• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 7
  • 6
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 49
  • 15
  • 12
  • 11
  • 9
  • 8
  • 8
  • 7
  • 7
  • 7
  • 6
  • 6
  • 6
  • 6
  • 6
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Efficient Computation of Pareto Optimal Beamforming Vectors for the MISO Interference Channel with Successive Interference Cancellation

Lindblom, Johannes, Karipidis, Eletherios, Larsson, Erik G. January 2013 (has links)
We study the two-user multiple-input single-output (MISO) Gaussian interference channel where the transmitters have perfect channel state information and employ single-stream beamforming. The receivers are capable of performing successive interference cancellation, so when the interfering signal is strong enough, it can be decoded, treating the desired signal as noise, and subtracted from the received signal, before the desired signal is decoded. We propose efficient methods to compute the Pareto-optimal rate points and corresponding beamforming vector pairs, by maximizing the rate of one link given the rate of the other link. We do so by splitting the original problem into four subproblems corresponding to the combinations of the receivers' decoding strategies - either decode the interference or treat it as additive noise. We utilize recently proposed parameterizations of the optimal beamforming vectors to equivalently reformulate each subproblem as a quasi-concave problem, which we solve very efficiently either analytically or via scalar numerical optimization. The computational complexity of the proposed methods is several orders-of-magnitude less than the complexity of the state-of-the-art methods. We use the proposed methods to illustrate the effect of the strength and spatial correlation of the channels on the shape of the rate region.
22

Military influence tactics: Lessons learned in Iraq and Afghanistan / Lessons learned in Iraq and Afghanistan

Wolfe, Andrea 03 1900 (has links)
xi, 48 p. : ill. (mostly col.) / For most influence attempts in everyday life, success makes life easier and failure is a disappointment, not a tragedy. When U.S. soldiers deployed overseas attempt to influence civilians, however, success can save lives and failure can be deadly. Along with the high stakes consequences of influence attempts, soldiers face the challenges of bridging differences in language, culture, beliefs, and agendas. The current study examined cross-cultural influence attempts made by deployed soldiers, contributing to existing influence research by examining influence attempts in a complex and challenging wartime environment. Survey data from 228 military personnel with deployment experience to Iraq and Afghanistan revealed that empathy, respect, prior relationships, and familiarity with influence targets predicted success. Five influence technique clusters emerged, and use of technique clusters involving resources and positive feelings were more successful than negative tactics. / Committee in charge: Dr. Holly Arrow, Chairperson; Dr. Gordon Hall, Member
23

Vad smakar Peaso? : Ett sensoriskt konsumenttest på Peaso med 4 och 8 veckorfermenteringstid. / What does Peaso taste? : A Sensory Evaluation of Peaso during 4 and 8 weeks offermentation

Hill, Jakob, Segestam, Olle January 2021 (has links)
No description available.
24

Multiple Input Single Output (MISO) Tablet/ Phone Charger

Wong, Kevin 01 June 2013 (has links) (PDF)
This thesis entails the design and implementation of a multiple input single output (MISO) DC-DC converter using the flyback topology to charge tablets/ smartphones or any USB powered portable device. The MISO converter will enable the use of various renewable energy sources such as a solar panel/ rechargeable battery combination, bicycle dynamo, hydroelectric power, and wind turbine. This paper will cover the design, simulations, and test results of the MISO converter. The flyback topology was chosen due to its low part count and its efficiency at low power. The proposed converter has a nominal 12V input to output USB 2.0 requirements (5V at 2.5W). Results from both computer simulation using LTSpice and hardware tests demonstrate the functionality of the proposed MISO converter with solar/battery and bicycle dynamo inputs. Overall performance of the converter in terms of efficiency, line and load regulations, as well as its charging ability to a cell phone will be presented in this report.
25

Controller Modeling and Stability Analysis of Multiple Input Single Output DC-DC Converter

Adhikari, Astha 01 March 2021 (has links) (PDF)
This thesis entails the stability analysis of the Multiple Input Single Output (MISO) DC-DC converter developed for the DC House Project at Cal Poly. A frequency domain control system model of the MISO converter was designed and constructed using MATLAB Simulink. Transfer functions were derived and modeled for each stage of the converter to best fit the converter circuit system used in the original MISO circuit. Stability metrics such as overshoot, undershoot, rise time, phase margin and gain margin were measured to evaluate and analyze the stability of the converter. These metrics were measured with the original model including the current sharing network that allows load sharing between multiple MISO modules. The simulation results demonstrate that based on the existing model, the system is stable with a gain margin of infinity and phase margin of around 40 degrees at crossover frequency of 47kHz with nominal input voltage of 24V. Another compensator was proposed to overcome the shortcomings of the original compensator model with respect to the overshoot and phase margin. The new compensator model improved the phase margin at the same crossover frequency with a higher rise time and lowered percent overshoot. Additional improvements and tradeoffs are further discussed to help with the decision when designing a compensator for DC-DC converter that uses the current mode control technique.
26

Vad smakar Peaso? : Ett sensoriskt konsumenttest på Peaso med 4 och 8 veckorfermenteringstid. / What does Peaso taste? : A Sensory Evaluation of Peaso during 4 and 8 weeks offermentation

Hill, Jakob, Segestam, Olle January 2021 (has links)
No description available.
27

Multiple-Input Single-Output Synthetic Aperture Radar and Space-Time Adaptive Processing

Bryant, Christine Ann 15 September 2010 (has links)
No description available.
28

Blind Unique Channel Identification of Alamouti Space-Time Coded Channel via a Signalling Scheme

Zhou, Lin 12 1900 (has links)
<p> In this thesis, we present a novel signalling scheme for blind channel identification of Alamouti space-time coded (STBC) channel and a space-time coded multiple-input single-output (MISO) system under flat fading environment. By using p-ary and q-ary PSK signals (where p and q are co-prime integers), we prove that a) under a noise-free environment, only two distinct pairs of symbols are needed to uniquely decode the signal and identify the channel, and b) under complex Gaussian noise, if the pth and qth order statistics of the received signals are available, the channel coefficients can also be uniquely determined. In both cases, simple closed-form solutions are derived by exploiting specific properties of the Alamouti STBC code and linear Diophantine equation theory.</p> <p> When only a limited number of received data are available, under Gaussian noise environment, we suggest the use of the semi-definite relaxation method and/or the sphere decoding method to implement blind ML detection so that the joint estimation of the channel and the transmitted symbols can be efficiently facilitated. Simulation results show that blind ML detection methods with our signalling scheme provide superior normalized mean square error in channel estimation compared to the method using only one constellation and that the average symbol error rate is close to that of the coherent detector (which necessitates perfect channel knowledge at the receiver), particularly when the SNR is high.</p> / Thesis / Master of Applied Science (MASc)
29

Beamforming and Protection Strategies in Gaussian MISO Wiretap Systems with Partial Channel State Information

Engelmann, Sabrina 24 August 2015 (has links) (PDF)
Within this thesis, we investigate the possibilities of physical layer secrecy for two special system models. In detail, we study beamforming and protection strategies in the Multiple-Input Single-Output (MISO) Gaussian Wiretap Channel (WTC) and the Gaussian two-hop relay WTC with multiple antennas at transmitter and receiver. In both system models, we examine the influence of partial Channel State Information (CSI) on the link to the eavesdropper and compare the achievable secrecy rates with the case of full CSI. We show for the MISO WTC that in the fast fading scenario the Beamforming Vector (BV) can be optimized such that the ergodic secrecy rate is maximized with regard to the degree of channel knowledge. Further we show that the ergodic secrecy rate can be significantly increased by usage of Artificial Noise (AN), if applied in a smart way. This means that the degree of channel knowledge on the link to the eavesdropper influences the portion of power that is spent for AN at the transmitter as well as the direction, in which the AN signal is sent. In addition, we apply the same beamforming and protection strategies to the slow fading scenario and find that these techniques also reduce the secrecy outage probability. For the two-hop relay WTC, we introduce Information Leakage Neutralization (IN) as a new protection strategy. If applied to a system model, where the transmitter has full CSI, the instantaneous secrecy rate performs almost as well as the instantaneous capacity of the peaceful system without an eavesdropper. The IN protected scheme outperforms the AN protected approach and performs much better than any beamforming scheme without additional protection mechanism. Another positive aspect of the IN protected scheme in the case of full CSI is that conventional channel codes can be applied instead of wiretap codes. For the case of partial CSI, where the transmitter has only an outdated estimate on the channel between relay and the eavesdropper, we show that the IN protected scheme can also be applied. Here, it strongly depends on the channel realizations and the delay of the estimate, whether the IN or the AN protection scheme should be applied. / In dieser Arbeit wird das Leistungsvermögen der Sicherheit auf der physikalischen Schicht anhand von zwei speziellen Systemmodellen untersucht. Im Detail werden Beamforming- und Absicherungsstrategien im gaußschen Multiple-Input Single-Output (MISO) Wiretap Channel (WTC) und dem gaußschen Two-hop Relay WTC mit mehreren Antennen am Sender und Empfänger studiert. In beiden Systemmodellen wird der Einfluss von partieller Kanalkenntnis zum Abhörer betrachtet und die so erreichbaren Sicherheitsraten mit denen verglichen, die bei voller Kanalkenntnis erreichbar sind. Für den MISO WTC kann gezeigt werden, dass für Kanäle mit schnellem Schwund der Beamforming-Vektor in Hinblick auf die ergodische Sicherheitsrate unter Berücksichtigung des Grades der Kanalkenntnis optimiert werden kann. Zudem kann durch die intelligente Verwendung von künstlichem Rauschen (Artificial Noise, AN) die ergodische Sicherheitsrate signifikant erhöht werden. Hierbei nimmt der Grad der Kanalkenntnis direkt Einfluss auf die Aufteilung der Leistung zwischen Daten- und AN-Signal am Sender sowie auch auf die Richtung, in der das AN-Signal gesendet wird. Zudem kann gezeigt werden, dass dieselben Beamforming- und Absicherungsstrategien ebenfalls die Sicherheitsausfallwahrscheinlichkeit für Kanäle mit langsamem Schwund minimieren. Im gaußschen Two-hop Relay WTC wird Information Leakage Neutralization (IN) als neuartige Absicherungsstrategie eingeführt. Diese Absicherungsstrategie erreicht nahezu dieselben instantanen Raten wie ein friedvolles System ohne Abhörer, wenn es bei voller Kanalkenntnis am Sender eingesetzt wird. Weiterhin sind durch die IN-Absicherungsstrategie höhere Raten erreichbar als durch den Einsatz von AN. Zusätzlich kann im Fall von voller Kanalkenntnis auf den Einsatz von Wiretap-Codes verzichtet werden. Auch im Fall partieller Kanalkenntnis, wo der Sender nur eine veraltete Schätzung des Kanals zwischen Relay und Abhörer besitzt, kann gezeigt werden, dass die IN-Absicherungsstrategie angewendet werden kann. Hierbei hängt es jedoch stark von den Kanalrealisierungen und dem Alter der Kanalschätzung ab, ob die IN- oder die AN-Absicherungsstrategie bessere Ergebnisse bringt und daher angewandt werden sollte.
30

Beamforming and Protection Strategies in Gaussian MISO Wiretap Systems with Partial Channel State Information

Engelmann, Sabrina 29 June 2015 (has links)
Within this thesis, we investigate the possibilities of physical layer secrecy for two special system models. In detail, we study beamforming and protection strategies in the Multiple-Input Single-Output (MISO) Gaussian Wiretap Channel (WTC) and the Gaussian two-hop relay WTC with multiple antennas at transmitter and receiver. In both system models, we examine the influence of partial Channel State Information (CSI) on the link to the eavesdropper and compare the achievable secrecy rates with the case of full CSI. We show for the MISO WTC that in the fast fading scenario the Beamforming Vector (BV) can be optimized such that the ergodic secrecy rate is maximized with regard to the degree of channel knowledge. Further we show that the ergodic secrecy rate can be significantly increased by usage of Artificial Noise (AN), if applied in a smart way. This means that the degree of channel knowledge on the link to the eavesdropper influences the portion of power that is spent for AN at the transmitter as well as the direction, in which the AN signal is sent. In addition, we apply the same beamforming and protection strategies to the slow fading scenario and find that these techniques also reduce the secrecy outage probability. For the two-hop relay WTC, we introduce Information Leakage Neutralization (IN) as a new protection strategy. If applied to a system model, where the transmitter has full CSI, the instantaneous secrecy rate performs almost as well as the instantaneous capacity of the peaceful system without an eavesdropper. The IN protected scheme outperforms the AN protected approach and performs much better than any beamforming scheme without additional protection mechanism. Another positive aspect of the IN protected scheme in the case of full CSI is that conventional channel codes can be applied instead of wiretap codes. For the case of partial CSI, where the transmitter has only an outdated estimate on the channel between relay and the eavesdropper, we show that the IN protected scheme can also be applied. Here, it strongly depends on the channel realizations and the delay of the estimate, whether the IN or the AN protection scheme should be applied. / In dieser Arbeit wird das Leistungsvermögen der Sicherheit auf der physikalischen Schicht anhand von zwei speziellen Systemmodellen untersucht. Im Detail werden Beamforming- und Absicherungsstrategien im gaußschen Multiple-Input Single-Output (MISO) Wiretap Channel (WTC) und dem gaußschen Two-hop Relay WTC mit mehreren Antennen am Sender und Empfänger studiert. In beiden Systemmodellen wird der Einfluss von partieller Kanalkenntnis zum Abhörer betrachtet und die so erreichbaren Sicherheitsraten mit denen verglichen, die bei voller Kanalkenntnis erreichbar sind. Für den MISO WTC kann gezeigt werden, dass für Kanäle mit schnellem Schwund der Beamforming-Vektor in Hinblick auf die ergodische Sicherheitsrate unter Berücksichtigung des Grades der Kanalkenntnis optimiert werden kann. Zudem kann durch die intelligente Verwendung von künstlichem Rauschen (Artificial Noise, AN) die ergodische Sicherheitsrate signifikant erhöht werden. Hierbei nimmt der Grad der Kanalkenntnis direkt Einfluss auf die Aufteilung der Leistung zwischen Daten- und AN-Signal am Sender sowie auch auf die Richtung, in der das AN-Signal gesendet wird. Zudem kann gezeigt werden, dass dieselben Beamforming- und Absicherungsstrategien ebenfalls die Sicherheitsausfallwahrscheinlichkeit für Kanäle mit langsamem Schwund minimieren. Im gaußschen Two-hop Relay WTC wird Information Leakage Neutralization (IN) als neuartige Absicherungsstrategie eingeführt. Diese Absicherungsstrategie erreicht nahezu dieselben instantanen Raten wie ein friedvolles System ohne Abhörer, wenn es bei voller Kanalkenntnis am Sender eingesetzt wird. Weiterhin sind durch die IN-Absicherungsstrategie höhere Raten erreichbar als durch den Einsatz von AN. Zusätzlich kann im Fall von voller Kanalkenntnis auf den Einsatz von Wiretap-Codes verzichtet werden. Auch im Fall partieller Kanalkenntnis, wo der Sender nur eine veraltete Schätzung des Kanals zwischen Relay und Abhörer besitzt, kann gezeigt werden, dass die IN-Absicherungsstrategie angewendet werden kann. Hierbei hängt es jedoch stark von den Kanalrealisierungen und dem Alter der Kanalschätzung ab, ob die IN- oder die AN-Absicherungsstrategie bessere Ergebnisse bringt und daher angewandt werden sollte.

Page generated in 0.0261 seconds