• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 137
  • 38
  • 9
  • 5
  • 4
  • 3
  • 2
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 233
  • 233
  • 116
  • 47
  • 46
  • 45
  • 44
  • 38
  • 33
  • 32
  • 27
  • 24
  • 23
  • 22
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
91

An implementation of TD/CCSK waveform using optical signal processing

Chindapol, Aik. January 1996 (has links)
Thesis (M.S.)--Ohio University, November, 1996. / Title from PDF t.p.
92

Using TD/CCSK spread spectrum technique to combat multipath interference in a multiple user system

Chen, Chi-She. January 1995 (has links)
Thesis (M.S.)--Ohio University, November, 1995. / Title from PDF t.p.
93

Evaluation of pseudorandom sequences used in third generation spread spectrum systems /

Manchiraju, Dinakar. January 2003 (has links)
Thesis (M.S.)--Ohio University, November, 2003. / Includes bibliographical references (p. 59).
94

A multiple access interference rejection technique using weighted despreading functions for direct-sequence code division multiple access communications /

Huang, Yuejin. January 1998 (has links)
Thesis (Ph. D.)--University of Hong Kong, 1998. / Includes bibliographical references.
95

Propagation measurement based estimation and comparison of DSSS microcellular mobile link performance at 2.25 and 5.8 GHz /

Han, Min, January 1900 (has links)
Thesis (M.App.Sc.) - Carleton University, 2007. / Includes bibliographical references (p. 108-110). Also available in electronic format on the Internet.
96

Multiuser multirate DS-CDMA detection techniques in multipath fading channels /

Yang, Bin. January 1900 (has links)
Thesis (Ph.D.) - Carleton University, 2007. / Includes bibliographical references (p. 213-224). Also available in electronic format on the Internet.
97

Evaluation of pseudorandom sequences used in third generation spread spectrum systems

Manchiraju, Dinakar. January 2003 (has links)
Thesis (M.S.)--Ohio University, November, 2003. / Title from PDF t.p. Includes bibliographical references (p. 59)
98

Throughput analysis for code division multiple accessing of the spread spectrum channel

January 1984 (has links)
Joseph Y.N. Hui. / Bibliography: p. [5] / "September 1984." Reprinted from IEEE Journal on Selected Areas in Communications, vol. SAC-2, no.4, July 1984. / "... supported by the National Science Foundation under Grant NSF/ECS 78-19880..." "... Advanced Project Agency under Grant ONR-N00014-75-C1183."
99

Performance analysis of suboptimal soft decision DS/BPSK receivers in pulsed noise and CW jamming utilizing jammer state information

Juntti, J. (Juhani) 17 June 2004 (has links)
Abstract The problem of receiving direct sequence (DS) spread spectrum, binary phase shift keyed (BPSK) information in pulsed noise and continuous wave (CW) jamming is studied in additive white noise. An automatic gain control is not modelled. The general system theory of receiver analysis is first presented and previous literature is reviewed. The study treats the problem of decision making after matched filter or integrate and dump demodulation. The decision methods have a great effect on system performance with pulsed jamming. The following receivers are compared: hard, soft, quantized soft, signal level based erasure, and chip combiner receivers. The analysis is done using a channel parameter D, and bit error upper bound. Simulations were done in original papers using a convolutionally coded DS/BPSK system. The simulations confirm that analytical results are valid. Final conclusions are based on analytical results. The analysis is done using a Chernoff upper bound and a union bound. The analysis is presented with pulsed noise and CW jamming. The same kinds of methods can also be used to analyse other jamming signals. The receivers are compared under pulsed noise and CW jamming along with white gaussian noise. The results show that noise jamming is more harmful than CW jamming and that a jammer should use a high pulse duty factor. If the jammer cannot optimise a pulse duty factor, a good robust choice is to use continuous time jamming. The best performance was achieved by the use of the chip combiner receiver. Just slightly worse was the quantized soft and signal level based erasure receivers. The hard decision receiver was clearly worse. The soft decision receiver without jammer state information was shown to be the most vulnerable to pulsed jamming. The chip combiner receiver is 3 dB worse than an optimum receiver (the soft decision receiver with perfect channel state information). If a simple implementation is required, the hard decision receiver should be used. If moderate complex implementation is allowed, the quantized soft decision receiver should be used. The signal level based erasure receiver does not give any remarkable improvement, so that it is not worth using, because it is more complex to implement. If receiver complexity is not limiting factor, the chip combiner receiver should be used. Uncoded DS/BPSK systems are vulnerable to jamming and a channel coding is an essential part of antijam communication system. Detecting the jamming and erasing jammed symbols in a channel decoder can remove the effect of pulsed jamming. The realization of erasure receivers is rather easy using current integrated circuit technology.
100

Enhancing the performance of ad hoc networking by lower layer design

Prokkola, J. (Jarmo) 25 November 2008 (has links)
Abstract The research of early ad hoc-like networks, namely multi-hop packet radio networks, was mainly concentrated on lower layers (below network layer). Interestingly, the research of modern ad hoc networks has been mainly restricted to routing protocols. This is understandable, since routing is very challenging in such dynamic networks, but the drawback is that the lower layer models used in the studies are often highly simplified, giving inaccurate or even incorrect results. In addition, modern ad hoc network solutions are usually suboptimal because lower layers, not designed especially for ad hoc networking, are used. Thus, ad hoc networking performance, in general, can be notably enhanced by considering also the design of lower layers. The simple deployment and robustness make wireless ad hoc networks attractive for several applications (e.g., military, public authority, peer-to-peer civilian, and sensor networking), but the performance of the current solutions is typically not adequate. The focus of this work is on the effects of lower layer functionalities on the performance of ad hoc networks, while also taking into account the effects of upper layers (e.g., the effect of application traffic models). A CDMA (Code Division Multiple Access) based dual channel flat ad hoc network solution, incorporating cross-layering between all three lowest layers, is proposed and analyzed. The main element of this is the Bi-Code Channel Access (BCCA) method, in which a common code channel is used for broadcast information (e.g., route discovery), while a receiver-specific code channel is used for all directed transmissions. In addition, a new MAC (Medium Access Control) solution designed for BCCA is presented. Moreover, a novel network layer spreading code distribution (NSCD) method is presented. The advantage of these methods is that they are designed especially to be used in ad hoc networks. With an extensive set of case studies, it is shown that the presented methods outperform the typically used ad hoc network solutions (based on IEEE 802.11) in different kind of scenarios, environments, modeling concepts, and with different parameters. Detailed simulations are carried out in order to analyze the effects of different features at the lower layers, finding also interesting phenomena and dependencies between different layers. It is also shown that close attention should be paid to lower layer modeling even though the overall network performance would be in focus. In addition, various interesting features and behavior models regarding ad hoc networking are brought up. / Tiivistelmä Ensimmäiset tutkimukset rakenteettomista (ad hoc) verkoista esiintyivät nimellä monihyppypakettiradioverkot, ja ne koskivat pääasiassa verkkokerroksen alapuolella olevia tietoliikennekerroksia, mutta nykyiset tutkimukset ovat kuitenkin keskittyneet pääasiassa reititysprotokolliin. Tämä on sikäli ymmärrettävää, että reititys on hyvin haasteellista tämän tyyppisissä dynaamisissa verkoissa, mutta ongelma on, että käytetyt alempien kerrosten mallit ovat usein hyvinkin yksinkertaistettuja, mikä voi johtaa epätarkkoihin tai jopa vääriin tuloksiin. Tämän lisäksi nykyiset ehdotetut rakenteettomien verkkojen ratkaisut ovat usein tehottomia, sillä käytettyjä alempien kerrosten ratkaisuja ei ole tarkoitettu tällaisiin verkkoihin. Niinpä rakenteettomien verkkojen suorituskykyä voidaan parantaa huomattavasti kiinnittämällä huomiota alempien kerrosten suunnitteluun. Verkkojen rakenteettomuus on ajatuksena houkutteleva useissa käyttökohteissa (esimerkiksi sotilasympäristössä, viranomaiskäytössä, käyttäjien välisissä suorissa yhteyksissä ja sensoriverkoissa), mutta suorituskyky ei useinkaan ole riittävällä tasolla käytännön sovelluksiin. Työssä tutkitaan pääasiassa alempien kerrosten toiminnallisuuden vaikutusta rakenteettomien verkkojen suorituskykyyn ottaen huomioon myös ylemmät kerrokset, kuten sovellustason mallit. Työssä esitellään ja analysoidaan koodijakomonikäyttöön (CDMA, Code Division Multiple Access) perustuva kaksikanavainen tasaisen rakenteettoman verkon ratkaisu, jossa hyödynnetään kaikkien kolmen alimman kerroksen välistä keskinäistä viestintää. Ratkaisun ydin on BCCA-menetelmä (Bi-Code Channel Access), jossa käytetään kahta kanavaa tiedonsiirtoon. Yksi kanava on tarkoitettu kaikille yhteiseksi kontrollikanavaksi (esimerkiksi reitinmuodostus voi käyttää tätä kanavaa), kun taas toinen kanava on käyttäjäkohtainen kanava, jota käytetään suoraan viestittämiseen kyseiselle käyttäjälle (varsinainen data yms.). Tämän lisäksi esitellään myös BCCA-menetelmää varten suunniteltu kanavakontrollimenetelmä sekä verkkotasolla toimiva hajotuskooditiedon jakamiseen tarkoitettu menetelmä. Näiden uusien menetelmien etu on se, että ne on suunniteltu nimenomaan rakenteettomiin verkkoihin. Kattavan testivalikoiman avulla osoitetaan, että esitetty uusi ratkaisu peittoaa tyypilliset IEEE 802.11 -standardiin pohjautuvat rakenteettomien verkkojen ratkaisut. Testeissä käytetään erityyppisiä verkkorakenteita, ympäristöjä, mallinnusmenetelmiä ja parametreja. Yksityiskohtaisissa simuloinneissa ajetaan eri testitapauksia ja selvitetään, miten alempien kerrosten eri menetelmät missäkin tapauksessa vaikuttavat suorituskykyyn. Alempien kerrosten mallinnuksessa on syytä olla tarkkana, sillä työssä käy ilmi, että mallinnusvirheillä voi olla suurikin vaikutus myös ylempien kerrosten suorituskykyyn. Työ myös paljastaa useita mielenkiintoisia ilmiöitä ja vuorovaikutussuhteita, jotka liittyvät tutkittujen menetelmien ja yleisesti rakenteettomien verkkojen toimintaan.

Page generated in 0.041 seconds