- Algorithm Description --- p.59 / Chapter 6.1.1 --- Introduction --- p.59 / Chapter 6.1.2 --- Lower bound of spectral radius --- p.60 / Chapter 6.1.3 --- Procedures of SAHA --- p.62 / Chapter 6.2 --- Simulation Result --- p.64 / Chapter 6.3 --- Performance evaluation --- p.64 / Chapter 7 --- Conclusion --- p.69 / Bibliography --- p.71

Page generated in 0.0501 seconds