• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1877
  • 347
  • 318
  • 250
  • 156
  • 112
  • 90
  • 73
  • 70
  • 56
  • 36
  • 33
  • 21
  • 14
  • 13
  • Tagged with
  • 4197
  • 461
  • 429
  • 330
  • 316
  • 310
  • 302
  • 279
  • 262
  • 245
  • 244
  • 242
  • 242
  • 231
  • 220
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

New bounding techniques for channel codes over quasi-static fading channels

Hu, Jingyu 01 April 2005 (has links)
This thesis is intended to provide several new bounding techniques for channel codes over quasi-static fading channels (QSFC). This type of channel has drawn more and more attention recently with the demanding need for higher capacity and more reliable wireless communication systems. Although there have been some published results on analyzing the performance of channel codes over QSFCs, most of them produced quite loose performance upper bounds. In this thesis, the general Gallager bounding approach which provides convergent upper bounds of coded systems over QSFCs is addressed first. It is shown that previous Gallager bounds employing trivial low SNR bounds tended to be quite loose. Then improved low instantaneous SNR bounds are derived for two classes of convolutional codes including turbo codes. Consequently, they are combined with the classical Union-Chernoff bound to produce new performance upper bounds for simple convolutional and turbo codes over single-input single-output (SISO) QSFCs. The new bound provides a much improved alternative to characterizing the performance of channel codes over QSFCs over the existing ones. Next the new bounding approach is extended to cases of serially concatenated space-time block codes, which show equivalence with SISO QSFCs. Tighter performance bounds are derived for this coding scheme for two specific cases: first a convolutional code, and later a turbo code. Finally, the more challenging cases of multiple-input multiple-output (MIMO) QSFCs are investigated. Several performance upper bounds are derived for the bit error probability of different cases of space-time trellis codes (STTC) over QSFCs using a new and tight low SNR bound. Also included in this work is an algorithm for computing the unusual information eigenvalue spectrum of STTCs.
332

Iterative receivers for OFDM systems with dispersive fading and frequency offset

Liu, Hui 30 September 2004 (has links)
The presence of dispersive fading and inter-carrier interference (ICI) constitute the major impediment to reliable communications in orthogonal frequency-division multiplexing (OFDM) systems. Recently iterative (``Turbo'') processing techniques, which have been successfully applied to many detection/decoding problems, have received considerable attention. In this thesis, we first aim on the design of iterative receiver for single antenna OFDM system with frequency offset and dispersive fading. Further work is then extended to space-time block coded (STBC) OFDM system. At last, the technique is applied to STBC-OFDM system through a newly built channel model, which is based on a physical description of the propagation environment. The performance of such systems are verified by computer simulations. The simulation results show that the iterative techniques work well in OFDM systems.
333

Essays on multichannel marketing

Kushwaha, Tarun Lalbahadur 15 May 2009 (has links)
Multichannel marketing is the practice of simultaneously offering information, goods, services, and support to customers through two or more synchronized channels. In this dissertation, I develop an integrated framework of multichannel marketing and develop models to assist managers in their marketing resource allocation decisions. In the first essay of the dissertation, I investigate the factors that drive customers multichannel shopping behavior and identify its consequences for retailers. In the second essay, I build on this work and develop a model that enables firms to optimize their allocation of marketing resources across different customer-channel segments. In the first essay, I develop a framework comprising the factors that drive consumers’ channel choice, the consequences of channel choice, and their implications for managing channel equity. The results show that customer-channel choice is driven in a nonlinear fashion by a customer demographic variable such as age and is also influenced by consumer shopping traits such as number of categories bought and the duration of relationship with a retailer. I show that by controlling for the moderating effects of channel-category associations, the influence of customers’ demographics and shopping traits on their channel choices can vary significantly across product categories. Importantly, the results show that multichannel shoppers buy more often, buy more items, and spend considerably more than single channel shoppers. The channel equity of multichannel customers is nearly twice that of the closest single channel customers (online or offline). In the second essay, I propose a model for optimal allocation of marketing efforts across multiple customer-channel segments. I first develop a set of models for consumer response to marketing efforts for each channel-customer segment. This set comprises four models, the first for purchase frequency, the second for purchase quantity, the third for product return behavior, and the fourth for contribution margin of purchase. The results show that customers’ responses to firm marketing efforts vary significantly across the customer-channel segments. They also suggest that marketing efforts influence purchase frequency, purchase quantity and monetary value in different ways. The resource allocation results show that profits can be substantially improved by reallocating marketing efforts across the different customer-channel segments.
334

Key Agreement over Wiretap Models with Non-Causal Side Information

Zibaeenejad, Ali January 2012 (has links)
The security of information is an indispensable element of a communication system when transmitted signals are vulnerable to eavesdropping. This issue is a challenging problem in a wireless network as propagated signals can be easily captured by unauthorized receivers, and so achieving a perfectly secure communication is a desire in such a wiretap channel. On the other hand, cryptographic algorithms usually lack to attain this goal due to the following restrictive assumptions made for their design. First, wiretappers basically have limited computational power and time. Second, each authorized party has often access to a reasonably large sequence of uniform random bits concealed from wiretappers. To guarantee the security of information, Information Theory (IT) offers the following two approaches based on physical-layer security. First, IT suggests using wiretap (block) codes to securely and reliably transmit messages over a noisy wiretap channel. No confidential common key is usually required for the wiretap codes. The secrecy problem investigates an optimum wiretap code that achieves the secrecy capacity of a given wiretap channel. Second, IT introduces key agreement (block) codes to exchange keys between legitimate parties over a wiretap model. The agreed keys are to be reliable, secure, and (uniformly) random, at least in an asymptotic sense, such that they can be finally employed in symmetric key cryptography for data transmission. The key agreement problem investigates an optimum key agreement code that obtains the key capacity of a given wiretap model. In this thesis, we study the key agreement problem for two wiretap models: a Discrete Memoryless (DM) model and a Gaussian model. Each model consists of a wiretap channel paralleled with an authenticated public channel. The wiretap channel is from a transmitter, called Alice, to an authorized receiver, called Bob, and to a wiretapper, called Eve. The Probability Transition Function (PTF) of the wiretap channel is controlled by a random sequence of Channel State Information (CSI), which is assumed to be non-causally available at Alice. The capacity of the public channel is C_P₁∈[0,∞) in the forward direction from Alice to Bob and C_P₂∈[0,∞) in the backward direction from Bob to Alice. For each model, the key capacity as a function of the pair (C_P₁, C_P₂) is denoted by C_K(C_P₁, C_P₂). We investigate the forward key capacity of each model, i.e., C_K(C_P₁, 0) in this thesis. We also study the key generation over the Gaussian model when Eve's channel is less noisy than Bob's. In the DM model, the wiretap channel is a Discrete Memoryless State-dependent Wiretap Channel (DM-SWC) in which Bob and Eve each may also have access to a sequence of Side Information (SI) dependent on the CSI. We establish a Lower Bound (LB) and an Upper Bound (UB) on the forward key capacity of the DM model. When the model is less noisy in Bob's favor, another UB on the forward key capacity is derived. The achievable key agreement code is asymptotically optimum as C_P₁→ ∞. For any given DM model, there also exists a finite capacity C⁰_P₁, which is determined by the DM-SWC, such that the forward key capacity is achievable if C_P₁≥ C⁰_P₁. Moreover, the key generation is saturated at capacity C_P₁= C⁰_P₁, and thus increasing the public channel capacity beyond C⁰_P₁ makes no improvement on the forward key capacity of the DM model. If the CSI is fully known at Bob in addition to Alice, C⁰_P₁=0, and so the public channel has no contribution in key generation when the public channel is in the forward direction. The achievable key agreement code of the DM model exploits both a random generator and the CSI as resources for key generation at Alice. The randomness property of channel states can be employed for key generation, and so the agreed keys depend on the CSI in general. However, a message is independent of the CSI in a secrecy problem. Hence, we justify that the forward key capacity can exceed both the main channel capacity and the secrecy capacity of the DM-SWC. In the Gaussian model, the wiretap channel is a Gaussian State-dependent Wiretap Channel (G-SWC) with Additive White Gaussian Interference (AWGI) having average power Λ. For simplicity, no side information is assumed at Bob and Eve. Bob's channel and Eve's channel suffer from Additive White Gaussian Noise (AWGN), where the correlation coefficient between noise of Bob's channel and that of Eve's channel is given by ϱ. We prove that the forward key capacity of the Gaussian model is independent of ϱ. Moreover, we establish that the forward key capacity is positive unless Eve's channel is less noisy than Bob's. We also prove that the key capacity of the Gaussian model vanishes if the G-SWC is physically degraded in Eve's favor. However, we justify that obtaining a positive key capacity is feasible even if Eve's channel is less noisy than Bob's according to our achieved LB on the key capacity for case (C_P₁, C_P₂)→ (∞, ∞). Hence, the key capacity of the Gaussian model is a function of ϱ. In this thesis, an LB on the forward key capacity of the Gaussian model is achieved. For a fixed Λ, the achievable key agreement code is optimum for any C_P₁∈[0,∞) in both low Signal-to-Interference Ratio (SIR) and high SIR regimes. We show that the forward key capacity is asymptotically independent of C_P₁ and Λ as the SIR goes to infinity, and thus the public channel and the interference have negligible contributions in key generation in the high SIR regime. On the other hand, the forward key capacity is a function of C_P₁ and Λ in the low SIR regime. Contributions of the interference and the public channel in key generation are significant in the low SIR regime that will be illustrated by simulations. The proposed key agreement code asymptotically achieves the forward key capacity of the Gaussian model for any SIR as C_P₁→ ∞. Hence, C_K(∞,0) is calculated, and it is suggested as a UB on C_K(C_P₁,0). Using simulations, we also compute the minimum required C_P₁ for which the forward key capacity is upper bounded within a given tolerance. The achievable key agreement code is designed based on a generalized version of the Dirty Paper Coding (DPC) in which transmitted signals are correlated with the CSI. The correlation coefficient is to be determined by C_P₁. In contrast to the DM model, the LB on the forward key capacity of a Gaussian model is a strictly increasing function of C_P₁ according to our simulations. This fact is an essential difference between this model and the DM model. For C_P₁=0 and a fixed Λ, the forward key capacity of the Gaussian model exceeds the main channel capacity of the G-SWC in the low SIR regime. By simulations, we show that the interference enhances key generation in the low SIR regime. In this regime, we also justify that the positive effect of the interference on the (forward) key capacity is generally more than its positive effect on the secrecy capacity of the G-SWC, while the interference has no influence on the main channel capacity of the G-SWC.
335

The Role of Vorticity, Turbulence and Three-dimensional Flow Structure on the Development of Scour

Jamieson, Elizabeth Clare 09 September 2011 (has links)
Fundamental to the understanding of how rivers transform and shape our environment is the role of turbulence and complex, three-dimensional flow, such as vorticity, in sediment transport and erosion. However, classical sediment transport models (or formulae) are based, for the most part, on boundary shear stress and do not incorporate these natural phenomena. This is understandable given that the relationship between turbulence generation, intensity and form; the influence of turbulence on mobile sediment; and the magnitude and patterns of deposition and erosion are complex and difficult to quantify. Nevertheless, the failure to incorporate turbulence and complex, three-dimensional flow into existing models means that our understanding of sediment transport remains incomplete. The central hypothesis of this thesis is that vortical motion is the main factor in the development of local scour. To examine this, a comprehensive experimental approach was taken. This approach involved detailed measurements of the unique three-dimensional patterns of velocity, turbulence and bed morphology associated with flow in an open channel with and without the presence of submerged groyne-like structures (stream barbs and wing dikes) at both the laboratory and field scales. Using densely spaced velocity data and new techniques for processing and analyzing these data, it was possible to identify complex features of the flow field at both scales, such as the presence of vortex cores, and correlate these with changes in bed levels. These data provide a unique perspective of the spatial variability of velocity, turbulence and bed morphology in open channels (and in particular in channel bends, where flow is highly three-dimensional). In particular, it was found that, of the flow parameters analyzed, turbulent stresses were most correlated to scour in channel bends without the presence of structures. In contrast, vorticity was found to be the dominant factor in local scour hole development in the vicinity of submerged structures at both the laboratory and field scale. Such data are rare (if non-existent) in existing experimental research, particularly at the scale of a large natural river. This research also examines stream barb design and performance. Stream barbs (also known as submerged groynes or spur dikes) are a relatively novel approach to stream bank protection and are not common in Canada. The design and installation of stream barbs in a creek in Ottawa (Sawmill Creek) was undertaken to serve as a demonstration project for the use of these structures in a semi-alluvial channel, for which no such case studies exist. Three years of monitoring the site and the performance of these structures to reduce bank erosion and improve aquatic habitat have been carried out. Laboratory testing of stream barb performance was also undertaken and showed that with improper design, the outer bank in a channel bend may be more susceptible to erosion due to excessive local scour downstream of the barb. In particular, to avoid bank erosion downstream of the barb, barbs should be small, such that they create minimum flow obstruction, and include a bank key that is wider than the barb itself and extends in the downstream direction.
336

Loss of KATP Channel Activity in Mouse FDB Leads to an Impairment in Energy Metabolism During Fatigue

Scott, Kyle 03 May 2012 (has links)
Recently, it has been postulated that fatigue is a mechanism to protect the muscle fiber from deleterious ATP depletion and cell death. The ATP-sensitive potassium (KATP) channel is believed to play a major role in this mechanism. Under metabolic stress, the channels open, reducing membrane excitability, Ca2+ release and force production. This alleviates energy demand within the fiber, as activation of the channel reduces ATP consumption from cellular ATPases. Loss of KATP channel activity during fatigue results in excessive intracellular Ca2+ ([Ca2+]i) levels, likely entering the fiber through L-type Ca2+ channels. It has been demonstrated that when mouse muscle lacking functional KATP channels are stimulated to fatigue, ATP levels become significantly lower than wild type levels. Thus, it was hypothesized that a lack of KATP channel activity impairs energy metabolism, resulting in insufficient ATP production. The focus of work for this M.Sc. project was to test this hypothesis. Fatigue was elicited in Kir6.2-/- FDB muscles for three min followed by 15 min recovery. After 60 sec, a 2.6-fold greater glycogen breakdown was observed in Kir6.2-/- FDB compared to wild type FDB. However, this effect disappeared thereafter, as there were no longer any differences between wild type and Kir6.2-/- FDB in glycogen breakdown by 180 sec. Glucose oxidation after 60 sec was also greater in Kir6.2-/- FDB compared to wild type FDB. However, levels of oxidation failed to increase in Kir6.2-/- FDB from 60 to 180 sec. Calculated ATP production during the fatigue period was 2.7-times greater in Kir6.2-/- FDB, yet measured ATP levels during fatigue are much lower in Kir6.2-/- FDB compared to wild type FDB. Taken together, it appears that muscle energy metabolism is impaired in the absence KATP channel activity.
337

Conceptual design for a re-entrant type fuel channel for supercritical water-cooled nuclear reactors

Samuel, Jeffrey 01 April 2011 (has links)
Current CANDU-type nuclear reactors use a once-through fuel-channel with an annulus gas insulating it from the moderator. The current reference design for a CANDU-type SuperCritical Water-Cooled Reactor (SCWR) is to eliminate the annulus gap and use a ceramic insert to insulate the coolant from the moderator. While such a design may work, alternative fuel-channel design concepts are under development to explore the optimum efficiency of SCWRs. One such alternative approach is called the Re-Entrant fuel-channel. The Re-Entrant fuel-channel consists of three tubes, the inner tube (flow tube), pressure tube and an outer tube. The fuel bundles are placed in the inner tube. An annulus is formed between the flow and pressure tubes, through which the primary coolant flows. A ceramic insulator is placed between the pressure tube and the outer tube. The coolant flows through the annulus receiving heat from the inner tube from one end of the channel to another. At the far end, the flow will reverse direction and enter the inner tube, and hence the fuel-string. At the inlet, the temperature is 350°C for a high-pressure coolant (pressure of 25 MPa), which is just below the pseudocritical point. At the outlet, the temperature is about 625ºC at the same pressure (the pressure drop is small and can be neglected). The objective of this work was to design the Re-Entrant channel and to estimate the heat loss to the moderator for the proposed new fuel-channel design. A numerical model was developed and MATLAB was used to calculate the heat loss from the insulated Re-Entrant fuel-channel along with the temperature profiles and the heat transfer coefficients for a given set of flow, pressure, temperature and power boundary conditions. Thermophysical properties were obtained from NIST REFPROP software. With the results from the numerical model, the design of the Re-Entrant fuelchannel was optimized to improve its efficiency / UOIT
338

Parity Forwarding for Relay Networks

Razaghi, Peyman 02 March 2010 (has links)
In this dissertation, we introduce a relay protocol for multiple-relay networks called parity forwarding. The relay channel is a classic multiuser information theory problem introduced in 1971, modeling a network of three nodes: a source, a destination, and a relay node. The relay has no message of its own and assists the source to communicate to the destination. Of the two main coding techniques for the relay channel, decode-and-forward (DF) and compress-and-forward (CF), our focus is to understand the DF scheme for single- and multiple-relay channels. For the single-relay channel, we present an interpretation of the classic DF strategy from a linear-coding perspective. Identifying binning in the classic DF strategy as parity bit generation, we devise ensembles of low-density parity-check (LDPC) codes, called bilayer LDPC codes, to incorporate the parity bits generated by the relay in the decoding process at the destination. We develop code design techniques and optimize the parameters of the bilayer LDPC code structure to show that bilayer LDPC codes can approach the theoretical DF rate. Inspired by the relation between binning and parity bits, we introduce the parity forwarding protocol to improve on the achievable DF rate in a multiple-relay network. For a two-relay network, we show that the previous multihop DF protocol can be improved if the relays forward parity messages and receivers (relays or the destination)use a joint decoding scheme. Depending on the relation between relay messages and decoded messages at each relay, different parity forwarding protocols are possible. In this thesis, we present a structured characterization of a class of parity forwarding protocols for multiple-relay networks. We propose a tree structure to describe the relations between messages. Using this tree structure, we derive a closed-form expression for the parity forwarding rate in a relay network with an arbitrary number of relays. Finally, examples of new types of degraded multiple-relay networks are presented for which the parity forwarding protocol achieves capacity.
339

Parity Forwarding for Relay Networks

Razaghi, Peyman 02 March 2010 (has links)
In this dissertation, we introduce a relay protocol for multiple-relay networks called parity forwarding. The relay channel is a classic multiuser information theory problem introduced in 1971, modeling a network of three nodes: a source, a destination, and a relay node. The relay has no message of its own and assists the source to communicate to the destination. Of the two main coding techniques for the relay channel, decode-and-forward (DF) and compress-and-forward (CF), our focus is to understand the DF scheme for single- and multiple-relay channels. For the single-relay channel, we present an interpretation of the classic DF strategy from a linear-coding perspective. Identifying binning in the classic DF strategy as parity bit generation, we devise ensembles of low-density parity-check (LDPC) codes, called bilayer LDPC codes, to incorporate the parity bits generated by the relay in the decoding process at the destination. We develop code design techniques and optimize the parameters of the bilayer LDPC code structure to show that bilayer LDPC codes can approach the theoretical DF rate. Inspired by the relation between binning and parity bits, we introduce the parity forwarding protocol to improve on the achievable DF rate in a multiple-relay network. For a two-relay network, we show that the previous multihop DF protocol can be improved if the relays forward parity messages and receivers (relays or the destination)use a joint decoding scheme. Depending on the relation between relay messages and decoded messages at each relay, different parity forwarding protocols are possible. In this thesis, we present a structured characterization of a class of parity forwarding protocols for multiple-relay networks. We propose a tree structure to describe the relations between messages. Using this tree structure, we derive a closed-form expression for the parity forwarding rate in a relay network with an arbitrary number of relays. Finally, examples of new types of degraded multiple-relay networks are presented for which the parity forwarding protocol achieves capacity.
340

Interference Channel with State Information

Zhang, Lili 2012 August 1900 (has links)
In this dissertation, we study the state-dependent two-user interference channel, where the state information is non-causally known at both transmitters but unknown to either of the receivers. We first propose two coding schemes for the discrete memoryless case: simultaneous encoding for the sub-messages in the first one and super-position encoding in the second one, both with rate splitting and Gel'fand-Pinsker coding. The corresponding achievable rate regions are established. Moreover, for the Gaussian case, we focus on the simultaneous encoding scheme and propose an active interference cancellation mechanism, which is a generalized dirty-paper coding technique, to partially eliminate the state effect at the receivers. The corresponding achievable rate region is then derived. We also propose several heuristic schemes for some special cases: the strong interference case, the mixed interference case, and the weak interference case. For the strong and mixed interference case, numerical results are provided to show that active interference cancellation significantly enlarges the achievable rate region. For the weak interference case, flexible power splitting instead of active interference cancellation improves the performance significantly. Moreover, we focus on the simplest symmetric case, where both direct link gains are the same with each other, and both interfering link gains are the same with each other. We apply the above coding scheme with different dirty paper coding parameters. When the state is additive and symmetric at both receivers, we study both strong and weak interference scenarios and characterize the theoretical gap between the achievable symmetric rate and the upper bound, which is shown to be less than 1/4 bit for the strong interference case and less than 3/4 bit for the weak interference case. Then we provide numerical evaluations of the achievable rates against the upper bound, which validates the theoretical analysis for both strong and weak interference scenarios. Finally, we define the generalized degrees of freedom for the symmetric Gaussian case, and compare the lower bounds against the upper bounds for both strong and weak interference cases. We also show that our achievable schemes can obtain the exact optimal values of the generalized degrees of freedom, i.e., the lower bounds meet the upper bounds for both strong and weak interference cases.

Page generated in 0.0451 seconds