• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 149
  • 62
  • 32
  • 26
  • 21
  • 12
  • 8
  • 7
  • 5
  • 4
  • 4
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 414
  • 293
  • 79
  • 67
  • 62
  • 48
  • 47
  • 45
  • 40
  • 39
  • 37
  • 37
  • 37
  • 36
  • 34
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
341

Analysis and design of efficient techniques for video transmission in IEEE 802.11 wireless ad hoc networks

Tavares de Araujo Cesariny Calafate, Carlos Miguel 16 January 2020 (has links)
[EN] Wireless mobile ad ho networks, also known as MANETs, are omposed by independent mobile stations that ommuni ate without requiring any sort of infrastru ture for support. These networks are hara terized by variable bandwidth values and frequent path breaks, whi h are due to hannel noise, interferen e between stations and mobility. Su h fa tors require significant adaptation apabilites at different levels of the proto ol suites employed, enabling stations to qui kly respond to fast- hanging network onditions. Resear h on the most adequate proto- ols for the physi al, MAC and routing layers is still on-going, though some basi onsensus has already been rea hed and several testbeds have been setup around the world. To deploy real-time multimedia servi es, namely voi e and video, on top of su h an unreliable network environment is a very hallenging task. In this thesis we propose to a hieve that goal starting from urrently available Wi-Fi te hnology, and gradually finding the most adequate enhan ements to ea h proto ol layer of interest; we then ombine these enhan ements until we a hieve a omplete QoS framework for ad ho networks. By using urrently available te hnology we assure that the proposal of this thesis has an inherent high-level of appli ability on real life environments. Sin e our working field fo uses on video transmission over wireless ad ho networks, we will show how it is possible to support several QoS- onstrained video streams in MANET environments hara terized by moderate to high mobility levels, and by a significant amount of best efort traffic / [ES] Las redes inalámbricas ad hoc, también conocidas como redes MANET, están compuestas por un conjunto de estaciones móviles independientes capaces de omunicarse entre sí sin necesidad de ningún tipo de infraestructura común de comunicaciones. Estas redes se caracterizan por tener un ancho de banda variable y pérdidas frecuentes de ruta que se pueden atribuir al ruido del anal inalámbrico, a la interferencia entre las estaciones móviles o bien a la movilidad de las estaciones. Dichos factores requieren una gran capacidad de adaptación en las diferentes capas de la arquitectura de protocolos, permitiendo a una estación responder rápidamente a posibles cambios bruscos en las condiciones de la red. A pesar de que aún se están realizando trabajos de investigación en bus a de los protocolos más adecuados para las capas físicas, a eso al medio (MAC) y encaminamiento, ha sido posible llegar a un nivel básico de consenso, lo cual ha permitido el despliegue de plataformas y entornos aplicados que utilizan tecnología de red MANET. Ofrecer servicios multimedia, como voz y vídeo, en redes con tan poca habilidad es un desafío importante. En esta tesis nos proponemos alcanzar este objetivo partiendo de la tecnología Wi-Fi actualmente disponible, encontrando de forma paulatina las mejoras más importantes en las diferentes capas de la arquitectura de red, para llegar, finalmente, a una solución integrada capaz de ofrecer calidad de servicio (QoS) en las redes MANET. Al utilizar la tecnología que disponemos actualmente nos aseguramos que las propuestas de esta tesis tengan un alto grado de aplicabilidad en entornos reales. Ya que la línea de trabajo de la tesis está aplicada a la transmisión de vídeo en redes MANET, demostraremos que es posible ofrecer calidad de servicio a varios flujos de vídeo en una red MANET caracterizada por altos grados de movilidad en sus nodos y un nivel significativo de tráfico o de tipo best effort / Tavares De Araujo Cesariny Calafate, CM. (2006). Analysis and design of efficient techniques for video transmission in IEEE 802.11 wireless ad hoc networks [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/135282 / TESIS
342

Multimediální služby v mobilních sítích / Multimedia Services in Mobile Networks

Kovář, Petr January 2009 (has links)
Long time ago, there were developed methods which can allow fast exchange of information at the longest distance possible. Until recent time, the possibilities of long way communications were very limited. There were technological and financial limitations mainly. With telegraph, telephone and the newest – computer networks invention, the telecommunication services became cheaper and much more comprehensive. With accession and high scale spread of internet, the role of communications is much more important. The most actual trend is mobile internet and connected multimedia networks and their instant accessibility from anywhere. On the first side there are classical telecommunication networks as GSM, UMTS, on the other side there is very strong alternative in shape of WiMAX and WiFi networks combination. For the usage of multimedia services in that networks is very important to handle their prefferization over other traffic, which is very difficult task even on wireless media. For the finding of new processes and methods, which can allow it, there is, at fist, the need for highly accurate and authentic mathematical models. In this doctoral thesis is mapped actual state of the art and proposed the new mathematical model of Distribution Coordination Function, which is much-frequent used as access method in 802.11 networks, Wi-Fi.
343

Why do people use public Wi-Fi? : An investigation of risk-taking behaviour and factors lead to decisions

Abdulkader, Mohamad January 2023 (has links)
The usage of public Wi-Fi and hotspots has witnessed a substantial increase in recent times, providing convenient connectivity in various public areas. Public wireless networks are now widely accessible, especially in smart cities. However, utilising public Wi-Fi exposes individuals to potential threats to their privacy and security. Hackers can exploit vulnerabilities present in public Wi-Fi networks, such as the "Evil Twin" attack, to deceive users and unlawfully obtain their personal information. The main objective of the research was to investigate people's awareness of the security risks associated with public Wi-Fi usage and to identify the factors that contribute to their willingness to take such risks. The research adopted a qualitative approach, utilising semi-structured interviews with 14 participants to gain valuable insights into their understanding and knowledge of the risks connected with public Wi-Fi. The majority of respondents employed public Wi-Fi for educational purposes, browsing the Internet, and engaging with social media platforms. Additionally, the findings of the study explored the motivations and influences that lead individuals to take risks when using public Wi-Fi. Factors such as convenience, cost-effectiveness, saving mobile data usage, limited mobile network coverage, and a lack of awareness concerning privacy and security risks emerged as the most significant reasons and influences behind the utilisation of public Wi-Fi.
344

Book retrieval system : Developing a service for efficient library book retrievalusing particle swarm optimization

Woods, Adam January 2024 (has links)
Traditional methods for locating books and resources in libraries often entail browsing catalogsor manual searching that are time-consuming and inefficient. This thesis investigates thepotential of automated digital services to streamline this process, by utilizing Wi-Fi signal datafor precise indoor localization. Central to this study is the development of a model that employsWi-Fi signal strength (RSSI) and round-trip time (RTT) to estimate the locations of library userswith arm-length accuracy. This thesis aims to enhance the accuracy of location estimation byexploring the complex, nonlinear relationship between Received Signal Strength Indicator(RSSI) and Round-Trip Time (RTT) within signal fingerprints. The model was developed usingan artificial neural network (ANN) to capture the relationship between RSSI and RTT. Besides,this thesis introduces and evaluates the performance of a novel variant of the Particle SwarmOptimization (PSO) algorithm, named Randomized Particle Swarm Optimization (RPSO). Byincorporating randomness into the conventional PSO framework, the RPSO algorithm aims toaddress the limitations of the standard PSO, potentially offering more accurate and reliablelocation estimations. The PSO algorithms, including RPSO, were integrated into the trainingprocess of ANN to optimize the network’s weights and biases through direct optimization, aswell as to enhance the hyperparameters of the ANN’s built-in optimizer. The findings suggestthat optimizing the hyperparameters yields better results than direct optimization of weights andbiases. However, RPSO did not significantly enhance the performance compared to thestandard PSO in this context, indicating the need for further investigation into its application andpotential benefits in complex optimization scenarios.
345

Performance Analysis and Improvement of 5G based Mission Critical Motion Control Applications

Bhimavarapu, Koushik January 2022 (has links)
The industrial needs in the production of goods and control of processes within the factory keep leapfrogging daily by the necessities to fulfil the needs of the ever-growing population. In recent times, the industries are looking towards Industry 4.0 to improve their overall productivity and scalability. One of the significant aspects that are required to meet the requirements of Industry 4.0 is communication networks among industrial applications. Nowadays, industries from the cross markets are looking to replace their existing wired networks with wireless networks, which indeed brings many use-cases and a lot of new business models into existence. To make all these options possible, wireless networks need to meet the stringent requirements of these industrial applications in the form of reliability, latency, and service availability. This thesis focuses on a systematic methodology to integrate wireless networks like 5G, Wi-Fi 6, etc., into real-life automation devices. It also describes a methodology to evaluate their communication and control performance by varying control parameters like topology, cycle time, and type of networks. It also devises some techniques and methods that can improve the overall performance, i.e., both control and communication performance of the control applications. The method used to implement this work is a case study. This work integrates and tests the industrial applications in a real-life scenario. It is the best effort to bring a unique perspective of communication engineers and control engineers together regarding the performance of the industrial applications. This work tries to verify the suitability of the wireless in mission-critical control application scenarios with respect to their communication and control performance. Software for data analysis and visualization and its methodology for analyzing the traffic flow of the control applications via different wireless networks is demonstrated by varying different control parameters. It is shown that it is challenging for 5G to support the shorter cycle time values, and performance will get better and more stable with the increase in the cycle time of the control application. It is also found that the 1-Hop wireless topologies have a comparatively better control performance than 2-Hop wireless topologies. In the end, it is found that the communication and control performance of the motion control application can be improved by using the hybrid topology, which is a mixture of 5G and Wi-Fi 6, by modifying some key aspects. The thesis work helps to introduce a novel systematic methodology for measuring and analyzing the communication and control applications via different wireless networks. It also gives a better idea for the control engineers in the industry about which cycle times the different wireless networks and their topologies support when integrated with industrial automation devices. It also describes which wireless networks support industrial applications better. It ends with a novel methodology that could improve the performance of the mission-critical motion applications by using existing wireless technologies.
346

Beyond turbine mortality: Holistic assessment of hydropower hazards for European fishes

van Treeck, Ruben 15 February 2022 (has links)
Gegenstand dieser Dissertation ist die Entwicklung von zwei Bewertungsinstrumenten zum Abschätzen von anthropogenen Störungen auf Fische: Das erste ist eine Sensitivitätsklassifizierung, die die Resistenz und das Erholungspotenzial einer Art gegen einen Stressor widerspiegelt. Das Prinzip basiert auf der Kombination & Aggregation von Life History Traits, die für die Resilienz der Art entscheidend sind wie z. B. maximale Größe oder Reproduktionswerte, aber auch der Migrationstyp. Diese Traits wurden einzeln je nach Typ und artspezifischer Ausprägung Perzentilgruppen zugeordnet und diese dann zu einem übergeordneten Sensitivitätswert aggregiert, der für 168 Arten bestimmt werden konnte. Von Arten mit einem hohen Wert ist eine höhere Resistenz gegenüber einem Stressor zu erwarten, ein niedriger Wert hingegen deutet auf eine geringe Resistenz aber hohes Erholungspotenzial nach Aufhebung des Stressors. Der Sensitivitätswert kann für die Bewertung menschlicher Einflüsse auf einzelne Arten, aber auch Artgemeinschaften und in einer Vielzahl von Szenarien genutzt werden wie z. B. Risikobewertungen und Umweltverträglichkeitsprüfungen, aber auch in Schutz- und Revitalisierungsbemühungen Anwendung finden. Das zweite Bewertungssystem, auf der in dieser Arbeit ein starker Fokus gelegt wird, ist der Europäische Fischgefährdungsindex EFHI, ein Evaluationswerkzeug für Wasserkraftrisiken für Fische. Dieser nutzt konzeptionelle, empirische und modellierte Daten zu den individuellen Risiken einzelner Kraftwerksbausteine und verschneidet sie mit der artspezifischen Empfindlichkeit betroffener Fische. Der Sensitivitätswert ist einer der Hauptfaktoren, die diese Empfindlichkeit bestimmen und wird um weitere Informationen wie der Körperform oder Schwimmblasenanatomie ergänzt. Der EFHI bewertet kontextabhängig einen artenspezifischen Risikowert, der dann zu einem Endergebnis zwischen 0 (kein Risiko) und 1 (höchstes Risiko) zusammengefasst wird. Der EFHI ist in ganz Europa anwendbar. / Content of this thesis is the development of two tools to assess anthropogenic impacts on fishes. The first is a score that classifies a species’ sensitivity to anthropogenic stress that would elevate the mortality of individuals in a population. It is based on the species-specific, unique suite of life history traits that mediate a species’ resilience e.g., maximum adult size, maturation metrics and fecundity, but also the migration type of species i.e., diadromous, potamodromous and resident. Traits on a continuous scale were grouped using percentiles, binary variables like migration type were treated nominally, and aggregated into a single score ranging from 1.58 to 4.42 for 168 species. Species with a high score are expected to resist a stressor for a longer time or resist a stressor of higher magnitude, respectively, whereas a lower score reflects a low individual resistance to a stressor but a rapid recovery. This score can be used for risk and impact evaluations of anthropogenic activities, but also to track restoration or conservation efforts. The second assessment system on which a particular focus is laid in this thesis is the European Fish Hazard Index EFHI, an assessment tool for hydropower risks for fishes. In the EFHI, the sensitivity score described above is one of the main factors determining specific susceptibility, along with body shape, swim bladder anatomy and conservation concern. The tool evaluates hazards related to the four hydropower components i) overall flow alterations, ii) entrainment and turbine mortality, iii) upstream fish passage and iv) downstream fish passage and calculates species- and components specific hazard scores that are ultimately aggregated into the final EFHI score ranging from 0 (no risk) to 1 (highest risk). It can be used across the bio-geographic range of all 168 species for which a sensitivity score could be calculated.
347

Ecological consequences of personality in sharks

Dhellemmes, Félicie 13 December 2021 (has links)
In der Verhaltensökologie hat das Interesse an der Persönlichkeit von Tieren in den letzten zwei Jahrzehnten zugenommen und man geht davon aus, dass verschiedene Verhaltenstypen wichtige ökologische und evolutionäre Konsequenzen haben. Diese Konsequenzen sind besonders ausgeprägt, wenn eine konstante Verhaltensweise mit anderen Verhaltensweisen (sog. Verhaltenssyndrome) oder mit Life-History-Merkmalen (sog. Pace-of-life-Syndrome) korreliert. Bisher haben Studien zu Verhaltens- und Pace-of-life-Syndromen zu keinen schlüssigen Ergebnissen geführt – manche Hypothesen wurden bestätigt, andere jedoch nicht. Man nimmt an, dass Kovariation zwischen Merkmalen von der Umwelt geprägt ist. Da jedoch Tiere in Gefangenschaft in diesen Studien überrepräsentiert sind, kann dies ein möglicher Grund für die recht uneindeutigen Ergebnisse sein. Um diese Wissenslücke zu schließen, erforschte ich die Entstehung von Verhaltens- und Pace-of-life-Syndromen in einer Wildpopulation juveniler Haie, die relevanten ökologischen Bedingungen ausgesetzt waren. Ich untersuchte (1) ob ein Syndrom zwischen zwei konstanten Verhaltensweisen besteht und ob das Auftreten des Syndroms kontextabhängig ist, (2) ob ein Trade-off zwischen Wachstum und Mortalität durch Explorationsverhalten vermittelt wird, und (3) ob Persönlichkeit das Nahrungshabitat der Haie vorhersagen kann und ob dieser Zusammenhang kontextabhängig ist. Ich dokumentierte ein Verhaltenssyndrom das über Jahre und Standorte hinweg inkonsistent war und von inter-individueller Konkurrenz abhing. Ein Zusammenhang zwischen Explorationsverhalten und einem Wachstums-Mortalitäts-Trade-off war nur bei geringem Prädationsrisiko zu beobachten. Zudem sagte das Explorationsverhalten Nahrungshabitate nur bei geringem Prädationsrisiko vorher. Zusammengenommen deuten diese Ergebnisse darauf hin, dass die ökologischen Bedingungen eine entscheidende Rolle bei der Entstehung und Ausprägung von Persönlichkeits- und Pace-of-life-Syndromen spielen. / In behavioural ecology, interest in the study of animal personality (i.e. consistent individual differences in behaviour across time and/or context) has increased in the last two decades as it is believed to have important ecological and evolutionary consequences. These consequences are especially pronounced when a behaviour that is consistent covaries with other consistent behaviours (i.e. behavioural syndrome) or with life-history traits (i.e. pace-of-life syndrome). So far, studies of behavioural and pace-of-life-syndromes have produced ambiguous outcomes (e.g. hypotheses are sometimes verified and others not), and the prominence of studies on captive animals (i.e. as opposed to wild animals) in the literature may be a reason for inconclusive results as trait covariation has been hypothesized to be environmentally driven. To address this knowledge gap, I investigated the emergence of behavioural and pace-of-life-syndromes in a wild population of juvenile sharks subject to relevant ecological pressures (e.g. predation risk, inter-individual competition). I explored (1) whether a behavioural syndrome existed between two consistent traits (exploration and sociability) and whether the appearance of the syndrome was context dependent, (2) whether a growth-mortality trade-off was mediated by exploration personality and (3) whether personality could predict the foraging habitat of sharks and whether this link was context-dependent. First, I observed a behavioural syndrome between sociability and exploration personality which was inconsistent across years and locations and was dependent on inter-individual competition. Then, I found the association between exploration personality and a growth-mortality trade-off to only be observable in low predation risk. Similarly, I found that exploration personality only predicted wild foraging habitat when predation risk was low. Overall, these results suggest that ecological conditions play a crucial role in the emergence and the shaping of personality and trait association. This thesis offers a possible explanation for the ambiguous results of previous studies and highlights the importance of increasing the focus on wild study systems that are subject to relevant ecological pressures in future animal personality research.
348

Preserving Security and Privacy: a WiFi Analyzer Application based on Authentication and Tor

Kolonia, Alexandra, Forsberg, Rebecka January 2020 (has links)
Numerous mobile applications have the potential to collect and share userspecific information on top of the essential data handling. This is made possible through poor application design and its improper implementation. The lack of security and privacy in an application is of main concern since the spread of sensitive and personal information can cause both physical and emotional harm, if it is being shared with unauthorized people. This thesis investigates how to confidentially transfer user information in such a way that the user remains anonymous and untraceable in a mobile application. In order to achieve that, the user will first authenticate itself to a third party, which provides the user with certificates or random generated tokens. The user can then use this as its communication credentials towards the server, which will be made through the Tor network. Further, when the connection is established, the WiFi details are sent periodically to the server without the user initiating the action. The results show that it is possible to establish connection, both with random tokens and certificates. The random tokens took less time to generate compared to the certificate, however the certificate took less time to verify, which balances off the whole performance of the system. Moreover, the results show that the implementation of Tor is working since it is possible for the system to hide the real IP address, and provide a random IP address instead. However, the communication is slower when Tor is used which is the cost for achieving anonymity and improving the privacy of the user. Conclusively, this thesis proves that combining proper implementation and good application design improves the security in the application thereby protecting the users’  privacy. / Många mobilapplikationer har möjlighet att samla in och dela användarspecifik information, utöver den väsentliga datahanteringen. Det här problemet möjliggörs genom dålig applikationsdesign och felaktig implementering. Bristen på säkerhet och integritet i en applikation är därför kritisk, eftersom spridning av känslig och personlig information kan orsaka både fysisk och emotionell skada, om den delas med obehöriga personer. Denna avhandling undersöker hur man konfidentiellt kan överföra användarinformation på ett sätt som tillåter användaren av mobilapplikationen att förbli både anonym och icke spårbar. För att uppnå detta kommer användaren först att behöva autentisera sig till en tredje part, vilket förser användaren med slumpmässigt genererade tecken eller med ett certifikat. Användaren kan sedan använda dessa till att kommunicera med servern, vilket kommer att göras över ett Tor-nätverk. Slutligen när anslutningen upprättats, kommer WiFi-detaljerna att skickas över periodvis till servern, detta sker automatiskt utan att användaren initierar överföringen. Resultatet visar att det är möjligt att skapa en anslutning både med ett certifikat eller med slumpmässiga tecken. Att generera de slumpmässiga tecknen tog mindre tid jämfört med certifikaten, däremot tog certifikaten mindre tid att verifiera än tecknen. Detta resulterade i att de båda metoderna hade en jämn prestanda om man ser över hela systemet. Resultatet visar vidare att det implementeringen av Tor fungerar då det är möjligt för systemet att dölja den verkliga IPadressen och att istället tillhandahålla en slumpmässig IP-adress. Kommunikationen genom Tor gör dock systemet långsammare, vilket är kostnaden för att förbättra användarens integritet och uppnå anonymitet. Sammanfattningsvis visar denna avhandling att genom att kombinera korrekt implementering och bra applikationsdesign kan man förbättra säkerheten i applikationen och därmed skydda användarnas integritet.
349

Coexistence of Wireless Systems for Spectrum Sharing

Kim, Seungmo 28 July 2017 (has links)
Sharing a band of frequencies in the radio spectrum among multiple wireless systems has emerged as a viable solution for alleviating the severe capacity crunch in next-generation wireless mobile networks such as 5th generation mobile networks (5G). Spectrum sharing can be achieved by enabling multiple wireless systems to coexist in a single spectrum band. In this dissertation, we discuss the following coexistence problems in spectrum bands that have recently been raising notable research interest: 5G and Fixed Satellite Service (FSS) at 27.5-28.35 GHz (28 GHz); 5G and Fixed Service (FS) at 71-76 GHz (70 GHz); vehicular communications and Wi-Fi at 5.85-5.925 GHz (5.9 GHz); and mobile broadband communications and radar at 3.55-3.7 GHz (3.5 GHz). The results presented in each of the aforementioned parts show comprehensively that the coexistence methods help achieve spectrum sharing in each of the bands, and therefore contribute to achieve appreciable increase of bandwidth efficiency. The proposed techniques can contribute to making spectrum sharing a viable solution for the ever evolving capacity demands in the wireless communications landscape. / Ph. D.
350

Paving the Path of LTE Toward 5G: Physical Layer Assurance and Operation in the Unlicensed Spectrum

Labib, Mina Salah Said 28 September 2020 (has links)
Long-Term Evolution (LTE) is the fourth generation (4G) wireless communications standard and its evolution is paving the path for the fifth generation (5G) technology. LTE is also considered for supporting public safety networks, Machine-to-Machine (M2M) communications, and many other applications. Hence, it is critical to ensure that the LTE system performs effectively even in harsh signaling environments. Unfortunately, LTE is vulnerable to intentional interference at the physical layer. We define the term LTE control channel spoofing, which refers to the case when an adversary sets a fake LTE-like base station (evolved NodeB or eNodeB) that transmits a partial or full LTE downlink frame to deceive LTE devices and hinder them from attaching to a real cell. Based on analyzing the initial cell selection process in the LTE specifications, we identify three different level of LTE control channel spoofing. We have built a testbed to demonstrate the feasibility of such an attack. The experimental results show that LTE control channel spoofing can cause permanent denial of service for LTE devices during the cell selection process. We propose effective mitigation techniques to enhance the immunity of LTE systems against all the three forms of LTE control channel spoofing, and ensure that it is secure and available when and where needed. Moreover, the commercial success of LTE and the resulting growth in mobile data demand have motivated cellular network operators to strive for new innovations. LTE-Unlicensed has been recently proposed to allow cellular network operators to offload some of their data traffic by accessing the unlicensed 5 GHz frequency band. There are three variants of LTE-Unlicensed that have been proposed in the industry. These variants differ in their operational features, but they enhance the capacity of LTE and represent a big milestone in its evolution toward 5G. However, LTE-Unlicensed faces several challenges when operating in the 5 GHz bands, as this spectrum is mainly occupied by Wi-Fi and by various radar systems. Therefore, we analyze the algorithms proposed in the industry for the LTE-Unlicensed and Wi-Fi coexistence, and we develop a new spectrum sharing technique for the coexistence between LTE-Unlicensed and radar systems. In order to analyze LTE-Unlicensed and Wi-Fi coexistence, we first explain the technical details of each of the three variants of LTE-Unlicensed, and we provide a comparative analysis of them in terms of their operational features. Then we develop an unbiased and objective evaluation of their proposed coexistence mechanisms with Wi-Fi systems, and numerically compare their performance. In order to emphasize the need for developing a new spectrum sharing technique for the coexistence between LTE-Unlicensed and radar systems, we first present the different regulatory requirements for the 5 GHz unlicensed bands in several world regions, and we perform a comprehensive survey on the different radar types within the 5 GHz sub-bands. Then we develop a novel spectrum sharing technique based on chance-constrained stochastic optimization to allow the LTE-Unlicensed eNodeB to share the spectrum efficiently with a radar system. The optimization problem is formulated to guarantee the minimum performance criteria for the radar operation, and at the same time allows the LTE-Unlicensed eNodeB to control its transmit power to maximize the performance for the serving LTE-Unlicensed device. A mathematical model is used to transform the stochastic optimization problem into a deterministic one, and an exhaustive search is used to solve the resulting optimization problem. Due to the power control mechanism resulting from the proposed algorithm, numerical results show a significant reduction in the protection distance required between the radar and the LTE-Unlicensed network for the two to coexist, as the proposed algorithm can allow the two systems to operate effectively with a protection distance of only 3.95% of the one imposed by the regulations.

Page generated in 0.0287 seconds