• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1604
  • 152
  • 125
  • 78
  • 33
  • 30
  • 17
  • 13
  • 9
  • 6
  • 5
  • 5
  • 5
  • 5
  • 5
  • Tagged with
  • 2326
  • 2326
  • 1937
  • 527
  • 526
  • 341
  • 310
  • 293
  • 284
  • 206
  • 182
  • 174
  • 174
  • 163
  • 158
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
591

Airborne ubiquitous surveillance and monitoring

Schumann, Axel 09 1900 (has links)
Approved for public release; distribution is unlimited / The thesis research examines the emergence of wireless technology as a pragmatic baseline supporting the goals of the Department of Defense developing towards Network Centric Forces. Increased international attention to the field of surveillance has developed parallel to the desire to interconnect all possible friendly forces in military operations and the Global War on Terror (GWOT). Ubiquitous surveillance is accomplished by prototyping a network node that is then integrated on board of a military type unmanned aerial vehicle (UAV). Although the commercial off the shelf network solution itself is broadly deployed, little is known so far how to operate and manage an airborne surveillance network node. The author shows that the use of unmanned aerial vehicles for networking purposes is not only possible but also manageable, even with remote operation of the unmanned aerial vehicle. The documented experiments over three generations of prototypes give insight about possibilities of how network infrastructure independence for the purpose of surveillance can be reached. / Kapitänleutnant, Federal German Navy
592

IEEE 802.16 Commercial Off The Shelf (COTS) technologies as a compliment to Ship To Objective Maneuver (STOM) communications

Munoz, Ramon J., Guice, Robert J. 09 1900 (has links)
Approved for public release; distribution is unlimited. / This research evaluates the IEEE 802.16 standards and technologies that are currently being developed in the commercial sector. The robust capability of this standard lends itself potentially to numerous military applications. This research explores how this technology might address the shortcomings of existing military radio and data systems; specifically, with respect to the issues surrounding the Ship to Objective Maneuver (STOM) communications. The intent of this research is to provide recommendations on the necessary 'adapt from COTS' changes for this technology to address STOM networking requirements. This research includes discussions on the military requirements for an IEEE 802.16 adapted waveform. The requirements are for the IEEE 802.16 'adapt from COTS' are derived from researched on the Concept of Employment for STOM operations and the specification of the Joint Tactical Radio Systems (JTRS) Wideband Networking Waveform (WNW). These discussions offer an illustration of the complex networking demands the COTS adapted systems would need to address. Through detailed exploration of the current IEEE 802.16 standards and implementation testing with pre-standard IEEE 802.16a equipment, we were able to make recommendations on the COTS adaptations necessary to make IEEE 802.16 suitable as a complimentary technology within the STOM scenario. / Captain, United States Marine Corps
593

Efficient Algorithms and Framework for Bandwidth Allocation, Quality-of-Service Provisioning and Location Management in Mobile Wireless Computing

Sen, Sanjoy Kumar 12 1900 (has links)
The fusion of computers and communications has promised to herald the age of information super-highway over high speed communication networks where the ultimate goal is to enable a multitude of users at any place, access information from anywhere and at any time. This, in a nutshell, is the goal envisioned by the Personal Communication Services (PCS) and Xerox's ubiquitous computing. In view of the remarkable growth of the mobile communication users in the last few years, the radio frequency spectrum allocated by the FCC (Federal Communications Commission) to this service is still very limited and the usable bandwidth is by far much less than the expected demand, particularly in view of the emergence of the next generation wireless multimedia applications like video-on-demand, WWW browsing, traveler information systems etc. Proper management of available spectrum is necessary not only to accommodate these high bandwidth applications, but also to alleviate problems due to sudden explosion of traffic in so called hot cells. In this dissertation, we have developed simple load balancing techniques to cope with the problem of tele-traffic overloads in one or more hot cells in the system. The objective is to ease out the high channel demand in hot cells by borrowing channels from suitable cold cells and by proper assignment (or, re-assignment) of the channels among the users. We also investigate possible ways of improving system capacity by rescheduling bandwidth in case of wireless multimedia traffic. In our proposed scheme, traffic using multiple channels releases one or more channels to increase the carried traffic or throughput in the system. Two orthogonal QoS parameters, called carried traffic and bandwidth degradation, are identified and a cost function describing the total revenue earned by the system from a bandwidth degradation and call admission policy, is formulated. A channel sharing scheme is proposed for co-existing real-time and non-real-time traffic and analyzed using a Markov modulated Poisson process (MMPP) based queueing model. The location management problem in mobile computing deals with the problem of a combined management of location updates and paging in the network, both of which consume scarce network resources like bandwidth, CPU cycles etc. An easily implementable location update scheme is developed which considers per-user mobility pattern on top of the conventional location area based approach and computes an update strategy for each user by minimizing the average location management cost. The cost optimization problem is elegantly solved using a genetic algorithm.
594

Algorithms for Efficient Utilization of Wireless Bandwidth and to Provide Quality-of-Service in Wireless Networks

Kakani, Naveen Kumar 08 1900 (has links)
This thesis presents algorithms to utilize the wireless bandwidth efficiently and at the same time meet the quality of service (QoS) requirements of the users. In the proposed algorithms we present an adaptive frame structure based upon the airlink frame loss probability and control the admission of call requests into the system based upon the load on the system and the QoS requirements of the incoming call requests. The performance of the proposed algorithms is studied by developing analytical formulations and simulation experiments. Finally we present an admission control algorithm which uses an adaptive delay computation algorithm to compute the queuing delay for each class of traffic and adapts the service rate and the reliability in the estimates based upon the deviation in the expected and obtained performance. We study the performance of the call admission control algorithm by simulation experiments. Simulation results for the adaptive frame structure algorithm show an improvement in the number of users in the system but there is a drop in the system throughput. In spite of the lower throughput the adaptive frame structure algorithm has fewer QoS delay violations. The adaptive call admission control algorithm adapts the call dropping probability of different classes of traffic and optimizes the system performance w.r.t the number of calls dropped and the reliability in meeting the QoS promised when the call is admitted into the system.
595

Impact of the wireless channel on the performance of ultrawideband communication system

Sipal, Vit January 2012 (has links)
Ultrawideband (UWB) wireless systems employ signals with bandwidths in excess of 500 MHz or with relative bandwidth more than 20%. The radiated signals have low power spectral density. A decade ago, UWB wireless systems were deemed to be the technology that will deliver 'Gigabit-wireless' for short range communications. However, the performance of current systems is significantly below the initial expectations. This thesis explores the UWB wireless channel and shows how its properties limit the performance of current UWB systems. Furthermore, it is shown that if the knowledge of the channel is fully exploited a significant performance improvement of UWB systems can be achieved. The thesis begins with exploration of the channel properties. Unlike previous work, that has investigated either the 'classical narrowband' channel with bandwidth <100 MHz or the UWB channel with bandwidth >1 GHz, this work studies the transition between the narrowband channels with bandwidth of 1 MHz to the extremely wide band channels with bandwidths of up to 10 GHz. The thesis concludes that for signals with bandwidth <1 GHz UWB antennas and antenna arrays can be described by the classical means of gain and array factor, i.e. they treat such signals as 'narrowband'. In contrast, wireless propagation for signals with bandwidth > 100 MHz has properties 'like UWB channels' with bandwidths in the GHz range. Additionally, the thesis suggests a correction to the IEEE802.15.4a model for channel impulse response because as will be shown in the thesis many multi paths in the model are manifes- tations of the antenna impulse response. Hence multiple multipaths in the IEEE802.15.4a model actually represent a single multipath component. This reduces the number of multipath components in the model by approximately factor of five. The understanding of the transition between narrowband and ultrawideband channel is used to improve the spectral efficiency of impulse radio systems which traditionally use signals with bandwidth> 1 GHz. It is shown that the optimum signal bandwidth for impulse radio systems is in the range 150-450 MHz. Such systems balance the robustness against frequency selective fading with the reduction of duty cycle. Hence, the data-rate of impulse radio systems can be significantly improved. The frequency selective fading is shown to be the main limiting factor for the performance of the commercial UWB WiMedia systems with OFDM. It is shown that adaptive loading of OFDM sub carriers , which is compatible with the frequency selectivity of the channel, is more suitable for UWB OFDM systems than the use of strong Forward-Error-Correction measures. The introduction of the adaptive OFDM is not a significant change to the design of the scheme because the commercial WiMedia standard already foresees pilot OFDM symbols for channel estimation. The adaptive OFDM for UWB has already been considered by some authors. Unlike previous works, this thesis explores the performance of such a system in a large number of measured wireless channels. Finally, the thesis studies the MIMO techniques for UWB systems. Suitable schemes for fixed and adaptive OFDM are discussed. A realistic simulation using measured wireless channel shows that a 4x 1 system with a low complexity beam-steering and adaptive OFDM can deliver a data-rate of 400 Mbps over a range of 9 m. This performance is for a system with bandwidth 528 MHz (like in the WiMedia standard). A further increase can be achieved with the increase of the system's bandwidth.
596

Performance analysis of M-QAM with Viterbi soft-decision decoding

Manso, Rogerio C. 03 1900
Approved for public release; distribution is unlimited / This thesis derives design tools for determining and improving performances of communication links that use M - QAM coherent demodulators associated with Viterbi soft-decision decoding (SDD) in Additive White Gaussian Noise (AWGN) and Nakagami-m channels. Performance analyses for 16-QAM, 64-QAM, QPSK and BPSK associated with up to three convolutional codes, including the one used by the IEEE 802.11a standard and the dual-k code, are presented as practical applications. The main tools relate to the analytical derivation of upper bounds of the probability of bit error (Pb) for any M -ary coherent demodulator followed by SDD, a methodology for improving an upper bound of Pb tightening it to realistic data, and the obtaining of the specific ( ) d b spectrum for any convolutional code intended to operate with a certain M-symbol modulation. All derivations involve statistical considerations over the AWGN and Nakagami-m channels, as well as in-depth analyses of modulator constellations. The tools and models developed can provide great optimization to bandwidth-limited system designs that require high data rates, especially the wireless ones. Consequently, they have great application to many fields of digital communications, such as cellular telephony, wireless networking, satellite links, ship-to-shore and ship -to-ship communications. / http://hdl.handle.net/10945/1090 / Lieutenant Commander, Brazilian Navy
597

The wireless ubiquitous surveillance testbed

Ford, Michael K., Dennis, LeRoy P. 03 1900 (has links)
Approved for public release; distribution is unlimited / This thesis research examines the emergence of surveillance and biometrics technologies as a sensible baseline for building a ubiquitous surveillance testbed for the Naval Postgraduate School. This thesis also defines what ubiquitous surveillance is, employs biometric applications and technical strategies to build a working testbed, and addresses developmental issues surrounding the hypothesis for a ubiquitous surveillance testbed. The authors conducted several evaluations of the testbed using different scenarios and recommend emerging biometric and surveillance technologies to promote the maturation of the testbed into a premier ubiquitous habitat. / Lieutenant, United States Navy / Lieutenant, United States Navy
598

Collaborative services in an ad hoc wireless network

Baalaji, Venkateshwaraiyer S. 09 1900 (has links)
Approved for public release; distribution is unlimited. / Wireless networks can be broadly classified into two types - infrastructure based networks and ad hoc networks. The former uses fixed base stations (infrastructure) which are responsible for coordinating communication between the mobile hosts (nodes). These base stations are interconnected by wired back bones, where as mobile nodes communicate with the base station through the wireless media. The latter one consists of mobile nodes which communicate with each other through wireless medium without any fixed infrastructure. Hence there is no centralized infrastructure that takes care of the routing of information among the participants in the network. There has been a growing interest in ad hoc network in recent years as mobile devices have become more powerful and are capable of processing data like their desktop counterparts. When such a capability is available these devices should be able to share information among them without reliance on existing network infrastructure. Mobile devices are self configurable into either infrastructure or ad hoc mode. Protocols and software have been developed to enable mobile devices to connect to an infrastructure node, where as the same is not the case in the ad hoc environment. Host mobility causes frequent and unpredictable topological changes in a wireless environment. Finding and maintaining routes in ad hoc networks is a non trivial task. This thesis will develop collaborative services in an ad hoc (802.11) wireless environment. / Major, Indian Air Force
599

Cooperative Jamming in Wireless Networks - Turning Attacks into Privacy Protection

Wu, Jingqi 19 December 2008 (has links)
Generally, collisions between packets are undesired in wireless networks. We design this scheme, Cooperative Jamming in Wireless Networks (CJWN), to make use of collision to protect secret DATA packets from being sniffed by a nearby eavesdropper. We are intending to greatly increase the Packet Error Rate (PER) at the eavesdropper when the PER at the receiver is maintained at an acceptable level. This scheme is not intended to completely take the place of various encryption/decryption schemes which are working based on successfully received packets. Adding CJWN to the popular CSMA/CA adopted in IEEE 802.11 will add more security even the key for encryption/decryption is already exposed. Because the overhead of CJWN is very big, we do not suggest using it on every transmission. When some secret packets have a high requirement of confidentiality, CJWN is worth trying at the cost of throughput performance and power.
600

Performance evaluation of voice handover between LTE and UMTS

Namakoye, Joyce 26 September 2012 (has links)
M.Sc.(Eng.), Faculty of Engineering and the Built Environment, 2011 / The main objective of seamless mobility is to enable mobile users to stay connected while roaming across heterogeneous networks. As cellular networks evolve from the third generation Universal Mobile Telecommunication System (UMTS) to the Long Term Evolution (LTE), a new Evolved Packet Core (EPC) will support heterogeneous radio access networks on the same platform. UMTS provides voice services in the circuit switched domain; while LTE operates in the packet switched domain. Cellular network operators thus face the challenge of providing voice services during initial deployment of LTE due to difficulty in mobility between the two domains. Seamless voice handover between packet switched LTE and the circuit switched UMTS network is therefore an important tool in solving this problem. This report investigates the performance of inter-Radio Access Technology voice handover between LTE and UMTS. The schemes evaluated were Voice Call Continuity (VCC) for UMTS to LTE handover and Single Radio Voice Call Continuity (SRVCC) for LTE to UMTS handover. The performance evaluation was done using mathematical models and equations that were derived for the handover service interruption time. The resulting equations were simulated and the output was analysed and compared with the Third Generation Partnership Project (3GPP) specifications.

Page generated in 0.2692 seconds