• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 12
  • 12
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A protection study for vehicles and grade crossings using radio system technology

Ou, Ting-Chia 26 July 2002 (has links)
The purpose of this thesis is to investigate radio systems for the protection of vehicles and grade crossings. The protection function used with wireless communication, associated with grade crossings (the vehicles), uses the radio propagation to dispatch message (data) from the radio facilities to the vehicles when the emergency button is pushed to enable the operator to assess the emergency situation in advance. The rule for static and non-static measurements of the radio system, concerned with the crossing, is able to offer an improved spectrum assignment tool. All measurement data was derived from measurements performed for the trains of The Taiwan Railway Administration. The results are compared with the European Norm and China National Standard. Thus, the electromagnetic interferences due to trains can be analyzed. In order to estimate the radio propagation distances, we particularize the several modes of radio propagation in detail, and use the Lagrange method to analyze and determine the distance.
2

Podpora výuky systémů pro ochranu zboží / Support for instruction in electronic surveillance of goods

Danišík, Milan January 2008 (has links)
The thesis deals with technologies of goods protection. It is focused on electronic technologies of goods protection, which call EAS (electronic article surveillance) in foreign literature. The goal of this thesis is support for instruction in electronic surveillance of goods. This document systematically describes principle and technical solution recent electronic technologies of goods protection. There are mentioned advantages and disadvantages too. The other chapter deals with basic operating mode and configuration parameters of loop systems, acoustic-magnetic system and radio system. On the basis of this was suggested laboratory task. This task is use for better understanding of principles electronic surveillance of goods. Some possible attacks of electronic surveillance of goods are described at the last chapter of this thesis. This attacks was also realized.
3

Radioräckviddsberäkningar för flygande plattformar / Radio range calculations for flying platforms

Forsberg, Nicklas, Säfholm, Johan January 2002 (has links)
<p>There exist several known methods for calculation of radio coverage for ground-based systems. As far as we know there are no equivalent methods for the case of flying platforms when the altitudes and speeds are significantly different to those of ground-based systems. </p><p>This thesis describes the theoretical concepts behind calculations of radio coverage for flying platforms. An investigation is made to sort out what is important and possible to employ in a model for simulations. A method is described and implemented in a program for evaluation of flying radio systems. Two typical cases of flight missions are simulated and discussed. </p><p>It is found that the free space model is valid most of the mission time. The contribution from the antennas is found to be small in comparison to the path loss. Further investigations suggested are e.g. better ground reflection models and a better model for the flight mechanics.</p>
4

Μελέτη και ανάπτυξη αποδοτικών τεχνικών για την ανίχνευση και παρακολούθηση φασματικών κενών σε ένα γνωστικό σύστημα ραδιοεπικοινωνιών ("Cognitive Radio System")

Βίγλας, Ζαφείριος 19 August 2009 (has links)
Η παρούσα διπλωματική εργασία έχει ως αντικείμενο την μελέτη και ανάπτυξη μίας τεχνικής ανίχνευσης φάσματος (spectrum sensing technique), η οποία να μπορεί να χρησιμοποιηθεί σε περιβάλλον Δυναμικής Εκχώρησης Φάσματος από Γνωστικά Συστήματα Ραδιοεπικοινωνιών (Cognitive Radio Systems). Οι παραδοσιακές στατικές στρατηγικές καταμερισμού του φάσματος έχουν δημιουργήσει προβλήματα έλλειψης διαθέσιμου φάσματος. Ταυτόχρονα, πρόσφατες μετρήσεις δείχνουν ότι μεγάλα τμήματα του φάσματος που έχουν εκχωρηθεί με άδεια σε συγκεκριμένα συστήματα υποχρησιμοποιούνται. Είναι επομένως αναγκαίο να υιοθετηθούν νέες πολιτικές διαχείρισης του φάσματος οι οποίες θα επιτρέπουν σε μη αδειοδοτημένα δίκτυα να κάνουν χρήση τμημάτων του αδειοδοτημένου φάσματος. Τα Γνωστικά Συστήματα Ραδιοεπικοινωνιών είναι ευφυή συστήματα τα οποία έχουν γνώση του περιβάλλοντός τους και μπορούν να προσαρμόζουν κατάλληλα τις παραμέτρους λειτουργίας τους σε αυτό. Τα συστήματα αυτά μπορούν να ανιχνεύουν περιοδικά το φάσμα, να εντοπίζουν τις ζώνες συχνοτήτων οι οποίες δε χρησιμοποιούνται από τους αδειοδοτημένους χρήστες τους και να τις αξιοποιούν. Όπως γίνεται εύκολα αντιληπτό από τα παραπάνω η ανίχνευση φάσματος αποτελεί ένα ιδιαιτέρως κρίσιμο θέμα για τα Γνωστικά Συστήματα Ραδιοεπικοινωνιών. Στο στάδιο αυτό, το σύστημα ανιχνεύει και παρακολουθεί στο περιβάλλον μέσα στο οποίο ενεργεί, το κατά πόσο το φάσμα είναι ελεύθερο ανά πάσα χρονική στιγμή και αξιοποιεί αυτά τα φασματικά κενά. Ουσιαστικά η ανίχνευση φάσματος εφαρμόζεται για να δώσει στον cognitive χρήστη μία όσο το δυνατόν πιστότερη εικόνα του περιβάλλοντος μέσα στο οποίο βρίσκεται. Η δική μας μελέτη επικεντρώθηκε στις τεχνικές ανίχνευσης φάσματος (spectrum sensing) και συγκεκριμένα αναπτύσσουμε μία μέθοδο ανίχνευσης φασματικών κενών βασιζόμενη στη χρήση ενός προβλεπτή (predictor) και στη χρησιμοποίηση του σφάλματος πρόβλεψης του σήματος που προκύπτει από αυτόν ως μετρική για τη λήψη απόφασης σχετικά με την ύπαρξη ή την απουσία σήματος ακόμα και σε θορυβώδη περιβάλλοντα (πολύ χαμηλό SNR). H τεχνική ανίχνευσης φάσματος που προτείνουμε μοντελοποιήθηκε στο περιβάλλον μοντελοποίησης MATLAB. Στη συνέχεια, διενεργήθηκαν εκτενείς προσομοιώσεις για ποικίλες τιμές των διαφόρων παραμέτρων του συστήματος αλλά και για διαφορετικά συστήματα, ούτως ώστε να αξιολογηθεί η επίδοση της τεχνικής σε διάφορες συνθήκες. / In the present thesis, we will study spectrum sensing techniques of Cognitive Radio SIMO systems. The conventional approach to spectrum management is not flexible, as most of the useful part of the spectrum is bounded. Hence it is extremely difficult to find free frequencies in order to deploy new services or to enhance the already existing ones. At the same time, various measurements show that the licensed spectrum is heavily underutilized in terms of both the time domain as well as the space domain. Thus Cognitive Radio technology comes to offer solutions, mainly with regard to the issues mentioned above, providing a dynamic utilization of the spectrum. Cognitive Radio has been proposed for lower priority secondary systems intending to improve spectral efficiency through spectrum sensing thus allowing these systems to transmit at frequency bands that are detected to be unused. As we can easily understand from the above, spectrum sensing is a critical issue for cognitive systems. In order to achieve adaptive transmission in unused portions of the spectrum without interferences to the licensed users of these portions (Primary Users-PUs), spectrum sensing is the first and one of the most important steps as high reliability is demanded on PUs' signal detection. That is, Secondary Users (SUs) should know if the spectrum is being used in order to exploit the available spectrum in the most efficient way. Essentially, spectrum sensing is used in order to provide the cognitive user with a representation of its operating environment which is as faithful as possible. The scope of this thesis is the study and the creation of algorithms that will give the SU of a SIMO system the opportunity to detect the existence of spectrum holes. The implementation we used is based on a predictor. More specifically, the received signal passes through a backward linear predictor from which we compute the difference between the actual signal and the predicted signal, which is the prediction error. By properly exploiting the prediction error, more precisely the power of the prediction error, we can trustworthily detect the existence or the absence of a signal, even in noisy environments, that is, for low values of the signal-to-noise ratio. In order to test the performance of our algorithms, the system above was simulated by MATLAB for different conditions and channels.
5

Multi-user Diversity Systems with Application to Cognitive Radio

January 2012 (has links)
abstract: This thesis aims to investigate the capacity and bit error rate (BER) performance of multi-user diversity systems with random number of users and considers its application to cognitive radio systems. Ergodic capacity, normalized capacity, outage capacity, and average bit error rate metrics are studied. It has been found that the randomization of the number of users will reduce the ergodic capacity. A stochastic ordering framework is adopted to order user distributions, for example, Laplace transform ordering. The ergodic capacity under different user distributions will follow their corresponding Laplace transform order. The scaling law of ergodic capacity with mean number of users under Poisson and negative binomial user distributions are studied for large mean number of users and these two random distributions are ordered in Laplace transform ordering sense. The ergodic capacity per user is defined and is shown to increase when the total number of users is randomized, which is the opposite to the case of unnormalized ergodic capacity metric. Outage probability under slow fading is also considered and shown to decrease when the total number of users is randomized. The bit error rate (BER) in a general multi-user diversity system has a completely monotonic derivative, which implies that, according to the Jensen's inequality, the randomization of the total number of users will decrease the average BER performance. The special case of Poisson number of users and Rayleigh fading is studied. Combining with the knowledge of regular variation, the average BER is shown to achieve tightness in the Jensen's inequality. This is followed by the extension to the negative binomial number of users, for which the BER is derived and shown to be decreasing in the number of users. A single primary user cognitive radio system with multi-user diversity at the secondary users is proposed. Comparing to the general multi-user diversity system, there exists an interference constraint between secondary and primary users, which is independent of the secondary users' transmission. The secondary user with high- est transmitted SNR which also satisfies the interference constraint is selected to communicate. The active number of secondary users is a binomial random variable. This is then followed by a derivation of the scaling law of the ergodic capacity with mean number of users and the closed form expression of average BER under this situation. The ergodic capacity under binomial user distribution is shown to outperform the Poisson case. Monte-Carlo simulations are used to supplement our analytical results and compare the performance of different user distributions. / Dissertation/Thesis / M.S. Electrical Engineering 2012
6

Radioräckviddsberäkningar för flygande plattformar / Radio range calculations for flying platforms

Forsberg, Nicklas, Säfholm, Johan January 2002 (has links)
There exist several known methods for calculation of radio coverage for ground-based systems. As far as we know there are no equivalent methods for the case of flying platforms when the altitudes and speeds are significantly different to those of ground-based systems. This thesis describes the theoretical concepts behind calculations of radio coverage for flying platforms. An investigation is made to sort out what is important and possible to employ in a model for simulations. A method is described and implemented in a program for evaluation of flying radio systems. Two typical cases of flight missions are simulated and discussed. It is found that the free space model is valid most of the mission time. The contribution from the antennas is found to be small in comparison to the path loss. Further investigations suggested are e.g. better ground reflection models and a better model for the flight mechanics.
7

Evaluating LoRa Physical as a Radio Link Technology for use in a Remote-Controlled Electric Switch System for a Network Bridge Radio-Node

Aden Hassan, Abdullahi, Karlsson Källqvist, Rasmus January 2019 (has links)
This report explores the design of a system for remotely switching electronics on and off within a range of at least 15 km, to be used with battery driven radio nodes for outdoor Wi-Fi network bridging. The application of the network bridges are connecting to remote networks, should Internet infrastructure fail during an emergency.The problem statement for the report was “What is a suitable radio link technology for use in a remote controlled electrical switch system and how should it best be put to use?” To answer the question, delimitation was done to exploring Low Power Wide Area Network (LPWAN) link technologies, due to their prior use within power constrained devices.Long Range-radio, abbreviated LoRa, is a LPWAN radio modulation technique and was determined to be a good candidate as a suitable link technology for the remote electrical switch system. The range of LoRa is achieved by drastically lowering the data rate of the transmission, and is suitable for battery-powered or energy harvesting devices such as those found in the field of Internet of Things.A LoRa-based transmitter and receiver pair was implemented, and measured to have a packet delivery ratio of over 95% at a distance of 2 km, measured between two bridges. Data at further distances could not be accurately determined, because of the LoRa transceiver giving faulty readings.No conclusion could be made about the suitability for using a LoRa based system to solve the problem, partially due to an improper method for testing the radio performance was used, and partially due to an inconclusive measurement result. / Denna rapport utforskar designen av ett system för att fjärrstyrt slå på eller av elektronik över ett avstånd på minst 15 km, för att användas med batteridrivna radionoder för nätverksbryggning utomhus med Wi-Fi. Tillämpningsområdet för nätverksbryggorna är att koppla samman avlägsna nätverk, om Internetinfrastruktur skulle sluta fungera vid en nödsituation.Problemställningen för rapporten var ”Vad är en lämplig radiolänksteknik att använda i ett fjärrstyrt elektriskt strömbrytarsystem, och hur ska det bäst brukas?”. För att svara på frågan gjordes en avgränsning att utforska Low Power Wide Area Network (LPWAN)-länktekniker, på grund av deras tidigare användning inom effektbegränsade enheter.Long Range-radio, förkortat LoRa, är en radiomodulationsteknik som används för att skicka data över långa avstånd med energibegränsade enheter. LoRa:s räckvidd uppnås genom att drastiskt sänka datatakten, och lämpar sig för bruk i batteridrivna eller energiskördande enheter, likt de som återfinns inom fältet Internet of Things.Ett LoRa-baserat sändaroch mottagarpar implementerades, och uppmättes till att ha en paketlevereringsmängd på över 95% vid ett avstånd på 2 km, mätt mellan två broar. Data vid större avstånd kunde inte bli bestämt noggrant, eftersom LoRa transceivern gav felaktiga avläsningar. Ingen slutsats kunde göras för lämpligheten för att använda ett LoRa-baserat system för att lösa problemet, delvist för att en olämplig metod för att testa radions prestanda använts, och delvist på grund av ett ofullständigt mätresultat.
8

Analysis of recent spectrum sharing concepts in policy making

Mustonen, M. (Miia) 07 November 2017 (has links)
Abstract During the last couple of decades a lot of research efforts have been spent on developing different spectrum sharing concepts. As the traditional regulatory methods for spectrum allocation are proving inadequate in responding to a growing need for mobile spectrum in a timely manner and finding spectrum for exclusive use is getting increasingly difficult, the political atmosphere is also becoming more and more receptive to new innovative spectrum sharing concepts that increase the efficiency of spectrum use. These concepts also provide regulatory authorities an opportunity to fundamentally change the current major operator driven mobile market and thereby to allow new players and innovative services to surface. However, there is still a gap between the work done by the research community and the work of the regulatory authorities. In this thesis, the aim is to clarify the reasons behind this gap by analysing three prevailing regulatory spectrum sharing concepts: Licensed Shared Access, the three-tier model and TV white space concept. As different stakeholders involved in spectrum sharing – the incumbent user, the entrant user and the regulatory authority – have very diverse roles in spectrum sharing, their incentives and key criteria may vary significantly. In order for a spectrum sharing concept to have a chance in a real life deployment, all these perspectives need to be carefully considered. In fact, a feasible spectrum sharing concept is a delicate balance between the viewpoints of different stakeholders, not necessarily the one offering the most efficient spectrum utilization. This thesis analyses spectrum sharing concepts from all these perspectives and as a consequence unveils the common process model for implementing a spectrum sharing concept in real life, highlighting the distinct roles of different stakeholders in its phases. / Tiivistelmä Parin viimeisen vuosikymmenen aikana tutkimusyhteisö on kehittänyt valtavasti eri käsitteitä ja tuloksia taajuuksien yhteiskäyttöön. Matkapuhelinoperaattoreiden nopeasti kasvavan tiedonsiirto- ja taajuustarpeen myötä myös poliittinen ilmapiiri on muuttunut vastaanottavaisemmiksi uusille jaetuille taajuuksienkäyttömalleille, joilla voidaan sekä lisätä taajuuksien käytön tehokkuutta että mahdollistaa uusien toimijoiden ja innovatiivisten palvelujen kehitys. Taajuuksien yhteiskäyttömalleihin liittyvä tutkimustyö ei kuitenkaan usein palvele suoraan taajuusviranomaisten tarpeita. Tämän työn tavoitteena on selvittää syitä tähän kolmen vallitsevan joustavan taajuuksienkäyttökonseptin avulla: lisensoidun taajuuksien yhteiskäyttömallin, kolmitasoisen taajuuksien yhteiskäyttömallin ja TV kaistojen yhteiskäyttömallin. Eri toimijoilla on hyvin erilaiset roolit taajuuksien yhteiskäytössä ja siksi sekä heidän kannustimensa että keskeiset kriteerit voivat olla hyvin erilaiset. Käytäntöön sopiva jaetun taajuudenkäytön malli onkin usein kompromissi eri näkemysten omaavien toimijoiden kesken, ei välttämättä taajuuksien käytöltään tehokkain vaihtoehto. Tässä työssä analysoidaan eri taajuuksien yhteiskäyttömalleja sekä eri toimijoiden näkökulmia. Analyysin tuloksena luodaan yleinen prosessimalli taajuuksien yhteiskäyttömallien toteutukselle sekä identifioidaan eri toimijoiden roolit sen eri vaiheissa.
9

Verfahren zur Punktidentifizierung bei der Qualitätskontrolle im Maschinenbau unter Verwendung von Polarmesssystemen

Ullrich, Robin 14 November 2017 (has links) (PDF)
In der heutigen Zeit wird die Qualitätssicherung von großen Produktionsgütern des Maschinen und Anlagenbaus vornehmlich durch flexibel einsetzbare Industrietachymeter oder Lasertracker vollzogen. Die vermessungstechnische Erfassung der qualitätsrelevanten Daten ist dabei in enge Prozessketten der Produktion eingebettet. Aufgrund dessen sind die Messabläufe meist softwareseitig gesteuert und gewährleisten eine vollständige und zeiteffiziente Erfassung aller Messpunkte. Damit die korrekte Überführung der Instrumentendaten in das Bezugssystem des Produkts sichergestellt werden kann, muss bei den Messungen ein besonderes Augenmerk auf die fehlerfreie Erfassung der Bezugs- und Verknüpfungspunkte gelegt werden. Im Rahmen der vorliegenden Arbeit wurden daher Identifizierungsverfahren erarbeitet, welche insbesondere für regelmäßige Bezugs- oder Verknüpfungspunktverteilungen zur sicheren Koordinatentransformation beitragen. Inhaltlich wird zwischen direkten und indirekten Identifizierungsstrategien unterschieden. Während die direkten Verfahren in erster Linie durch die Auswertung von Signalintensitäten eines Tachymeters gekennzeichnet sind, machen sich indirekte Verfahren zusätzliche Distanzdaten eines Funksystems zunutze. Speziell für die Anforderung der Verknüpfungspunktmessung vervollständigen punktidentifizierende Reflektorhalterungen das Anwendungsspektrum. Bei der direkten Identifizierungsvariante wurde das Konzept photogrammetrischer Zielzeichencodierungen aufgegriffen. Die Codierung der Zielmarke wird für tachymetrische Messungen durch verschieden stark reflektierende Zielmarkenbereiche erreicht, welche anhand der gemessenen Signalintensitäten voneinander trennbar sind. Mithilfe der empirisch ermittelten Instrumentenparameter zur Laserspotgröße und Intensitätsmessrate sowie Betrachtungen hinsichtlich minimaler Winkelgeschwindigkeiten wurde die Codeerfassung und -auswertung softwareseitig automatisiert. Die Validierung der Verfahren wurde mit einem Industrietachymeter Leica TDRA6000 für ring und sektorförmig codierte Zielmarken durchgeführt. Die Basis des indirekten Identifizierungsverfahrens ist die Kombination von Tachymeter- und Funkdaten. Der mobile Knoten eines Funksystems wurde dazu direkt am Tragegriff des Tachymeters angebracht und durch Bogenschnittverfahren im Bezugssystem positioniert. Angesichts der Vorinformation zur Mobilknotenposition wird die Identifizierung von tachymetrisch erfassten Bezugspunkten ermöglicht. Die Auswahl des Bezugspunkts wird aufgrund einer Kandidatenliste vollzogen, die in mehreren Filterstufen bis zum Verbleib eines einzigen Kandidaten reduziert wird. Neben definierten Distanzkriterien führen vor allem die Ergebnisse kandidatenbezogener Ausgleichungen mit Restriktionen zwischen den Unbekannten zur Identifizierung des Bezugspunkts. Das Konzept der funkgestützten Identifizierung wurde anhand einer Versuchsfeldanwendung verifiziert, wobei die Robustheit der Datenanalyse besonders durch die örtlichen Gegebenheiten des Maschinenbaus gefordert wird. Am Beispiel der Qualitätssicherung schienengebundener Fahrzeuge wurde zudem veranschaulicht, wie die Anwendung der direkten und indirekten Identifizierungsverfahren innerhalb eines strukturierten Messablaufes zur zeiteffizienten und sicheren Qualitätskontrolle beitragen kann.
10

Dependable cognitive wireless networking:modelling and design

Celentano, U. (Ulrico) 06 June 2014 (has links)
Abstract Radio communication is used in increasingly diversified device typologies. Telecommunications with a reduced detrimental impact on health and environment, and an improved cost-efficiency and working lifetime are expected by institutions, end-users, operators and manufacturers. Moreover, with more networks present or more articulated systems, dependability of the entirety is to be ensured. The related need of efficiency in various compartments – such as in the use energy or the radio spectrum – and of effectiveness in adapting to changing operating conditions can be achieved with cognitive features. This dissertation addresses network reconfiguration and dependability by cognitive measures from multiple perspectives – each covered by a respective part of this work – providing guidelines for cognitive networks design. A rationalising view on cognitive networks with related taxonomies and models includes a discussion on the dynamics and interactions in networks operating closely and simultaneously (here, concurrent networks). While cognitive domains are specified for cognitive functions, with a more generic scope control functions are assigned to topological domains. This allows a flexible exploitation of the system design by decoupling the specification of system functions from their mapping onto network devices that will host them. As interaction plays an important role in many topical scenarios, a model for networked engineered cognitive entities comprising four categories (observation, interworking, consolidation, operation) and two levels (a cognitive frontier and a metacognitive hub) is presented here. Its cognitive phases are considered with regard to the other architectural elements. Moving the focus down to the levers for exploitation of context awareness, are presented solutions for efficient use of resources and dependability in general, considering the network dynamics. For communication link and network adaptation, the effective capacity is captured by a compact-form expression also considering imperfections, while learning is exploited for reducing overhead, and collaboration for fairly maximising energy save. / Tiivistelmä Käyttäjät, operaattorit ja laitevalmistajat toivovat tulevilta tietoliikennejärjestelmiltä sekä aiempaa pienempiä haitallisia vaikutuksia terveyteen ja ympäristöön että parannettua kustannustehokkuutta ja toiminta-aikaa. Lisäksi olisi varmistettava useiden verkkojen ja niiden muodostamien monimutkaisten järjestelmien kokonaisuuden luotettava toiminta. Tarvittava tehokkuus energian ja radioresurssien käytössä, samoin kuin kyky sopeutua muuttuviin käyttötilanteisiin, voidaan saavuttaa kognitiivisilla radioteknikoilla. Tämä väitöskirja käsittelee kognitiivisten menetelmien tuomaa radioverkkojen mukauttamista ja luotettavuutta eri näkökulmista. Samalla esitetään kognitiivisten verkkojen suunnittelun periaatteita ja lähtökohtia. Väitöskirja sisältää katsauksen kognitiivisiin radioverkkoihin niihin liittyvine luokitteluineen ja malleineen, sekä tarkastelee samanaikaisesti ja läheisesti toimivien verkkojen (rinnakkaisten verkkojen) dynamiikkaa ja vuorovaikutuksia. Työssä määritetään kognitiiviset lohkot kognitiivisine toimintoineen, kun taas topologiset tasot hallintatoimintoineen määritetään yleisemmin. Tämä mahdollistaa järjestelmäsuunnittelun joustavan hyödyntämisen erottamalla järjestelmän toimintojen määrittelyn toteuttavista verkkolaitteista. Koska vuorovaikutus on merkittävä tekijä useissa sovellusskenaarioissa, verkottuneille keinotekoisille kognitiivisille yksiköille ehdotetaan tässä neljä luokkaa (havainnointi, yhteistoiminta, vakauttaminen, toiminta) sekä kaksi vyöhykettä (kognitiivinen raja-alue ja metakognitiivinen keskus) sisältävää mallia. Mallin kognitiiviset vaiheet käsitellään suhteessa muihin arkkitehtuurin elementteihin. Järjestelmän kontekstitietoisuuden hyväksikäyttöön liittyen esitetään ratkaisuja resurssien tehokkaaseen käyttöön ja yleisemmin luotettavuuteen ottaen huomioon verkkojen dynamiikkaa. Yhteyksien ja verkkojen mukauttamisesta esitetään analyyttinen ratkaisu saavutettavan tehollisen kapasiteetin määrittämiseksi, huomioiden mahdolliset epäideaalisuudet. Kognitiivista oppimista hyödynnetään hallintalikenteen vähentämiseksi ja yhteistyötä energiansäästön maksimoimiseksi verkon alueella tasapuolisesti.

Page generated in 0.069 seconds