Searched for: contributor%3A%22Kooij%2C+R.E.+%28mentor%29%22
(1 - 9 of 9)
document
Huang, Hao (author)
The core-periphery structure is a mesoscale topological structure that refers to the presence of a dense core and a sparse periphery. The core-periphery structure has been discovered in financial, biological, and technological networks. Various methods for detecting core-periphery structure have been proposed, exploring different discrete or...
master thesis 2021
document
Chen, Anqi (author)
Network recoverability refers to the ability of a network to return to a desired<br/>performance level after suffering malicious attacks or random failures. A system is controllable if it can be driven from any arbitrary state to any desired state in finite time under the control of the driver nodes, which are attached to external inputs. We use...
master thesis 2021
document
Stratis, A. (author)
The traditional power grid map has drastically changed with the advent of renewable energy technologies. The intermittent nature of renewable energy sources hours. In order to deal with issues related to the fundamental quantities of a power grid system (frequency, voltage and current), smart grid systems have been introduced to ensure that...
master thesis 2016
document
Ungureanu, O.M. (author)
The mobile core network experienced many transformations during the past decade and at this moment virtualisation constitutes the next big phase in the operators strategies. Another technology which might step in the coming years is Software Defined Networking (SDN), a more mature technology in data centers, which strives to revolutionize the...
master thesis 2014
document
Rijnboutt, E.H.J. (author), Hokke, O.J. (author)
Het bachelorproject `How High' heeft als doel het opbouwen en testen van een algoritme waarmee worpen van een telefoon gedetecteerd kunnen worden, en waarmee de bereikte hoogte bepaald kan worden. Dit algoritme dient daarna te worden toegepast in een game voor mobiele telefoons. Voor de detectie kan gebruik gemaakt worden van verschillende...
bachelor thesis 2012
document
Verma, T. (author)
Power sector vulnerability has been a key issue in society for over a decade. A component failure may trigger cascades of failures across the grid and lead to a large blackout. Complex Network approaches have shown a direction to study some of the problems faced by power grids and it is a continuing challenge thus far. Power grids have been...
master thesis 2012
document
Shirmohamadi, B. (author)
In this thesis, I have investigated the self-optimization approach in order to solve a generic resource allocation challenge. The challenge is defined for a general ICT system serving two classes of jobs: low and high priority. The high priority jobs require a higher quality of service compared to the low priority jobs. In order to fulfill this...
master thesis 2011
document
Ngo, M.T. (author)
Most decoding algorithms of linear codes, in general, are designed to correct or detect errors. However, many channels cause erasures in addition to errors. In principle, decoding over such channels can be accomplished by deleting the erased symbols and decoding the resulting vector with respect to a punctured code. For any given linear code and...
master thesis 2009
document
Ebem, D.U. (author)
Measurement of the quality of Igbo speech.
master thesis 2009
Searched for: contributor%3A%22Kooij%2C+R.E.+%28mentor%29%22
(1 - 9 of 9)