1 |
Some aspects of a code division multiple access local area networkPearce, Richard Sargon January 1987 (has links)
No description available.
|
2 |
PG-means : learning the number of clusters in data /Feng, Yu. Hamerly, Gregory James, January 2006 (has links)
Thesis (M.S.)--Baylor University, 2006. / Includes bibliographical references (p. 50-52).
|
3 |
Scalable network architectures for providing per-flow service guaranteesKaur, Jasleen 17 May 2011 (has links)
Not available / text
|
4 |
Home automation and power conservation using ZigBeeªUnknown Date (has links)
The ZigBee standard is a wireless networking standard created and maintained by the ZigBee Alliance. The standard aims to provide an inexpensive, reliable, and efficient solution for wirelessly networked sensing and control products. The ZigBee Alliance is composed of over 300 member companies making use of the standard in different ways, ranging from energy management and efficiency, to RF remote controls, to health care products. Home automation is one market that greatly benefits from the use of ZigBee. With a focus on conserving home electricity use, a sample design is created to test a home automation network using Freescale's ZigBee platform. Multiple electrical designs are tested utilizing sensors ranging from proximity sensors to current sense transformers. Software is fashioned as well, creating a PC application that interacts with two ZigBee transceiver boards performing different home automation functions such as air conditioner and automatic lighting control. / by Michael G. DiBenedetto. / Thesis (M.S.C.S.)--Florida Atlantic University, 2009. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2009. Mode of access: World Wide Web.
|
5 |
A scalable architecture for the demand-driven deployment of location-neutral software servicesMacInnis, Robert F. January 2010 (has links)
This thesis presents a scalable service-oriented architecture for the demand-driven deployment of location-neutral software services, using an end-to-end or ‘holistic’ approach to address identified shortcomings of the traditional Web Services model. The architecture presents a multi-endpoint Web Service environment which abstracts over Web Service location and technology and enables the dynamic provision of highly-available Web Services. The model describes mechanisms which provide a framework within which Web Services can be reliably addressed, bound to, and utilized, at any time and from any location. The presented model eases the task of providing a Web Service by consuming deployment and management tasks. It eases the development of consumer agent applications by letting developers program against what a service does, not where it is or whether it is currently deployed. It extends the platform-independent ethos of Web Services by providing deployment mechanisms which can be used independent of implementation and deployment technologies. Crucially, it maintains the Web Service goal of universal interoperability, preserving each actor’s view upon the system so that existing Service Consumers and Service Providers can participate without any modifications to provider agent or consumer agent application code. Lastly, the model aims to enable the efficient consumption of hosting resources by providing mechanisms to dynamically apply and reclaim resources based upon measured consumer demand.
|
6 |
Towards a portal and search engine to facilitate academic and research collaboration in engineering andUnknown Date (has links)
While international academic and research collaborations are of great importance at this
time, it is not easy to find researchers in the engineering field that publish in languages
other than English. Because of this disconnect, there exists a need for a portal to find
Who’s Who in Engineering Education in the Americas. The objective of this thesis is to
built an object-oriented architecture for this proposed portal. The Unified Modeling
Language (UML) model developed in this thesis incorporates the basic structure of a
social network for academic purposes. Reverse engineering of three social networks
portals yielded important aspects of their structures that have been incorporated in the
proposed UML model. Furthermore, the present work includes a pattern for academic
social networks. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2014. / FAU Electronic Theses and Dissertations Collection
|
7 |
Enhancements to the XNS authentication-by-proxy model /Wing, Peter D. January 1990 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 1990. / Spine title: Authentication models. Bibliography. p. [167-175].
|
8 |
A Reference Model and Architecture for Future Computer NetworksHassan, Hoda Mamdouh 15 July 2010 (has links)
The growing need for a trustworthy Future Internet demands evolutionary approaches unfettered by legacy constrains and concepts. The networking community is calling for new network architectural proposals that address the deficiencies identified in present network realizations, acknowledge the need for a trustworthy IT infrastructure, and satisfy the society's emerging and future requirements. Proposed architectures need to be founded on well-articulated design principles, account for network operational and management complexities, embrace technology and application heterogeneity, regulate network-inherent emergent behavior, and overcome shortcomings attributed to present network realizations.
This dissertation presents our proposed clean-slate Concern-Oriented Reference Model (CORM) for architecting future computer networks. CORM stands as a guiding framework from which network architectures can be derived according to specific functional, contextual, and operational requirements or constraints. CORM represents a pioneering attempt within the network realm, and to our knowledge, CORM is the first reference model that is bio-inspired and derived in accordance with the Function-Behavior-Structure (FBS) engineering framework.
CORM conceives a computer network as a software-dependent complex system whose design needs to be attempted in a concern-oriented bottom-up approach along two main dimensions: a vertical dimension addressing structure and configuration of network building blocks; and a horizontal dimension addressing communication and interactions among the previously formulated building blocks. For each network dimension, CORM factors the design space into function, structure, and behavior, applying to each the principle of separation of concerns for further systematic decomposition.
In CORM, the network-building block is referred to as the Network Cell (NC), which represents CORM's first basic abstraction. An NC's structure and inherent behavior are bio-inspired, imitating a bacterium cell in a bacteria colony, thus it is capable of adaptation, self-organization and evolution. An NC's functional operation is defined by CORM second basic abstraction; the ACRF framework. The ACRF framework is a conceptual framework for network-concerns derived according to our interpretation of computer network requirement specifications. CORM networks are recursively synthesized in a bottom-up fashion out of CORM NCs. CORM addresses the multi-dimensionality of computer networks by modeling the network structure and behavior using a network structural template (NST), and an information flow model (IFM), respectively. Being developed according to a complex system paradigm, CORM refutes the long endorsed concept of layering, intrinsically accounts for emergent behavior, and ensures system integrity and stability.
As a reference model, CORM is more typical of conventional engineering. Therefore it was validated using the FBS engineering framework. However, the behavior to be realized in CORM-based networks was substantiated and evaluated by deriving CellNet, our proposed CORM-based network architecture. CellNet-compliant protocols' behavioral adaptation and modification were illustrated and evaluated through simulation.
CORM will have a profound impact on the operation and behavior of computer networks composing the Internet. By introducing awareness adaptability and evolvability as network intrinsic features, CORM-based Internet will proactively respond to changes in operational contexts, underlying technologies, and end user requirements. A major direction in CORM future work would be to detail the IFM component. / Ph. D.
|
9 |
Prognosis and health monitoring communications quality of serviceUnknown Date (has links)
This thesis research was funded by the Southeast National Marine Renewable Energy Center (SNMREC) at Florida Atlantic University. Its objective is the development of Quality of Service (QoS) mechanisms for the wireless communications architecture used by the Prognosis and Health Monitoring (PHM) subsystem. There are numerous technical challenges that the PHM Communications Subsystem tries to solve. Due to ocean platform mobility from waves, currents, and other environmental factors, signal quality can vary significantly. As a result, the wireless link between the electric generator platform and shore systems will have variable quality in terms of data rate, delay, and availability. In addition, the data traffic that flows from generator sensors and PHM applications to the shore systems consists of numerous types of messages that have different QoS demands (e.g. delay) and priority that depends on the message type, user ID, sensor location, and application-dependent parameters. The PHM Communications subsystem must handle effectively high priority messages, such as alarms, alerts, and remote control commands from shore systems. It also performs QoS in the application layer, so it can read the contents of every message to prioritize them. In order to perform QoS in the application layer the PHM subsystem relies on Java Servlet multithreaded technology and different queuing techniques to control message transmission order. Furthermore, it compresses all traffic that comes from the ocean-based electric generator/turbine platform to reduce the load on the wireless link. The PHM Communications subsystem consists of three components: the wireless link, the Link Manager, and the Web Services Network Proxy. We present experimental results for the Web Services Network Proxy and demonstrate the effectiveness of XML data compression and semantic-based message scheduling over a link with variable capacity. / by Timur Tavtilov. / Thesis (M.S.C.S.)--Florida Atlantic University, 2011. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2011. Mode of access: World Wide Web.
|
10 |
Network capacity sharing with QoS as a financial derivative pricing problem : algorithms and network designRasmusson, Lars January 2002 (has links)
A design of anautomatic network capacity markets, oftenreferred to as a bandwidth market, is presented. Three topicsare investigated. First, a network model is proposed. Theproposed model is based upon a trisection of the participantroles into network users, network owners, and market middlemen.The network capacity is defined in a way that allows it to betraded, and to have a well defined price. The network devicesare modeled as core nodes, access nodes, and border nodes.Requirements on these are given. It is shown how theirfunctionalities can be implemented in a network. Second, asimulated capacity market is presented, and a statisticalmethod for estimating the price dynamics in the market isproposed. A method for pricing network services based on sharedcapacity is proposed, in which the price of a service isequivalent to that of a financial derivative contract on anumber of simple capacity shares.Third, protocols for theinteraction between the participants are proposed. The marketparticipants need to commit to contracts with an auditableprotocol with a small overhead. The proposed protocol is basedon a public key infrastructure and on known protocols for multiparty contract signing. The proposed model allows networkcapacity to be traded in a manner that utilizes the networkeciently. A new feature of this market model, compared to othernetwork capacity markets, is that the prices are not controlledby the network owners. It is the end-users who, by middlemen,trade capacity among each-other. Therefore, financial, ratherthan control theoretic, methods are used for the pricing ofcapacity. <b>Keywords:</b>Computer network architecture, bandwidthtrading, inter-domain Quality-of-Service, pricing,combinatorial allocation, financial derivative pricing,stochastic modeling
|
Page generated in 0.1075 seconds