• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 90
  • 12
  • 6
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 134
  • 134
  • 76
  • 57
  • 32
  • 24
  • 23
  • 18
  • 17
  • 17
  • 17
  • 17
  • 16
  • 16
  • 14
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

ICAR an integrated cellular and ad hoc relaying system /

Wu, Hongyi. January 1900 (has links) (PDF)
Thesis (Ph. D.)--State University of New York at Buffalo, 2002. / "May 10, 2002." Includes bibliographical references (p. 140-150). Also available in print.
52

A study of fixed channel assignment algorithms for cellular mobile radio systems /

Thavarajah, Arunasala Iyer. January 1999 (has links)
Thesis (M. Phil.)--University of Hong Kong, 1999. / Includes bibliographical references (leaves 123-127).
53

Smart antenna application in DS-CDMA mobile communication system /

Ng, Kok Keng. January 2002 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, September 2002. / Thesis advisor(s): Tri T. Ha, Jovan Lebaric. Includes bibliographical references (p. 63). Also available online.
54

Pricing policies in oligopoly with product differentiation : the case of cellular telephony /

Marciano, Sonia. January 2000 (has links)
Thesis (Ph. D.)--University of Chicago, Graduate School of Business. / Includes bibliographical references. Also available on the Internet.
55

USB telephony interface device for speech recognition applications /

Müller, J. J. January 2005 (has links)
Thesis (MSc)--University of Stellenbosch, 2005. / Bibliography. Also available via the Internet.
56

On the optimal location of transmitters for micro-cellular radio communication system design /

Pendyala, Chandra Mohan, January 1994 (has links)
Thesis (M.S.)--Virginia Polytechnic Institute and State University, 1994. / Vita. Abstract. Includes bibliographical references (leaves 80-82). Also available via the Internet.
57

Data mining, fraud detection and mobile telecommunications: call pattern analysis with unsupervised neural networks

Abidogun, Olusola Adeniyi January 2005 (has links)
Magister Scientiae - MSc / Huge amounts of data are being collected as a result of the increased use of mobile telecommunications. Insight into information and knowledge derived from these databases can give operators a competitive edge in terms of customer care and retention, marketing and fraud detection. One of the strategies for fraud detection checks for signs of questionable changes in user behavior. Although the intentions of the mobile phone users cannot be observed, their intentions are reflected in the call data which define usage patterns. Over a period of time, an individual phone generates a large pattern of use. While call data are recorded for subscribers for billing purposes, we are making no prior assumptions about the data indicative of fraudulent call patterns, i.e. the calls made for billing purpose are unlabeled. Further analysis is thus, required to be able to isolate fraudulent usage. An unsupervised learning algorithm can analyse and cluster call patterns for each subscriber in order to facilitate the fraud detection process. This research investigates the unsupervised learning potentials of two neural networks for the profiling of calls made by users over a period of time in a mobile telecommunication network. Our study provides a comparative analysis and application of Self-Organizing Maps (SOM) and Long Short-Term Memory (LSTM) recurrent neural networks algorithms to user call data records in order to conduct a descriptive data mining on users call patterns. Our investigation shows the learning ability of both techniques to discriminate user call patterns; the LSTM recurrent neural network algorithm providing a better discrimination than the SOM algorithm in terms of long time series modelling. LSTM discriminates different types of temporal sequences and groups them according to a variety of features. The ordered features can later be interpreted and labeled according to specific requirements of the mobile service provider. Thus, suspicious call behaviours are isolated within the mobile telecommunication network and can be used to to identify fraudulent call patterns. We give results using masked call data from a real mobile telecommunication network. / South Africa
58

Design of a Microprocessor Controlled Telecommunication System

Maroutsos, George J. 01 January 1976 (has links)
Recent advancements in Large Scale Integration Technology have made available devices, such as microprocessors, analog gates and “three state” logic, that provide the designer with a wide range of possibilities in the design of telecommunication systems. A microprocessor and analog gates are utilized in this design to demonstrate the feasibility of implementing a flexible Telecommunication System. The microprocessor is programmed to control, through software, the system functions. The feasibility of systems highly adaptable to the needs of individual subscribers is thus demonstrated.
59

Geography and the cost of network infrastructure: the case of local telephone systems

Cubukcu, Kemal Mert January 2003 (has links)
No description available.
60

Reliability Analysis of Emergency Telephone System Models

Hobbs, Thomas J. 01 October 1979 (has links) (PDF)
Several alternate systems for use in implementing the 911 emergency system in Orange County, Florida were investigated. The proposed systems were compared with the already existing systems on the basis of reliability, response time, and cost. System reliability was the prime consideration of the study. Flow charts of each system were formulated in order to determine the functions required of equipment and humans. The reliability was then determined by examining the difficulty of the tasks that each was required to perform. Reliability models of the present and proposed systems were constructed. By examining these models and comparing the reliabilities, response times, and costs, the most advantageous system configurations were determined. Two systems, Emergency Operator Call Transfer and Emergency Operator Call Relay, were selected as the most desirable; there were no appreciable differences in their reliability, response time, and cost.

Page generated in 0.08 seconds