Spelling suggestions: "subject:"amobile communication"" "subject:"0mobile communication""
351 |
Novel self-decorrelation and fractional self-decorrelation pre-processing techniques to enhance the output SINR of single-user-type DS-CDMA detectors in blind space-time RAKE receivers.January 2002 (has links)
Cheung Shun Keung. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2002. / Includes bibliographical references (leaves 80-83). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- The Problem --- p.1 / Chapter 1.2 --- Overview of CDMA --- p.2 / Chapter 1.3 --- Problems Encountered in Direct-Sequence (DS)CDMA --- p.3 / Chapter 1.3.1 --- Multipath Fading Scenario in DS-CDMA Cellular Mo- bile Communication --- p.3 / Chapter 1.3.2 --- Near-Far Problem --- p.4 / Chapter 1.4 --- Delimitation and Significance of the Thesis --- p.5 / Chapter 1.5 --- Summary --- p.7 / Chapter 1.6 --- Scope of the Thesis --- p.8 / Chapter 2 --- Literature Review of Blind Space-Time Processing in a wire- less CDMA Receiver --- p.9 / Chapter 2.1 --- General Background Information --- p.9 / Chapter 2.1.1 --- Time Model of K-User Chip-Synchronous CDMA --- p.9 / Chapter 2.1.2 --- Dispersive Channel Modelling --- p.10 / Chapter 2.1.3 --- Combination of K-user CDMA Time Model with the Slow Frequency-Selective Fading Channel Model to form a completed Chip-Synchronous CDMA Time Model --- p.13 / Chapter 2.1.4 --- Spatial Channel Model with Antenna Array [9] --- p.15 / Chapter 2.1.5 --- Joint Space-Time Channel Model in Chip-Synchronous CDMA --- p.19 / Chapter 2.1.6 --- Challenges to Blind Space-Time Processing in a base- station CDMA Receiver --- p.23 / Chapter 2.2 --- Literature Review of Single-User-Type Detectors used in Blind Space-Time DS-CDMA RAKE Receivers --- p.25 / Chapter 2.2.1 --- A Common Problem among the Signal Processing Schemes --- p.28 / Chapter 3 --- "Novel ""Self-Decorrelation"" Technique" --- p.29 / Chapter 3.1 --- "Problem with ""Blind"" Space-Time RAKE Processing Using Single- User-Type Detectors" --- p.29 / Chapter 3.2 --- "Review of Zoltowski & Ramos[10,11,12] Maximum-SINR Single- User-Type CDMA Blind RAKE Receiver Schemes" --- p.31 / Chapter 3.2.1 --- Space-Time Data Model --- p.31 / Chapter 3.2.2 --- The Blind Element-Space-Only (ESO) RAKE Receiver with Self-Decorrelation Pre-processing Applied --- p.32 / Chapter 3.3 --- Physical Meaning of Self-Decorrelation Pre-processing --- p.35 / Chapter 3.4 --- Simulation Results --- p.38 / Chapter 4 --- """Fractional Self-Decorrelation"" Pre-processing" --- p.45 / Chapter 4.1 --- The Blind Maximum-SINR RAKE Receivers in Chen et. al.[l] and Wong et. al.[2] --- p.45 / Chapter 4.2 --- Fractional Self-Decorrelation Pre-processing --- p.47 / Chapter 4.3 --- The Blind Element-Space-Only (ESO) RAKE Receiver with Fractional Self-Decorrelation Pre-processing Applied --- p.50 / Chapter 4.4 --- Physical Meaning of Fractional Self-Decorrelation Pre-processing --- p.54 / Chapter 4.5 --- Simulation Results --- p.55 / Chapter 5 --- Complexity Analysis and Schematics of Proposed Techniques --- p.64 / Chapter 5.1 --- Computational Complexity --- p.64 / Chapter 5.1.1 --- Self-Decorrelation Applied in Element-Space-Only (ESO) RAKE Receiver --- p.64 / Chapter 5.1.2 --- Fractional Self-Decorrelation Applied in Element-Space- Only (ESO) RAKE Receiver --- p.67 / Chapter 5.2 --- Schematics of the Two Proposed Techniques --- p.69 / Chapter 6 --- Summary and Conclusion --- p.74 / Chapter 6.1 --- Summary of the Thesis --- p.74 / Chapter 6.1.1 --- The Self-Decorrelation Pre-processing Technique --- p.75 / Chapter 6.1.2 --- The Fractional Self-Decorrelation Pre-processing Tech- nique --- p.76 / Chapter 6.2 --- Conclusion --- p.78 / Chapter 6.3 --- Future Work --- p.78 / Bibliography --- p.80 / Chapter A --- Generalized Eigenvalue Problem --- p.84 / Chapter A.1 --- Standard Eigenvalue Problem --- p.84 / Chapter A.2 --- Generalized Eigenvalue Problem --- p.84
|
352 |
GSM mobility management using an intelligent network platformSivagnanasundaram, Suthaharan January 1997 (has links)
No description available.
|
353 |
Remote Execution for 3D GraphicsBanerjee, Kutty S 23 May 2005 (has links)
Mobile clients such as PDAs, laptops, wrist watches, smart phones are rapidly emerging in the consumer market and an increasing number of graphics applications are being developed for them. However, current hardware technology limits the processing power on these mobile devices and wireless network bandwidth can be scarce and unreliable. A modern photorealistic graphics application is resource-hungry, consumes large amounts of cpu cycles, memory and network bandwidth if distributed. Besides running them on mobile devices may also diminish their battery power in the process. Bulk of graphics computations involve floating point operations and the lack of hardware support for such on PDAs imposes further restrictions. Remote execution, wherein part or the entire rendering process is offloaded to a powerful surrogate server is an attractive solution. We propose pipeline-splitting, a paradigm whereby 15 sub-stages of the graphics pipeline are isolated and instrumented with networking code such that it can run on either a graphics client or a surrogate server. To validate our concepts, we instrument Mesa3D, a popular implementation of the OpenGL graphics to support pipeline-splitting, creating Remote Mesa (RMesa). We further extend the Remote Execution model to provide an analytical model for predicting the rendering time and memory consumption involved in Remote Execution. Mobile devices have limited battery power. Therefore, it is important to understand if during Remote Execution, communication is more power consuming than computation. In order to study the same, we develop PowerSpy, a Real Time Power Profiler for I/O devices and applications. Finally, we add Remote Execution to an existing Distributed Graphics Framework targeted for mobile devices, namely, MADGRAF. In addition to Remote Execution, MADGRAF has another policy known as the Transcoder Based Approach in which the original 3D graphics image is modified to suite the mobile devices' rendering capacity. Though this speeds up the rendering process, it affects photorealism. We propose an intelligent runtime decision making engine, Intelligraph, which evaluates the runtime performance of the mobile client and decides between Remote Execution and the Transcoder Based Approach.
|
354 |
Characterization of Multi-Carrier Locator PerformanceBreen Jr., Daniel E. 30 April 2004 (has links)
Time-Difference-of-Arrival (TDOA) location estimation is central to an OFDM based Precision Personnel Locator system being developed at WPI. Here we describe a component of the effort towards characterizing the performance of such a system and verifying the functionality of hardware and software implementations. The performance degradations due to noise in the received signal and misalignments between transmitter and receiver clock and heterodyne frequencies are investigated. This investigation involves development of a MATLAB simulator for the entire system, experimental measures using a prototype implementation and linearized analytic analysis of specific subsystems. The three types of characterizations are compared, confirming agreement, and analytic results are used to demonstrate construction of a system engineering design tool.
|
355 |
State vector estimation in the presence of measurement uncertaintyEkchian, L. K. (Leon K.) January 1980 (has links)
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1980. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING. / Bibliography: leaves 215-218. / by Leon K. Ekchian. / M.S.
|
356 |
Multi-access in packet radio networksArıkan, Erdal January 1982 (has links)
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1982. / MICROFICHE COPY AVAILABLE IN ARCHIVES AND ENGINEERING. / Includes bibliographical references. / by Erdal Arikan. / M.S.
|
357 |
Code time division multiple access for multicarrier communication systems.January 2004 (has links)
Huang Yi. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 97-98). / Abstracts in English and Chinese. / Abstract --- p.i / 摘要 --- p.iii / Acknowledgments --- p.iv / Contents --- p.v / Chapter Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- CTDMA for Multicarrier Communication Systems --- p.2 / Chapter 1.2 --- Contributions of This Thesis --- p.4 / Chapter 1.3 --- Outline of This Thesis --- p.6 / Chapter Chapter 2 --- Multicarrier Communication Systems --- p.8 / Chapter 2.1 --- Multicarrier Modulation (MCM) Scheme versus Single Carrier Modulation (SCM) Scheme --- p.9 / Chapter 2.2 --- Orthogonal Frequency Division Multiplexing (OFDM) Systems --- p.12 / Chapter 2.3 --- Multicarrier CDMA --- p.16 / Chapter Chapter 3 --- Data Rate Guaranteed CTDMA for Multicarrier Communication Systems --- p.21 / Chapter 3.1 --- Code Time Division Multiple Access (CTDMA) --- p.22 / Chapter 3.2 --- Mathematical Programming --- p.28 / Chapter 3.3 --- Near Optimal CTDMA Approach --- p.32 / Chapter 3.4 --- Ad Hoc CTDMA Approach --- p.48 / Chapter 3.5 --- Lower Bound on Optimization --- p.61 / Chapter 3.6 --- Performance Evaluation --- p.64 / Chapter Chapter 4 --- Code Assignment for Multicarrier Communication Systems with Quantized Feedback --- p.73 / Chapter 4.1 --- Code Assignment for Fully Loaded Systems --- p.74 / Chapter 4.2 --- Random Orthogonal Codes --- p.76 / Chapter 4.3 --- Wireless Fading Channel Model --- p.78 / Chapter 4.4 --- Performance Evaluation of One-to-one Assignment --- p.80 / Chapter 4.5 --- Code Assignment for Non-fully Loaded Systems --- p.89 / Chapter 4.6 --- Performance Evaluation of Multiple-to-one Assignment --- p.90 / References --- p.97
|
358 |
Mobile personal authentication using fingerprint.January 2004 (has links)
Cheng Po Sum. / Thesis submitted in: July 2003. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2004. / Includes bibliographical references (leaves 64-67). / Abstracts in English and Chinese. / List of Figures --- p.i / List of Tables --- p.iii / Acknowledgments --- p.iv / 摘要 --- p.v / Thesis Abstract --- p.vi / Chapter 1. --- Mobile Commerce --- p.1 / Chapter 1.1 --- Introduction to Mobile Commerce --- p.1 / Chapter 1.2 --- Mobile commence payment systems --- p.2 / Chapter 1.3 --- Security in mobile commerce --- p.5 / Chapter 2. --- Mobile authentication using Fingerprint --- p.10 / Chapter 2.1 --- Authentication basics --- p.10 / Chapter 2.2 --- Fingerprint basics --- p.12 / Chapter 2.3 --- Fingerprint authentication using mobile device --- p.15 / Chapter 3. --- Design of Mobile Fingerprint Authentication Device --- p.19 / Chapter 3.1 --- Objectives --- p.19 / Chapter 3.2 --- Hardware and software design --- p.21 / Chapter 3.2.1 --- Choice of hardware platform --- p.21 / Chapter 3.3 --- Experiments --- p.25 / Chapter 3.3.1 --- Design methodology I - DSP --- p.25 / Chapter 3.3.1.1 --- Hardware platform --- p.25 / Chapter 3.3.1.2 --- Software platform --- p.26 / Chapter 3.3.1.3 --- Implementation --- p.26 / Chapter 3.3.1.4 --- Experiment and result --- p.27 / Chapter 3.3.2 --- Design methodology II ´ؤ SoC --- p.28 / Chapter 3.3.2.1 --- Hardware components --- p.28 / Chapter 3.3.2.2 --- Software components --- p.29 / Chapter 3.3.2.3 --- Implementation Department of Computer Science and Engineering --- p.29 / Chapter 3.3.2.4 --- Experiment and result --- p.30 / Chapter 3.4 --- Observation --- p.30 / Chapter 4. --- Implementation of the Device --- p.31 / Chapter 4.1 --- Choice of platforms --- p.31 / Chapter 4.2 --- Implementation Details --- p.31 / Chapter 4.2.1 --- Hardware implementation --- p.31 / Chapter 4.2.1.1 --- Atmel FingerChip --- p.32 / Chapter 4.2.1.2 --- Gemplus smart card and reader --- p.33 / Chapter 4.2.2 --- Software implementation --- p.33 / Chapter 4.2.2.1 --- Operating System --- p.33 / Chapter 4.2.2.2 --- File System --- p.33 / Chapter 4.2.2.3 --- Device Driver --- p.35 / Chapter 4.2.2.4 --- Smart card --- p.38 / Chapter 4.2.2.5 --- Fingerprint software --- p.41 / Chapter 4.2.2.6 --- Graphical user interface --- p.41 / Chapter 4.3 --- Results and observations --- p.44 / Chapter 5. --- An Application Example 一 A Penalty Ticket Payment System (PTPS) --- p.47 / Chapter 5.1 --- Requirement --- p.47 / Chapter 5.2 --- Design Principles --- p.48 / Chapter 5.3 --- Implementation --- p.52 / Chapter 5.4 --- Results and Observation --- p.57 / Chapter 6. --- Conclusions and future work --- p.62 / Chapter 7. --- References --- p.64
|
359 |
Face authentication on mobile devices: optimization techniques and applications.January 2005 (has links)
Pun Kwok Ho. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2005. / Includes bibliographical references (leaves 106-111). / Abstracts in English and Chinese. / Chapter 1. --- Introduction --- p.1 / Chapter 1.1 --- Background --- p.1 / Chapter 1.1.1 --- Introduction to Biometrics --- p.1 / Chapter 1.1.2 --- Face Recognition in General --- p.2 / Chapter 1.1.3 --- Typical Face Recognition Systems --- p.4 / Chapter 1.1.4 --- Face Database and Evaluation Protocol --- p.5 / Chapter 1.1.5 --- Evaluation Metrics --- p.7 / Chapter 1.1.6 --- Characteristics of Mobile Devices --- p.10 / Chapter 1.2 --- Motivation and Objectives --- p.12 / Chapter 1.3 --- Major Contributions --- p.13 / Chapter 1.3.1 --- Optimization Framework --- p.13 / Chapter 1.3.2 --- Real Time Principal Component Analysis --- p.14 / Chapter 1.3.3 --- Real Time Elastic Bunch Graph Matching --- p.14 / Chapter 1.4 --- Thesis Organization --- p.15 / Chapter 2. --- Related Work --- p.16 / Chapter 2.1 --- Face Recognition for Desktop Computers --- p.16 / Chapter 2.1.1 --- Global Feature Based Systems --- p.16 / Chapter 2.1.2 --- Local Feature Based Systems --- p.18 / Chapter 2.1.3 --- Commercial Systems --- p.20 / Chapter 2.2 --- Biometrics on Mobile Devices --- p.22 / Chapter 3. --- Optimization Framework --- p.24 / Chapter 3.1 --- Introduction --- p.24 / Chapter 3.2 --- Levels of Optimization --- p.25 / Chapter 3.2.1 --- Algorithm Level --- p.25 / Chapter 3.2.2 --- Code Level --- p.26 / Chapter 3.2.3 --- Instruction Level --- p.27 / Chapter 3.2.4 --- Architecture Level --- p.28 / Chapter 3.3 --- General Optimization Workflow --- p.29 / Chapter 3.4 --- Summary --- p.31 / Chapter 4. --- Real Time Principal Component Analysis --- p.32 / Chapter 4.1 --- Introduction --- p.32 / Chapter 4.2 --- System Overview --- p.33 / Chapter 4.2.1 --- Image Preprocessing --- p.33 / Chapter 4.2.2 --- PCA Subspace Training --- p.34 / Chapter 4.2.3 --- PCA Subspace Projection --- p.36 / Chapter 4.2.4 --- Template Matching --- p.36 / Chapter 4.3 --- Optimization using Fixed-point Arithmetic --- p.37 / Chapter 4.3.1 --- Profiling Analysis --- p.37 / Chapter 4.3.2 --- Fixed-point Representation --- p.38 / Chapter 4.3.3 --- Range Estimation --- p.39 / Chapter 4.3.4 --- Code Conversion --- p.42 / Chapter 4.4 --- Experiments and Discussions --- p.43 / Chapter 4.4.1 --- Experiment Setup --- p.43 / Chapter 4.4.2 --- Execution Time --- p.44 / Chapter 4.4.3 --- Space Requirement --- p.45 / Chapter 4.4.4 --- Verification Accuracy --- p.45 / Chapter 5. --- Real Time Elastic Bunch Graph Matching --- p.49 / Chapter 5.1 --- Introduction --- p.49 / Chapter 5.2 --- System Overview --- p.50 / Chapter 5.2.1 --- Image Preprocessing --- p.50 / Chapter 5.2.2 --- Landmark Localization --- p.51 / Chapter 5.2.3 --- Feature Extraction --- p.52 / Chapter 5.2.4 --- Template Matching --- p.53 / Chapter 5.3 --- Optimization Overview --- p.54 / Chapter 5.3.1 --- Computation Optimization --- p.55 / Chapter 5.3.2 --- Memory Optimization --- p.56 / Chapter 5.4 --- Optimization Strategies --- p.58 / Chapter 5.4.1 --- Fixed-point Arithmetic --- p.60 / Chapter 5.4.2 --- Gabor Masks and Bunch Graphs Precomputation --- p.66 / Chapter 5.4.3 --- Improving Array Access Efficiency using ID array --- p.68 / Chapter 5.4.4 --- Efficient Gabor Filter Selection --- p.75 / Chapter 5.4.5 --- Fine Tuning System Cache Policy --- p.79 / Chapter 5.4.6 --- Reducing Redundant Memory Access by Loop Merging --- p.80 / Chapter 5.4.7 --- Maximizing Cache Reuse by Array Merging --- p.90 / Chapter 5.4.8 --- Optimization of Trigonometric Functions using Table Lookup. --- p.97 / Chapter 5.5 --- Summary --- p.99 / Chapter 6. --- Conclusions --- p.103 / Chapter 7. --- Bibliography --- p.106
|
360 |
Wireless access pricing.January 2011 (has links)
Leung, Kwan Fong. / Thesis (M.Phil.)--Chinese University of Hong Kong, 2011. / Includes bibliographical references (leaves 63-66). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.10 / Chapter 1.1 --- Motivation and Overview --- p.10 / Chapter 1.2 --- Thesis Outline --- p.13 / Chapter 2 --- Problem Formulation --- p.15 / Chapter 2.1 --- Basic Wireless Market Model --- p.15 / Chapter 2.2 --- "User's Utility, Payment, Payoff, and Demand" --- p.17 / Chapter 2.3 --- Network Costs --- p.18 / Chapter 2.4 --- Access Price --- p.20 / Chapter 3 --- Fixed Coverage Two Base Stations Model --- p.21 / Chapter 3.1 --- Social Optimal User Pricing --- p.21 / Chapter 3.2 --- Social Optimal Access Pricing --- p.24 / Chapter 3.2.1 --- "Networks' Profit-Maximizing User Pricing Given Fixed Access Prices:TT1* (α1 α2) and TT2* (α1, α2)" --- p.24 / Chapter 3.2.2 --- Social Optimal Access Pricing: αS1 and αS2 --- p.27 / Chapter 3.3 --- Deregulated User Pricing and Access Pricing --- p.30 / Chapter 3.3.1 --- User's Optimal Data Rate Demand in Stage III --- p.30 / Chapter 3.3.2 --- Operators' User Pricing in Stage II --- p.30 / Chapter 3.3.3 --- Operators' Access Pricing in Stage I --- p.31 / Chapter 4 --- Full Coverage Two Base Stations Model --- p.34 / Chapter 4.1 --- Full Coverage Wireless Market Model --- p.34 / Chapter 4.2 --- Users' choice of service providers --- p.35 / Chapter 4.3 --- Social Optimal User Pricing --- p.36 / Chapter 4.3.1 --- Numerical study --- p.38 / Chapter 4.4 --- Deregulated case - Profit-maximizing access price and user price --- p.41 / Chapter 4.4.1 --- Numerical Study --- p.45 / Chapter 5 --- Full Coverage Three Base Stations Model --- p.46 / Chapter 5.1 --- Three base-stations Full Coverage Market Model --- p.46 / Chapter 5.2 --- Social Optimal User Prices --- p.48 / Chapter 5.2.1 --- Numerical Study --- p.50 / Chapter 5.3 --- Deregulated scenario --- p.53 / Chapter 5.3.1 --- Numerical Study --- p.57 / Chapter 6 --- Conclusions and Future Work --- p.60 / Bibliography --- p.63
|
Page generated in 0.1202 seconds