• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 86
  • 16
  • 4
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 139
  • 139
  • 89
  • 31
  • 19
  • 15
  • 15
  • 14
  • 13
  • 12
  • 12
  • 12
  • 12
  • 12
  • 12
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Distributed detection and estimation with reliability-based splitting algorithms in random-access networks

Laitrakun, Seksan 12 January 2015 (has links)
We design, analyze, and optimize distributed detection and estimation algorithms in a large, shared-channel, single-hop wireless sensor network (WSN). The fusion center (FC) is allocated a shared transmission channel to collect local decisions/estimates but cannot collect all of them because of limited energy, bandwidth, or time. We propose a strategy called reliability-based splitting algorithm that enables the FC to collect local decisions/estimates in descending order of their reliabilities through a shared collision channel. The algorithm divides the transmission channel into time frames and the sensor nodes into groups based on their observation reliabilities. Only nodes with a specified range of reliabilities compete for the channel using slotted ALOHA within each frame. Nodes with the most reliable decisions/estimates attempt transmission in the first frame; nodes with the next most reliable set of decisions/estimates attempt in the next frame; etc. The reliability-based splitting algorithm is applied in three scenarios: time-constrained distributed detection; sequential distributed detection; and time-constrained estimation. Performance measures of interest - including detection error probability, efficacy, asymptotic relative efficiency, and estimator variance - are derived. In addition, we propose and analyze algorithms that exploit information from the occurrence of collisions to improve the performance of both time-constrained distributed detection and sequential distributed detection.
52

On the Optimal Transmission Strategies for Sources without Channel State Information

Pourahmadi, Vahid January 2011 (has links)
With the growth of multimedia services, it is essential to find new transmission schemes to support higher data rates in wireless networks. In this thesis, we study networks in which the Channel State Information (CSI) is only available at the destination. We focus on the analysis of three different network setups. For each case, we propose a transmission scheme which maximizes the average performance of the network. The first scenario, which is studied in Chapter 2, is a multi-hop network in which the channel gain of each hop changes quasi-statically from one transmission block to the other. Our main motivation to study this network is the recent advances in deployment of relay nodes in wireless networks (e.g., LTE-A and IEEE 802.16j). In this setup, we assume that all nodes are equipped with a single antenna and the relay nodes are not capable of data buffering over multiple transmission blocks. The proposed transmission scheme is based on infinite-layer coding at all nodes (the source and all relays) in conjunction with the Decode-and-Forward DF relaying. The objective is to maximize the statistical average of the received rate per channel use at the destination. To find the optimal parameters of this code, we first formulate the problem for a two-hop scenario and describe the code design algorithm for this two-hop setting. The optimality of infinite-layer DF coding is also discussed for the case of two-hop networks. The result is then generalized to multi-hop scenarios. To show the superiority of the proposed scheme, we also evaluate the achievable average received rate of infinite-layer DF coding and compare it with the performance of previously known schemes. The second scenario, studied in Chapter 3, is a single-hop network in which both nodes are equipped with multiple antennas, while the channel gain changes quasi-statically and the CSI is not available at the source. The main reason for selecting this network setup is to study the transmission of video signals (compressed using a scalable video coding technique, e.g., SVC H.264/AVC) over a Multiple-Input Multiple-Output (MIMO) link. In this setup, although scalable video coding techniques compress the video signal into layers with different importance (for video reconstruction), the source cannot adapt the number of transmitted layers to the capacity of the channel (since it does not have the CSI in each time slot). An alternative approach is to always transmit all layers of the compressed video signal, but use unequal error protection for different layers. With this motivation, we focus on the design of multilayer codes for a MIMO link in which the destination is only able to perform successive decoding (not joint-decoding). In this chapter, we introduce a design rule for construction of multilayer codes for MIMO systems. We also propose a algorithm that uses this design rule to determine the parameters of the multilayer code. The performance analysis of the proposed scheme is also discussed in this chapter. In the two previous scenarios, the ambiguity of the source regarding the channel state comes from the fact that the channel gains randomly change in each transmission block and there is no feedback to notify the source about the current state of the channel. Apart from these, there are some scenarios in which the channel state is unknown at the source, even though the channel gain is fixed and the source knows its value. The third scenario of this thesis presents an example of such network setups. More precisely, in Chapter 4, we study a multiple access network with K users and one Access Point (AP), where all nodes are equipped with multiple antennas. To access the network, each user independently decides whether to transmit in a time slot or not (no coordination between users). Considering a two-user random access network, we first derive the optimal value of network average Degrees of Freedom (DoF) (introduced in Section 4.1). Generalizing the result to multiuser networks, we propose an upper-bound for the network average DoF of a K-user random access network. This upper-bound is then analyzed for different network configurations to identify the network classes in which the proposed upper-bound is tight. It is also shown that simple single-stream data transmission achieves the upper-bound in most network settings. However, for some network configurations, we need to apply multi-stream data transmission in conjunction with interference alignment to reach the upper-bound. Some illustrative examples are also presented in this chapter.
53

Design of a very high speed dynamic RAM in gallium arsenide for an ATM switch / Michael K. McGeever.

McGeever, Michael K. January 1995 (has links)
Bibliography: leaves 156-165. / xvi, 174 leaves : ill. ; 30 cm. / Title page, contents and abstract only. The complete thesis in print form is available from the University Library. / This thesis analyses the design of a Dynamic RAM in gallium arsenide for use as a buffer in an ATM switch. The causes of leakage are investigated and methods to overcome or compensate the leakage are devised, resulting in a memory cell with a large storage time, high speed and low power dissipation. A 14 kbit RAM array is designed and laid out in gallium arsenide. The RAM array is designed to operate over a -25oC to +125oC temperature range using process parameters which vary by up to 2 [sigma] from typical. / Thesis (M.Eng.Sc.)--University of Adelaide, Dept. of Electrical & Electronic Engineering, 1996?
54

Simulated temperature dependency of SEU sensitivity in A 0.5 [mu]m CMOS SRAM

Sanathanamurthy, Siddartha. January 2008 (has links)
Thesis (M. S. in Electrical Engineering)--Vanderbilt University, Aug. 2008. / Title from title screen. Includes bibliographical references.
55

Analysis and improvement of Virtex-4 block RAM Built-In Self-Test and introduction to Virtex-5 block RAM Built-In Self-Test

Garrison, Brooks, Stroud, Charles E., January 2009 (has links)
Thesis--Auburn University, 2009. / Abstract. Vita. Includes bibliographical references (p. 112-113).
56

Designing and implementing a new pulsar timer for the Hartebeesthoek Radio Astronomy Observatory

Youthed, Andrew David January 2008 (has links)
This thesis outlines the design and implementation of a single channel, dual polarization pulsar timing instrument for the Hartebeesthoek Radio Astronomy Observatory (HartRAO). The new timer is designed to be an improved, temporary replacement for the existing device which has been in operation for over 20 years. The existing device is no longer reliable and is di±cult to maintain. The new pulsar timer is designed to provide improved functional- ity, higher sampling speed, greater pulse resolution, more °exibility and easier maintenance over the existing device. The new device is also designed to keeping changes to the observation system to a minimum until a full de-dispersion timer can be implemented at theobservatory. The design makes use of an 8-bit Reduced Instruction Set Computer (RISC) micro-processor with external Random Access Memory (RAM). The instrument includes an IEEE-488 subsystem for interfacing the pulsar timer to the observation computer system. The microcontroller software is written in assembler code to ensure optimal loop execution speed and deterministic code execution for the system. The design path is discussed and problems encountered during the design process are highlighted. Final testing of the new instrument indicates an improvement in the sam- pling rate of 13.6 times and a significant reduction in 60Hz interference over the existing instrument.
57

Ověření vlivu MTCG na vytížení eNodeB v mobilní síti LTE-Advanced / Verification of MTCG's Influence on eNodeB Utilization in Mobile Network LTE-Advanced

Bartal, Boris Unknown Date (has links)
This thesis is dealing with the problem of MTC (Machine Type Communication) devices accessing LTE (Long Term Evolution) network. First part of work contains theoretical description of MTC, LTE network and possibility of using QoS (Quality of Service) for this type of communication. Influence of simultaneous access of large number of MTC devices into LTE network is examined. A solution is proposed -- usage of MTCG. In simulation enviroment NS-3 (Network Simulator 3), two scenarios are created for simulation with and without MTCG. The results of these simulations are then compared.
58

High Performance Static Random Access Memory Design for Emerging Applications

Chen, Xiaowei January 2018 (has links)
Memory wall is becoming a more and more serious bottleneck of the processing speed of microprocessors. The mismatch between CPUs and memories has been increasing since three decades ago. SRAM was introduced as the bridge between the main memory and the CPU. SRAM is designed to be on the same die with CPU and stores temporary data and instructions that are to be processed by the CPU. Thus, the performance of SRAMs has a direct impact on the performance of CPUs. With the application of mass amount data to be processed nowadays, there is a great need for high-performance CPUs. Three dimensional CPUs and CPUs that are specifically designed for machine learning are gaining popularity. The objective of this work is to design high-performance SRAM for these two emerging applications. Firstly, a novel delay cell based on dummy TSV is proposed to replace traditional delay cells for better timing control. Secondly, a unique SRAM with novel architecture is custom designed for a high-performance machine learning processor. Post-layout simulation shows that the SRAM works well with the processing core and its design is optimized to work well with machine learning processors based on convolutional neural networks. A prototype of the SRAM is also tapped out to further verify our design.
59

Contrôle de charge des réseaux IoT : d'une étude théorique à une implantation réelle / IoT networks load control mechanisms : From a theoretical study to a real implementation

Chelle, Hugo 18 December 2018 (has links)
Prenons en exemple une salle de classe composée d’un professeur et de nombreux élèves, lorsque trop d’élèves s’adressent en même temps au professeur ce dernier n’est plus en mesure de comprendre les paroles transmisses par les élèves. Cette illustration s’étend évidemment aux systèmes de communications sans fil (la 4G par exemple). Dans ces systèmes, les terminaux (les élèves par analogie) transmettent sur un canal, nommé canal en accès aléatoire, des messages qui sont potentiellement réceptionnés par la station de base (le professeur par analogie). Ces canaux ne sont habituellement pas surchargés car leur capacité (nombre de messages reçus par seconde) est tellement importante qu’il est très complexe de surcharger le canal. L’émergence de l’Internet des objets où des milliards de petits objets devraient être déployés partout dans le monde a changé la donne. Étant donné leur nombre et leur type de trafic, ces derniers peuvent surcharger les canaux en accès aléatoire. Ainsi, le sujet : « contrôle de charge des canaux en accès aléatoire » a connu un gain d’intérêts ces dernières années. Dans cette thèse nous avons développé des algorithmes de contrôle de charge permettant d’éviter qu’une station de base soit surchargée. Cela est très utile pour les opérateurs Télécoms, ils sont désormais certains qu’il y n’y aura pas de perte de service à cause de ces surcharges. Tous les principes développés dans cette thèse seront intégrés dans un futur proche aux produits IoT d’Airbus. / Take for example a classroom composed of a teacher and many students. When too many students address at the same time to the teacher, the latter is no longer able to understand the words transmitted by students. This illustration obviously extends to wireless communication systems (the 4G for example). In these systems, terminals (students by analogy) transmit on a channel, named random access channel, messages that are potentially received by the base station (the teacher by analogy). These channels are usually not overloaded because their capacity (number of messages received per second) is so important that it is very complex to overload the channel. The emergence of the Internet of Things, where billions of small objects should be deployed around the world, has changed the game. Due to their number and type of traffic, they can overload random access channels. Therefore, the subject: "load control of random access channels" has seen an increase in interest in recent years. In this PhD we have developed load control algorithms to prevent a base station from being overloaded. This is very useful for telecom operators, they are now certain that there will be no loss of service because of these overloads. All the principles developed in this thesis will be integrated in the near future within Airbus IoT products
60

Selfish Dynamic Spectrum Access in Multichannel Wireless Networks : Complete and incomplete information analysis

Özyagci, Ali January 2011 (has links)
The increasing popularity and widespread deployment of wireless data systems fuel the increasing demand for more spectrum. On the other hand, various studies measuring spectrum utilization show that there is a huge variation in spectrum utilization at different times and locations. In view of this, various dynamic spectrum access (DSA) methods have been proposed in order to achieve more efficient utilization of spectrum resources by virtue of exploiting the variations in spectrum demand over time and space. Implementing DSA systems in a centralized way can lead to complexity and scalability problems due to the extensive control signaling involved. Therefore distributed implementations of DSA systems in which the users can access the system resources at their own discretion have been proposed. These distributed mechanisms typically incorporate cognitive radio systems which act as agents on behalf of users to measure the radio environment and make decisions based on these measurements. On the other hand, the freedom of the users in distributed systems to form their actions can lead each user to try to maximize its benefit from the system without regard the overall performance of the DSA system. Therefore, selfish behavior can prevail in distributed systems, which is likely to degrade the system performance.In this thesis we investigate the implications of selfish decision making in dynamic spectrum access systems. To address this broad problem, we focus our analysis on a particular system which can represent the essential properties of DSA systems and thus can shed light on the performance of the broad class of DSA systems with selfish users. Specifically, we model a DSA system as a multichannel random access system which uses ALOHA for medium access, and we analyze the behavior of the selfish users by modeling the system as a non-cooperative game. In this analysis we incorporate the effect of channel state information on the decision making of the users; we consider both cases when the users act on global (complete) and on local (incomplete) information. We determine the behavior of the selfish users at the Nash equilibria of the non-cooperative game and measure the performance of the system in terms of sum and individual utilities for various user loads and amount of available resources. We try to identify how the performance of the DSA system with selfish users compares with its cooperative counterpart. By performing these analyses we provide insights into the broader question of whether selfish users can utilize spectrum resources in a DSA system as well as cooperative users. / <p>QC 20111208</p> / MultiOperator Dynamic Spectrum access (MODyS)

Page generated in 0.2702 seconds