• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 196
  • 32
  • 23
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 464
  • 464
  • 161
  • 140
  • 113
  • 88
  • 74
  • 67
  • 63
  • 62
  • 51
  • 49
  • 48
  • 46
  • 40
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

Future of asynchronous transfer mode networking

Hachfi, Fakhreddine Mohamed 01 January 2004 (has links)
The growth of Asynchronous Transfer Mode (ATM) was considered to be the ideal carrier of the high bandwidth applications like video on demand and multimedia e-learning. ATM emerged commercially in the beginning of the 1990's. It was designed to provide a different quality of service at a speed up 100 Gbps for both real time and non real time application. The turn of the 90's saw a variety of technologies being developed. This project analyzes these technologies, compares them to the Asynchronous Transfer Mode and assesses the future of ATM.
332

A metaphoric cluster analysis of the rhetoric of digital technology

Marse, Michael Eugene, Negroponte, Nicholas 01 January 2005 (has links)
This thesis seeks to identify and explain some technology in order to more fully understand modern communication. This study makes use of metaphoric cluster analysis to examine the technological rhetoric of Nicholas Negroponte.
333

Symbol level decoding of Reed-Solomon codes with improved reliability information over fading channels

Ogundile, Olanyika Olaolu January 2016 (has links)
A thesis submitted to the Faculty of Engineering and the Built Environment, University of the Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of Doctor of Philosophy in the School of Electrical and Information Engineering, 2016 / Reliable and e cient data transmission have been the subject of current research, most especially in realistic channels such as the Rayleigh fading channels. The focus of every new technique is to improve the transmission reliability and to increase the transmission capacity of the communication links for more information to be transmitted. Modulation schemes such as M-ary Quadrature Amplitude Modulation (M-QAM) and Orthogonal Frequency Division Multiplexing (OFDM) were developed to increase the transmission capacity of communication links without additional bandwidth expansion, and to reduce the design complexity of communication systems. On the contrary, due to the varying nature of communication channels, the message transmission reliability is subjected to a couple of factors. These factors include the channel estimation techniques and Forward Error Correction schemes (FEC) used in improving the message reliability. Innumerable channel estimation techniques have been proposed independently, and in combination with di erent FEC schemes in order to improve the message reliability. The emphasis have been to improve the channel estimation performance, bandwidth and power consumption, and the implementation time complexity of the estimation techniques. Of particular interest, FEC schemes such as Reed-Solomon (RS) codes, Turbo codes, Low Density Parity Check (LDPC) codes, Hamming codes, and Permutation codes, are proposed to improve the message transmission reliability of communication links. Turbo and LDPC codes have been used extensively to combat the varying nature of communication channels, most especially in joint iterative channel estimation and decoding receiver structures. In this thesis, attention is focused on using RS codes to improve the message reliability of a communication link because RS codes have good capability of correcting random and burst errors, and are useful in di erent wireless applications. This study concentrates on symbol level soft decision decoding of RS codes. In this regards, a novel symbol level iterative soft decision decoder for RS codes based on parity-check equations is developed. This Parity-check matrix Transformation Algorithm (PTA) is based on the soft reliability information derived from the channel output in order to perform syndrome checks in an iterative process. Performance analysis verify that this developed PTA outperforms the conventional RS hard decision decoding algorithms and the symbol level Koetter and Vardy (KV ) RS soft decision decoding algorithm. In addition, this thesis develops an improved Distance Metric (DM) method of deriving reliability information over Rayleigh fading channels for combined demodulation with symbol level RS soft decision decoding algorithms. The newly proposed DM method incorporates the channel state information in deriving the soft reliability information over Rayleigh fading channels. Analysis verify that this developed metric enhances the performance of symbol level RS soft decision decoders in comparison with the conventional method. Although, in this thesis, the performance of the developed DM method of deriving soft reliability information over Rayleigh fading channels is only veri ed for symbol level RS soft decision decoders, it is applicable to any symbol level soft decision decoding FEC scheme. Besides, the performance of the all FEC decoding schemes plummet as a result of the Rayleigh fading channels. This engender the development of joint iterative channel estimation and decoding receiver structures in order to improve the message reliability, most especially with Turbo and LDPC codes as the FEC schemes. As such, this thesis develops the rst joint iterative channel estimation and Reed- Solomon decoding receiver structure. Essentially, the joint iterative channel estimation and RS decoding receiver is developed based on the existing symbol level soft decision KV algorithm. Consequently, the joint iterative channel estimation and RS decoding receiver is extended to the developed RS parity-check matrix transformation algorithm. The PTA provides design ease and exibility, and lesser computational time complexity in an iterative receiver structure in comparison with the KV algorithm. Generally, the ndings of this thesis are relevant in improving the message transmission reliability of a communication link with RS codes. For instance, it is pertinent to numerous data transmission technologies such as Digital Audio Broadcasting (DAB), Digital Video Broadcasting (DVB), Digital Subscriber Line (DSL), WiMAX, and long distance satellite communications. Equally, the developed, less computationally intensive, and performance e cient symbol level decoding algorithm for RS codes can be use in consumer technologies like compact disc and digital versatile disc. / GS2016
334

Voice flow control in integrated packet networks

Hayden, Howard Paul. January 1981 (has links)
Thesis (Elec.E.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1981. / Includes bibliographical references. / by Howard Paul Hayden. / Thesis (Elec.E.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1981.
335

Physical Layer Security of Wireless Transmissions Over Fading Channels

Unknown Date (has links)
The open nature of the wireless medium makes the wireless communication susceptible to eavesdropping attacks. In addition, fading and shadowing significantly degrade the performance of the communication system in the wireless networks. A versatile approach to circumvent the issues of eavesdropping attacks while exploiting the physical properties of the wireless channel is the so-called physical layer-security. In this work, we consider a model in which two legitimate users communicate in the presence of an eavesdropper. We investigate the performance of the wireless network at the physical layer that is subject to a variety of fading environments that may be modeled by the Rayleigh, Nakagami-m, and Generalized-K distributions, to mention a few. We use the secrecy outage probability (SOP) as the standard performance metrics to study the performance of the wireless networks. We propose two different approaches to compute the secrecy outage probability, and derive explicit expressions for the secrecy outage probability that allow us to characterize the performance of the wireless networks. Specifically, we use a direct integration approach as well as a Taylor series base approach to evaluate the secrecy outage probability. Finally, we use computer simulations, based on MATLAB, to confirm the analytical results. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2016. / FAU Electronic Theses and Dissertations Collection
336

Bolhas de ódio: o ódio como componente político nas dinâmicas interacionais societárias mediadas por Tecnologias de Comunicação Instantânea (TCIs) / Hate bubbles: hate as a political component of social interactional dynamics mediated by Instant Communication Technologies (ICTs)

Lobo, Denis Augusto Carneiro 09 March 2018 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-05-10T12:55:18Z No. of bitstreams: 1 Denis Augusto Carneiro Lobo.pdf: 2377689 bytes, checksum: ec66c81fcf1d6584b5311171b0eae5c2 (MD5) / Made available in DSpace on 2018-05-10T12:55:18Z (GMT). No. of bitstreams: 1 Denis Augusto Carneiro Lobo.pdf: 2377689 bytes, checksum: ec66c81fcf1d6584b5311171b0eae5c2 (MD5) Previous issue date: 2018-04-09 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / This master’s thesis analyses the constitution of the so-called Hate Speech in Digital Social Networks (DSNs), specifically, on Facebook. Starting from users’ text interactions in public Facebook pages of the 2014 presidential candidates Dilma Rousseff (Workers Party) and Aécio Neves (Brazilian Social Democracy Party) during the presidential run (August to October 2014), I’ve searched for the characterization of this phenomena within a political-party polarization scenario. Focusing in the political constitution of the referred phenomena, I’ve then evidenced the difference between the legal concept of Hate Speech and a more widespread phenomena, which worked in this scenario as a political component of the social interactions: the political hate. Furthermore, the debate gets centralized in the mediation process of social interactions in an Instant Communication Technology (ICTs) scenario, in search of a confluence with the Latin American studies about the process of technological and communicational mediation, its diferences and implications in an Interactional Sociology. Finally, having analysed such studies as a theorical and methodological background, I've presented a discussion about the importance of the new computational techniques such as "filter bubbles", "social bots" and User Experience (UX) in the daily life of today's liberal democracies, leading the debate to the establishment of "fear techniques", clearly an expression of the so-called "Fear Culture", to which many authors refeer today / Esta dissertação analisou a constituição do chamado Discurso de Ódio nas Redes Sociais Digitais (RSDs), mais especificamente no Facebook. Partindo das interações textuais dos usuários nas páginas públicas dos candidatos à Presidência da República no ano de 2014, Dilma Rousseff (PT) e Aécio Neves (PSDB), durante o pleito eleitoral (agosto a outubro de 2014), buscou-se a caracterização desse fenômeno dentro de um cenário de polarização político-partidária. Voltando o olhar para a constituição política do fenômeno em questão, buscou-se a diferenciação da figura jurídica do Discurso de Ódio de um fenômeno mais capilar, que funcionou como componente político das interações societárias nesse cenário: o ódio político. Além disso, centralizamos o debate nas interações sociais e na mediação das Tecnologias de Comunicação Instantânea (TCIs), buscando uma confluência com o pensamento latino-americano sobre os processos de mediação tecnológica e comunicacional e suas diferenciações e implicações em uma Sociologia Interacionista. Buscou-se também, a partir desse arcabouço teórico-metodológico, discutir os pesos das novas técnicas computacionais, como a “bolha de filtros”, os “social bots”, “fake news” e as técnicas de User Experience (UX) no cotidiano das democracias liberais atuais, direcionando o debate para o estabelecimento de “técnicas do medo”, visivelmente assentados na chamada “Cultura do Medo”, a qual muitos pesquisadores recorrem na atualidade
337

Consumerismo e consumidores indignados: netativismo contra as marcas nas redes sociais

Borges, Fábio Mariano 31 October 2017 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2017-12-11T11:12:22Z No. of bitstreams: 1 Fábio Mariano Borges.pdf: 24818396 bytes, checksum: 907b16881a5f0b26717b3573507ca0d4 (MD5) / Made available in DSpace on 2017-12-11T11:12:22Z (GMT). No. of bitstreams: 1 Fábio Mariano Borges.pdf: 24818396 bytes, checksum: 907b16881a5f0b26717b3573507ca0d4 (MD5) Previous issue date: 2017-10-31 / Digital activism or netativism is a recent advent and expression of the political exercise of users of the cyber world, especially of social networks. One of its types refers to the manifestations of the consumers against the companies through denunciations of crimes and attempt to promote boycott against them, in order to positive results for the collective. In this sense, consumption is seen as an area to political exercise, and this type of practice is even more democratized and accessible through social networks. The present study reflects about the reconfiguration of consumerism, very recently impacted by consumer netativism. Consumerism is a sociological term that names the set of consumer practices in order to exercise power, conquest, maintenance of rights and resistance to the commercial interests of the companies. The object of research is the manifestations of consumer indignation on Facebook between the years 2012 and 2017. For that, was conducted netnography, through monitoring the clashes between consumers and businesses on Facebook. In this sense, the study analyzes consumerism in the form of netativism, as a device of power, as well as consumption, both situated in the concept of biopolitics developed by Foucault / O ativismo digital ou netativismo é um advento recente e expressão do exercício político dos usuários do mundo cibernético, em especial das redes sociais. Uma de suas modalidades refere-se às manifestações dos consumidores contra as empresas através de denúncias de delitos e tentativa de promover boicote contra elas, a fim de resultados positivos para o coletivo. Nesse sentido, o consumo é visto como um terreno propício ao exercício político, sendo que esse tipo de prática é ainda mais democratizada e acessível através das redes sociais. O presente estudo trata sobre a reconfiguração do consumerismo, muito recentemente impactado pelo netativismo de consumidores. O consumerismo é um termo sociológio que nomea o conjunto de práticas de consumidores a fim do exercício de poder, conquista, manutenção de direitos e resistência frente aos interesses comerciais das empresas. O objeto de pesquisa aborda as manifestações de indignação dos consumidores no Facebook entre os anos de 2012 e 2017. Para tanto, foi realizada netnografia, através de acompanhamento e monitoramento dos embates no Facebook entre consumidores e empresas. Neste sentido, o estudo analisa o consumerismo sob a forma de netativismo e as relaçãoes de consumo, como dispositivos de poder, ambos situados no conceito de biopolítica desenvolvido por Foucault
338

Algoritmo para determinação da taxa de transmissão em uma rede IP. / Algorithm to transmission rate determination in an IP network.

Zegarra Rodríguez, Demóstenes 24 September 2009 (has links)
A comunicação de Voz sobre IP (VoIP) vem aumentando com o decorrer do tempo e as redes de comunicação estão se tornando cada vez mais congestionadas, ocasionando perda de pacotes e latência nas redes, prejudicando diretamente a qualidade das comunicações de voz. Neste trabalho, foi estudado em detalhe como a qualidade do sinal de voz transmitido em uma comunicação VoIP é afetada por parâmetros da rede e pelo tipo de codificador utilizado na comunicação. Uma contribuição importante deste trabalho é a apresentação de uma metodologia que serve para predizer o comportamento de um codificador de voz em diferentes cenários de redes. O estabelecimento de um mecanismo de controle que otimize a utilização da rede e ao mesmo tempo garanta a melhor qualidade possível do sinal de voz transmitido vem sendo motivo de pesquisa. O emprego de codificadores multitaxa nas comunicações de voz possibilita a implementação de algoritmos que controlem a comutação destas taxas de codificação baseados em diferentes fatores de decisão como as características do sinal de voz a ser transmitido ou empregando a informação dos parâmetros de rede. Este trabalho apresenta um algoritmo de determinação de taxa de codificação com fator de decisão baseado na qualidade do sinal avaliada no ponto da recepção ou em algum ponto intermediário. Para realização dos testes montou-se um cenário de emulação de rede IP para o estabelecimento de uma chamada VoIP, onde são utilizados codificadores multitaxa (ITU-T G.726 e Speex). Para avaliação da qualidade do sinal de voz foi utilizada a recomendação ITU-T P.563, sendo que o índice MOS obtido no ponto de recepção é transmitido utilizando um laço de transmissão, que forma parte da estrutura do mecanismo de controle apresentado neste trabalho. Este laço de transmissão é implementado via socket sobre uma comunicação UDP. Como as ferramentas utilizadas são todas freeware, o cenário de emulação pode ser facilmente implementado por demais pesquisadores. Os resultados obtidos são confiáveis, já que para cenários onde se mesclam diferentes taxas de codificação, o índice MOS obtido é um valor que está na faixa dos valores obtidos nos cenários onde se utilizou taxa de codificação única. O correto desempenho do mecanismo do RDA também foi verificado, sendo que a qualidade do sinal de voz decresce, o mecanismo de controle no RDA comuta a uma taxa de codificação menor, garantindo o melhor uso do canal de transmissão. Quando os parâmetros da rede passam a melhores condições, o índice MOS do sinal aumenta e o RDA comuta a uma taxa de codificação maior obtendo uma qualidade mais alta na comunicação. / Voice over IP (VoIP) communications are becoming increasingly popular so that data communication networks are ever more prone to degradations like packet losses and rising latency. In this work, it was studied in detail how the quality of the speech signal transmitted in a VoIP communication is affected by parameters of the network and the type of codec used in the communication. An important contribution of this work is to predict the behavior of a speech codec in different network scenarios. The main goal of this research has been the development of an algorithm that constrains rate allocation to a speech communication for best quality according to current network resource availability. The use of multirate codecs in speech communications makes it possible to implement control algorithms for coding rate switching. They are based on speech signal features or network trafic parameters. This work presents an algorithm for the determination of coding rate with decision factor based on speech quality evaluated at the point of reception or intermediate points. For accomplishment of the tests, a scenario of emulation of an IP network for the establishment of a VoIP call was built, where multi-rate codecs are used (ITU-T G.726 and Speex). For evaluation of the quality of the speech signal the Recommendation ITU-T P.563 was used, where the MOS index obtained in the reception is transmitted using a transmission loop, as a part in the control mechanism in the proposed algorithm. This transmission loop consists of a UDP message sent on a socket. As the tools used are all freeware, the simulation scenarios can easily be implemented by other researchers. The results are trustworthy, because for multirate scenarios, the MOS index obtained is a value that is between the ones obtained in the single-rate scenarios. The correct performance of the mechanism of the RDA was also verified, so that when the quality of the signal decreases, the control mechanism in the RDA switches to a lower coding rate, ensuring the best use of the transmission canal. When the parameters of the network drive to best conditions, the MOS index of the signal increases and the RDA decides to switch to a higher coding rate achieving a higher communication quality.
339

A DIVERSE BAND-AWARE DYNAMIC SPECTRUM ACCESS ARCHITECTURE FOR CONNECTIVITY IN RURAL COMMUNITIES

Shah, Vijay K. 01 January 2019 (has links)
Ubiquitous connectivity plays an important role in improving the quality of life in terms of economic development, health and well being, social justice and equity, as well as in providing new educational opportunities. However, rural communities which account for 46% of the world's population lacks access to proper connectivity to avail such societal benefits, creating a huge "digital divide" between the urban and rural areas. A primary reason is that the Information and Communication Technologies (ICT) providers have less incentives to invest in rural areas due to lack of promising revenue returns. Existing research and industrial attempts in providing connectivity to rural communities suffer from severe drawbacks, such as expensive wireless spectrum licenses and infrastructures, under- and over-provisioning of spectrum resources while handling heterogeneous traffic, lack of novel wireless technologies tailored to the unique challenges and requirements of rural communities (e.g., agricultural fields). Leveraging the recent advances in Dynamic Spectrum Access (DSA) technologies like wide band spectrum analyzers and spectrum access systems, and multi-radio access technologies (multi-RAT), this dissertation proposes a novel Diverse Band-aware DSA (d-DSA) network architecture, that addresses the drawbacks of existing standard and DSA wireless solutions, and extends ubiquitous connectivity to rural communities; a step forward in the direction of the societal and economic improvements in rural communities, and hence, narrowing the "digital divide" between the rural and urban societies. According to this paradigm, a certain wireless device is equipped with software defined radios (SDRs) that are capable of accessing multiple (un)licensed spectrum bands, such as, TV, LTE, GSM, CBRS, ISM, and possibly futuristic mmWaves. In order to fully exploit the potential of the d-DSA paradigm, while meeting heterogeneous traffic demands that may be generated in rural communities, we design efficient routing strategies and optimization techniques, which are based on a variety of tools such as graph modeling, integer linear programming, dynamic programming, and heuristic design. Our results on realistic traces in a large variety of rural scenarios show that the proposed techniques are able to meet the heterogeneous traffic requirements of rural applications, while ensuring energy efficiency and robustness of the architecture for providing connectivity to rural communities.
340

Energy Demand Response for High-Performance Computing Systems

Ahmed, Kishwar 22 March 2018 (has links)
The growing computational demand of scientific applications has greatly motivated the development of large-scale high-performance computing (HPC) systems in the past decade. To accommodate the increasing demand of applications, HPC systems have been going through dramatic architectural changes (e.g., introduction of many-core and multi-core systems, rapid growth of complex interconnection network for efficient communication between thousands of nodes), as well as significant increase in size (e.g., modern supercomputers consist of hundreds of thousands of nodes). With such changes in architecture and size, the energy consumption by these systems has increased significantly. With the advent of exascale supercomputers in the next few years, power consumption of the HPC systems will surely increase; some systems may even consume hundreds of megawatts of electricity. Demand response programs are designed to help the energy service providers to stabilize the power system by reducing the energy consumption of participating systems during the time periods of high demand power usage or temporary shortage in power supply. This dissertation focuses on developing energy-efficient demand-response models and algorithms to enable HPC system's demand response participation. In the first part, we present interconnection network models for performance prediction of large-scale HPC applications. They are based on interconnected topologies widely used in HPC systems: dragonfly, torus, and fat-tree. Our interconnect models are fully integrated with an implementation of message-passing interface (MPI) that can mimic most of its functions with packet-level accuracy. Extensive experiments show that our integrated models provide good accuracy for predicting the network behavior, while at the same time allowing for good parallel scaling performance. In the second part, we present an energy-efficient demand-response model to reduce HPC systems' energy consumption during demand response periods. We propose HPC job scheduling and resource provisioning schemes to enable HPC system's emergency demand response participation. In the final part, we propose an economic demand-response model to allow both HPC operator and HPC users to jointly reduce HPC system's energy cost. Our proposed model allows the participation of HPC systems in economic demand-response programs through a contract-based rewarding scheme that can incentivize HPC users to participate in demand response.

Page generated in 0.0969 seconds