• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • Tagged with
  • 10
  • 10
  • 7
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Production and cost analysis of two harvesting systems in central Appalachia

Long, Charles R., January 2003 (has links)
Thesis (M.S.)--West Virginia University, 2003. / Title from document title page. Document formatted into pages; contains vii, 80 p. : ill. Includes abstract. Includes bibliographical references (p. 62-67).
2

Modeling operational forestry problems in central Appalachian hardwood forests

Li, Yaoxiang. January 2005 (has links)
Thesis (Ph. D.)--West Virginia University, 2005 / Title from document title page. Document formatted into pages; contains ix, 144 p. : ill. (some col.) Includes abstract. Includes bibliographical references (p. 107-114).
3

Heuristic solution techniques for a spatial harvest scheduling problem involving wildlife habitat and timber income /

Sharer, Brian K. January 1999 (has links)
Thesis (M.S.)--Oregon State University, 2000. / Typescript (photocopy). Includes bibliographical references (leaves 87-91). Also available on the World Wide Web.
4

An optimal harvesting model to evaluate the Indonesian Selective Cutting System for secondary dipterocarp forests

Sianturi, Apul. January 1990 (has links)
Thesis (Ph. D.)--University of Washington, 1990. / Vita. Includes bibliographical references (leaves [115]-124).
5

Modeling of forest harvest scheduling and terrestrial carbon sequestration

Sharma, Benktesh D. January 2010 (has links)
Thesis (Ph. D.)--West Virginia University, 2010. / Title from document title page. Document formatted into pages; contains xi, 160 p. : ill. (some col.), col. map. Vita. Includes abstract. Includes bibliographical references.
6

Effects of spatially dispersed green-tree retention on ectomycorrhiza diversity /

Kolaczkowski, Oralia. January 1900 (has links)
Thesis (M.S.)--Oregon State University, 2006. / Printout. Includes bibliographical references (leaves 55-60). Also available on the World Wide Web.
7

Forest response to tornado disturbance and subsequent salvage logging in an East Tennessee oak-hickory forest 14 years post-disturbance /

McGrath, Jonathan Charles, January 2009 (has links) (PDF)
Thesis (M.S.)--University of Tennessee, Knoxville, 2009. / Title from title page screen (viewed on Oct. 23, 2009). Thesis advisor: Wayne Clatterbuck. Vita. Includes bibliographical references.
8

Watershed-scale sediment movement in relation to in-stream water quality pre- and post-harvest observations /

Hamiter, Bonnie Leigh, January 2009 (has links)
Thesis (M.S.)--Mississippi State University. Department of Forestry. / Title from title screen. Includes bibliographical references.
9

Monitoring of a Modelled Real-Time System : with Data Diode Enabled Unidirectional Network / Övervakning av ett modellerat realtidssystem : Enkelriktat nätverk möjliggjort av dioder

Sterneling, Hanna January 2020 (has links)
Monitoring and logging is fundamental in systems. Today, these techniques are widely used to detect functionality issues as well as malicious event. This thesis compares and evaluates two techniques commonly used for this purpose: the Simple Network Management Protocol (SNMP) and the Syslog protocol. The protocols are evaluated with regard to their vulnerability to traffic pattern analysis, impact on network load and performance of the system, and the attack surface of the technique. Each protocol’s applicability is investigated on a modelled system, containing a data diode, using experiments and analysis of their individual features. We observe only small differences in traffic load and performance of the two techniques. The findings suggest that each of the two techniques can successfully be applied on the modelled system, and the decision on which technique should be used at each instance can therefore be left to the customer of each specific system implementation instance.
10

Centralized log management for complex computer networks

Hanikat, Marcus January 2018 (has links)
In modern computer networks log messages produced on different devices throughout the network is collected and analyzed. The data from these log messages gives the network administrators an overview of the networks operation, allows them to detect problems with the network and block security breaches. In this thesis several different centralized log management systems are analyzed and evaluated to see if they match the requirements for security, performance and cost which was established. These requirements are designed to meet the stakeholder’s requirements of log management and allow for scaling along with the growth of their network. To prove that the selected system meets the requirements, a small-scale implementation of the system will be created as a “proof of concept”. The conclusion reached was that the best solution for the centralized log management system was the ELK Stack system which is based upon the three open source software Elasticsearch, Logstash and Kibana. In the small-scale implementation of the ELK Stack system it was shown that it meets all the requirements placed on the system. The goal of this thesis is to help develop a greater understanding of some well-known centralized log management systems and why the usage of them is important for computer networks. This will be done by describing, comparing and evaluating some of the functionalities of the selected centralized log management systems. This thesis will also be able to provide people and entities with guidance and recommendations for the choice and implementation of a centralized log management system. / I moderna datornätverk så produceras loggar på olika enheter i nätverket för att sedan samlas in och analyseras. Den data som finns i dessa loggar hjälper nätverksadministratörerna att få en överblick av hur nätverket fungerar, tillåter dem att upptäcka problem i nätverket samt blockera säkerhetshål. I detta projekt så analyseras flertalet relevanta system för centraliserad loggning utifrån de krav för säkerhet, prestanda och kostnad som är uppsatta. Dessa krav är uppsatta för att möta intressentens krav på loghantering och även tillåta för skalning jämsides med tillväxten av deras nätverk. För att bevisa att det valda systemet även fyller de uppsatta kraven så upprättades även en småskalig implementation av det valda systemet som ett ”proof of concept”. Slutsatsen som drogs var att det bästa centraliserade loggningssystemet utifrån de krav som ställs var ELK Stack som är baserat på tre olika mjukvarusystem med öppen källkod som heter Elasticsearch, Logstash och Kibana. I den småskaliga implementationen av detta system så påvisades även att det valda loggningssystemet uppnår samtliga krav som ställdes på systemet. Målet med detta projekt är att hjälpa till att utveckla kunskapen kring några välkända system för centraliserad loggning och varför användning av dessa är av stor betydelse för datornätverk. Detta kommer att göras genom att beskriva, jämföra och utvärdera de utvalda systemen för centraliserad loggning. Projektet kan även att hjälpa personer och organisationer med vägledning och rekommendationer inför val och implementation av ett centraliserat loggningssystem.

Page generated in 0.1263 seconds