• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1086
  • 286
  • 169
  • 143
  • 109
  • 49
  • 44
  • 37
  • 23
  • 18
  • 15
  • 15
  • 9
  • 7
  • 7
  • Tagged with
  • 2497
  • 333
  • 209
  • 204
  • 201
  • 193
  • 172
  • 161
  • 160
  • 149
  • 133
  • 131
  • 131
  • 128
  • 127
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
271

Minimizing Overlap in Tree-Based Multipoint Communication

Wang, Yanhua 31 May 2005 (has links)
No description available.
272

Optical Memory Device Structure Using Vertical Interference From Digital Thin Films

Chi, Robert Chih-Jen 11 October 2001 (has links)
No description available.
273

Effects of high voltage transmission lines on NDB performance

Ismail, Ibrahim January 1981 (has links)
No description available.
274

Selective Interference Cancellation and Frame Synchronization for Packet Radio

Howlader, Mohammad Mostofa Kamal 03 August 2000 (has links)
This research investigates the application of multiuser interference suppression to direct-sequence code-division multiple-access (DS-CDMA) for peer-to-peer packet radio networks. The emphasis of this work is to develop and validate efficient interference suppression techniques through selective cancellation of interference; next, the combination of interference suppression with error correction coding is studied. A decoder-assisted frame synchronization technique is proposed for future packet radio system. The performance of DS-CDMA in packet radio networks suffers from the near-far problem. This near-far problem can be alleviated by using either a multiuser receiver or a single-user adaptive receiver along with centralized or distributed power control. The first part of this dissertation compares the use of these receivers in a peer-to-peer environment. Next, we investigate how interference cancellation can be combined with forward error correction coding for throughput enhancement of the system. Although receivers using interference suppression are simple in structure, the performance degrades due to the lack of exact knowledge of the interfering signal in cancellation and also due to biased decision statistics for the parallel cancellation case. We consider a system that employs both partial parallel interference cancellation and convolutional coding. Information is shared between the operations of interference cancellation and decoding in an iterative manner, using log-likelihood ratios of the estimated coded symbols. We investigate the performance of this system for both synchronous and asynchronous CDMA systems, and for both equal and unequal signal powers. Finally, a new code-assisted frame synchronization scheme, which uses the soft-information of the decoder, is proposed and evaluated. The sync bits are placed in the mid-amble, and encoded as a part of the data sequence using the error correction encoder to resolve time ambiguities. This technique is applied for turbo decoder-assisted frame synchronization. The performance improvement of these proposed techniques over conventional synchronization techniques is explored via simulation. / Ph. D.
275

A Model-Based Receiver for CPM Signals in a Cochannel Interference Limited Environment

Barthelemy, Pierre 06 June 2002 (has links)
Cochannel interference (CCI) is a major impairment in narrowband cellular systems. To increase the spectral efficiency of the narrowband systems, identical carrier frequencies are reused in distant cells. The interference rejection capability of the receiver determines this frequency reuse and is therefore critical. In this thesis, we propose an improved demodulation scheme, employing high-resolution frequency estimation techniques, for continuous phase modulated (CPM) signals in presence of CCI. Minimum shift keying (MSK), which is a special case of CPM, is a very popular modulation format around the world. Frequency detectors, such as the limiter-discriminator permit the non-coherent demodulation of MSK signals. High-resolution frequency estimation appears as a very attractive alternative to the conventional non-coherent frequency detectors. The frequency estimation methods that we have studied are based on autoregressive modeling. The contributions of this thesis include the implementation of various demodulation schemes employing parametric frequency estimation. The use of the Viterbi algorithm as a non-linear equalization technique to mitigate intersymbol interference is considered. We verified that the model-based sequence estimation schemes outperform the conventional non-coherent receivers for MSK with AWGN, flat fading, and CCI. Demodulator diversity is also investigated as a way to combat interference. An improved technique combining the proposed model-based receiver and the conventional coherent receiver is implemented and simulated in presence of CCI. / Master of Science
276

Modeling and Analysis of the Effects of Impairments in Fiber Optic Links

Kanprachar, Surachet 30 September 1999 (has links)
In digital communication systems, several types of impairments may be introduced to the signal. These impairments result in degraded system performance; for example, high bit-error-rate or power penalty. For optical communication systems, in this thesis, these impairments are categorized into four types; that is, thermal noise, shot noise, signal-dependent noise, and intersymbol interference (ISI). By using a Gaussian approximation, effects of the first three impairments are analyzed. It is shown that signal-dependent noise introduces an error floor to the system and the bit-error-rate is considerably degraded if a nonzero-extinction ratio is applied to the system. It is shown that if the decision threshold at the decision circuit is set improperly, more received power is required to keep the bit-error-rate constant. Three main components in the system (i.e., transmitter, optical fiber, and receiver) are modeled as Butterworth filters. ISI from this model is determined by computer simulation. A high ISI is from a small system bandwidth. It is shown that a minimum power penalty can be achieved if the transmitter and receiver bandwidths are matched and fixed, and the ratio of fiber bandwidth to bit rate is 0.85. Comparing ISI from this model to ISI from raised cosine- rolloff filters, it is shown that at some particular bandwidths ISI from raised cosine-rolloff filters is much lower that that from this model. However, if the transmitter and receiver bandwidths are not matched and are not equal to these bandwidths, ISI from this model is lower than ISI from raised cosine-rolloff filters. / Master of Science
277

A software defined GPS signal simulator design

Pan, Zhenhe 17 March 2014 (has links)
The Global Positioning System (GPS) signal simulator plays a critical role in developing and testing GPS receivers. Unfortunately, very few commercial GPS signal simulators are user-friendly for security researchers because they fail to generate abnormal GPS signals, which are fundamentally important. In this thesis, we develop a cost efficient software defined GPS signal simulator. To reduce the design complexity, we make some reasonable assumptions about the GPS system. This simulator is able to generate clean GPS signals, as well as polluted GPS signals by jamming, multi-path, and spoofing interferences. In addition to simulating GPS signals for a single stand alone antenna, our simulator is also able to simulate GPS signals for multiple antennas, simultaneously. These features of the simulator will immensely help the security researchers in the GPS community. / Master of Science
278

Receiver Implementations for a CDMA Cellular System

Aliftiras, George 01 July 1996 (has links)
The communications industry is experiencing an explosion in the demand for personal communications services (PCS). Several digital technologies have been proposed to replace overburdened analog systems. One system that has gained increasing popularity in North America is a 1.25 MHz Code Division Multiple Access (CDMA) system (IS-95). In CDMA systems, multiple access interference limits the capacity of any system using conventional single user correlation or matched filter receivers. Previous research has shown that multiuser detection receivers that employ interference cancellation techniques can significantly improve the capacity of a CDMA system. This thesis studies two such structures: the successive interference cancellation scheme and the parallel interference cancellation scheme. These multiuser receivers are integrated into an IS-95 compatible receiver model which is simulated in software. This thesis develops simulation software that simulates IS-95 with conventional and multiuser receivers in multipath channels and when near-far conditions exist. Simulation results present the robustness of multiuser receivers to near-far in a practical system. In addition to multiuser implemenations, quantization effects from finite bit analog to digital converters (ADC) in CDMA systems will also be simulated. / Master of Science
279

Chameleon Interference: Assessing Vulnerability of Magnetic Sensors to Spoofing and Signal injection attacks through Environmental interference in Mobile Devices

Gleason, David Theodore 06 January 2023 (has links)
Embedded sensors are a fixture of most devices in the current computer industry. These small devices are used for a variety of purposes throughout many fields to collect whatever kind of information is needed by the user. From data on device acceleration to data on position relative to the Earth's magnetic field, embedded sensors can provide it for any number of tasks. The advent of these devices has made work and research in the computer industry significantly easier but they are not without their drawbacks. Most of these sensors operate by drawing external data from the environment through send and receive signals. This mode of operation leaves them vulnerable to external malicious users who seek access to the data being stored and handled by the sensors. Concerns over security and privacy of embedded sensor data has become a topic of great concern with the continued digitization of sensitive personal data. Within the last five years, studies have shown the ability to manipulate embedded magnetic sensors in order to gain access to various forms of sensitive personal data. This is of great concern to the developers of mobile devices as most mobile devices possess embedded magnetic sensors. The vulnerability of sensors to external influence leads to concerns for both data privacy and degradation of public trust in the ability of their devices to keep their personal information safe and out of the wrong hands. Degradation of public trust in security methodologies is a major concern to many in the research and tech industry as much of the work conducted to advance both security and technology depends on large amounts of public data. If the public loses trust in the ability of the devices used by researchers to protect and ensure the safety of the data provided to them, then they may stop providing data which would then make the work of researchers and other tech workers considerably more difficult. To address these concerns, this thesis will present an introduction to Magnetic sensor devices (a prominent tool for data collection), how these sensors work and the ways they handle data. We shall then examine the techniques used to interfere with the functioning and output of magnetic sensors employed by mobile devices. Finally, we shall examine existing techniques for defending against these kinds of attacks as well as propose potential new techniques. The end goal of this work is to provide a broader perspective on the nature of environmental/natural interference and its relationship to scientific study and technological advancement. Literature around this topic does exist, however, all existing works currently in the literature focus exclusively on one form of interference i.e., light which leads to a smaller/narrower perspective which this work seeks to remedy. The end result is meant to give a broader perspective of multiple forms of interference and their interrelations between each other than is possible by current perspectives due to their narrow lens. / Master of Science / Embedded sensors are small devices integrated into many mobile devices currently in the public market. These devices serve to collect environmental data of all kinds in order to perform a variety of functions. From directional calibration to magnetic orientation in relation to the magnetic north pole, sensors perform it all. This has led to a massive increase in computer power and quality of life for the general public but not without issue. The increase in storing personal/sensitive data to be processed by these devices has prompted a new breed of privacy concerns and problems to confront. In this thesis, we seek to show the influence and effects of five distinct types of interference rooted in the natural world on the functioning of magnetic sensor devices. Through the experiments conducted in this work, it was found that the interference forms of sound, temperature, and electromagnetism could induce a 32-36 percent average decrease in standard deviation in the data being processed by the sensor. Temperature shifting as an interference form also showed the potential for sizeable impacts on sensor functioning in terms of both increases and decreases. The largest decrease in standard deviation observed was 122 percent from the experiments with low temperature shifting. This work shows the incredible power and influence that the forces of nature can have on everyday devices and their need for data from their environment. The results observed from the temperature shift experiments also highlight the danger of leaving temperature based cyber-attacks under researched. The main use of this work is to fill the void in the current literature created by temperature based cyber-attacks and hopefully spur more research to be conducted into this method of cyber threat.
280

Backpressure Policies for Wireless ad hoc Networks

Shukla, Umesh Kumar 14 May 2010 (has links)
Interference in ad hoc wireless networks causes the performance of traditional networking protocols to suffer. However, some user applications in ad hoc networks demand high throughput and low end-user delay. In the literature, the backpressure policy, i.e. queue backlog differential-based joint routing and scheduling, is known to be throughput-optimal with robust support for traffic load fluctuations \cite{Tssailus92}. Unfortunately, many backpressure-based algorithms cannot be implemented due to high end-user delay, inaccurate assumptions for interference, and high control overhead in distributed scenarios. We develop new backpressure based approaches to address these issues. We first propose a heuristic packet forwarding scheme that solves the issue of high end-user delay and still provides near-optimal throughput. Next we develop a novel interference model that provides simple yet accurate interference relationships among users. Such a model is helpful in designing a simple backpressure scheduling algorithm that does not violate realistic interference constraints. Finally we develop distributed backpressure algorithms based on our proposed ideas. Our distributed algorithms provide throughput performance close to the optimal and have low control overhead and simple implementation. / Master of Science

Page generated in 0.0682 seconds