• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 580
  • 87
  • 62
  • 30
  • 21
  • 13
  • 6
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • Tagged with
  • 904
  • 277
  • 240
  • 220
  • 217
  • 217
  • 217
  • 209
  • 209
  • 209
  • 192
  • 143
  • 123
  • 86
  • 74
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
621

Congestion Control For The Available Bit Rate Service(abr) In Asychronous Transfer Mode (atm)networks

Bozkurt Ozzaman, Hulya 01 May 2005 (has links) (PDF)
Congestion control is concerned with allocating the resources in a network such that the network can operate at an acceptable performance level when the demand exceeds or is near the capacity of the network resources. These resources include bandwidths of links, buffer space (memory) and processing capacity at intermediate nodes. Although resource allocation is necessary even at low load, the problem becomes more important as the load increases. Without proper congestion control mechanisms, the throughput may be reduced considerably under heavy load. Future applications are expected to require increasingly higher bandwidth and generate a heterogeneous mix of network traffic. ATM network is potentially capable of supporting all classes of traffic (e.g., voice, video, and data) and have multiple service classes allow audio, video and data to share the same network. Of these, the Available Bit Rate (ABR) service class is designed to efficiently support data traffic. Switch algorithms have been the most investigated topic of ABR. This has happened because the specification of ABR given by the ATM Forum allows a diversity of switch algorithms to be implemented. These range from the simplest binary switches to the more complex ER switches. The major part of this thesis has been devoted to ABR. First an introduction to the concept of congestion control and a brief literature survey of congestion control for ABR service of ATM networks are presented. Then two proposed congestion control mechanisms for the ABR service class in ATM networks are examined by means of simulation, showing the different degree of performance and complexity. The simulation results presented in this thesis were obtained using a network simulator written in C++. This network simulator is a small event driven program. Analytical results were derived for different network configurations and different scenarios using this program.
622

An Investigation On Plasma Antennas

Tigrek, Recep Firat 01 August 2005 (has links) (PDF)
The plasma antennas offer a new solution to new requirements that are imposed on antenna systems with the advancing communication technology and increasing demand on wider frequency bands. In this thesis the plasma antennas are investigated for the radar and communication applications. The interaction of gas and semiconductor plasma with electromagnetic waves is inspected theoretically, and several experiments on the interaction of microwaves with gas plasma are conducted. Results of these experiments show that a relatively simple setup can produce plasma dense enough to interact with microwaves of frequency about 8 GHz. The previous studies of other institutes on plasma antennas are surveyed, emphasizing the results important for the use in radar and communication applications. Finally, semiconductor plasma is introduced, and an antenna system utilizing the semiconductor plasma generated by optical excitation is proposed.
623

On Qos Multicast Routing Routing Protocols

Bereketli, Alper 01 September 2005 (has links) (PDF)
Multicasting is a technique used for distributing data packets from one or more sources to a set of receivers on interconnected networks. Currently developing network applications bring specific quality of service (QoS) requirements like bounded delay, minimum bandwidth, and maximum data loss rate. Providing the required quality of service addresses routing and resource reservation concepts. In this study, a literature survey is carried out on traditional and QoS multicast routing protocols, and the need for QoS routing protocols is investigated. QoS multicast routing protocols are classified and compared according to their multicast tree construction and resource reservation approaches. Two QoS protocols, QROUTE and QMBF, are selected, and their performances are experimentally compared using the network simulation tool Network Simulator-2 (ns-2). The objective of the simulations is to compare the QoS routing algorithms and their tree construction efficiencies. The first contribution of the thesis is the survey and classification of traditional and QoS multicast routing protocols. Another contribution is the ns-2 implementation of two QoS multicast routing protocols. The final contribution of the thesis is the performance evaluation of the recent protocols from a different perspective.
624

Constructions Of Resilient Boolean Functions With Maximum Nonlinearity

Sahin, Mehmet Ozgur 01 August 2005 (has links) (PDF)
In this thesis, we work on the upper bound for nonlinearity of t-resilient Boolean functions given by Sarkar and Maitra, which is based on divisibility properties of spectral weights of resilient functions and study construction methods that achieve the upper bound. One of the construction methods, introduced by Maity and Johansson, starts with a bent function and complements some values of its truth table corresponding to a previously chosen set of inputs, S, which satisfies three criteria. In this thesis, we show that a fourth criterion is needed for t-resiliency of the resulting function, and prove that three criteria of Maity and Johansson do not guarantee resiliency. We also work on other constructions, one by Sarkar and Maitra, which uses a Maiorana-McFarland like technique to satisfy the upper bound and the other by Tarannikov, which satisfies the nonlinearity bound using a technique with low computational complexity. However, these methods have tendency to maximize the order of resiliency for a given number of variables, therefore one cannot construct functions for all possible resiliency values given the number of variables, using this method. We further go into details and compute the auto-correlation functions of the constructed Boolean functions to find the absolute indicator and sum-of-squared-errors for each of them. We also provide a comparison of Boolean functions constructed by other techniques given in the literature, together with the ones studied in this thesis.
625

Target Detection By The Ambiguity Function Technique And The Conventional Fourier Transform Technique In Frequency Coded Continuous Wave Radars

Akangol, Mehmet 01 December 2005 (has links) (PDF)
Continuous Wave (CW) radars are preferred for their low probability of intercept by the other receivers. Frequency modulation techniques, the linear frequency modulation (LFM) technique in particular, are commonly used in CW radars to resolve the range and the radial velocity of the detected targets. The conventional method for target detection in a linear FMCW radar makes use of a mixer followed by a low-pass filter whose output is Fourier transformed to get the range and velocity information. In this thesis, an alternative target detection technique based on the use of the Ambiguity Function (AF) will be investigated in frequency modulated CW radars. Results of the AF-based technique and the conventional Fourier-based technique will be compared for different target detection scenarios.
626

Waveform Design For Pulse Doppler Radar

Agirman, Handan 01 December 2005 (has links) (PDF)
ABSTRACT WAVEFORM DESIGN FOR PULSE DOPPLER RADAR AgIRMAN, Handan M.S., Department of Electrical and Electronics Engineering Supervisor: Prof. Dr. Mete Severcan December 2005, 100 pages This study is committed to the investigation of optimum waveforms for a pulse doppler radar which uses a non linear high power amplifier in the transmitter. The optimum waveform is defined as the waveform with the lowest peak and integrated side lobe level, the narrowest main lobe in its autocorrelation and the narrowest bandwidth in its spectrum. The Pulse Compression method is used in radar systems since it is more advantageous in terms of the resolution. Among all pulse compression methods, the main focus of this study is on Phase Coding. Two types of radar waveforms assessed throughout this study are Discrete Phase Modulated Waveforms and Continuous Phase Modulated Waveforms. The continuous phase modulated waveforms are arranged under two titles: the memoryless phase modulated waveform and the waveform modulated with memory. In order to form memoryless continuous phase waveforms, initially, discrete phase codes are obtained by using Genetic Algorithm. Following this process, a new phase shaping pulse is defined and applied on the discrete phase waveforms. Among the applicable modulation with memory techniques, Continuous Phase Modulation maintains to be the most appropriate. The genetic algorithm is used to find different lengths of optimum data sequences which form the continuous phase scheme.
627

Robust Data Hiding Scheme With Turbo Codes

Unal, Baris 01 December 2005 (has links) (PDF)
ABSTRACT ROBUST DATA HIDING SCHEME WITH TURBO CODES &Uuml / NAL, BariS M.S., Department of Electrical And Electronics Engineering Supervisor: Prof. Dr. R&uuml / yal ERG&Uuml / L December 2005, 127 pages This study describes the design and implementation of a robust data hiding algorithm which is provided by turbo codes. As the digital technology grows up, it is getting easy to copy and distribute multimedia products without getting legal permission. This has forced researchers to study in digital watermarking areas. Along with watermarking researches, data hiding studies have gained interest in the last decade. Different watermark and data hiding algorithms have been proposed considering different requirements and properties such as robustness, fidelity, invisibility and data hiding capacity. In this thesis, robustness of watermarking systems and fidelity requirement in watermark models are considered and use of turbo codes is proposed with data embedding systems to improve system performance in terms of robustness. Fundamental watermarking algorithms in DCT domain are analyzed and simulated. Their performances in terms of robustness are presented. Data hiding algorithm which is based on projection and perturbation in transform domain is implemented in visual C. Then turbo codes are applied to this algorithm to improve system robustness. Improvement provided by turbo codes is demonstrated and compared with other discussed watermarking systems.
628

Chaotic Digital Modulation And Demodulation

Ozturk, Uygar 01 December 2005 (has links) (PDF)
This thesis considers a communication system with chaotic modulation. Noise-like signals are generated by chaotic systems with different parameters to modulate binary digital signals. Demodulation is performed by both the Extended Kalman Filter (EKF) and Optimum Decoding Based Smoothing Algorithm (ODSA). Simulations are performed using both of these algorithms for different parameters affecting the performance of the communication system. Simulation results of these algorithms are compared.
629

Application Of Odsa To Population Calculation

Ulukaya, Mustafa 01 April 2006 (has links) (PDF)
In this thesis, Optimum Decoding-based Smoothing Algorithm (ODSA) is applied to well-known Discrete Lotka-Volterra Model. The performance of the algorithm is investigated for various parameters by simulations. Moreover, ODSA is compared with the SIR Particle Filter Algorithm. The advantages and disadvantages of the both algorithms are presented.
630

Performance analysis of CDMA data networks with rate and delay variations /

Paliwal, Vikas, January 1900 (has links)
Thesis (M. App. Sc.)--Carleton University, 2004. / Includes bibliographical references (p. 80-83). Also available in electronic format on the Internet.

Page generated in 0.0408 seconds