• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 195
  • 32
  • 23
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • Tagged with
  • 460
  • 460
  • 159
  • 136
  • 110
  • 87
  • 72
  • 67
  • 62
  • 61
  • 50
  • 48
  • 48
  • 46
  • 39
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

Voice flow control in integrated packet networks

Hayden, Howard Paul. January 1981 (has links)
Thesis (Elec.E.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1981. / Includes bibliographical references. / by Howard Paul Hayden. / Thesis (Elec.E.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1981.
332

Physical Layer Security of Wireless Transmissions Over Fading Channels

Unknown Date (has links)
The open nature of the wireless medium makes the wireless communication susceptible to eavesdropping attacks. In addition, fading and shadowing significantly degrade the performance of the communication system in the wireless networks. A versatile approach to circumvent the issues of eavesdropping attacks while exploiting the physical properties of the wireless channel is the so-called physical layer-security. In this work, we consider a model in which two legitimate users communicate in the presence of an eavesdropper. We investigate the performance of the wireless network at the physical layer that is subject to a variety of fading environments that may be modeled by the Rayleigh, Nakagami-m, and Generalized-K distributions, to mention a few. We use the secrecy outage probability (SOP) as the standard performance metrics to study the performance of the wireless networks. We propose two different approaches to compute the secrecy outage probability, and derive explicit expressions for the secrecy outage probability that allow us to characterize the performance of the wireless networks. Specifically, we use a direct integration approach as well as a Taylor series base approach to evaluate the secrecy outage probability. Finally, we use computer simulations, based on MATLAB, to confirm the analytical results. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2016. / FAU Electronic Theses and Dissertations Collection
333

Bolhas de ódio: o ódio como componente político nas dinâmicas interacionais societárias mediadas por Tecnologias de Comunicação Instantânea (TCIs) / Hate bubbles: hate as a political component of social interactional dynamics mediated by Instant Communication Technologies (ICTs)

Lobo, Denis Augusto Carneiro 09 March 2018 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2018-05-10T12:55:18Z No. of bitstreams: 1 Denis Augusto Carneiro Lobo.pdf: 2377689 bytes, checksum: ec66c81fcf1d6584b5311171b0eae5c2 (MD5) / Made available in DSpace on 2018-05-10T12:55:18Z (GMT). No. of bitstreams: 1 Denis Augusto Carneiro Lobo.pdf: 2377689 bytes, checksum: ec66c81fcf1d6584b5311171b0eae5c2 (MD5) Previous issue date: 2018-04-09 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / This master’s thesis analyses the constitution of the so-called Hate Speech in Digital Social Networks (DSNs), specifically, on Facebook. Starting from users’ text interactions in public Facebook pages of the 2014 presidential candidates Dilma Rousseff (Workers Party) and Aécio Neves (Brazilian Social Democracy Party) during the presidential run (August to October 2014), I’ve searched for the characterization of this phenomena within a political-party polarization scenario. Focusing in the political constitution of the referred phenomena, I’ve then evidenced the difference between the legal concept of Hate Speech and a more widespread phenomena, which worked in this scenario as a political component of the social interactions: the political hate. Furthermore, the debate gets centralized in the mediation process of social interactions in an Instant Communication Technology (ICTs) scenario, in search of a confluence with the Latin American studies about the process of technological and communicational mediation, its diferences and implications in an Interactional Sociology. Finally, having analysed such studies as a theorical and methodological background, I've presented a discussion about the importance of the new computational techniques such as "filter bubbles", "social bots" and User Experience (UX) in the daily life of today's liberal democracies, leading the debate to the establishment of "fear techniques", clearly an expression of the so-called "Fear Culture", to which many authors refeer today / Esta dissertação analisou a constituição do chamado Discurso de Ódio nas Redes Sociais Digitais (RSDs), mais especificamente no Facebook. Partindo das interações textuais dos usuários nas páginas públicas dos candidatos à Presidência da República no ano de 2014, Dilma Rousseff (PT) e Aécio Neves (PSDB), durante o pleito eleitoral (agosto a outubro de 2014), buscou-se a caracterização desse fenômeno dentro de um cenário de polarização político-partidária. Voltando o olhar para a constituição política do fenômeno em questão, buscou-se a diferenciação da figura jurídica do Discurso de Ódio de um fenômeno mais capilar, que funcionou como componente político das interações societárias nesse cenário: o ódio político. Além disso, centralizamos o debate nas interações sociais e na mediação das Tecnologias de Comunicação Instantânea (TCIs), buscando uma confluência com o pensamento latino-americano sobre os processos de mediação tecnológica e comunicacional e suas diferenciações e implicações em uma Sociologia Interacionista. Buscou-se também, a partir desse arcabouço teórico-metodológico, discutir os pesos das novas técnicas computacionais, como a “bolha de filtros”, os “social bots”, “fake news” e as técnicas de User Experience (UX) no cotidiano das democracias liberais atuais, direcionando o debate para o estabelecimento de “técnicas do medo”, visivelmente assentados na chamada “Cultura do Medo”, a qual muitos pesquisadores recorrem na atualidade
334

Consumerismo e consumidores indignados: netativismo contra as marcas nas redes sociais

Borges, Fábio Mariano 31 October 2017 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2017-12-11T11:12:22Z No. of bitstreams: 1 Fábio Mariano Borges.pdf: 24818396 bytes, checksum: 907b16881a5f0b26717b3573507ca0d4 (MD5) / Made available in DSpace on 2017-12-11T11:12:22Z (GMT). No. of bitstreams: 1 Fábio Mariano Borges.pdf: 24818396 bytes, checksum: 907b16881a5f0b26717b3573507ca0d4 (MD5) Previous issue date: 2017-10-31 / Digital activism or netativism is a recent advent and expression of the political exercise of users of the cyber world, especially of social networks. One of its types refers to the manifestations of the consumers against the companies through denunciations of crimes and attempt to promote boycott against them, in order to positive results for the collective. In this sense, consumption is seen as an area to political exercise, and this type of practice is even more democratized and accessible through social networks. The present study reflects about the reconfiguration of consumerism, very recently impacted by consumer netativism. Consumerism is a sociological term that names the set of consumer practices in order to exercise power, conquest, maintenance of rights and resistance to the commercial interests of the companies. The object of research is the manifestations of consumer indignation on Facebook between the years 2012 and 2017. For that, was conducted netnography, through monitoring the clashes between consumers and businesses on Facebook. In this sense, the study analyzes consumerism in the form of netativism, as a device of power, as well as consumption, both situated in the concept of biopolitics developed by Foucault / O ativismo digital ou netativismo é um advento recente e expressão do exercício político dos usuários do mundo cibernético, em especial das redes sociais. Uma de suas modalidades refere-se às manifestações dos consumidores contra as empresas através de denúncias de delitos e tentativa de promover boicote contra elas, a fim de resultados positivos para o coletivo. Nesse sentido, o consumo é visto como um terreno propício ao exercício político, sendo que esse tipo de prática é ainda mais democratizada e acessível através das redes sociais. O presente estudo trata sobre a reconfiguração do consumerismo, muito recentemente impactado pelo netativismo de consumidores. O consumerismo é um termo sociológio que nomea o conjunto de práticas de consumidores a fim do exercício de poder, conquista, manutenção de direitos e resistência frente aos interesses comerciais das empresas. O objeto de pesquisa aborda as manifestações de indignação dos consumidores no Facebook entre os anos de 2012 e 2017. Para tanto, foi realizada netnografia, através de acompanhamento e monitoramento dos embates no Facebook entre consumidores e empresas. Neste sentido, o estudo analisa o consumerismo sob a forma de netativismo e as relaçãoes de consumo, como dispositivos de poder, ambos situados no conceito de biopolítica desenvolvido por Foucault
335

Algoritmo para determinação da taxa de transmissão em uma rede IP. / Algorithm to transmission rate determination in an IP network.

Zegarra Rodríguez, Demóstenes 24 September 2009 (has links)
A comunicação de Voz sobre IP (VoIP) vem aumentando com o decorrer do tempo e as redes de comunicação estão se tornando cada vez mais congestionadas, ocasionando perda de pacotes e latência nas redes, prejudicando diretamente a qualidade das comunicações de voz. Neste trabalho, foi estudado em detalhe como a qualidade do sinal de voz transmitido em uma comunicação VoIP é afetada por parâmetros da rede e pelo tipo de codificador utilizado na comunicação. Uma contribuição importante deste trabalho é a apresentação de uma metodologia que serve para predizer o comportamento de um codificador de voz em diferentes cenários de redes. O estabelecimento de um mecanismo de controle que otimize a utilização da rede e ao mesmo tempo garanta a melhor qualidade possível do sinal de voz transmitido vem sendo motivo de pesquisa. O emprego de codificadores multitaxa nas comunicações de voz possibilita a implementação de algoritmos que controlem a comutação destas taxas de codificação baseados em diferentes fatores de decisão como as características do sinal de voz a ser transmitido ou empregando a informação dos parâmetros de rede. Este trabalho apresenta um algoritmo de determinação de taxa de codificação com fator de decisão baseado na qualidade do sinal avaliada no ponto da recepção ou em algum ponto intermediário. Para realização dos testes montou-se um cenário de emulação de rede IP para o estabelecimento de uma chamada VoIP, onde são utilizados codificadores multitaxa (ITU-T G.726 e Speex). Para avaliação da qualidade do sinal de voz foi utilizada a recomendação ITU-T P.563, sendo que o índice MOS obtido no ponto de recepção é transmitido utilizando um laço de transmissão, que forma parte da estrutura do mecanismo de controle apresentado neste trabalho. Este laço de transmissão é implementado via socket sobre uma comunicação UDP. Como as ferramentas utilizadas são todas freeware, o cenário de emulação pode ser facilmente implementado por demais pesquisadores. Os resultados obtidos são confiáveis, já que para cenários onde se mesclam diferentes taxas de codificação, o índice MOS obtido é um valor que está na faixa dos valores obtidos nos cenários onde se utilizou taxa de codificação única. O correto desempenho do mecanismo do RDA também foi verificado, sendo que a qualidade do sinal de voz decresce, o mecanismo de controle no RDA comuta a uma taxa de codificação menor, garantindo o melhor uso do canal de transmissão. Quando os parâmetros da rede passam a melhores condições, o índice MOS do sinal aumenta e o RDA comuta a uma taxa de codificação maior obtendo uma qualidade mais alta na comunicação. / Voice over IP (VoIP) communications are becoming increasingly popular so that data communication networks are ever more prone to degradations like packet losses and rising latency. In this work, it was studied in detail how the quality of the speech signal transmitted in a VoIP communication is affected by parameters of the network and the type of codec used in the communication. An important contribution of this work is to predict the behavior of a speech codec in different network scenarios. The main goal of this research has been the development of an algorithm that constrains rate allocation to a speech communication for best quality according to current network resource availability. The use of multirate codecs in speech communications makes it possible to implement control algorithms for coding rate switching. They are based on speech signal features or network trafic parameters. This work presents an algorithm for the determination of coding rate with decision factor based on speech quality evaluated at the point of reception or intermediate points. For accomplishment of the tests, a scenario of emulation of an IP network for the establishment of a VoIP call was built, where multi-rate codecs are used (ITU-T G.726 and Speex). For evaluation of the quality of the speech signal the Recommendation ITU-T P.563 was used, where the MOS index obtained in the reception is transmitted using a transmission loop, as a part in the control mechanism in the proposed algorithm. This transmission loop consists of a UDP message sent on a socket. As the tools used are all freeware, the simulation scenarios can easily be implemented by other researchers. The results are trustworthy, because for multirate scenarios, the MOS index obtained is a value that is between the ones obtained in the single-rate scenarios. The correct performance of the mechanism of the RDA was also verified, so that when the quality of the signal decreases, the control mechanism in the RDA switches to a lower coding rate, ensuring the best use of the transmission canal. When the parameters of the network drive to best conditions, the MOS index of the signal increases and the RDA decides to switch to a higher coding rate achieving a higher communication quality.
336

A DIVERSE BAND-AWARE DYNAMIC SPECTRUM ACCESS ARCHITECTURE FOR CONNECTIVITY IN RURAL COMMUNITIES

Shah, Vijay K. 01 January 2019 (has links)
Ubiquitous connectivity plays an important role in improving the quality of life in terms of economic development, health and well being, social justice and equity, as well as in providing new educational opportunities. However, rural communities which account for 46% of the world's population lacks access to proper connectivity to avail such societal benefits, creating a huge "digital divide" between the urban and rural areas. A primary reason is that the Information and Communication Technologies (ICT) providers have less incentives to invest in rural areas due to lack of promising revenue returns. Existing research and industrial attempts in providing connectivity to rural communities suffer from severe drawbacks, such as expensive wireless spectrum licenses and infrastructures, under- and over-provisioning of spectrum resources while handling heterogeneous traffic, lack of novel wireless technologies tailored to the unique challenges and requirements of rural communities (e.g., agricultural fields). Leveraging the recent advances in Dynamic Spectrum Access (DSA) technologies like wide band spectrum analyzers and spectrum access systems, and multi-radio access technologies (multi-RAT), this dissertation proposes a novel Diverse Band-aware DSA (d-DSA) network architecture, that addresses the drawbacks of existing standard and DSA wireless solutions, and extends ubiquitous connectivity to rural communities; a step forward in the direction of the societal and economic improvements in rural communities, and hence, narrowing the "digital divide" between the rural and urban societies. According to this paradigm, a certain wireless device is equipped with software defined radios (SDRs) that are capable of accessing multiple (un)licensed spectrum bands, such as, TV, LTE, GSM, CBRS, ISM, and possibly futuristic mmWaves. In order to fully exploit the potential of the d-DSA paradigm, while meeting heterogeneous traffic demands that may be generated in rural communities, we design efficient routing strategies and optimization techniques, which are based on a variety of tools such as graph modeling, integer linear programming, dynamic programming, and heuristic design. Our results on realistic traces in a large variety of rural scenarios show that the proposed techniques are able to meet the heterogeneous traffic requirements of rural applications, while ensuring energy efficiency and robustness of the architecture for providing connectivity to rural communities.
337

Energy Demand Response for High-Performance Computing Systems

Ahmed, Kishwar 22 March 2018 (has links)
The growing computational demand of scientific applications has greatly motivated the development of large-scale high-performance computing (HPC) systems in the past decade. To accommodate the increasing demand of applications, HPC systems have been going through dramatic architectural changes (e.g., introduction of many-core and multi-core systems, rapid growth of complex interconnection network for efficient communication between thousands of nodes), as well as significant increase in size (e.g., modern supercomputers consist of hundreds of thousands of nodes). With such changes in architecture and size, the energy consumption by these systems has increased significantly. With the advent of exascale supercomputers in the next few years, power consumption of the HPC systems will surely increase; some systems may even consume hundreds of megawatts of electricity. Demand response programs are designed to help the energy service providers to stabilize the power system by reducing the energy consumption of participating systems during the time periods of high demand power usage or temporary shortage in power supply. This dissertation focuses on developing energy-efficient demand-response models and algorithms to enable HPC system's demand response participation. In the first part, we present interconnection network models for performance prediction of large-scale HPC applications. They are based on interconnected topologies widely used in HPC systems: dragonfly, torus, and fat-tree. Our interconnect models are fully integrated with an implementation of message-passing interface (MPI) that can mimic most of its functions with packet-level accuracy. Extensive experiments show that our integrated models provide good accuracy for predicting the network behavior, while at the same time allowing for good parallel scaling performance. In the second part, we present an energy-efficient demand-response model to reduce HPC systems' energy consumption during demand response periods. We propose HPC job scheduling and resource provisioning schemes to enable HPC system's emergency demand response participation. In the final part, we propose an economic demand-response model to allow both HPC operator and HPC users to jointly reduce HPC system's energy cost. Our proposed model allows the participation of HPC systems in economic demand-response programs through a contract-based rewarding scheme that can incentivize HPC users to participate in demand response.
338

On combination and interference free window spreading sequences

Cresp, Gregory January 2008 (has links)
Spread spectrum techniques have a number of different applications, including range finding, synchronisation, anti-jamming systems and multiple access communication systems. In each of these applications the properties of the resulting systems depend heavily on the family of spreading sequences employed. As such, the design of spreading sequences is an important area of research. Two areas of spreading sequence design are of particular interest in this work, combination techniques and Interference Free Window (IFW) sequences. Combination techniques allow a new sequence family to be constructed by combining two or more existing families. Such an approach allows some of the desirable properties of the components to be maintained, whilst mitigating the components' disadvantages. In addition, it can facilitate the construction of large families at a greatly reduced computational cost. Combination families are considered through the construction of two new classes of sequences, modified Unified Complex Hadamard Transform (UCHT) sequences, and combination Oppermann sequences, respectively based on UCHT sequences and periodic Oppermann sequences. Numerical optimisation techniques are employed to demonstrate the favourable performance of sequences from these classes compared to conventional families. Second, IFW sequences are considered. In systems where approximate, but not perfect, synchronisation between different users can be maintained, IFW sequences can be employed to greatly reduce both interference between users and interference resulting from multipath spread of each user's signal. Large Area Synchronous (LAS) sequences are a class of sequences which both result from combination techniques and exhibit an IFW. LAS sequences are produced by combining Large Area (LA) sequences and LS sequences. They have been demonstrated to be applicable to multiple access communication systems, particularly through their use in LAS2000, which was proposed for third generation mobile telephony. Work to date has been restricted to only a very small range of examples of these families. In order to examine a wider range of LAS sequences, the construction and resulting properties of LA and LS families are considered. The conditions an LA family must satisfy are codified here, and algorithms which can be used to construct LA families with given parameters are presented. The construction of LS sequences is considered, and relationship between each of the parameters used in this construction and the properties of the final family is examined. Using this expanded understanding of both these sequence families, a far wider range of LAS families, potentially applicable to a wider range of applications, can be considered. Initially, the merits of proposed sequences are considered primarily through their correlation properties. Both maximum and mean squared correlation values are considered, depending on the context. In order to demonstrate their practical applicability, combination Oppermann, modified UCHT and LAS sequences are employed in a simulated communications system, and the resulting bit error rates are examined.
339

Design and evaluation of on-line arithmetic modules and networks for signal processing applications on FPGAs

Galli, Reto 07 June 2001 (has links)
Several papers propose the use of on-line arithmetic for signal processing applications implemented on FPGAs. Although those papers provide reasonable arguments for the use of on-line arithmetic, they give only inadequate or incomplete comparisons of the proposed on-line designs to other state of the art solutions on FPGAs. In this thesis, the design, implementation and evaluation of on-line modules and networks for DSP applications, using FPGAS as the target technology, are shown. The presented designs of the modules are highly optimized for the target hardware, which allows a significant increase in efficiency compared to standard on-line designs. The design process for the networks of on-line modules is described in detail, and a methodology to analyze the dataflow and timing is presented. A comparison of on-line signal processing solutions with other approaches. that are available as IP building blocks or components, is given. It is shown that on-line designs are better in terms of latency but that they can not compete in terms of throughput and area for basic applications like FIR filters. However, it is also shown that on-line designs are able to overtake other approaches as the applications become more sophisticated. e.g. when data dependencies exist, or when non constant multiplicands restrict the use of other approaches, such as serial distributed arithmetic. For these applications, online arithmetic shows, compared to other designs, a lower latency and a significant area reduction, while maintaining a high throughput. Several properties of algorithms for which on-line arithmetic is advantageous are identified in this thesis. With this information, it is possible to determine if an on-line solution for an application should be considered. The conclusions are based on experimental data collected using CAD tools for the Xilinx XC4000 family of chips. All the designs are synthesized for the same type of devices for comparison, avoiding rough estimates of the system performance. This generates a more reliable comparison allowing designers to decide between on-line or conventional approaches for their DSP designs. / Graduation date: 2002
340

Code-aided synchronization for digital burst communications

Herzet, Cédric 21 April 2006 (has links)
This thesis deals with the synchronization of digital communication systems. Synchronization (from the Greek syn (together) and chronos (time)) denotes the task of making two systems running at the same time. In communication systems, the synchronization of the transmitter and the receiver requires to accurately estimate a number of parameters such as the carrier frequency and phase offsets, the timing epoch... In the early days of digital communications, synchronizers used to operate in either data-aided (DA) or non-data-aided (NDA) modes. However, with the recent advent of powerful coding techniques, these conventional synchronization modes have been shown to be unable to properly synchronize state-of-the-art receivers. In this context, we investigate in this thesis a new family of synchronizers referred to as code-aided (CA) synchronizers. The idea behind CA synchronization is to take benefit from the structure of the code used to protect the data to improve the estimation quality achieved by the synchronizers. In a first part of the thesis, we address the issue of turbo synchronization, i.e., the iterative synchronization of continuous parameters. In particular, we derive several mathematical frameworks enabling a systematic derivation of turbo synchronizers and a deeper understanding of their behavior. In a second part, we focus on the so-called CA hypothesis testing problem. More particularly, we derive optimal solutions to deal with this problem and propose efficient implementations of the proposed algorithms. Finally, in a last part of this thesis, we derive theoretical lower bounds on the performance of turbo synchronizers.

Page generated in 0.1021 seconds