1,498 Matching Results

Search Results

Advanced search parameters have been applied.

Computational Complexity of Hopfield Networks

Description: There are three main results in this dissertation. They are PLS-completeness of discrete Hopfield network convergence with eight different restrictions, (degree 3, bipartite and degree 3, 8-neighbor mesh, dual of the knight's graph, hypercube, butterfly, cube-connected cycles and shuffle-exchange), exponential convergence behavior of discrete Hopfield network, and simulation of Turing machines by discrete Hopfield Network.
Date: August 1998
Creator: Tseng, Hung-Li
Partner: UNT Libraries

Social Networking and Constituent Communications: Members' Use of Twitter and Facebook During a Two-Month Period in the 112th Congress

Description: This report examines Member adoption and use of two social networking services: Twitter and Facebook. The report analyzes data on Member use of Twitter and Facebook collected by an academic institution in collaboration with the Congressional Research Service during a two-month period between August and October 2011 and the adoption of both platforms as of January 2012.
Date: March 22, 2013
Creator: Glassman, Matthew E.; Straus, Jacob R. & Shogan, Colleen J.
Partner: UNT Libraries Government Documents Department

Throughput Optimization in Multi-Cell CDMA Networks

Description: In this paper, the authors investigate the performance of a multi-cell CDMA network by determining the maximum throughput that the network can archive for a given grade-of-service requirement, quality-of-service requirement, network topology and call arrival rate profile.
Date: March 2005
Creator: Akl, Robert G.; Naraghi-Pour, Mort & Hegde, Manju V.
Partner: UNT College of Engineering

Internet Governance and the Domain Name System: Issues for Congress

Description: As the Internet grows and becomes more pervasive in all aspects of modern society, the question of how it should be governed becomes more pressing. Currently, an important aspect of the Internet is governed by a private sector, international organization called the Internet Corporation for Assigned Names and Numbers (ICANN), which manages and oversees some of the critical technical underpinnings of the Internet such as the domain name system and Internet Protocol (IP) addressing. ICANN makes its policy decisions using a multistakeholder model of governance, whereby a “bottom-up” collaborative process is open to all constituencies of Internet stakeholders. A key issue for Congress is whether and how the U.S. government should continue to maximize U.S. influence over ICANN's multistakeholder Internet governance process, while at the same time effectively resisting proposals for an increased role by international governmental institutions such as the U.N. The outcome of this debate will likely have a significant impact on how other aspects of the Internet may be governed in the future, especially in such areas as intellectual property, privacy, law enforcement, Internet free speech, and cybersecurity. Looking forward, the institutional nature of Internet governance could have far reaching implications on important policy decisions that will likely shape the future evolution of the Internet.
Date: February 9, 2012
Creator: Kruger, Lennard G.
Partner: UNT Libraries Government Documents Department

Access to Broadband Networks

Description: From Summary: "The report then reviews various legislative proposals affecting network access to assess their potential impact on broadband network provider's ability to mange their networks and to practice anticompetitive strategic behavior."
Date: June 28, 2006
Creator: Goldfarb, Charles B.
Partner: UNT Libraries Government Documents Department

Access to Broadband Networks

Description: From Summary: "This report analyzes these three components to identify the parameters that network providers have within their control (such as their choices about network architecture, overall bandwidth capacity, bandwidth reserved for their own use, traffic prioritization, the terms and rates for access to their networks and for their own use, traffic prioritization, the terms and rates for access to their networks and for their retail services) that can affect how end users and independent applications providers can access their networks, how those parameters might be used strategically to harm competition for, and consumers of, voice over internet protocol (VOIP), video, and other applications that ride over broadband networks."
Date: August 31, 2006
Creator: Goldfarb, Charles B.
Partner: UNT Libraries Government Documents Department

Overview and Issues for Implementation of the Federal Cloud Computing Initiative: Implications for Federal Information Technology Reform Management

Description: This report explains what cloud computing is, including cloud deployment models and service models, discusses issues that should be considered when adopting cloud services, and presents the federal government's planning for IT reform.
Date: January 20, 2015
Creator: Figliola, Patricia Moloney & Fischer, Eric A.
Partner: UNT Libraries Government Documents Department

Organizational Considerations for and Individual Perceptions of Web-Based Intranet Systems

Description: Utilization of World Wide Web style Web-Based Intranet Systems (W-BIS) is a rapidly expanding information delivery technique in many organizations. Published reports concerning these systems have cited return on investment values exceeding 1300% and direct payback time periods as low as six to twelve weeks. While these systems have been widely implemented, little theoretically grounded research has been conducted in relation to users' acceptance, utilization or the perceived quality of these systems. The study employed a two-site investigation of corporate Web-Based Intranet Systems, with surveys distributed via the traditional mail system. The complete survey instrument distributed to employees included the ServQual/ServPerf, User Information Satisfaction, Ease of Use/Usefulness, and Computer Playfulness instruments. In addition to these previously developed instruments, the survey instrument for this study included measures of Web-Based Intranet Systems utilization and usefulness along with respondent demographics and subordinate-reported managerial commitment. This study investigated the reliability and validity of the ServQual/ServPerf instrument in an information systems service environment. The same analysis was conducted of the more generally accepted User Information Satisfaction instrument.
Date: May 1999
Creator: Myerscough, Mark Alan
Partner: UNT Libraries

Overview and Issues for Implementation of the Federal Cloud Computing Initiative: Implications for Federal Information Technology Reform Management

Description: This report explains what cloud computing is -- including cloud deployment models and service models -- discusses issues that should be considered when adopting cloud services, and presents the federal government's planning for IT reform. It also provides information on assessments that have been conducted on agency cloud adoption and discusses both the challenges and drivers of cloud adoption. Finally, the report provides possible mechanisms for Congress to monitor agencies as they implement cloud computing.
Date: February 3, 2014
Creator: Figliola, Patricia Moloney & Fischer, Eric A.
Partner: UNT Libraries Government Documents Department

Concentration-dependent Effects of D-Methylphenidate on Frontal Cortex and Spinal Cord Networks in vitro

Description: Spontaneously active frontal cortex and spinal cord networks grown on microelectrode arrays were used to study effects of D-methylphenidate. These central nervous system tissues have relatively low concentrations of dopaminergic and noradrenergic neurons compared to the richly populated loci, yet exhibit similar neurophysiological responses to methylphenidate. The spontaneous spike activity of both tissues was inhibited in a concentration-dependent manner by serial additions of 1-500 µM methylphenidate. Methylphenidate is non-toxic as spike inhibition was recovered following washes. The average concentrations for 50% spike rate inhibition (IC50 ± SD) were 118 ± 52 (n= 6) and 57 ± 43 (n = 11) for frontal cortex and spinal cord networks, respectively. A 3 hour exposure of a network to 1 mM methylphenidate was nontoxic. The effective concentrations described in this study are within the therapeutic dosage range. Therefore, the platform may be used for further investigations of drug mechanisms.
Date: December 2004
Creator: Miller, Benjamin R.
Partner: UNT Libraries

Power-benefit analysis of erasure encoding with redundant routing in sensor networks.

Description: One of the problems sensor networks face is adversaries corrupting nodes along the path to the base station. One way to reduce the effect of these attacks is multipath routing. This introduces some intrusion-tolerance in the network by way of redundancy but at the cost of a higher power consumption by the sensor nodes. Erasure coding can be applied to this scenario in which the base station can receive a subset of the total data sent and reconstruct the entire message packet at its end. This thesis uses two commonly used encodings and compares their performance with respect to power consumed for unencoded data in multipath routing. It is found that using encoding with multipath routing reduces the power consumption and at the same time enables the user to send reasonably large data sizes. The experiments in this thesis were performed on the Tiny OS platform with the simulations done in TOSSIM and the power measurements were taken in PowerTOSSIM. They were performed on the simple radio model and the lossy radio model provided by Tiny OS. The lossy radio model was simulated with distances of 10 feet, 15 feet and 20 feet between nodes. It was found that by using erasure encoding, double or triple the data size can be sent at the same power consumption rate as unencoded data. All the experiments were performed with the radio set at a normal transmit power, and later a high transmit power.
Date: December 2006
Creator: Vishwanathan, Roopa
Partner: UNT Libraries

Energy-Aware Time Synchronization in Wireless Sensor Networks

Description: I present a time synchronization algorithm for wireless sensor networks that aims to conserve sensor battery power. The proposed method creates a hierarchical tree by flooding the sensor network from a designated source point. It then uses a hybrid algorithm derived from the timing-sync protocol for sensor networks (TSPN) and the reference broadcast synchronization method (RBS) to periodically synchronize sensor clocks by minimizing energy consumption. In multi-hop ad-hoc networks, a depleted sensor will drop information from all other sensors that route data through it, decreasing the physical area being monitored by the network. The proposed method uses several techniques and thresholds to maintain network connectivity. A new root sensor is chosen when the current one's battery power decreases to a designated value. I implement this new synchronization technique using Matlab and show that it can provide significant power savings over both TPSN and RBS.
Date: December 2006
Creator: Saravanos, Yanos
Partner: UNT Libraries

Security problems in 802.11 wireless networks standard due to the inefficiency of wired equivalent privacy protocol.

Description: Due to the rapid growth of wireless networking, the fallible security issues of the 802.11 standard have come under close scrutiny. Nowadays most of the organizations are eager to setup wireless local area networks to reduce the hassles of limited mobility provided by conventional wired network. There are serious security issues that need to be sorted out before everyone is willing to transmit valuable corporate information on a wireless network. This report documents the inherent flaws in wired equivalent privacy protocol used by the 802.11 standard and the ensuing security breaches that can occur to a wireless network due to these flaws. The solutions suggested in this report might not actually make the 802.11 standard secure, but will surely help in the lead up to a secure wireless network standard.
Date: May 2003
Creator: Samanthapudi, Varma
Partner: UNT Libraries

Telecommunication Technologies, Networking and Libraries

Description: Abstract: The conference provided an overview of current and developing technologies for digital transmission of image data that are likely to have an impact on the operations of libraries and information centers or provide support for information networking. Technologies reviewed include slow-scan television, teleconferencing, and videodisc. Other papers discuss technology and standards development for computer network interconnection through hardware and software, particularly packet-switched networks; computer network protocols for library and information service applications; the structure of a national bibliographic telecommunications network; and the major policy issues involved in the regulation or deregulation of the common communications carriers industry.
Date: December 1981
Creator: Knight, Nancy H.
Partner: UNT Libraries Government Documents Department