• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 271
  • 145
  • 59
  • 48
  • 23
  • 12
  • 11
  • 10
  • 7
  • 6
  • 5
  • 4
  • 2
  • 2
  • 2
  • Tagged with
  • 728
  • 185
  • 135
  • 89
  • 87
  • 87
  • 80
  • 79
  • 75
  • 69
  • 68
  • 57
  • 52
  • 49
  • 48
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

INSIDEout DETROIT: The hub and the affordable house

Curtis, Mitchell 28 June 2021 (has links)
No description available.
32

Interactions Within the Intrinsic Cardiac Nervous System Contribute to Chronotropic Regulation

Randall, David C., Brown, David R., McGuirt, A. Scott, Thompson, Gregory W., Armour, J. Andrew, Ardell, Jeffrey L. 01 January 2003 (has links)
The objective of this study was to determine how neurons within the right atrial ganglionated plexus (RAGP) and posterior atrial ganglionated plexus (PAGP) interact to modulate right atrial chronotropic, dromotropic, and inotropic function, particularly with respect to their extracardiac vagal and sympathetic efferent neuronal inputs. Surgical ablation of the PAGP (PAGPx) attenuated vagally mediated bradycardia by 26%; it reduced heart rate slowing evoked by vagal stimulation superimposed on sympathetically mediated tachycardia by 36%. RAGP ablation (RAGPx) eliminated vagally mediated bradycardia, while retaining the vagally induced suppression of sympathetic-mediated tachycardia (-83%). After combined RAGPx and PAGPx, vagal stimulation still reduced sympathetic-mediated tachycardia (-47%). After RAGPx alone and after PAGPx alone, stimulation of the vagi still produced negative dromotropic effects, although these changes were attenuated compared with the intact state. Negative dromotropic responses to vagal stimulation were further attenuated after combined ablation, but parasympathetic inhibition of atrioventricular nodal conduction was still demonstrable in most animals. Finally, neither RAGPx nor PAGPx altered autonomic regulation of right atrial inotropic function. These data indicate that multiple aggregates of neurons within the intrinsic cardiac nervous system are involved in sinoatrial nodal regulation. Whereas parasympathetic efferent neurons regulating the right atrium, including the sinoatrial node, are primarily located within the RAGP, prejunctional parasympathetic-sympathetic interactions regulating right atrial function also involve neurons within the PAGP.
33

Survivability Analysis of Two Specific 16-Node, 24-Link Communication Networks

Nazrul, Shahbaz 25 August 1998 (has links)
A highly survivable communication network is desirable, as service disruption is usually not tolerated. In this thesis we mainly investigate and discuss the survivability of two specific communication networks, termed topology 1 and 2, under usual network failures. The survivability of the networks mainly comes from their structure. Both topologies have different routes between all source-destination pairs, which gives the networks high route diversity. In fact, both topologies considered are regular networks with connectivity 3. Discussion starts by defining several network properties, such as average route-length and link and node utilization, for the fault-free condition. Alterations of these properties are investigated when a network failure takes place. Using the results for fault-free and faulty situations, a comparison is made between the topologies. Topologies 1 and 2 are also compared with other standard topologies like full ring, square grid and star topologies. Another regular network topology called the star-ring topology is also introduced and investigated for the same properties. Enough insight is given to devise an optimal re-routing strategy when a network failure takes place. A new idea of static routing strategy called the Static Disjoint Routing Strategy is introduced. This disjoint routing strategy is proven to be close in performance to that of traditional Dynamic Shortest Routing with a considerable gain in ease of operation. The disjoint routing table is used to investigate whether any link or node becomes over utilized in faulty situations. On the whole both topologies were found to be highly survivable structures with reasonable cost. / Master of Science
34

CONTOUR GUIDED DISSEMINATION FOR NETWORKED EMBEDDED SYSTEMS

Chu, I-Hsine (Jack) January 2006 (has links)
No description available.
35

Geometric Routing Without Geometry

Jadhav, Rajesh 02 May 2007 (has links)
No description available.
36

A WebSocket-based Approach to Transporting Web Application Data

Hadden, Ross A. 22 June 2015 (has links)
No description available.
37

Mining constraints for Testing and Verification

Wu, Weixin 06 February 2009 (has links)
With the advances in VLSI and System-On-Chip (SOC) technologies, the complexity of hardware systems has increased manifold. The increasing complexity poses serious challenges to the digital hardware design. Functional verification has become one of the most expensive and time-consuming components of the current product development cycle. Today, design verification alone often surpasses 70% of the total development cost and the situation has been projected to continue to worsen. The two most widely used formal methods for design verification are Equivalence Checking and Model Checking. During the design phase, hardware goes through several stages of optimizations for area, speed, power, etc. Determining the functional correctness of the design after each optimization step by means of exhaustive simulation can be prohibitively expensive. An alternative to prove functional correctness of the optimized design is to determine the design's functional equivalence with respect to some golden model which is known to be functionally correct. Efficient techniques to perform this process is known as Equivalence Checking. Equivalence Checking requires that the implementation circuit should be functionally equivalent to the specification circuit. Complexities in Equivalence Checking can be exponential to the circuit size in the worst case. Since Equivalence Checking of sequential circuits still remains a challenging problem, in this thesis, we first address this problem using efficient learning techniques. In contrast to the traditional learning methods, our method employs a mining algorithm to discover global constraints among several nodes efficiently in a sequential circuit. In a Boolean satisfiability (SAT) based framework for the bounded sequential equivalence checking, by taking advantage of the repeated search space, our mining algorithm is only performed on a small window size of unrolled circuit, and the mined relations could be reused subsequently. These powerful relations, when added as new constraint clauses to the original formula, help to significantly increase the deductive power for the SAT engine, thereby pruning a larger portion of the search space. Likewise, the memory required and time taken to solve these problems are alleviated. We also propose a pseudo-functional test generation method based on effective functional constraints extraction. We use mining techniques to extract a set of multi-node functional constraints which consists of illegal states and internal signal correlation. Then the functional constraints are imposed to a ATPG tool to generate pseudo functional delay tests. / Master of Science
38

Towards an adaptive solution to data privacy protection in hierarchical wireless sensor networks

Al-Riyami, Ahmed January 2016 (has links)
Hierarchical Wireless Sensor networks (WSNs) are becoming attractive to many applications due to their energy efficiency and scalability. However, if such networks are deployed in a privacy sensitive application context such as home utility consumption, protecting data privacy becomes an essential requirement. Our threat analysis in such networks has revealed that PPDA (Privacy Preserving Data Aggregation), NIDA (Node ID Anonymity) and ENCD (Early Node Compromise Detection) are three essential properties for protecting data privacy. The scope of this thesis is on protecting data privacy in hierarchical WSNs byaddressing issues in relation to two of the three properties identified, i.e., NIDA and ENCD, effectively and efficiently. The effectiveness property is achieved by considering NIDA and ENCD in an integrated manner, and the efficiency property is achieved by using an adaptive approach to security provisioning. To this end, the thesis has made the following four novel contributions. Firstly, this thesis presents a comprehensive analysis of the threats to data privacy and literature review of the countermeasures proposed to address these threats. The analysis and literature review have led to the identification of two main areas for improvements: (1) to reduce the resources consumed as the result of protecting data privacy, and (2) to address the compatibility issue between NIDA and ENCD.Secondly, a novel Adaptive Pseudonym Length Estimation (AdaptPLE) method has been proposed. The method allows the determination of a minimum acceptable length of the pseudonyms used in NIDA based on a given set of security and application related requirements and constraints. In this way, we can balance the trade-off between an ID anonymity protection level and the costs (i.e., transmission and energy) incurred in achieving the protection level. To demonstrate its effectiveness, we have evaluated the method by applying it to two existing NIDA schemes, the Efficient Anonymous Communication (EAC) scheme and theCryptographic Anonymous Scheme (CAS).Thirdly, a novel Adaptive Early Node Compromise Detection (AdaptENCD) scheme for cluster-based WSNs has been proposed. This scheme allows early detections of compromised nodes more effectively and efficiently than existing proposals. This is achieved by adjusting, at run-time, the transmission rate of heartbeat messages, used to detect nodes' aliveness, in response to the average message loss ratio in a cluster. This adaptive approach allows us to significantly reduce detection errors while keeping the number of transmitted heartbeat messages as low as possible, thus reducing transmission costs. Fourthly, a novel Node ID Anonymity Preserving Scheme (ID-APS) for clusterbased WSNs has been proposed. ID-APS protects nodes ID anonymity while, at the same time, also allowing the global identification of nodes. This later property supports the identification and removal of compromised nodes in the network, which is a significant improvement over the state-of-the-art solution, the CAS scheme. ID-APS supports both NIDA and ENCD by making a hybrid use of dynamic and global identification pseudonyms. More importantly, ID-APS achieves these properties with less overhead costs than CAS. All proposed solutions have been analysed and evaluated comprehensively to prove their effectiveness and efficiency.
39

Energy Balanced Sensor Node Organisation For Maximising Network Lifetime

Sakib, Kazi Muheymin-Us, s3091580@rmit.edu.au January 2008 (has links)
Recent advances in Micro-Electro-Mechanical Systems (MEMS) and low-power short-range radios have enabled rapid development of wireless sensor networks. Future sensor networks are anticipated to include hundreds or thousands of these devices in many applications, such as capturing multimedia content for surveillance, structural health monitoring, tracking of accidental chemical leaks, machine failures, earthquakes and intrusion detection. With the increase of sensor applications, a number of challenging problems related to the network protocol design has emerged - the most important ones relating to energy efficiency and lifetime maximisation. Techniques devised for sensor networks should deal with a large number of sensors distributed in the field. Wireless sensor nodes are deployed with limited energy reserves, so the networks should operate with minimum energy overhead. In fact, the network should take into account not only individual node's energy efficiency but also consider the global picture, because surviving nodes' energy reserves in a failed network are wasted energy. This thesis examines a node organisation technique to deal with the above challenges. The focus is on improving network lifetime via organising the nodes in a distributed and energy efficient manner. The main goal is lowering wasted energy via energy balancing and exploiting node redundancy in case of node failure. In particular, this thesis proposes Energy Balanced Clustering (EBC) method for node self-organisation where network tasks (such as data aggregation and data forwarding) are shifted to high-energy neighbours to reduce the energy consumption of low energy nodes. After showing how to extend network lifetime by energy balanced node organisation, the effect of redundant node deployments on network lifetime is addressed. Redundant nodes consume energy by performing unnecessary tasks so a method called Self-Calculated Redundancy Check (SCRC) is proposed to deactivate redundant nodes. A deactivated redundant node can be used as a replacement for a failed node. The Asynchronous Failed Sensor node Detection (AFSD) proposed in this thesis uses the data packets exchanged between neighbours to identify failed neighbours. To restore coverage for network holes caused by failed nodes, policies are given for re-activating redundant nodes. Detailed analytical analysis and simulation of the proposed methods demonstrate that by taking into account energy balancing, eliminating redundant tasks and replacing failed nodes sensor network lifetime can significantly be improved.
40

Automatic fault detection and localization in IPnetworks : Active probing from a single node perspective

Pettersson, Christopher January 2015 (has links)
Fault management is a continuously demanded function in any kind of network management. Commonly it is carried out by a centralized entity on the network which correlates collected information into likely diagnoses of the current system states. We survey the use of active-on-demand-measurement, often called active probes, together with passive readings from the perspective of one single node. The solution is confined to the node and is isolated from the surrounding environment. The utility for this approach, to fault diagnosis, was found to depend on the environment in which the specific node was located within. Conclusively, the less environment knowledge, the more useful this solution presents. Consequently this approach to fault diagnosis offers limited opportunities in the test environment. However, greater prospects was found for this approach while located in a heterogeneous customer environment.

Page generated in 0.0624 seconds