• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 51
  • 12
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • Tagged with
  • 89
  • 89
  • 26
  • 22
  • 19
  • 17
  • 16
  • 13
  • 12
  • 11
  • 8
  • 8
  • 8
  • 8
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
81

Packet Scheduling on the Wireless Channel

Mondal, Santanu January 2014 (has links) (PDF)
Scheduling has always been an indispensable part of resource allocation in wireless networks. Accurate information about channel-state is assumed as a modeling simplification. However, in a real-life network ,e.g., Long Term Evolution(LTE) or IEEE 802.16e WiMAX, the channel-state information feedback to the transmitter can have uncertainty. The primary reason being that although resource allocation is done at the finer granularity of a Physical Resource Block (PRB), channel-state information is still feedback at the coarser granularity of a sub band, which is a group of PRBs. This is done to reduce the feedback traffic from the users to the Base Station. However, this averaging causes information loss and hence, the resulting uncertainty at the scheduler. Moreover, uncertainty might be present in the channel-estimates because of the very process of estimation. In the first part of the thesis, we model the channel-estimate in accuracy and characterize the network stability region. Compared to earlier works, we allow the channel estimates to have dependence among themselves, which is a more realistic situation in a modern LTE or WiMax network. We then propose two simple Max Weight based scheduling schemes that achieve any rate in the interior of the stability region. We also derive an asymptotically tight upper bound on the mean queueing delay in our system under one of the throughput-optimal policies we propose. The above policies ensure stability of the network and we have also obtained bounds on the mean queueing delays. However, different applications may require certain quality of service which may not be satisfied by these policies. Thus, we also propose a throughput-optimal policy for the network under traffic with heterogeneous QoS constraints and present some numerical results studying its performance. In the second part of the thesis, we study the problem of energy-efficient scheduling under average delay constraint. For wireless access technologies, the largest power consumer is the Base Station(BS). Any reduction in the power consumption in a BS will reduce carbon footprint from the Information and Communication Technology sector. We concentrate on the problem of minimizing the total non-renewable power consumed in a Green BS, that is powered by renewable energy sources ,e.g., solar/wind energy and may also be connected to the power grid or diesel generators. Specifically, we consider the problem of minimizing the average grid power consumption of a Green BS downlink in scheduling multiple users with average delay constraints. We have a packetized model for the data packets (i.e., the packets cannot be fragmented) which is a more realistic model for packet-switched networks. The power function is a non-decreasing convex function of the queue-lengths and only one user is allowed to transmit in a slot. We prove the existence of a power optimal policy under delay constraints for multiple users. We analyse the problem and provide some structural results for the optimal policy.
82

Global Localization of an Indoor Mobile Robot with a single Base Station

Hennig, Matthias, Kirmse, Henri, Janschek, Klaus 13 February 2012 (has links)
The navigation tasks in advanced home robotic applications incorporating reliable revisiting strategies are dependent on very low cost but nevertheless rather accurate localization systems. In this paper a localization system based on the principle of trilateration is described. The proposed system uses only a single small base station, but achieves accuracies comparable to systems using spread beacons and it performs sufficiently for map building. Thus it is a standalone system and needs no odometry or other auxiliary sensors. Furthermore a new approach for the problem of the reliably detection of areas without direct line of sight is presented. The described system is very low cost and it is designed for use in indoor service robotics. The paper gives an overview on the system concept and special design solutions and proves the possible performances with experimental results.
83

Comparative LCA model on renewable power solutions for off-grid radio base stations

Bondesson, Anna January 2010 (has links)
Globally, there are approximately 900 000 telecommunication radio base station sites (RBS-sites)located in areas without access to the electrical grid. Traditionally, these sites are powered by dieselgenerators, consuming large amounts of fossil diesel fuel. Diesel combustion is connected both toenvironmental impacts and high economical expenses for the mobile operators. As the mobilenetwork expansion is increasingly located in off-grid areas of developing countries, the search forrenewable power alternatives has been intensified. This Master thesis presents results from a life cycle assessment (LCA) of photovoltaic and windturbine hybrid power configurations for off-grid RBS-sites. The LCA covers environmental impactsfrom all life cycle activities of the hybrid system: from raw material extraction, manufacturing, andtransportation, to on-site usage, and disposal. To enable assessment of variable hybrid configurations, four scalable sub-models were constructed:one diesel sub-model including the generator and yearly diesel consumption, one back-up batterysub-model, one PV module sub-model and one wind turbine sub-model. Included in the sub-modelswere required site equipment; e.g. foundations for generators, PV modules and battery banks, powerconverters, fuel tanks and possible housings. The number of generators, liters of fuel consumed peryear, number of battery cells, square meters of PV module and number of wind turbines were set asvariables. Hereby RBS-sites with different capacities and availability of renewable source could bemodeled. A hybrid configuration including 21 square meters photovoltaic modules, one wind turbine, a storageof 36 (12 V) batteries and one generator back-up consuming 1500 liters of diesel fuel per year wasevaluated. The hybrid site represents between 11 and 16 percent of the different environmentalimpact potentials, global warming potential specifically representing 13 percent, caused by acorresponding traditional diesel site consuming 20000 liters of fuel per year. The most importantparameters influencing the environmental performance of the renewable hybrid site following thediesel fuel production and combustion are the production energy mix and energy intensive processesincluding the up-stream silicon and lead processing. The thesis confirmed great environmental benefits of using wind and solar power at RBS-sites. Theadditional gain of applying wind power when feasible to decrease the PV module area or batterycapacity required was also demonstrated. The great importance of manufacturing location andelectricity mix should encourage Ericsson to map supplier manufacturing locations, searchingpossibilities to decrease the environmental impacts from the manufacturing phase of the differentsub-systems. / Idag finns det omkring 5 miljoner radiobasstationer i det i det globala telekomnätet, varav 900000 ärbelägna i områden utan tillgång till elektricitet. Traditionellt drivs dessa stationer av dieselgeneratorersom konsumerar stora mängder diesel. Dieselförbränningen bidrar både till lokala och globalamiljöeffekter samt höga driftkostnader för mobiloperatörerna. Expansionen av mobilnätet sker i alltstörre utsträckning i områden i utvecklingsländer utan elförsörjning, vilket har ökat intresset föralternativa kraftkällor. Inom examensarbetet har ett redskap för jämförande livscykelanalys (LCA) av förnyelsebara krafthybridlösningarför radiobasstationer utvecklats. Hybriderna kombinerar solceller och vindturbinermed dieselförbränning och batterier. Genom att använda LCA inkluderas miljöeffekter från alla steg i hybridsystemets livscykel; frånutvinning av råmaterial och tillverkning av sub-system, transport, användning på RBS-siten till denslutliga avvecklingen. För att kunna utvärdera olika hybridkonfigurationer skapades 4 olika delmodeller: en delmodell fördieselförbränning innefattande generator och dieselkonsumption, en batteri-delmodell, en PVdelmodellsamt en vindturbin-delmodell. Delmodellerna inkluderar även nödvändiga komponentersom betonggrund till generatorer, PV-modulerna och batteribanken. Antal dieselgeneratorer,battericeller, vindturbiner samt PV-moduler och liter dieselkonsumption kan varieras för att simuleraen specifik anläggning. En hybridlösning med 21 m2 solceller, en vindturbin, 36 stycken (12V) battericeller och endieselgenerator som konsumerar 1500 liter diesel per år analyserades. Hybridlösningen ger upphovtill miljöeffekter motsvarande mellan 11 och 16 procent, global uppvärmning motsvarande 13procent, av miljöeffekterna orsakade av en traditionell dieselkonfiguration som konsumerar omkring20000 liter diesel per år. Betydelsefulla parametrar som påverkar miljöeffekterna frånhybridlösningen förutom produktion och förbränning av diesel är vilken elektricitetsmix somanvänds vid tillverkning av de olika komponenterna och energiintensiva processer som kisel- ochblyframställning. Resultaten tydliggör de stora minskningar av miljöeffekterna som en övergång från dieselförbränningtill sol- och vindkraft på RBS-anläggningar kan ge. Den relativa förbättringen av att installeravindturbiner för att minimera mängden sol- och battericeller har även visats. Betydelsen avproduktionsplats och elektricitetsmix för den totala miljöpåverkan bör motivera Ericsson attkartlägga och välja tillverkare som innebär ett litet bidrag till de totala miljöeffekterna.
84

Closing of 3G Sites : Model for Decision Making

Chaudron, Emmanuel January 2018 (has links)
Radio access technologies evolving fast, mobile operators have to handle an increasing amount of base stations and frequency bands for their network to continue to function. This is a costly venture for mobile network operators that continuously have to keep up to date with never-ending advancements in technologies, as base stations are costly to build and to maintain. It is therefore necessary for these companies to investigate when to close down base stations that are not necessary anymore. With the upcoming release of 5G, it is expected that 3G is going to be less and less used—as of 2018, it is already less used than 4G in developed countries.This thesis analyses the corporate data of a mobile operator, Telenor Sweden, in order to make clear which metrics are important to take into account as regards to deciding whether or not to close down a base station. It provides methods and models to help a mobile operator to take such a decision. It focuses on UMTS (3G) base stations, even though the results can be generalized for other technologies as well.It evaluates the economic feasibility of closing a base station, with regards to how many users are still connecting to it. More importantly, it explains for what reasons users’ devices switch to 3G, and investigates what can be done to avoid switching from 4G to 3G, so as to make it easier to close down a 3G site. It provides eventually a model to help to know when closing a site, given the traffic data of the operator. / Radioåtkomstteknologier utvecklas snabbt, mobiloperatörer måste hantera en ökande mängd basstationer och frekvensband för att deras nätverk fortsätter att fungera. Detta är ett dyrt satsning för mobilnätoperatörer som kontinuerligt måste hålla sig uppdaterade med oändliga tekniska framsteg, eftersom basstationerna är kostsamma att bygga och underhålla. Det är därför nödvändigt för dessa företag att undersöka när man ska stänga basstationer som inte längre är nödvändiga. Med den kommande utgåvan av 5G förväntas 3G att bli mindre och mindre används. Från och med 2018 används den redan mindre än 4G i industriländer. Denna avhandling analyserar företagsdata från en mobiloperatör, Telenor, för att klargöra vilka mätvärden som är viktiga att ta hänsyn till när det gäller att avgöra om en basstation ska stängas eller inte. Det ger metoder och modeller för att hjälpa en mobiloperatör att fatta ett sådant beslut. Den fokuserar på UMTS (3G) basstationer, även om resultaten kan generaliseras för annan teknik också. Det utvärderar den ekonomiska möjligheten att stänga en basstation, med tanke på hur många användare som fortfarande ansluter till den. Viktigare är det att det förklaras av vilka anledningar användarens enheter växlar till 3G och undersöker vad som kan göras för att undvika att växla från 4G till 3G, så att det blir lättare att stänga en 3G-basstation. Det ger så småningom en modell som hjälper till att veta när man stänger en webbplats, med tanke på operatörens trafikdata.
85

Antenna Options for High Altitude IMT Base Stations (HIBS) in Cellular Networks

Magnusson, Harald January 2022 (has links)
This thesis is the result of a collaboration between Ericsson AB and Luleå University of Technology. A feasibility study has been conducted to investigate antenna options for the HIBS access link. The study contains two parts. Firstly, a link budget investigating the gain required from the antenna. The metric of concern in the link budget was SNR. Secondly, a wide area coverage investigation that explored coverage feasibility over an area with a radius of 100 km. The metrics of concern in this investigation were antenna gain and beamwidth. Two types of antennas have been included: parabolic reflector and phased array. Seven frequency bands have been studied: 0.7, 1.9, 2.7, 3.5, 6, 10, and 26 GHz. The first three bands shared a bandwidth of 20 MHz, the next three shared a bandwidth of 80 MHz, and the last band had a bandwidth of 100 MHz. This bandwidth difference was found to have a meaningful effect on SNR. The feasibility condition for the link budget was -6 dB SNR for uplink and 6 dB SNR for downlink. The link budget concluded that the first three bands (0.7, 1.9, and 2.7 GHz) are feasible with reasonably sized antennas. This meant a parabolic reflector dish diameter of 0.6 m for all three bands, or a phased array antenna with 4, 32, and 64 elements, respectively, that all resulted in a roughly equal physical size of the array. The 3.5 GHz frequency band was found to be feasible with a much larger antenna (512 element array). The bands above 3.5 GHz were not deemed feasible. The wide area investigation limited the antenna to a phased array antenna. Two cell layouts were considered for coverage: a 7 cell layout with one nadir cell surrounded by 6 cells and a 19 cell layout which encapsulates the former with another layer of 12 cells. The feasibility condition was that the half power beamwidth is equal to the angular size of a cell from the HIBS for each cell layer while maintaining gain. Beamwidth was controlled through array tapering and altering element configurations. This investigation concluded that coverage is feasible for two bands. In the 0.7 GHz band, the chosen option was a 7 cell layout using a single element antenna for the nadir cell and 3 by 1 arrays for the outer cells. In the 1.9 GHz band, the chosen option was a 19 cell layout with a single element antenna for the nadir cell, 5 by 1 arrays for the cells in the middle layer, and 8 by 5 arrays for the outer layer. Higher frequency bands required higher gain antennas which in turn did not provide adequate beamwidth for coverage.
86

Modeling of initial contention window size for successful initial ranging process in IEEE 802.22 WRAN cell

Afzal, Humaira, Awan, Irfan U., Mufti, Muhammad R., Sheriff, Ray E. 20 December 2014 (has links)
No / Avoiding collision among contending customer premise equipments (CPEs) attempting to associate with a base station (BS) in a wireless regional area network (WRAN) is a challenging issue. The collision probability is highly dependent upon the size of the initial contention window and the number of contending CPEs. To reduce the collision probability among CPEs in order to start the ranging process in an IEEE 802.22 network, the BS needs to adjust the initial contention window size. This paper provides an analytical framework to estimate the ranging request collision probability depending upon the size of the initial contention window and the number of CPEs attempting to join the IEEE WRAN cell. The accuracy of the estimated curve is analyzed for various numbers of contention CPEs on the basis of the relative errors. The numerical results confirm that the approximation works reasonably well for finding the ranging request collision probability for any number of contention CPEs at a particular value of initial contention window size. Moreover, this approximation provides the threshold size for a contention window to start the initial ranging process for any number of CPEs in an IEEE 802.22 network. (C) 2014 Elsevier B.V. All rights reserved.
87

合理隱私期待之研究-以定位科技為例 / A Study of Reasonable Expectation of Privacy- Case Studies related with Positioning Technology

李明勳, Li, Ming Shiun Unknown Date (has links)
大法官在釋字第689號解釋中,首次在解釋文中引進美國法上的「合理隱私期待」概念,以作為人民是否受到憲法隱私權保障的判定標準。事實上,「合理隱私期待」的概念在我國法上並不令人感到陌生。例如,通訊保障及監察法第3條第2項即明確規定:「前項所稱之通訊,以有事實足認受監察人對其通訊內容有『隱私或秘密之合理期待』者為限」。 除了尾隨、全天候視覺監控等類似的古老方法,隨著科技的進步,諸如以衛星為基礎的汽車導航系統、以基地台為基礎的行動電話定位服務等低成本、高效率的定位科技,可以更輕易且嚴重地侵害我們的私生活及隱私。當定位科技成為我們每天生活的一部分時,如何在這樣的脈絡下正確地操作「合理隱私期待」概念,已成為一項重要的議題。 惟國內學術文獻對於如何正確地操作「合理隱私期待」,似乎欠缺全面性地研究。為了填補國內的空白,本文進行了美國及台灣案例法之深入比較分析,尤其是關於合理隱私期待及定位裝置的判決。本文指出了以往我國及美國法院判決的問題,以及邏輯矛盾之處。為了達到更加一致、正確的判決結果,本文認為,在操作合理隱私期望概念時,法院應著重於四個因素,其分別是:「資訊的性質」、「侵害的手段」、「侵害的場所」及「第三人原則」。 / In J.Y. Interpretation No. 689, the Constitutional Court , for the first time, employs the concept of “reasonable expectation of privacy”, originated from the United States, in order to determine whether an individual enjoys a constitutionally protected right to privacy. The concept, however, is not new to our legal system. For example, Paragraph 2, Article 3 of the Communication Protection and Surveillance Act provides: “The communications referred to in the preceding paragraph shall be limited to those for which there is an adequate showing of facts that a person subject to surveillance would have a reasonable expectation of privacy or confidentiality with respect to the content of the communications.” In addition to tailing, around the clock visual surveillance and similar old-fashioned methods, with the advance in technology, our private life and privacy could be more easily and greatly intruded by low-cost, high-efficiency location positioning technology, such as satellite-based car navigation system and cell sites-based cellphone positioning service. When location positioning technology becomes part of our everyday life, how to properly apply the concept of “reasonable expectation of privacy” in this context has also become an important issue. So far, there seems to lack a comprehensive study on the aforementioned issue in domestic academic literature. To fill the gap, this thesis conducts an in-depth comparative analysis of both U.S. and Taiwan case law, especially those involving reasonable expectation of privacy and location positioning devices. This thesis points out the problems and logical inconsistencies in past decisions in both jurisdictions. In order to reach a more consistent and appropriate result, this thesis argues that when applying the reasonable expectation of privacy test, courts should focus on four factors which are: “nature of information,” “measure of infringement,” “the place where the intrusion happens,” and “third party doctrine.”
88

SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure

Megahed, Mohamed Helmy Mostafa 30 May 2014 (has links)
Surveillance wireless sensor networks (WSNs) are highly vulnerable to the failure of the base station (BS) because attackers can easily render the network useless for relatively long periods of time by only destroying the BS. The time and effort needed to destroy the BS is much less than that needed to destroy the numerous sensing nodes. Previous works have tackled BS failure by deploying a mobile BS or by using multiple BSs, which requires extra cost. Moreover, despite using the best electronic countermeasures, intrusion tolerance systems and anti-traffic analysis strategies to protect the BSs, an adversary can still destroy them. The new BS cannot trust the deployed sensor nodes. Also, previous works lack both the procedures to ensure network reliability and security during BS failure such as storing then sending reports concerning security threats against nodes to the new BS and the procedures to verify the trustworthiness of the deployed sensing nodes. Otherwise, a new WSN must be re-deployed which involves a high cost and requires time for the deployment and setup of the new WSN. In this thesis, we address the problem of reliable recovery from a BS failure by proposing a new security architecture called Surveillance Security (SurvSec). SurvSec continuously monitors the network for security threats and stores data related to node security, detects and authenticates the new BS, and recovers the stored data at the new BS. SurvSec includes encryption for security-related information using an efficient dynamic secret sharing algorithm, where previous work has high computations for dynamic secret sharing. SurvSec includes compromised nodes detection protocol against collaborative work of attackers working at the same time where previous works have been inefficient against collaborative work of attackers working at the same time. SurvSec includes a key management scheme for homogenous WSN, where previous works assume heterogeneous WSN using High-end Sensor Nodes (HSN) which are the best target for the attackers. SurvSec includes efficient encryption architecture against quantum computers with a low time delay for encryption and decryption, where previous works have had high time delay to encrypt and decrypt large data size, where AES-256 has 14 rounds and high delay. SurvSec consists of five components, which are: 1. A Hierarchical Data Storage and Data Recovery System. 2. Security for the Stored Data using a new dynamic secret sharing algorithm. 3. A Compromised-Nodes Detection Algorithm at the first stage. 4. A Hybrid and Dynamic Key Management scheme for homogenous network. 5. Powerful Encryption Architecture for post-quantum computers with low time delay. In this thesis, we introduce six new contributions which are the followings: 1. The development of the new security architecture called Surveillance Security (SurvSec) based on distributed Security Managers (SMs) to enable distributed network security and distributed secure storage. 2. The design of a new dynamic secret sharing algorithm to secure the stored data by using distributed users tables. 3. A new algorithm to detect compromised nodes at the first stage, when a group of attackers capture many legitimate nodes after the base station destruction. This algorithm is designed to be resistant against a group of attackers working at the same time to compromise many legitimate nodes during the base station failure. 4. A hybrid and dynamic key management scheme for homogenous network which is called certificates shared verification key management. 5. A new encryption architecture which is called the spread spectrum encryption architecture SSEA to resist quantum-computers attacks. 6. Hardware implementation of reliable network recovery from BS failure. The description of the new security architecture SurvSec components is done followed by a simulation and analytical study of the proposed solutions to show its performance.
89

SurvSec Security Architecture for Reliable Surveillance WSN Recovery from Base Station Failure

Megahed, Mohamed Helmy Mostafa January 2014 (has links)
Surveillance wireless sensor networks (WSNs) are highly vulnerable to the failure of the base station (BS) because attackers can easily render the network useless for relatively long periods of time by only destroying the BS. The time and effort needed to destroy the BS is much less than that needed to destroy the numerous sensing nodes. Previous works have tackled BS failure by deploying a mobile BS or by using multiple BSs, which requires extra cost. Moreover, despite using the best electronic countermeasures, intrusion tolerance systems and anti-traffic analysis strategies to protect the BSs, an adversary can still destroy them. The new BS cannot trust the deployed sensor nodes. Also, previous works lack both the procedures to ensure network reliability and security during BS failure such as storing then sending reports concerning security threats against nodes to the new BS and the procedures to verify the trustworthiness of the deployed sensing nodes. Otherwise, a new WSN must be re-deployed which involves a high cost and requires time for the deployment and setup of the new WSN. In this thesis, we address the problem of reliable recovery from a BS failure by proposing a new security architecture called Surveillance Security (SurvSec). SurvSec continuously monitors the network for security threats and stores data related to node security, detects and authenticates the new BS, and recovers the stored data at the new BS. SurvSec includes encryption for security-related information using an efficient dynamic secret sharing algorithm, where previous work has high computations for dynamic secret sharing. SurvSec includes compromised nodes detection protocol against collaborative work of attackers working at the same time where previous works have been inefficient against collaborative work of attackers working at the same time. SurvSec includes a key management scheme for homogenous WSN, where previous works assume heterogeneous WSN using High-end Sensor Nodes (HSN) which are the best target for the attackers. SurvSec includes efficient encryption architecture against quantum computers with a low time delay for encryption and decryption, where previous works have had high time delay to encrypt and decrypt large data size, where AES-256 has 14 rounds and high delay. SurvSec consists of five components, which are: 1. A Hierarchical Data Storage and Data Recovery System. 2. Security for the Stored Data using a new dynamic secret sharing algorithm. 3. A Compromised-Nodes Detection Algorithm at the first stage. 4. A Hybrid and Dynamic Key Management scheme for homogenous network. 5. Powerful Encryption Architecture for post-quantum computers with low time delay. In this thesis, we introduce six new contributions which are the followings: 1. The development of the new security architecture called Surveillance Security (SurvSec) based on distributed Security Managers (SMs) to enable distributed network security and distributed secure storage. 2. The design of a new dynamic secret sharing algorithm to secure the stored data by using distributed users tables. 3. A new algorithm to detect compromised nodes at the first stage, when a group of attackers capture many legitimate nodes after the base station destruction. This algorithm is designed to be resistant against a group of attackers working at the same time to compromise many legitimate nodes during the base station failure. 4. A hybrid and dynamic key management scheme for homogenous network which is called certificates shared verification key management. 5. A new encryption architecture which is called the spread spectrum encryption architecture SSEA to resist quantum-computers attacks. 6. Hardware implementation of reliable network recovery from BS failure. The description of the new security architecture SurvSec components is done followed by a simulation and analytical study of the proposed solutions to show its performance.

Page generated in 0.1976 seconds