Spelling suggestions: "subject:"over"" "subject:"ever""
291 |
Extreme Value Theory Applied to Securitizations Rating Methodology / Extremvärdesteori tillämpat på värdepapperiseringBarbouche, Tarek January 2017 (has links)
One of today’s financial trends is securitization. Evaluating Securitization risk requires some strong quantitative skills and a deep understanding of both credit and market risk. For international securitization programs it is mandatory to take into account the exchange-rates-related risks. We will see the di˙erent methods to evaluate extreme variations of the exchange rates using the Extreme Value Theory and Monte Carlo simulations. / Värdepapperisering är en av dagens finansiella trender. Att utvärdera vär-depapperisering risk kräver starka kvantitativa kunskaper och en förståelseför både kredit- och marknadsrisk. För internationell värdepapperisering ärdet obligatoriskt att hänsyn tas till valutarisker. Vi kommer att se de olika metoder för att utvärdera extrema variationer i valutakurser med hjälp av extremvärdesteori och Monte Carlo-simuleringar.
|
292 |
A new approach for implementing QO-STBC over OFDMDama, Yousef A.S., Migdadi, Hassan S.O., Shuaieb, Wafa S.A., Elkhazmi, Elmahdi A., Abdulmula, E.A., Abd-Alhameed, Raed, Hammoudeh, W., Masri, A. January 2015 (has links)
No / A new approach for implementing QO-STBC and DHSTBC over OFDM for four, eight and sixteen transmitter antennas is presented, which eliminates interference from the detection matrix and improves performance by increasing the diversity order on the transmitter side. The proposed code promotes diversity gain in comparison with the STBC scheme, and also reduces Inter Symbol Interference.
|
293 |
Personlighet och känsla av sammanhang som prediktorer för avhopp från grundläggande militär utbildning / Personality and sense of coherence as predictors for turn-over from the Swedish military education programLarsson, Anna, Melin, Jonas January 2015 (has links)
No description available.
|
294 |
Flight Safety System for Unmanned Air VehiclePérez-Falcón, Tony, Kolar, Ray 10 1900 (has links)
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada / A Flight Safety System (RAFS) for multiple, reliable Unmanned Air Vehicles (UAV’s) capable of
flying Over-the-Horizon (OTH) and outside test range airspace. In addition to the flight safety
application, the described full-duplex data link is suitable as a backup command and control link for
UAV’s, and for sensor control & data exfiltration.
The IRIDIUM satellite system was selected to provide the communications link and because of its
global coverage and requisite data throughputs.
A Risk Reduction activity ensued to quantify IRIDIUM performance. Hardware and software was
developed to demonstrate the feasibility of using IRIDIUM in a flight safety scenario.
|
295 |
Överskuldsatt och skyldig : en rättsvetenskaplig analys av konsumentskyddet mot överskuldsättning / Deep in debt and liable to pay : a legal analysis of Sweden´s consumer protections against personal over-indebtednessHenrikson, Ann-Sofie January 2016 (has links)
Consumer credit is seen as a matter of course and an essential precondition enabling the individual consumer to allocate in a smooth manner his or her income to varying expenses, and allowing the growth-rate to increase in society. The consumer community using different forms of credit has increased and includes today a diversity of social groups such as the elderly, children, the rich and the poor. Credit is not just a good thing, however, as it involves risks of failing to fulfill the credit contract obligations. The point of departure for the thesis is that over-indebtedness constitutes a problem which society wishes to solve because it causes considerable difficulties for both individuals and society as a whole. Numerous rules govern loans in Sweden, from the moment the consumer contemplates entering into a credit contract to the moment when the consumer is too indebted to repay the debt when due and must seek debt-repayment-plan modification. The thesis examines and analyses which consumer protections against overindebtedness emerge from these rules. The study shows that the regulatory measures adopted in recent years are similar to each other and mostly consist of rules protecting the consumer before a credit contract is concluded. Although the purpose of other existing rules addressing the last phase of the credit process is to protect the consumer who miscalculated his or her future economic circumstances, the protection is overall weak. In fact some of the rules in the last phase of the credit process can contribute to aggravating the consumer’s economic situation.
|
296 |
Estimating Internet-scale Quality of Service Parameters for VoIPNiemelä, Markus January 2016 (has links)
With the rising popularity of Voice over IP (VoIP) services, understanding the effects of a global network on Quality of Service is critical for the providers of VoIP applications. This thesis builds on a model that analyzes the round trip time, packet delay jitter, and packet loss between endpoints on an Autonomous System (AS) level, extending it by mapping AS pairs onto an Internet topology. This model is used to produce a mean opinion score estimate. The mapping is introduced to reduce the size of the problem in order to improve computation times and improve accuracy of estimates. The results of testing show that estimating mean opinion score from this model is not desirable. It also shows that the path mapping does not affect accuracy, but does improve computation times as the input data grows in volume.
|
297 |
Wireless audio networking modifying the IEEE 802.11 standard to handle multi-channel real-time wireless audio networksChousidis, Christos January 2014 (has links)
Audio networking is a rapidly increasing field which introduces new exiting possibilities for the professional audio industry. When well established, it will drastically change the way live sound systems will be designed, built and used. Today's networks have enough bandwidth that enables them to transfer hundreds of high quality audio channels, replacing analogue cables and intricate installations of conventional analogue audio systems. Currently there are many systems in the market that distribute audio over networks for live music and studio applications, but this technology is not yet widespread. The reasons that audio networks are not as popular as it was expected are mainly the lack of interoperability between different vendors and still, the need of a wired network infrastructure. Therefore, the development of a wireless digital audio networking system based on the existing widespread wireless technology is a major research challenge. However, the ΙΕΕΕ 802.11 standard, which is the primary wireless networking technology today, appears to be unable to handle this type of application despite the large bandwidth available. Apart from the well-known drawbacks of interference and security, encountered in all wireless data transmission systems, the way that ΙΕΕΕ 802.11 arbitrates the wireless channel access causes significantly high collision rate, low throughput and long overall delay. The aim of this research was to identify the causes that impede this technology to support real time wireless audio networks and to propose possible solutions. Initially the standard was tested thoroughly using a data traffic model which emulates a multi-channel real time audio environment. Broadcasting was found to be the optimal communication method, in order to satisfy the intolerance of live audio, when it comes to delay. The results were analysed and the drawback was identified in the hereditary weakness of the IEEE 802.11 standard to manage broadcasting, from multiple sources in the same network. To resolve this, a series of modifications was proposed for the Medium Access Control algorithm of the standard. First, the extended use of the "CTS-to-Self" control message was introduced in order to act as a protection mechanism in broadcasting, similar to the RTC/CTS protection mechanism, already used in unicast transmission. Then, an alternative "random backoff" method was proposed taking into account the characteristics of live audio wireless networks. For this method a novel "Exclusive Backoff Number Allocation" (EBNA) algorithm was designed aiming to minimize collisions. The results showed that significant improvement in throughput can be achieved using the above modifications but further improvement was needed, when it comes to delay, in order to reach the internationally accepted standards for real time audio delivery. Thus, a traffic adaptive version of the EBNA algorithm was designed. This algorithm monitors the traffic in the network, calculates the probability of collision and accordingly switches between classic IEEE 802.11 MAC and EBNA which is applied only between active stations, rather than to all stations in the network. All amendments were designed to operate as an alternative mode of the existing technology rather as an independent proprietary system. For this reason interoperability with classic IEEE 802.11 was also tested and analysed at the last part of this research. The results showed that the IEEE 802.11 standard, suitably modified, is able to support multiple broadcasting transmission and therefore it can be the platform upon which, the future wireless audio networks will be developed.
|
298 |
Error resilience and concealment in MVC video over wireless networksIbrahim, Abdulkareem B. January 2015 (has links)
Multi-view video is capable of presenting a full and accurate depth perception of a scene. The concept of multi-view video is becoming more useful especially in 3D display systems by enhancing the viewing of high resolution stereoscopic images from arbitrary viewpoints without the use of any special glasses. Like monoscopic video, the multi-view video is faced with different challenges such as: reliable compression, storage and bandwidth due to the increased number of views as well as the high sensitivity to transmission errors. All these may lead to a detrimental effect on the reconstructed views. The work in this thesis investigates the problems and challenges of transmission losses in a multi-view video bitstream over error prone wireless networks. Based on the network simulation results, the proposed technique is capable of addressing the problem of transmission losses. In practical wireless networks, transmission errors are inevitable and pose a serious challenge to the coded video data. The aim of this research effort is to examine the effect of these errors in a multi-view video bitstream when transmitted over a lossy channel. Moreover, this research work aims to develop a novel scheme that can make the multi-view coded videos more robust to transmission errors by minimizing the error effects and improving the perceptual quality. Multi-layer data partitioning as an error resilient technique is developed in JMVC 8.5 reference software in order to make the multi-view video bitstream more robust during transmission. In addition to that, we propose a simple decoding scheme that can support the decoding of the multi-layer data partitioning bitstream over channels with high error rate. The proposed technique is benchmarked with the already existing H.264/AVC data partitioning technique. The work in this thesis also employs the use of group of pictures as a coding parameter to investigate and reduce the effects of transmission errors in multi-view video transmitted over a very high error rate channel. The experiments are carried out with different error loss rates in order to evaluate the performance of these techniques in terms of perceptual quality when transmitted over a simulated erroneous channel. Errors are introduced using the Sirannon network simulator. The error performance of each technique is evaluated and analysed both objectively and subjectively after reconstruction. The results of the research investigation and simulation are presented and analysed in chapter six of the thesis.
|
299 |
Optical fiber transmission systems for in-door next generation broadband access networkOkonkwo Igweani, Uchenna Titus January 2014 (has links)
This thesis investigates the generation and radio-over-fibre (RoF) transport of unlicensed 60 GHz millimetre-wave (mm-wave) frequency band. The investigated benefits of transmission schemes applicable for the mm-wave generation include optical carrier suppression (OCS), optical frequency multiplication (OFM) and remote heterodyne detection (RHD). For the in-door cabling of the mm-wave transmission, a low-cost polymer optical fibre (POF) along with bend-insensitive single mode fibre (BI-SMF) has been investigated for short-range networks. Transporting mm-wave generated signals over POF and BI-SMF cables based on OCS scheme showed results with the highest spectral efficiency and least inter-symbol interference over a 2.5 Gbit/s data delivery. Based on this thesis analysis, OCS simulation of POF showed the most reliable power penalty performance and receiver sensitivity at 30-m whilst the BI-SMF fiber produced equal observations at 150-m and more. In observing the free space links of delivering the RoF signal, the attenuation on the received signal power for both POF and BI-SMF was insignificant but expected, as the simulation assumed complete and total collimation of the light beams onto the aperture of the photodetector. OCS scheme for mm-wave generation and transport was explored based on the cost effectiveness of using one external modulator compared to other generation schemes that utilised more than one external modulator. OFM scheme was simulated to transport LTE and Wi-Fi signals along with 60 GHz RF band through both SMF and MMF-POF/BI-SMF cables. OFM transport scheme produced the highest attenuation on LTE, Wi-Fi and mm-wave signals carrying 100 Mbit/s data as simulated POF lengths increased. The best performance POF length was observed at 10-m. The application of offset launch technique at the coupling of SMF and POF showed insignificant improvement on signal bandwidth. The free space OFM transmission also demonstrated negligible change to the received signal power. This reinforces the attributes of deploying OWC system in an in-door environment. In other investigation, the simulated successful delivery of mm-wave signal using RHD scheme modulated and transported 10 Gbit/s data signal over POF and BI-SMF cables. Additional observed unrecorded result also showed BI-SMF cable maintained a 2% reduction of received power for 450-m fiber cable from 150-m. The attributes to RHD includes its low operating power system application and delivery of localised 60 GHz signal for uplink RoF transmission. The conceptualised design of Gigabit data delivery for indoor customer applications either through POF or BI-SMF cable, transporting various wireless channels has been presented in this thesis for the design of a robust next generation Broadband access network to reinforce the fiber-inside-the-home (FiTH) deployment.
|
300 |
An empirical comparison of extreme value modelling procedures for the estimation of high quantilesEngberg, Alexander January 2016 (has links)
The peaks over threshold (POT) method provides an attractive framework for estimating the risk of extreme events such as severe storms or large insurance claims. However, the conventional POT procedure, where the threshold excesses are modelled by a generalized Pareto distribution, suffers from small samples and subjective threshold selection. In recent years, two alternative approaches have been proposed in the form of mixture models that estimate the threshold and a folding procedure that generates larger tail samples. In this paper the empirical performances of the conventional POT procedure, the folding procedure and a mixture model are compared by modelling data sets on fire insurance claims and hurricane damage costs. The results show that the folding procedure gives smaller standard errors of the parameter estimates and in some cases more stable quantile estimates than the conventional POT procedure. The mixture model estimates are dependent on the starting values in the numerical maximum likelihood estimation, and are therefore difficult to compare with those from the other procedures. The conclusion is that none of the procedures is overall better than the others but that there are situations where one method may be preferred.
|
Page generated in 0.0429 seconds