• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 35
  • 9
  • 7
  • 7
  • 4
  • 3
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 86
  • 35
  • 30
  • 22
  • 18
  • 16
  • 16
  • 15
  • 12
  • 12
  • 12
  • 9
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

A memetic genetic program for knowledge discovery

Nel, Gert M 09 June 2005 (has links)
Local search algorithms have been proved to be effective in refining solutions that have been found by other algorithms. Evolutionary algorithms, in particular global search algorithms, have shown to be successful in producing approximate solutions for optimisation and classification problems in acceptable computation times. A relatively new method, memetic algorithms, uses local search to refine the approximate solutions produced by global search algorithms. This thesis develops such a memetic algorithm. The global search algorithm used as part of the new memetic algorithm is a genetic program that implements the building block hypothesis by building simplistic decision trees representing valid solutions, and gradually increases the complexity of the trees. The specific building block hypothesis implementation is known as the building block approach to genetic programming, BGP. The effectiveness and efficiency of the new memetic algorithm, which combines the BGP algorithm with a local search algorithm, is demonstrated. / Dissertation (MSc)--University of Pretoria, 2006. / Computer Science / unrestricted
82

Management počítačové sítě / Network Management

Hrnčíř, Jan January 2015 (has links)
Thesis deals with the assessment of the current state of computer network management and information security for a particular company. Analyzes will be foundation for possible change proposals and enhancements to the requirements and economic opportunities of the specific company.
83

BGP Class of Service Interconnection

Knoll, Thomas Martin 04 February 2009 (has links)
This document focuses on Class of Service Interconnection at inter- domain peering points. It specifies two new non-transitive attributes, which enable adjacent peers to signal Class of Service Capabilities and certain Class of Service admission control Parameters. The new "CoS Capability Attribute" is deliberately kept simple and denotes the general EF, AF Group and BE forwarding support across the advertising AS. The second "CoS Parameter Attribute" is of variable length and contains a more detailed description of available forwarding behaviours using the PHB id Code encoding. Each PHB id Code is associated with rate and size based traffic parameters, which will be applied in the ingress AS Border Router for admission control purposes to a given forwarding behaviour. The denoted Class of Service forwarding support is meant as the AS externally available (transit) Class of Service support.
84

Muscle Wasting in a Rat ICU Model : Underlying Mechanisms and Specific Intervention Strategies

Salah, Heba January 2017 (has links)
Critical care has undergone several developments in the recent years leading to improved survival. However, acquired muscle weakness in the intensive care unit (ICU) is an important complication that affects severely ill patients and can prolong their ICU stay. Critical illness myopathy (CIM) is the progressive decline in the function and mass of the limb muscles in response to exposure to the ICU condition, while ventilator-induced diaphragm dysfunction (VIDD) is the time dependent decrease in the diaphragm function after the initiation of mechanical ventilation. Since the complete underlying mechanisms for CIM and VIDD are not completely understood, there is a compelling need for research on the mechanisms of CIM and VIDD to develop intervention strategies targeting these mechanisms. The aim of this thesis was to investigate the effects of several intervention strategies and rehabilitation programs on muscle wasting associated with ICU condition. Moreover, muscle specific differences in response to exposure to the ICU condition and different interventions was investigated. Hence, a rodent ICU model was used to address the mechanistic and therapeutic aspects of CIM and VIDD. The effects of heat shock protein 72 co-inducer (HSP72), BGP-15, on diaphragm and soleus for rats exposed to different durations of ICU condition was investigated. We showed that 5 and 10 days treatment with BGP-15 improved diaphragm fiber and myosin function, protected myosin from posttranslational modification, induced HSP72 and improved mitochondrial function. Moreover, BGP-15 treatment for 5 days improved soleus muscle fibers function, improved mitochondrial structure and reduced the levels of some ubiquitin ligases. In addition to BGP-15 treatment, passive mechanical loading of the limb muscles was investigated during exposure to the ICU condition. We showed that mitochondrial dynamics and mitophagy gene expression was affected by Mechanical silencing while mechanical loading counteracted these effects. Our investigation for other pathways that can be involved in muscle wasting associated with ICU condition showed that the Janus kinase 2/ Signal transducer and activator of transcription 3 (JAK2/STAT3) pathway is differentially activated in plantaris, intercostals and diaphragm. However, further studies are required with JAK2/STAT3 inhibitors to fully examine the role of this pathway in the pathogenesis of CIM and VIDD prior to translation to clinical research.
85

Architektury systémů na Internetu se skupinovým adresováním / Architectures of Internet-Based Systems with Multicasting

Veselý, Vladimír January 2009 (has links)
With rapid expansion of interest in multimedia and distributed computing applications across the Internet increases importance of optimized delivery of group traffic. According to current situation the best practice to achieve this goal is multicasting. This masters thesis summarizes multicasting methods and facts. Also it draws conclusions from practical application of presented information on commercial project.
86

Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level / Implementation av datainsamlingsverktyg med NetFlow på ISP-nivå för statistisk analys av datatrafik

Karlström, Daniel January 2012 (has links)
Defending against Dos- and DDoS attacks is difficult to accomplish; finding and filtering out illegitimate traffic from the legitimate flow is near impossible. Taking steps to mitigate or even block the traffic can only be done once the IP addresses of the attackers are known. This is achievable by monitoring the flows to- and from the target and identifying the attacker's IP addresses, allowing the company or their ISP to block the addresses itself by blackholing them (also known as a null route). Using the IP accounting and monitoring tool “pmacct”, this thesis aims to investigate whether or not the pmacct suite is suited for larger installations when tracking and mitigating DDoS-attacks, such at an Internet Service Provider (ISP). Potential problems are the amount of traffic that need to be analyzed and the computational power required to do it. This thesis also provide information about the pmacct suite at large. The conclusions are positive, indicating it does scale up to handle larger installations when given careful consideration and planning. / Att försvara sig mot DoS-och DDoS-attacker är svårt att åstadkomma; att hitta och filtrera ut illegitim trafik från det legitima flödet är nästan omöjligt. Att vidta åtgärder när en sådan attack upptäcks kan endast göras när IP-adresserna från angriparna är kända. Detta kan uppnås genom att man övervakar trafikflödet mellan målet för attacken och angriparna och ser vilka som sänder mest data och på så sätt identifierar angriparna.. Detta tillåter företaget eller dess ISP att blockera trafiken ifrån dessa IP-adresser genom att sända trafiken vidare till ingenstans. Detta kallas blackhole-routing eller null-routing. Genom att använda redovisnings- och övervakningsprogrammet pmacct syftar denna uppsats på att undersöka hurvida pmacct-sviten är lämpad för större installationer när det gäller att spåra och förhindra DDoS-attacker, såsom hos en Internetleverantör eller dylikt. Potentialla problem som kan uppstå är att mängden trafik som måste analyserar blir för stor och för krävande. Denna avhandling går även igenom pmacct-verktyget i sig. Slutsatserna är lovande, vilket indikerar att den har potential av att kunna hantera sådana stora miljöer med noggrann planering.

Page generated in 0.0235 seconds