• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 46
  • 6
  • 4
  • 2
  • 2
  • 2
  • Tagged with
  • 74
  • 74
  • 74
  • 41
  • 27
  • 23
  • 16
  • 16
  • 15
  • 14
  • 14
  • 13
  • 13
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Propagation prediction for PCS design in urban microwave channels /

Tran, Thuy Thomas, January 1993 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1993. / Vita. Abstract. Includes bibliographical references (leaves 138-145). Also available via the Internet.
62

Effect of negative spatial/temporal correlation on the performance of maximal ratio combining in a WCDMA cellular system

Pandey, Arvind Nath 21 September 2005 (has links)
Please read the abstract in the section 00front of this document / Dissertation (M Eng (Electronic Engineering))--University of Pretoria, 2005. / Electrical, Electronic and Computer Engineering / unrestricted
63

Blind multi-user cancellation using the constant modulus algorithm

De Villiers, Johan Pieter 21 September 2005 (has links)
Please read the abstract in the section 00front of this document / Dissertation (M Eng (Electronic Engineering))--University of Pretoria, 2006. / Electrical, Electronic and Computer Engineering / unrestricted
64

Detecting fraud in cellular telephone networks

Van Heerden, Johan H. 12 1900 (has links)
Thesis (MSc)--University of Stellenbosch, 2005. / ENGLISH ABSTRACT: Cellular network operators globally loose between 3% and 5% of their annual revenue to telecommunications fraud. Hence it is of great importance that fraud management systems are implemented to detect, alarm, and shut down fraud within minutes, minimising revenue loss. Modern proprietary fraud management systems employ (i) classification methods, most often artificial neural networks learning from classified call data records to classify new call data records as fraudulent or legitimate, (ii) statistical methods building subscriber behaviour profiles based on the subscriber’s usage in the cellular network and detecting sudden changes in behaviour, and (iii) rules and threshold values defined by fraud analysts, utilising their knowledge of valid fraud cases and the false alarm rate as guidance. The purpose of this thesis is to establish a context for and evaluate the performance of well-known data mining techniques that may be incorporated in the fraud detection process. Firstly, a theoretical background of various well-known data mining techniques is provided and a number of seminal articles on fraud detection, which influenced this thesis, are summarised. The cellular telecommunications industry is introduced, including a brief discussion of the types of fraud experienced by South African cellular network operators. Secondly, the data collection process and the characteristics of the collected data are discussed. Different data mining techniques are applied to the collected data, demonstrating how user behaviour profiles may be built and how fraud may be predicted. An appraisal of the performances and appropriateness of the different data mining techniques is given in the context of the fraud detection process. Finally, an indication of further work is provided in the conclusion to this thesis, in the form of a number of recommendations for possible adaptations of the fraud detection methods, and improvements thereof. A combination of data mining techniques that may be used to build a comprehensive fraud detection model is also suggested. / AFRIKAANSE OPSOMMING: Sellulêre netwerk operateurs verloor wêreldwyd tussen 3% en 5% van hul jaarlikse inkomste as gevolg van telekommunikasie bedrog. Dit is dus van die uiterse belang dat bedrog bestuurstelsels geïmplimenteer word om bedrog op te spoor, alarms te genereer, en bedrog binne minute te staak om verlies aan inkomste tot ’n minimum te beperk. Moderne gepatenteerde bedrog bestuurstelsels maak gebruik van (i) klassifikasie metodes, mees dikwels kunsmatige neurale netwerke wat leer vanaf geklassifiseerde oproep rekords en gebruik word om nuwe oproep rekords as bedrog-draend of nie bedrog-draend te klassifiseer, (ii) statistiese metodes wat gedragsprofiele van ’n intekenaar bou, gebaseer op die intekenaar se gedrag in die sellulêre netwerk, en skielike verandering in gedrag opspoor, en (iii) reëls en drempelwaardes wat deur bedrog analiste daar gestel word, deur gebruik te maak van hulle ondervinding met geldige gevalle van bedrog en die koers waarteen vals alarms gegenereer word. Die doel van hierdie tesis is om ’n konteks te bepaal vir en die werksverrigting te evalueer van bekende data ontginningstegnieke wat in bedrog opsporingstelsels gebruik kan word. Eerstens word ’n teoretiese agtergrond vir ’n aantal bekende data ontginningstegnieke voorsien en ’n aantal gedagteryke artikels wat oor bedrog opsporing handel en wat hierdie tesis beïnvloed het, opgesom. Die sellulêre telekommunikasie industrie word bekend gestel, insluitend ’n kort bespreking oor die tipes bedrog wat deur Suid-Afrikaanse sellulˆere telekommunikasie netwerk operateurs ondervind word. Tweedens word die data versamelingsproses en die eienskappe van die versamelde data bespreek. Verskillende data ontginningstegnieke word vervolgens toegepas op die versamelde data om te demonstreer hoe gedragsprofiele van gebruikers gebou kan word en hoe bedrog voorspel kan word. Die werksverrigting en gepastheid van die verskillende data ontginningstegnieke word bespreek in die konteks van die bedrog opsporingsproses. Laastens word ’n aanduiding van verdere werk in die gevolgtrekking tot hierdie tesis verskaf, en wel in die vorm van ’n aantal aanbevelings oor moontlike aanpassings en verbeterings van die bedrog opsporingsmetodes wat beskou en toegepas is. ’n Omvattende bedrog opsporingsmodel wat gebruik maak van ’n kombinasie van data ontginningstegnieke word ook voorgestel.
65

The use of mobile phones as service-delivery devices in sign language machine translation system

Mehrdad Ghaziasgar January 2010 (has links)
<p>This thesis investigates the use of mobile phones as service-delivery devices in a sign language machine translation system. Four sign language visualization methods were evaluated on mobile phones. Three of the methods were synthetic sign language visualization methods. Three factors were considered: the intelligibility of sign language, as rendered by the method / the power consumption / and the bandwidth usage associated with each method. The average intelligibility rate was 65%, with some methods achieving intelligibility rates of up to 92%. The average le size was 162 KB and, on average, the power consumption increased to 180% of the idle state, across all methods. This research forms part of the Integration of Signed and Verbal Communication: South African Sign Language Recognition and Animation (SASL) project at the University of the Western Cape and serves as an integration platform for the group's research. In order to perform this research a machine translation system that uses mobile phones as service-delivery devices was developed as well as a 3D Avatar for mobile phones. It was concluded that mobile phones are suitable service-delivery platforms for sign language machine translation systems.</p>
66

Wireless Channel Modeling, Simulation, and Estimation

Patel, Chirag S. 29 March 2006 (has links)
Several emerging wireless communication systems require direct transmission between mobile terminals to support efficient data transfer and user mobility. Such mobile-to-mobile communication systems differ from the conventional cellular systems where only the user unit is mobile. In addition, there might be a relay, also called a repeater, between the original transmitter and the final receiver to improve the network range and coverage. Potential applications for mobile-to-mobile systems include Intelligent Highways for coordinated traffic control and ad-hoc networks meant for military and disaster management. Relays may be deployed in cellular networks and IEEE 802.16 mesh networks for wireless broadband access. Extensive research in cellular radio channels has led to the successful deployment of cellular networks. However, our knowledge of the radio channels encountered in mobile-to-mobile and relay-based systems is still inadequate. This forms the primary motivation behind our research in addressing wireless channel modeling, simulation, and estimation issues for these systems. Specifically, we investigate frequency-flat mobile-to-mobile channels and develop simulation models by using the sum-of-sinusoids method, which is widely used for cellular channels. In addition, we present the properties of amplify and forward relay channels via theoretical analysis. This analysis, to the best of our knowledge, is the first of its kind. Further, we address the unique challenges, which arise because of the different underlying channel model, for channel estimation in amplify and forward relay systems. Our work would provide other researchers the necessary tools for the design and testing of these emerging communication systems.
67

Indoor/Outdoor Location of Cellular Handsets Based on Received Signal Strength

Zhu, Jian 19 May 2006 (has links)
Indoor/Outdoor Location of Cellular Handsets Based on Received Signal Strength Jian Zhu 123 pages Directed by Dr. Gregory D. Durgin Accurate geo-location is an important emerging technology for public safety, commercial use, and military application. Especially, in the United States, the wireless Enhanced 911 (E911) rules by the Federal Communication Commission (FCC) seek to provide 911 dispatchers with additional information on wireless 911 calls. This dissertation presents a novel technique for indoor/outdoor location of cellular handsets based on received signal strength (RSS) measurements taken by a cellular handset of the surrounding base stations. RSS location accuracy for different environments is studied as a function of base station separation distance, cell sector density, measurement density, radio propagation environment, and accuracy of measurement. The analytical and experimental results in this thesis serve as a guideline for the accuracy of RSS signature location technology under different conditions. Accurate outdoor to indoor penetration models are proposed and validated for dense urban areas by introducing pseudo-transmitters to simulate the wave-guiding effects in urban canyon environments. A set of location algorithms is developed to improve location accuracy. Furthermore, an algorithm to discriminate between indoor and outdoor users is proposed and validated. The research results demonstrate the feasibility of RSS location techniques to meet the FCCs requirements for E911 accuracy in urban and semi-urban environments. The techniques remain accurate for indoor handsets. The results also suggest that a hybridization of the handset-based GPS method and the RSS signature method may prove to be the most effective solution for locating handsets across a range of environments; including rural, suburban, dense urban, and indoor.
68

Interference cancellation for collocated wireless radios

Raghavan, Anand 29 June 2007 (has links)
The area of deterministic noise cancellation in mobile radio communication systems is investigated and analyzed. Several interoperation problems in the mobile wireless radio space are identified and interference concerns for the Bluetooth - WLAN networks are characterized and quantified in the physical layer. A mathematical framework has been created for describing interference in the 2.4 GHz band. An adaptive noise suppression system has been developed that is able to alleviate the encroachment of the aggressor signal on the victim without sacrificing any of the original signal. This system is demonstrated to improve the victim SNR in a spread spectrum communication scenario. The research is extended to construct an interference canceller that is easy to assimilate into existing RF front-ends. A low-power small form-factor analog active canceller has been designed in 0.18-ìm Si-CMOS IC technology that delivers adequate noise suppression performance while operating in the RF domain. This includes novel implementations of phase rotator circuits based on delay interpolation and an integrated low-current quadrature modulator-based continuously variable analog phase shifter. This canceller is capable of up to 30 dB of in-band cancellation for the Bluetooth - WLAN problem. Other versions of the canceller are configured to protect GPS and DVB-H receivers from unintentional radiators transmitting in the vicinity. These demonstrate noise mitigation of at least 15 dB in their respective bands while generating very low broadband noise at the output. A simple low-power mixed-signal automatic control mechanism is also developed to operate the canceller adaptively. The work described in this dissertation advances the state-of-the-art in the area of mobile wireless radio coexistence.
69

The use of mobile phones as service-delivery devices in sign language machine translation system

Mehrdad Ghaziasgar January 2010 (has links)
<p>This thesis investigates the use of mobile phones as service-delivery devices in a sign language machine translation system. Four sign language visualization methods were evaluated on mobile phones. Three of the methods were synthetic sign language visualization methods. Three factors were considered: the intelligibility of sign language, as rendered by the method / the power consumption / and the bandwidth usage associated with each method. The average intelligibility rate was 65%, with some methods achieving intelligibility rates of up to 92%. The average le size was 162 KB and, on average, the power consumption increased to 180% of the idle state, across all methods. This research forms part of the Integration of Signed and Verbal Communication: South African Sign Language Recognition and Animation (SASL) project at the University of the Western Cape and serves as an integration platform for the group's research. In order to perform this research a machine translation system that uses mobile phones as service-delivery devices was developed as well as a 3D Avatar for mobile phones. It was concluded that mobile phones are suitable service-delivery platforms for sign language machine translation systems.</p>
70

Análise da vazão de dados no enlace reverso de redes celulares CDMA / Data throughput analysis for the uplink of the CDMA cellular networks

Mello, Rodolpho Conti Gianini Ferreira, 1988- 12 June 2013 (has links)
Orientador: Celso de Almeida / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação / Made available in DSpace on 2018-08-24T01:46:06Z (GMT). No. of bitstreams: 1 Mello_RodolphoContiGianiniFerreira_M.pdf: 1434278 bytes, checksum: c9d50dad0686c63ee7429ff495370ace (MD5) Previous issue date: 2013 / Resumo: Os fatores responsáveis pela vazão de dados em uma rede celular são o número de usuários alocados em uma célula e a taxa de dados de cada usuário. Desta forma, para alcançar melhores resultados em termos de vazão de dados, deve-se utilizar de técnicas que trabalhem com foco no produto destes dois parâmetros. Este trabalho consiste em uma análise comparativa entre diferentes sistemas CDMA sob a ótica da vazão de dados, tendo como foco sequências de espalhamento do tipo aleatórias e também de Walsh e detecção com filtro casado e com o detector multiusuário descorrelacionador (MUD-D - Multiuser Detector Decorrelator), além de considerar a presença de interferência interna e externa no sistema. O método utilizado para a análise e comparação consiste na modelagem matemática do enlace reverso de um sistema celular DS-CDMA em canal AWGN com controle perfeito de potência e com alguns parâmetros fixos, tais como, a taxa máxima de erro de bit ( ), a taxa mínima de dados por usuário (10 kbps, referente ao serviço de voz) e a potência máxima de transmissão de 0,5W por estação móvel. Este trabalho apresenta também uma análise comparativa entre um sistema DS-CDMA com filtro casado e outro com o detector MUD-D na presença de interferência externa. A análise comparativa do detector MUD-D com o filtro casado em ambiente com interferência externa e toda a análise da vazão de dados do sistema são contribuições do autor / Abstract: The factors responsible for the data throughput in a cellular network are the number of users allocated in a cell and the users' data rate. This way, to reach better results in terms of data throughput, one must use techniques that act with focus on the product of those two parameters. This work consists in a comparative analysis among different CDMA systems from the perspective of the data throughput, focusing on random and Walsh spreading sequences and detection method with matched filter and with the multi-user detector decorrelator (MUD-D), besides considering the presence of internal and external interference in the system. The analysis and comparison methods consist in the CDMA cellular system uplink mathematical modelling in an AWGN channel considering a perfect power control and some fixed parameters such as the maximum bit error rate ( ), minimum data rate per user (10 kbps, referring to the voice service) and maximum transmitting power of 0.5 W per mobile station. This work also presents a comparative analysis between a DS-CDMA system with matched filter and another with the MUD-D detector in the presence of external interference. The MUD-D and matched filter comparative analysis in a scenario with external interference and the whole system's data throughput analysis are the author's contribution / Mestrado / Telecomunicações e Telemática / Mestre em Engenharia Elétrica

Page generated in 0.097 seconds