• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 105
  • 78
  • 31
  • 30
  • 27
  • 17
  • 11
  • 10
  • 9
  • 9
  • 7
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 364
  • 70
  • 53
  • 44
  • 41
  • 39
  • 37
  • 30
  • 29
  • 29
  • 28
  • 27
  • 27
  • 25
  • 24
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
341

Exploring complexity metrics for artifact-centric business process models

Marin, Mike A. 02 1900 (has links)
This study explores complexity metrics for business artifact process models described by Case Management Model and Notation (CMMN). Process models are usually described using Business Process Management (BPM), which is a relatively mature discipline with a large number of practitioners. Over the last few decades a new way of describing data intensive business processes has emerged in BPM literature, for which traditional BPM is no longer adequate. This emerging method, used to describe more flexible processes, is called business artifacts with Guard-Stage-Milestone (GSM). The work on GSM influenced CMMN, which was created to fill a market need for more flexible case management processes for knowledge workers. Complexity metrics have been developed for traditional BPM models, such as the Business Process Model and Notation (BPMN). However, traditional BPM is not suitable for describing GSM or CMMN process models. Therefore, complexity metrics developed for traditional process models may not be applicable to business artifact process models such as CMMN. This study addresses this gap by exploring complexity metrics for business artifact process models using CMMN. The findings of this study have practical implications for the CMMN standard and for the commercial products implementing CMMN. This research makes the following contributions: • The development of a formal description of CMMN using first-order logic. • An exploration of the relationship between CMMN and GSM and the development of transformation procedures between them. • A comparison between the method complexity of CMMN and other popular process methods, including BPMN, Unified Modeling Language (UML) Activity diagrams, and Event-driven Process Charts (EPC). • The creation of a systematic literature review of complexity metrics for process models, which was conducted in order to inform the creation of CMMN metrics. • The identification of a set of complexity metrics for the CMMN standard, which underwent theoretical and empirical validation. This research advances literature in the areas of method complexity, complexity metrics for process models, declarative processes, and research on CMMN by characterizing CMMN method complexity, identifying complexity metrics for CMMN, and exploring the relationship between CMMN and GSM. / Ph.D. (Computer Science)
342

Optimization of Remote ServiceSolution for large installations : Wireless LAN and WAN for ABB Robotics

Stenbom, Håkan January 2011 (has links)
This report describes a thesis work carried out at ABB Robotics in Västerås. The objective of this thesis is to find technologies  and equipments  for wireless data transfer  suitable for the present and future needs of ABB Robotics Remote Service for large installations in industrial environments. ABB Robotics has a Remote Service solution to securely gather information from robots, manage alarms and potentially execute remote commands by ABB Robotics. This solution consists of an intelligent Service  Box plugged to the robot. This  Service Box is also connected through GPRS or directly through Internet to create a secure VPN connection to a central Remote Service  server. The Remote Service Box is well  suited  for small customers with  1-10 robots with plug  and play installation, but show limitations at a larger scale of deployment  due to equipment costs,  network and installation complexity. A new Service Box is planned that will accommodate future added functionality to Remote Service. This Service Box will require new network solutions as the added functionality  is depending on a higher bandwidth than the GPRS networks can deliver. I have surveyed most existing  wireless  networking technologies  and  analyzed  them  withrespect  to function, cost and availability which provide a knowledge base that makes it possible to find  suitable  solutions. When the most suitable technologies are identified a survey was performed to find equipments that meet the requirements at the lowest cost. A new hierarchical network topology is proposed  that will lead to cost savings by replacing multiple WAN connections in the present solution with  a network switch and  single WAN connection to Internet. As manufacturers of network equipments for industrial environments are relatively few, alternative solutions were also investigated in order to find the most cost effective solutions. The  proposed  network topology together with the data from the surveys lead to recommendations on using Wi-Fi  in the wireless LAN and  a  3G mobile  network for the WAN connection to Internet, as well as recommendations on alternative network equipments that  potentially  can  lead to substantial savings when the new network solutions are implemented.
343

A Systems Biology Approach towards Understanding Host Response and Pathogen Adaptation in Latent Tuberculosis Infection

Baloni, Priyanka January 2016 (has links) (PDF)
Mycobacterium tuberculosis, the etiological agent of tuberculosis, has adapted with the host environment and evolved to survive in harsh conditions in the host. The pathogen has successfully evolved strategies not only to evade the host immune system but also to thrive within the host cells. Upon infection, the pathogen is either cleared due to the host immune response, or it survives and causes active tuberculosis (TB) infection. In a number of cases however, the pathogen is neither killed nor does it actively proliferate, but it remains dormant in the host until the environment becomes favorable. This dormant state of pathogen is responsible for latent TB infection (LTBI). WHO reports indicated that as much as a third of the whole world’s population is exposed to the pathogen, of which a significant proportion could be latently infected (WHO report, 2015). These individuals do not show symptoms of active TB infection and hence are difficult to detect. The latent TB infected (LTBI) individuals serve as a reservoir for the pathogen, which can lead to epidemics when the conditions change. Hence, it is necessary to understand the host -pathogen interactions during LTBI, as this might provide clues to developing new strategies to detect and curb a latent infection. Host-pathogen interactions are multifaceted, in which both species attempt to recognize and respond to each other, all of these through specific molecules making distinct interactions with the other species. The outcome of the infection is thus decided by a complex set of host-pathogen interactions. The complexity arises since a large number of molecular components are involved, also multiplicity of interactions among these components and due to several feedback, feed forwards or other regulatory or influential loops within the system. The complexity of biological systems makes modeling and simulation an essential and critical part of systems– level studies. Systems biology studies provide an integrated framework to analyze and understand the function of biological systems. This work addresses some of these issues with an unbiased systems-level analysis so as to identify and understand the important global changes both in the host and in the pathogen during LTBI. The broad objectives of the work was to identify the key processes that vary in the host during latent infection, the set of metabolic reactions in the host which can be modulated to control the reactivation of infection, global adaptation in Mycobacterium tuberculosis (Mtb) and then to utilize this knowledge to identify strategies for tackling latent infection. A review of literature of the current understanding of latency from the pathogen and the host perspective is described in chapter 1. From this, it is clear that most available studies have focused on the role of individual molecules and individual biological processes such as granuloma formation, toll-like receptor signaling, T cell responses as well as cytokine signaling, in either initiating or maintaining a latent infection, but there is no report till date about whether and how these processes are connected with each other. While transcriptome based studies have identified lists of differentially expressed genes in LTBI as compared to healthy controls, no further understanding is currently available for many of them, regarding the processes they may be involved in and what interactions they make, which may be important for understanding LTBI. The first part of the work is a systematic meta-analysis of genome-scale protein interaction networks rendered condition-specific with transcriptome data of patients with LTBI, which has provided a global unbiased picture of the transcriptional and metabolic variations in the host and in the pathogen during the latent infection. To start with, publicly available gene expression data related to LTBI, active TB and healthy controls were considered. In all, 183 datasets summing up to 105 LTBI, 41 active TB and 37 healthy control samples were analyzed. (Chapter 2). Standard analysis of the transcriptome profiles of these datasets indicated that there was zero overlap among them and that not a single gene was seen in common among all datasets for the same condition. An extensive human protein-protein interaction network was constructed using information available from multiple resources that comprehensively contained structural or physical interactions and genetic interactions or functional influences. Nodes in this network represented individual proteins and edges represented interactions between pairs of nodes. The identity of each node and the nature of interaction of each edge along with the type of evidence that was used as the basis for drawing the edge, was collated for the network. The gene expression data was integrated into the human protein-protein interaction (PPI) network for each condition, which essentially had weighted nodes and directed edges, specific to that condition, from which specific comparative networks were derived. The highest ranked perturbations in LTBI were identified through a network mining protocol previously established in the laboratory. This involved computing all versus all shortest paths on the comparative network, scoring the paths based on connectedness and various centrality measures of the nodes and the edges and finally ranking the paths based on the cumulative path scores. Intriguingly, the top-ranked set of perturbations were found to form a connected sub-network by themselves, referred to as a top perturbed sub-network (top-net), indicating that they were functionally linked or perhaps even orchestrated in some sense. Th17 signaling appears to be dominant. About 40 genes were identified in the unique set of LTBI condition as compared to the active TB condition, and these genes showed enrichment for processes such as apoptosis, cell cycle as well as natural killer cell mediated toxicity. Construction and analysis of a miRNA network indicated that 32 of these have strong associations with miRNA explaining the role of the latter in controlling LTBI. 3 other genes from the top-net are already established drug targets for different diseases with known drugs associated with them, which are BCL2, HSP90AA1 and NR3C1. These 3 proteins can be explored further as drug targets in LTBI whose manipulation using existing drugs may result in inhibiting the underlying biological process and thereby result in disturbing the state of latency. As a second objective, global variations in the host transcriptome were identified during ascorbic acid induced dormancy (Chapter 3). Ascorbic acid or Vitamin C is a nutrient supplement required in the diet. This organic compound has a known antioxidant property, as it is known to scavenge the free radicals. In a recent study, Taneja et al, demonstrated that Vitamin C could induce dormancy in Mtb. On similar lines, experiments were done in THP-1 cells infected with Mtb to determine the host responses during ascorbic acid (AA) induced dormancy. The raw gene expression data was provided by our collaborator Prof. Jaya Tyagi that included 0 hour, 4 days and 6 days time points with infection and vitamin C versus infection alone or vitamin C alone as controls. The transcriptome data was normalized and integrated into the human PPI network as described for the meta-analyses. It was experimentally determined that ascorbic acid induces dormancy in 4 days post infection. The top-ranked paths of perturbation were analyzed and compared for three different conditions: (i) uninfected condition, (ii) AA treated and infected condition, and (iii) AA, isoniazid and infected condition. The dormant pathogen is known to be drug-tolerant and thus as a marker for the state of dormancy, the lack of effect of isoniazid is also monitored in the infected host cells. The analysis revealed that there were some broad similarities as compared to LTBI from patient samples but AA induced dormancy in cell lines stood out a separate group indicating that there were significant differences such as involving Interferon Induced Transmembrane Proteins (IFITMs), vacuolar ATPase as well as GDF15, which belongs to TGF-beta signaling pathway. The highest ranked perturbed paths contained genes involved in innate immune responses of which ISG15, IFITMs, HLAs and ATPases emerge as the most altered in the dormant condition. CCR7 emerges as a key discriminator, which is subdued in the latent samples but highly induced in infection conditions. Pathway-based analysis of different conditions showed that oxidative stress, glutathione metabolism, proteasome degradation as well as type II interferon signaling are significantly up-regulated in AA induced dormancy. The dormant bacteria reside in the host cells and are known to modulate the host metabolism for their own benefit. So, the third objective was to understand the metabolic variations in the host during LTBI (Chapter 4). A genome-scale metabolic (GSM) model of alveolar macrophage was used in this study. The metabolic model contains information of the reactions, metabolites and the genes encoding enzymes that catalyze a particular reaction. Flux balance analysis (FBA), a constraint-based metabolic modeling method, is used for analyzing the alterations in the metabolism under different infection conditions. In order to mimic the physiological condition, gene expression data was used for constraining the bounds of the reactions in the model. Two different expression studies were used for analysis: GSE25534 (from Chapter 2) and ascorbic acid induced dormancy (Chapter 3). The analysis was carried out for latent TB versus healthy control and latent TB versus active TB to identify the most altered metabolic processes in LTBI. Differences in fluxes between the two conditions were calculated. A new classification scheme was devised to categorize the reactions on the basis of flux differences. In this chapter, higher fluxes in LTBI condition were identified for reactions involved in transport of small metabolites as well as amino acids. Solute carrier proteins responsible for the transport of the metabolites were identified and their biological significance is discussed. Reduced glutathione (GSH), arachidonic acid, prostaglandins, pantothenate were identified as important metabolites in LTBI condition and their physiological role has been described. Sub-system analysis for different conditions shows differential regulation for arachidonic acid metabolism, fatty acid metabolism, folate metabolism, pyruvate metabolism, glutathione metabolism, ROS detoxification, triacylglycerol synthesis and transport as well as tryptophan metabolism. From the study, transporter proteins and reactions altered during LTBI were identified, which again provide clues for understanding the molecular basis of establishing a latent infection. Mycoabcterium tuberculosis is known to undergo dormancy during stress conditions. In this chapter, the main objective was to identify the global variations in the dormant Mtb (Chapter 5). To carry out the analysis, the Mtb PPI network was constructed using information from available resources. Gene expression data of two different dormancy models, Wayne growth model and multiple-stress model, were used for the study. To identify the key players involved in reversal of dormancy, the transcriptome data of reaeration condition was also used. In this study, the Max-flow algorithm was implemented to identify the feasible paths or flows in different condition. The flows with higher scores indicate that more information is traversed by the path, and hence is important for the study. From the analysis of Wayne growth model (hypoxia model), important transcriptional regulators such as SigB, SigE, SigH, regulators in the two-component system such as MprA, MtrA, PhoP, RegX3 and TrcR were identified in stress condition. Multiple-stress model studied the growth of bacteria in low oxygen concentration, high carbon dioxide levels, low pH and nutrient starvation. The gene expression data was integrated in the Mtb PPI network and implementation of Max-flow algorithm showed that MprA, part of the MprA-MprB two-component system, is involved in the regulation of persistent condition. WhiB1 also features in the paths of dormant condition and its role in persistence can be explored. In reaeration model, WhiB1 and WhiB4 are present in the top flows of this condition indicating that the redox state is perturbed in the pathogen and the interactions of these proteins are important to understand the reversal of dormant condition. From the study, Rv2034, Rv2035, HigA, Rv1989, Rv1990 and Rv0837 proteins belonging to toxin-antitoxin systems were also identified in the dormant bacteria, indicating their role in adaptation during stress condition. The role of Rv2034 has been studied in persistence, but the function of other proteins can be analyzed to provide new testable hypotheses about the role of these proteins in dormancy. Thus, the flows or paths perturbed during dormancy were identified in this study. To get a better understanding of the metabolic network active in mycobacteria under different conditions, experiments were performed in Mycobacterium smegmatis MC2 155. The non-pathogenic strain of genus Mycobacteria, Mycobacterium smegmatis, is used as a surrogate to carry out molecular biology studies of Mtb. Mycobacterium smegmatis MC2 155 (Msm) is the commonly used laboratory strain for experimental purpose. In order to obtain a clear understanding of how comparable are the metabolic networks between the virulent M. tuberculosis H37Rv and the model system Msm, the latter model is first studied systematically. In Chapter 6, first the functional annotation of the Msm genome was carried out and the genes were categorized into different Tuberculist classes based on homology with the Mtb genome. A high-throughput growth characterization was carried out to characterize the strain systematically in terms of different carbon, nitrogen or other sources that promoted growth and thus served as nutrients and those that did not, together yielding a genome-phenome correlation in Msm. Gene expression was measured and used for explaining the observed phenotypic behavior of the organism. Together with the genome sequence, the transcriptome and phenome analysis, a set of about 257 different metabolic pathways were identified to be feasible in wild-type Msm. About 284 different carbon, nitrogen source and nutrient supplements were tested in this experiment and 167 of them supported growth of Msm. This indicates that the compounds enter the cells and are metabolized efficiently, thus yielding similar phenotypes. The expressed genes and metabolites supporting growth were mapped to the metabolic network of Msm, thus helping in the identification of feasible metabolic routes in Msm. A comparative study between Msm and Mtb revealed that these organisms share similarity in the nutrient sources that are utilized for growth. The study provides experimental proof to identify the feasible metabolic routes in Msm, and this can be used for understanding the metabolic capability in the two organisms under different conditions providing a basis to understand adaptations during dormancy. In the last part of the work presented in this thesis, the metabolic shift in the pathogen was studied using a genome-scale metabolic model of Mtb (Chapter 7). The model contains information of the reactions, metabolites and genes involved in the reactions. Flux balance analysis (FBA) was carried out by integrating normalized gene expression data (Wayne model and multiple-stress model transcriptome considered in Chapter 5) to identify the set of reactions, which have a higher flux in the dormant condition as compared to the control replicating condition. Glutamate metabolism along with propionyl CoA metabolism emerge as major up-regulated processes in dormant Mtb. Next, with an objective of identifying essential genes in dormant Mtb, a systematic in silico single gene knock-out analysis was carried out where each gene and it's associated reaction was knocked out of the model, one at a time and the ability of the model to reach its objective function assessed. About 168 common genes in Wayne model and multiple-stress model were identified as important in Mtb after the knockout analysis. Essentiality is in essence a systems property and requires to be probed through multiple angles. Towards this, essential genes were identified in Mtb using a multi-level multi-scale systems biology approach. About 283 genes were identified as essential on the basis of combined analysis of transcriptome data, FBA, network analysis and phyletic retention studies in Mtb. 168 genes identified as important in dormant Mtb were compared with 283 essential genes and about 91 genes were found to be essential. Finally, among the set of essential genes, those that satisfy other criteria for a drug target were analyzed using the list of high-confidence drug targets of Mtb available in the laboratory along with their associated drug or drug-like molecules. 38 out of the 168 important genes in Mtb were found to have one or more drugs associated with them from the DrugBank database. Colchicin-Rv1655, Raloxifene-Rv1653, Bexarotene-Rv3804, Rosiglitazone-Rv3804 are top-scoring drug-target pairs that can be explored for killing dormant bacilli. The study has thus been useful in identifying important proteins, reactions and drug targets in dormant Mtb. In summary, the thesis presents a comprehensive systems-level understanding of various aspects of host responses and pathogen adaptation during latent TB infection. Key host and pathogen factors involved in LTBI are identified that serve as useful pointers for deriving strategies for tackling a latent infection.
344

Zabezpečovací systém s komunikací přes mobilní telefon / Security system with mobile phone communication

Ulbrich, Jakub January 2009 (has links)
This thesis deals with the question of electronic security systems. In the forepart are described electronic security system components such as keyboards, detectors, alarm devices etc. Various methods of security or de-security of properties, trespassing and other events detection methods, and ways of alarm calling are described there too. The next part of the master’s thesis focuses on the construction of an alarm system which is designed for security of a common-size flat with one entry. The system manages to control up to four movement detectors. The operation of the system is handled by a 16 button keyboard, and easy orientation is provided thanks to a liquid crystal display. The alarm is signaled by an indoor alert siren, however, other alarm announcing devices with an input matched for the log. 0 or log. 1 reception can be connected too. The system contains communication equipment (mobile phone) which signals alarm at a distance to the three telephone numbers. User can use a distance control by text message to unlock system or to determine its status. The system is controlled by the microcontroller AVR ATmega16, the product of Atmel company. A brief description of all components of the electronic alarm system is included in this work.
345

Měření kvality a dostupnosti GSM sítě / Quality and accessability measurement of GSM network

Vondra, Marek January 2011 (has links)
The thesis is specialized on a possibility of measuring qualities and availability of a cellular radio system and also on evaluation qualities, fruitfulness interface, permeability etc. It includes short description of a basic mobile technology. Further analysis of the possibility of measuring the mobile network and how implement the measure. It also includes a draft program for measuring and evaluation of the GSM network with help several tests by a mobile phone connected through the Bluetooth.
346

Měření a modelování pokrytí bezdrátových sítí / Measurement and Modeling of Wireless Network Coverage

Julínek, Pavel January 2015 (has links)
The diploma thesis describes mobile communication systems GSM and UMTS including the operating principle of these systems. It also deals with the GPS issues and the determination of the location by this system. The signal path losses issues between the transmitter and receiver are also described. The focus is also put on Telit UC864-G model and the measurement system, operated by the created programme with the graphic user interface, which measures parameters of the cellular network according to entered input parameters and saves the measured values into the file. The part of the diploma thesis describes another created programme with the graphic user interface displaying the measured network parameters in map data with the possibility to compare the distribution of the measured signal value in both outdoor and indoor environment and the theoretical value set by the propagation models.
347

Zkvalitnění služby GSM Banking pro zákazníky T-Mobile. / Improving quality of GSM Banking services for T-Mobile customers.

Bolehovská, Zuzana January 2007 (has links)
This diploma thesis on the theme Improving quality of GSM Banking services for T-Mobile customers deals with detailed analysis of the selected product, which the T-Mobile company has been mediating to all it´s customers for years. This analysis resides in comparing of GSM Banking services with other mobile operators operating on the contemporary Czech market. My thesis contains general theoretical and concrete practical resources, which offer possibilities of improving and innovation of the present situation.
348

Aplikace pro ovládání dohledového systému v obytných vozech / Application for Controll System in Caravan

Řehulka, Marek January 2015 (has links)
This Master's thesis deals with the development of a mobile application for a control of the supervisory system in caravans and motorhomes. The thesis presents the currently available principles and research of the existing solutions. This custom solution includes an Android application and a desktop application of the central unit simulator of the supervisory system. The simulator is based on the Node.js and node-webkit technologies. The simulator communicates with the devices available via RF Transciever and it simulates other devices. The mobile application communicates with the simulator via Bluetooth Low Energy and GSM. Major part of the implementation description is devoted to the Bluetooth Low Energy technology and to issues, which are associated with it. The resulting solution puts emphasis on the usability of the user interface and the ability to supervise a wide range of connected devices. The system also implements custom logic alerts for tracked events. The thesis concludes with evaluation of the resulting system and outlining the future development options.
349

Fountain codes and their typical application in wireless standards like edge

Grobler, Trienko Lups 26 January 2009 (has links)
One of the most important technologies used in modern communication systems is channel coding. Channel coding dates back to a paper published by Shannon in 1948 [1] entitled “A Mathematical Theory of Communication”. The basic idea behind channel coding is to send redundant information (parity) together with a message to make the transmission more error resistant. There are different types of codes that can be used to generate the parity required, including block, convolutional and concatenated codes. A special subclass of codes consisting of the codes mentioned in the previous paragraph, is sparse graph codes. The structure of sparse graph codes can be depicted via a graphical representation: the factor graph which has sparse connections between its elements. Codes belonging to this subclass include Low-Density-Parity-Check (LDPC) codes, Repeat Accumulate (RA), Turbo and fountain codes. These codes can be decoded by using the belief propagation algorithm, an iterative algorithm where probabilistic information is passed to the nodes of the graph. This dissertation focuses on noisy decoding of fountain codes using belief propagation decoding. Fountain codes were originally developed for erasure channels, but since any factor graph can be decoded using belief propagation, noisy decoding of fountain codes can easily be accomplished. Three fountain codes namely Tornado, Luby Transform (LT) and Raptor codes were investigated during this dissertation. The following results were obtained: <ol> <li>The Tornado graph structure is unsuitable for noisy decoding since the code structure protects the first layer of parity instead of the original message bits (a Tornado graph consists of more than one layer).</li> <li> The successful decoding of systematic LT codes were verified.</li> <li>A systematic Raptor code was introduced and successfully decoded. The simulation results show that the Raptor graph structure can improve on its constituent codes (a Raptor code consists of more than one code).</li></ol> Lastly an LT code was used to replace the convolutional incremental redundancy scheme used by the 2G mobile standard Enhanced Data Rates for GSM Evolution (EDGE). The results show that a fountain incremental redundancy scheme outperforms a convolutional approach if the frame lengths are long enough. For the EDGE platform the results also showed that the fountain incremental redundancy scheme outperforms the convolutional approach after the second transmission is received. Although EDGE is an older technology, it still remains a good platform for testing different incremental redundancy schemes, since it was one of the first platforms to use incremental redundancy. / Dissertation (MEng)--University of Pretoria, 2008. / Electrical, Electronic and Computer Engineering / MEng / unrestricted
350

Modelling and design of compact wideband and ultra-wideband antennas for wireless communications. Simulation and measurement of planer inverted F antennas (PIFAs) for contemporary mobile terminal applications, and investigations of frequency range and radiation performance of UWB antennas with design optimisation using parametric studies.

Hraga, Hmeda I. January 2013 (has links)
The rapidly growing demand for UWB as high data rates wireless communications technology, since the Federal Communications Commission (FCC) allocated the bandwidth of UWB from 3.1GHz to 10.6 GHz. Antenna also plays an essential role in UWB system. However, there are some difficulties in designing UWB antenna as compared to narrowband antenna. The primary requirement of UWB antennas is be able to operate over frequencies released by the FCC. Moreover, the satisfaction of radiation properties and good time domain performance over the entire frequency range are also necessary. In this thesis, designing and analysing printed crescent shape monopole antenna, Planar Inverted F-L Antenna (PIFLA) and Planar Inverted FF Antenna (PIFFA) are focused. A Planar Inverted FF Antenna (PIFFA) can be created to reduce the potential for interference between a UWB system and other communications protocols by using spiral slot. The antennas exhibits broadside directional pattern. The performances such as return loss, radiation pattern and current distribution of the UWB antennas are extensively investigated and carried out. All the results have been demonstrated using simulation and experimentally whereby all results satisfy the performance under - 10dB point in the bandwidth of UWB. In addition the miniaturization of MIMO/diversity Planar Inverted-F antenna (PIFA) which is suitable for pattern diversity in UWB applications is presented. This antenna assembly is formed by two identical PIFAs, a T-shaped decoupling structure which connects the two PIFAs and a finite ground plane with a total compact envelope dimension of 50 ¿ 90 ¿ 7.5mm3. The radiation performance of the proposed MIMO antenna was quite encouraging and provided an acceptable agreement between the computed and measured envelope correlation coefficient and channel capacity loss. / General Secretariat of Education and Scientific Research Libya

Page generated in 0.0178 seconds