• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 220
  • 50
  • 24
  • 23
  • 20
  • 16
  • 10
  • 8
  • 6
  • 5
  • 4
  • 4
  • 3
  • 2
  • 2
  • Tagged with
  • 503
  • 108
  • 107
  • 79
  • 78
  • 73
  • 73
  • 59
  • 56
  • 51
  • 51
  • 48
  • 47
  • 46
  • 46
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

2008 - ett år för mobil-tv-marknadens utbredning? Drivkrafter hinder och aktörer

Engstrand, Hilda January 2007 (has links)
Abstract Title: 2008- the year of the mobile-TV-markets expansion? (2008- ett år för mobil-tv-marknadens utbredning? Drivkrafter hinder och aktörer). Number of pages: 50 Author: Hilda Engstrand Tutor: Lowe Hedman Course: Media and Communication Studies C Period: Fall Semester 2007 University: Division of Media and Communication, Department of Information Science, Uppsala University. Purpose/Aim: The aim of this research paper is to identify the main operators on the mobile-tv-market and to map out the main forces behind its growth. What are the driving forces that creates a new disribution-market? Also to study how political media-regulation effect and urge the mobile-tv- market. Material/Method: Interviews with people from the mobile-tv-market. To read public-documents, press releases and reports from the government, media-companies and organisations has also been a method used to gain information. Main results: That the mobile-tv-markets growth is a result of several driving forces. Political regulation is an important force that can make a difference in how and when the mobile-tv-market will expand. My research has also showed that it is beneficial if operators on the market co-operate in different ways. Keywords: Mobile TV, Communication Techniques, Political Regulation, Broadcast Standards, New Media
182

Mobile Satellite Broadcast and Multichannel Communications : analysis and design

Martin, Cristoff January 2005 (has links)
In this thesis, analytical analysis and design techniques for wireless communications with diversity are studied. The impact of impairments such as correlated fading is analyzed using statistical models. Countermeasures designed to overcome, or even exploit, such effects are proposed and examined. In particular two applications are considered, satellite broadcast to vehicular terminals and communication using transmitters and receivers equipped with multiple antennas. Mobile satellite broadcast systems offer the possibility of high data rate services with reliability and ubiquitous coverage. The design of system architectures providing such services requires complex trade-offs involving technical, economical, and regulatory aspects. A satisfactory availability can be ensured using space, terrestrial, and time diversity techniques. The amount of applied diversity affects the spectral efficiency and system performance. Also, dedicated satellite and terrestrial networks represent significant investments and regulatory limitations may further complicate system design. The work presented in this thesis provides insights to the technical aspects of the trade-offs above. This is done by deriving an efficient method for estimating what resources in terms of spectrum and delay are required for a broadcast service to reach a satisfactory number of end users using a well designed system. The results are based on statistical models of the mobile satellite channel for which efficient analytical design and error rate estimation methods are derived. We also provide insight to the achievable spectral efficiency using different transmitter and receiver configurations. Multiple-element antenna communication is a promising technology for future high speed wireless infrastructures. By adding a spatial dimension, radio resources in terms of transmission power and spectrum can be used more efficiently. Much of the design and analysis work has focused on cases where the transmitter either has access to perfect channel state information or it is blind and the spatial channels are uncorrelated. Herein, systems where the fading of the spatial channels is correlated and/or the transmitter has access to partial channel state information are considered. While maintaining perfect channel knowledge at the transmitter may prove difficult, updating parameters that change on a slower time scale could be realistic. Here we formulate analysis and design techniques based on statistical models of the multichannel propagation. Fundamental properties of the multi-element antenna channel and limitations given by information theory are investigated under an asymptotic assumption on the number of antennas on either side of the system. For example, limiting normal distributions are derived for the squared singular values of the channel matrix and the mutual information. We also propose and examine a practical scheme capable of exploiting partial channel state information. In both applications outlined above, by using statistical models of the channel characteristics in the system design, performance can be improved. The main contribution of this thesis is the development of efficient techniques for estimating the system performance in different scenarios. Such techniques are vital to obtain insights to the impact of different impairments and how countermeasures against these should be designed. / QC 20101019
183

Light-Weight Authentication Schemes with Applications to RFID Systems

Malek, Behzad 03 May 2011 (has links)
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems is authentication of tags and readers. RFID tags are very constrained in terms of power, memory and size of circuit. Therefore, RFID tags are not capable of performing sophisticated cryptographic operations. In this dissertation, we have designed light-weight authentication schemes to securely identify the RFID tags to readers and vice versa. The authentication schemes require simple binary operations and can be readily implemented in resource-constrained Radio Frequency Identi cation (RFID) tags. We provide a formal proof of security based on the di culty of solving the Syndrome Decoding (SD) problem. Authentication veri es the unique identity of an RFID tag making it possible to track a tag across multiple readers. We further protect the identity of RFID tags by a light-weight privacy protecting identifi cation scheme based on the di culty of the Learning Parity with Noise (LPN) complexity assumption. To protect RFID tags authentication against the relay attacks, we have designed a resistance scheme in the analog realm that does not have the practicality issues of existing solutions. Our scheme is based on the chaos-suppression theory and it is robust to inconsistencies, such as noise and parameters mismatch. Furthermore, our solutions are based on asymmetric-key algorithms that better facilitate the distribution of cryptographic keys in large systems. We have provided a secure broadcast encryption protocol to effi ciently distribute cryptographic keys throughout the system with minimal communication overheads. The security of the proposed protocol is formally proven in the adaptive adversary model, which simulates the attacker in the real world.
184

Light-Weight Authentication Schemes with Applications to RFID Systems

Malek, Behzad 03 May 2011 (has links)
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems is authentication of tags and readers. RFID tags are very constrained in terms of power, memory and size of circuit. Therefore, RFID tags are not capable of performing sophisticated cryptographic operations. In this dissertation, we have designed light-weight authentication schemes to securely identify the RFID tags to readers and vice versa. The authentication schemes require simple binary operations and can be readily implemented in resource-constrained Radio Frequency Identi cation (RFID) tags. We provide a formal proof of security based on the di culty of solving the Syndrome Decoding (SD) problem. Authentication veri es the unique identity of an RFID tag making it possible to track a tag across multiple readers. We further protect the identity of RFID tags by a light-weight privacy protecting identifi cation scheme based on the di culty of the Learning Parity with Noise (LPN) complexity assumption. To protect RFID tags authentication against the relay attacks, we have designed a resistance scheme in the analog realm that does not have the practicality issues of existing solutions. Our scheme is based on the chaos-suppression theory and it is robust to inconsistencies, such as noise and parameters mismatch. Furthermore, our solutions are based on asymmetric-key algorithms that better facilitate the distribution of cryptographic keys in large systems. We have provided a secure broadcast encryption protocol to effi ciently distribute cryptographic keys throughout the system with minimal communication overheads. The security of the proposed protocol is formally proven in the adaptive adversary model, which simulates the attacker in the real world.
185

A Security Analysis of Some Physical Content Distribution Systems

Jiayuan, Sui January 2008 (has links)
Content distribution systems are essentially content protection systems that protect premium multimedia content from being illegally distributed. Physical content distribution systems form a subset of content distribution systems with which the content is distributed via physical media such as CDs, Blu-ray discs, etc. This thesis studies physical content distribution systems. Specifically, we concentrate our study on the design and analysis of three key components of the system: broadcast encryption for stateless receivers, mutual authentication with key agreement, and traitor tracing. The context in which we study these components is the Advanced Access Content System (AACS). We identify weaknesses present in AACS, and we also propose improvements to make the original system more secure, flexible and efficient.
186

Optimal Power Allocation for a Successive Refinable Source with Multiple Descriptions over a Fading Relay Channel Using Broadcast/Multicast Strategies

Shi, Kun January 2009 (has links)
In a wireless fading relay system with multicast/broadcast transmission, one of the most crucial challenges is the optimization of a transmission rate under multiuser channel diversity. Previously reported solutions for mitigating the vicious effect due to multi-user channel diversity have been mainly based on superposition coded multicast, where an optimal power allocation to each layer of modulated signals is determined. Many previous studies investigated a harmonic interplay between the successively re nable (SR) content source and a layered modulation via superposition coding (SPC) over the multicast/broadcast channels. By jointly considering the successive re nement characteristic at the source and the dependency of the layered modulation at the channel, a graceful fexibility can be achieved on a group of users with di erent channel realizations. Here most of the receivers are supposed to obtain the base quality layer information modulated in a lower rate, while the receivers with better channel realizations will obtain more information by re ning the base quality layer information using the enhancement quality layer information. In particular, the optimal power allocation for a SR source over a fading relay channel using broadcast/multicast strategy can be determined such that the minimum distortion of total received information is produced. However, a quality layer of data in a successively refined source may not be decodable if there is any loss of channel codewords, even if the corresponding longterm channel realization is su cient for decoding. To overcome this problem, one of the previous studies introduced a framework of coded video multicast, where multiple description coding (MDC) is applied to an SR content source and is further mapped into a layered modulation via SPC at the channel. Up till now, there has not been a rigorous proof provided on the bene t of manipulating the two coding techniques, (i.e. MDC and SPC), nor has any systematic optimization approach been developed for quantifying the parameter selection. Cooperative relaying in wireless networks has recently received much attention. Because the received signal can be severely degraded due to fading in wireless communications, time, frequency and spatial diversity techniques are introduced to overcome fading. Spatial diversity is typically envisioned as having multiple transmit and/or receive antennas. Cooperation can be used here to provide higher rates and results in a more robust system. Recently proposed cooperation schemes, which take into account the practical constraint that the relay cannot transmit and receive at the same time, include amplify-forward(AF), decode-forward(DF), and compress-forward(CF). In this study, in a fading relay scenario, a proposed framework is investigated to tackle the task of layered power allocation, where an in-depth study is conducted on achieving an optimal power allocation in SPC, such that the information distortion perceived at the users can be minimized. This thesis provides a comprehensive formulation on the information distortion at the receivers and a suite of solution approaches for the developed optimization problem by jointly considering MDC and SPC parameter selection over the fading relay channel.
187

Joint Source Channel Coding in Broadcast and Relay Channels: A Non-Asymptotic End-to-End Distortion Approach

Ho, James January 2013 (has links)
The paradigm of separate source-channel coding is inspired by Shannon's separation result, which implies the asymptotic optimality of designing source and channel coding independently from each other. The result exploits the fact that channel error probabilities can be made arbitrarily small, as long as the block length of the channel code can be made arbitrarily large. However, this is not possible in practice, where the block length is either fixed or restricted to a range of finite values. As a result, the optimality of source and channel coding separation becomes unknown, leading researchers to consider joint source-channel coding (JSCC) to further improve the performance of practical systems that must operate in the finite block length regime. With this motivation, this thesis investigates the application of JSCC principles for multimedia communications over point-to-point, broadcast, and relay channels. All analyses are conducted from the perspective of end-to-end distortion (EED) for results that are applicable to channel codes with finite block lengths in pursuing insights into practical design. The thesis first revisits the fundamental open problem of the separation of source and channel coding in the finite block length regime. Derived formulations and numerical analyses for a source-channel coding system reveal many scenarios where the EED reduction is positive when pairing the channel-optimized source quantizer (COSQ) with an optimal channel code, hence establishing the invalidity of the separation theorem in the finite block length regime. With this, further improvements to JSCC systems are considered by augmenting error detection codes with the COSQ. Closed-form EED expressions for such system are derived, from which necessary optimality conditions are identified and used in proposed algorithms for system design. Results for both the point-to-point and broadcast channels demonstrate significant reductions to the EED without sacrificing bandwidth when considering a tradeoff between quantization and error detection coding rates. Lastly, the JSCC system is considered under relay channels, for which a computable measure of the EED is derived for any relay channel conditions with nonzero channel error probabilities. To emphasize the importance of analyzing JSCC systems under finite block lengths, the large sub-optimality in performance is demonstrated when solving the power allocation configuration problem according to capacity-based formulations that disregard channel errors, as opposed to those based on the EED. Although this thesis only considers one JSCC setup of many, it is concluded that consideration of JSCC systems from a non-asymptotic perspective not only is more meaningful, but also reveals more relevant insight into practical system design. This thesis accomplishes such by maintaining the EED as a measure of system performance in each of the considered point-to-point, broadcast, and relay cases.
188

A Security Analysis of Some Physical Content Distribution Systems

Jiayuan, Sui January 2008 (has links)
Content distribution systems are essentially content protection systems that protect premium multimedia content from being illegally distributed. Physical content distribution systems form a subset of content distribution systems with which the content is distributed via physical media such as CDs, Blu-ray discs, etc. This thesis studies physical content distribution systems. Specifically, we concentrate our study on the design and analysis of three key components of the system: broadcast encryption for stateless receivers, mutual authentication with key agreement, and traitor tracing. The context in which we study these components is the Advanced Access Content System (AACS). We identify weaknesses present in AACS, and we also propose improvements to make the original system more secure, flexible and efficient.
189

Optimal Power Allocation for a Successive Refinable Source with Multiple Descriptions over a Fading Relay Channel Using Broadcast/Multicast Strategies

Shi, Kun January 2009 (has links)
In a wireless fading relay system with multicast/broadcast transmission, one of the most crucial challenges is the optimization of a transmission rate under multiuser channel diversity. Previously reported solutions for mitigating the vicious effect due to multi-user channel diversity have been mainly based on superposition coded multicast, where an optimal power allocation to each layer of modulated signals is determined. Many previous studies investigated a harmonic interplay between the successively re nable (SR) content source and a layered modulation via superposition coding (SPC) over the multicast/broadcast channels. By jointly considering the successive re nement characteristic at the source and the dependency of the layered modulation at the channel, a graceful fexibility can be achieved on a group of users with di erent channel realizations. Here most of the receivers are supposed to obtain the base quality layer information modulated in a lower rate, while the receivers with better channel realizations will obtain more information by re ning the base quality layer information using the enhancement quality layer information. In particular, the optimal power allocation for a SR source over a fading relay channel using broadcast/multicast strategy can be determined such that the minimum distortion of total received information is produced. However, a quality layer of data in a successively refined source may not be decodable if there is any loss of channel codewords, even if the corresponding longterm channel realization is su cient for decoding. To overcome this problem, one of the previous studies introduced a framework of coded video multicast, where multiple description coding (MDC) is applied to an SR content source and is further mapped into a layered modulation via SPC at the channel. Up till now, there has not been a rigorous proof provided on the bene t of manipulating the two coding techniques, (i.e. MDC and SPC), nor has any systematic optimization approach been developed for quantifying the parameter selection. Cooperative relaying in wireless networks has recently received much attention. Because the received signal can be severely degraded due to fading in wireless communications, time, frequency and spatial diversity techniques are introduced to overcome fading. Spatial diversity is typically envisioned as having multiple transmit and/or receive antennas. Cooperation can be used here to provide higher rates and results in a more robust system. Recently proposed cooperation schemes, which take into account the practical constraint that the relay cannot transmit and receive at the same time, include amplify-forward(AF), decode-forward(DF), and compress-forward(CF). In this study, in a fading relay scenario, a proposed framework is investigated to tackle the task of layered power allocation, where an in-depth study is conducted on achieving an optimal power allocation in SPC, such that the information distortion perceived at the users can be minimized. This thesis provides a comprehensive formulation on the information distortion at the receivers and a suite of solution approaches for the developed optimization problem by jointly considering MDC and SPC parameter selection over the fading relay channel.
190

Optimal Multiresolution Quantization for Broadcast Channels with Random Index Assignment

Teng, Fei 06 August 2010 (has links)
Shannon's classical separation result holds only in the limit of infinite source code dimension and infinite channel code block length. In addition, Shannon theory does not address the design of good source codes when the probability of channel error is nonzero, which is inevitable for finite-length channel codes. Thus, for practical systems, a joint source and channel code design could improve performance for finite dimension source code and finite block length channel code, as well as complexity and delay. Consider a multicast system over a broadcast channel, where different end users typically have different capacities. To support such user or capacity diversity, it is desirable to encode the source to be broadcasted into a scalable bit stream along which multiple resolutions of the source can be reconstructed progressively from left to right. Such source coding technique is called multiresolution source coding. In wireless communications, joint source channel coding (JSCC) has attracted wide attention due to its adaptivity to time-varying channels. However, there are few works on joint source channel coding for network multicast, especially for the optimal source coding over broadcast channels. In this work, we aim at designing and analyzing the optimal multiresolution vector quantization (MRVQ) in conjunction with the subsequent broadcast channel over which the coded scalable bit stream would be transmitted. By adopting random index assignment (RIA) to link MRVQ for the source with superposition coding for the broadcast channel, we establish a closed-form formula of end-to-end distortion for a tandem system of MRVQ and a broadcast channel. From this formula we analyze the intrinsic structure of end-to-end distortion (EED) in a communication system and derive two necessary conditions for optimal multiresolution vector quantization over broadcast channels with random index assignment. According to the two necessary conditions, we propose a greedy iterative algorithm for jointly designed MRVQ with channel conditions, which depends on the channel only through several types of average channel error probabilities rather than the complete knowledge of the channel. Experiments show that MRVQ designed by the proposed algorithm significantly outperforms conventional MRVQ designed without channel information. By building an closed-form formula for the weighted EED with RIA, it also makes the computational complexity incurred during the performance analysis feasible. In comparison with MRVQ design for a fixed index assignment, the computation complexity for quantization design is significantly reduced by using random index assignment. In addition, simulations indicate that our proposed algorithm shows better robustness against channel mismatch than MRVQ design with a fixed index assignment, simply due to the nature of using only the average channel information. Therefore, we conclude that our proposed algorithm is more appropriate in both wireless communications and applications where the complete knowledge of the channel is hard to obtain. Furthermore, we propose two novel algorithms for MRVQ over broadcast channels. One aims to optimize the two corresponding quantizers at two layers alternatively and iteratively, and the other applies under the constraint that each encoding cell is convex and contains the reconstruction point. Finally, we analyze the asymptotic performance of weighted EED for the optimal joint MRVQ. The asymptotic result provides a theoretically achievable quantizer performance level and sheds light on the design of the optimal MRVQ over broadcast channel from a different aspect.

Page generated in 0.0276 seconds