Repository logo
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
  • Colleges, Institutes & Collections
  • Browse AAU-ETD
  • English
  • Català
  • Čeština
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • Latviešu
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Қазақ
  • বাংলা
  • हिंदी
  • Ελληνικά
  • Српски
  • Yкраї́нська
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Desalegn, Konjit"

Now showing 1 - 2 of 2
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    Assessment of Business Incubation Centers Development in Ethiopia
    (Addis Ababa University, 2016-01) Desalegn, Konjit; Seid, Mohamed (PhD)
    The objective of this research is to assess the status of Business Incubation centers development in Ethiopia. This research covered 15 business incubation centers found in five regions of Ethiopia i.e. Addis Ababa, Oromia, Tigray, Amhara and SNNPR. Due to newness of the concept and the absence of complete database on the BICs in Ethiopia, non exhaustive list was developed by the researcher through personal research. The list was taken as both the target population and a sample for the study. The representativeness of the sample per owners category is ensured. The results of the study revealed that Business Incubation Center development in Ethiopia is at the infancy stage (life time less than 2 years for most of them) though the first centers established 2008 and 2009. There are various constraints that need additional effort and support from different actors for the BICs to develop and grow at acceptable rate. Lack of experience with in the BICs, finance, working space, absence of policies and guidelines, incentive programs etc... are among the major challenges the centers facing.. The results found suggest that, BICs are important to improve growth and development of the country if managed properly. The government need to take the leading role in placing operational rules and regulation of the BICs and create a legal framework they could register and function independently.
  • No Thumbnail Available
    Item
    Intrusion Detection System for Mobile Ad-Hoc Networks (Manets)
    (Addis Ababa University, 2006-04) Desalegn, Konjit; Biru, Getachew(PhD)
    The term wireless networking refers to technology that enables two or more computing devices to communicate using standard wireless networking protocols. Strictly speaking, any communication technology that uses such a scheme could be called wireless networking. Based on the coverage area, wireless networking technology can be classified as wide area network (ex. Mobile cellular standards such as GSM, IS95) and local area networking (ex. WLAN such as the IEEE 802.11x). Furthemore wireless networks can be classified as infrastructure based, that is a wireless network with a central control device or access point (IEEE WLAN and GSM) , the second type of wireless networks is the so called infrastructure-less or Mobile Ad hoc networking (MANETs). This thesis deals with the analysis and implementation of two types of intrusion detection techniques for mobile Ad-hoc networks. Since MANETs have no established infrastructure: they are also described as self-organized peer-to-peer wireless network composed of mobile nodes. MANETs represent a dynamic network with no centralized control (i.e., a node can enter or leave a MANET group without collapsing the network). This property allows MANETs to change the network topology of a peer collection of mobile nodes with in the coverage range of each other, dynamically. However, this nature of ad-hoc wireless networks also makes them very vulnerable to an adversary's malicious attacks. To detect those malicious attacks the network needs an intrusion detection system. Various types of intrusion detection systems for wireless Ad hoc networks exist and are discussed in the next sections. In this thesis performance evaluation of the MANET routing protocol, Ad-hoc on demand distance vector (AODV) is done using the so called misuse IDS technique. Implementation aspect of the IDS for a particular type of attack, called resource consumption attack is done using the NS- 2 simulator, for the AODV routing protocol. A significant decrease in packet drop is obtained due to the application of the misuse intrusion detection algorithm. Other metrics such as energy consumption, delay are considered, and show improvement due to the application of the IDS. An in-depth discussion of the simulation results can be found in section

Home |Privacy policy |End User Agreement |Send Feedback |Library Website

Addis Ababa University © 2023