Dissertationen zum Thema „Telecommunication systems Mathematical models“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "Telecommunication systems Mathematical models" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Britton, Matthew Scott. „Stochastic task scheduling in time-critical information delivery systems“. Title page, contents and abstract only, 2003. http://web4.library.adelaide.edu.au/theses/09PH/09phb8629.pdf.
Der volle Inhalt der QuelleHou, Yuen Tan. „Resource management in multimedia communication systems“. HKBU Institutional Repository, 2003. http://repository.hkbu.edu.hk/etd_ra/478.
Der volle Inhalt der QuelleWitosurapot, Suntorn, und wsuntorn@fivedots coe psu ac th. „Resolving competition for resources between multimedia and traditional Internet applications“. Swinburne University of Technology, 2004. http://adt.lib.swin.edu.au./public/adt-VSWT20050309.123048.
Der volle Inhalt der QuelleTomlin, Toby-Daniel. „Analysis and modelling of jitter and phase noise in electronic systems : phase noise in RF amplifiers and jitter in timing recovery circuits“. University of Western Australia. School of Electrical, Electronic and Computer Engineering, 2004. http://theses.library.uwa.edu.au/adt-WU2004.0021.
Der volle Inhalt der QuelleBradley, W. Scott. „Propagation modeling for land mobile satellite communications“. Thesis, Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/74511.
Der volle Inhalt der QuelleMaster of Science
Barreira, Ramiro Roque Antunes. „Modelo mel-cepstral generalizado para envoltória espectral de fala“. [s.n.], 2010. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259047.
Der volle Inhalt der QuelleDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-17T02:12:55Z (GMT). No. of bitstreams: 1 Barreira_RamiroRoqueAntunes_M.pdf: 2303475 bytes, checksum: 72e03fe8e41e9e440f2d4a266666763d (MD5) Previous issue date: 2010
Resumo: A análise Mel-Cepstral Generalizada (MGC) corresponde a uma abordagem para estimação de envoltória espectral de fala que unifica as análises LPC, Mel-LPC, Cepstral e Mel-Cepstral. A forma funcional do modelo MGC varia continuamente com dois parâmetros reais ? e ?, possibilitando que o modelo assuma diferentes características. A flexibilidade oferecida pelo modelo MGC aliada à sua estabilidade e bom desempenho sob manipulação de parâmetros tem feito com que os parâmetros MGC sejam empregados com sucesso em codificação de fala e síntese de fala via HMM (Hidden Markov Models). O presente trabalho foca os aspectos matemáticos da análise MGC, abordando e demonstrando, em extensão, a formulação em seus vieses analítico e computacional para a solução do modelo. As propriedades e formulações básicas da análise MGC são tratadas na perspectiva do espectro mel-logarítmico generalizado. Propõe-se um método para a computação dos coeficientes MGC e Mel-Cepstrais que não envolve o uso de fórmulas recursivas de transformação em freqüência. As análises e experimentos relacionados ao método encontram-se em estágio inicial e devem ser completados no sentido de se identificar a relação ganho computacional × qualidade da representação.
Abstract: Mel-Generalized Cepstral analysis (MGC) is an approach for speech spectral envelope estimation that unifies LPC, Mel-LPC, Cepstral and Mel-Cepstral Analysis. The functional form of the MGC model varies continuously with the real parameters ? e ?, enabling the model to acquire different characteristics. The flexibility of MGC model associated with its stability and good performance under parameter manipulation have made MGC parameters to be successfully employed in speech codification and HMM speech synthesis. The present study focuses on mathematical aspects of MGC analysis, treating and proving, in a fairly extended way, analytical and computational formulation for model solution. MGC analysis properties and basic formulation are treated in melgeneralized logarithmic spectrum perspective. A method for the computation of MGC and Mel-Cepstral coefficients that do not require frequency transformation recursion formulas is proposed. Experiments and analysis concerning the method are in their initial stage and needs to be completed in the sense to identify computational × representation performances.
Mestrado
Telecomunicações e Telemática
Mestre em Engenharia Elétrica
Borg, Andreas. „Processes and Models for Capacity Requirements in Telecommunication Systems“. Doctoral thesis, Linköping : Department of Computer and Information Science, Linköpings universitet, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-16932.
Der volle Inhalt der QuelleCoyle, Andrew James. „Some problems in queueing theory“. Title page, contents and summary only, 1989. http://web4.library.adelaide.edu.au/theses/09PH/09phc8812.pdf.
Der volle Inhalt der QuellePawlowska, Bogna Julia. „Mathematical models of microbial evolution : cooperative systems“. Thesis, University of Exeter, 2016. http://hdl.handle.net/10871/26819.
Der volle Inhalt der QuelleNagarajan, Krishnamurthy. „New resource allocation strategies based on statistical network traffic models“. Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/33437.
Der volle Inhalt der Quelle梁慧敏 und Wai-man Wanthy Leung. „Evolutionary optimisation of industrial systems“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B30252994.
Der volle Inhalt der QuelleDowns, Michael S. „Developing integrated decision support systems from mathematical models“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA303712.
Der volle Inhalt der QuelleThesis advisor(s): H. Bhargava,R.K. Wood. "September 1995." Bibliography: p. 43. Also available online.
Gómez, Bardón María del Rocío. „Mathematical models and simulations of complex social systems“. Thesis, University of Birmingham, 2010. http://etheses.bham.ac.uk//id/eprint/1287/.
Der volle Inhalt der QuelleMa, Chunyan. „Mathematical security models for multi-agent distributed systems“. CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Der volle Inhalt der Quelle馮達淸 und Tat-ching Fung. „Steady state solutions of nonlinear dynamic systems“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1989. http://hub.hku.hk/bib/B31231809.
Der volle Inhalt der QuelleStuk, Stephen Paul. „Multivariable systems theory for Lanchester type models“. Diss., Georgia Institute of Technology, 1987. http://hdl.handle.net/1853/24171.
Der volle Inhalt der QuelleZhou, Wen, und 周雯. „A study of channel estimation for OFDM systems and system capacity forMIMO-OFDM systems“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45555850.
Der volle Inhalt der QuelleLi, Yang. „Models and applications of wireless networks in rural environments“. Thesis, University of the Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&.
Der volle Inhalt der QuelleThe research has set up two independent models, one for the economic need and the other for the technical need of building networks in rural areas. One model was the Impact of Telecommunications Model, which disclosed the importance of building a wireless network in specified rural areas by choosing an economic parameter to forecast the profitability of the network. The other was the Service Model, which collected primitive data from given rural areas and abstracted these data by flowing them through four technical layers to form the predicted technical wireless network. Both of the models had been applied to real-world cases to demonstrate how to use them.
A simulation environment was finally designed and implemented to realize the above two models for the sake of instantiation. This environment could simulate the specified rural network by constructing a wireless network on the invented areas and evaluating its quality and economic efficiency. It was written in Scilab simulation language, which was an open source.
Basak, Rishi. „Environmental management systems and the intra-firm risk relationship“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0034/MQ64316.pdf.
Der volle Inhalt der QuelleDasci, Abdullah. „Discrete and continuous models for production-distribution systems“. Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=37625.
Der volle Inhalt der QuelleThe models proposed in this thesis are based on two fundamentally different but equally central approaches. The first approach builds on traditionally popular integer programming formulation in facility location theory, in which two such models presented in this thesis. The first one assumes that there are a number of dedicated production technologies for each product whereas, the second one assumes that a set of flexible technologies is also present. Analytical properties of the models are described, which lead to the development of exact and heuristic solution procedures. Results of several sets of computational experiments are also reported. The second approach is based on continuous approximation (also known as continuum mechanics), which has not been used to its potential in the literature. The third model in this thesis is proposed for a system with single product. It is based on the use of continuous functions in representing spatial distribution of cost parameters and decision variables. In this model, the focus is to compute the service regions leaving the precise plant locations to a subsequent analysis. This model lends itself to closed form solutions and allows derivation of a number of insights on the impact of several cost factors on facility design decisions. Then, it is utilized in an analytical framework to analyze several plant focus decisions of firms in a multi-product environment. The closed form solution is used to analyze several product and market focus strategies, which have provided several insights into more sophisticated plant focus decisions and into the impact of different production technologies on these decisions.
Kröckel, Silke. „Stochastic production-inventory systems with significant setup times“. Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/24367.
Der volle Inhalt der QuelleYuen, Wai-on, und 袁偉安. „Models and numerical algorithms for re-manufacturing systems“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30292931.
Der volle Inhalt der QuelleLi, Tang, und 李唐. „Markov chain models for re-manufacturing systems and credit risk management“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40203700.
Der volle Inhalt der Quelle陳立梅 und Lap-mui Ann Chan. „Near optimal lot-sizing policies for multi-stage production/inventory systems“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1990. http://hub.hku.hk/bib/B31209129.
Der volle Inhalt der QuelleCong, Yang, und 丛阳. „Optimization models and computational methods for systems biology“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B47752841.
Der volle Inhalt der Quellepublished_or_final_version
Mathematics
Doctoral
Doctor of Philosophy
Almohri, Hussain. „High Assurance Models for Secure Systems“. Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/22030.
Der volle Inhalt der QuelleComplex attacks on large networks are only possible with the existence of vulnerable intermediate machines, routers, or mobile devices (that we refer to as network components) in the network. Vulnerabilities in highly connected servers and workstations, that compromise the heart of today\'s networks, are inevitable. Also, modern mobile devices with known vulnerabilities cause an increasing risk on large networks. Thus, weak security mechanisms in vulnerable network components open the possibilities for effective network attacks.
On the other hand, lack of systematic methods for an effective static analysis of an overall complex network results in inconsistent and vulnerable configurations at individual network components as well as at the network level. For example, inconsistency and faults in designing firewall rules at a host may result in enabling more attack vector. Further, the dynamic nature of networks with changing network configurations, machine availability and connectivity, make the security analysis a challenging task.
This work presents a hybrid approach to security by providing two solutions for analyzing the overall security of large organizational networks, and a runtime framework for protecting individual network components against misuse of system resources by cyber attackers. We observe that to secure an overall computing environment, a static analysis of a network is not sufficient. Thus, we couple our analysis with a framework to secure individual network components including high performance machines as well as mobile devices that repeatedly enter and leave networks. We also realize the need for advancing the theoretical foundations for analyzing the security of large networks.
To analyze the security of large enterprise network, we present the first scientific attempt to compute an optimized distribution of defensive resources with the objective of minimizing the chances of successful attacks. To achieve this minimization, we develop a rigorous probabilistic model that quantitatively measures the chances of a successful attack on any network component. Our model provides a solid theoretical foundation that enables efficient computation of unknown success probabilities on every stage of a network attack. We design an algorithm that uses the computed attack probabilities for optimizing security configurations of a network. Our optimization algorithm uses state of the art sequential linear programming to approximate the solution to a complex single objective nonlinear minimization problem that formalizes various attack steps and candidate defenses at the granularity of attack stages.
To protect individual network components, we develop a new approach under our novel idea of em process authentication.
We argue that to provide high assurance security, enforcing authorization is necessary but not sufficient. In fact, existing authorization systems lack a strong and reliable process authentication model for preventing the execution of malicious processes (i.e., processes that intentionally contain malicious goals that violate integrity and confidentiality of legitimate processes and data). Authentication is specially critical when malicious processes may use various system vulnerabilities to install on the system and stealthily execute without the user\'s consent.
We design and implement the Application Authentication (A2) framework that is capable of monitoring application executions and ensuring proper authentication of application processes. A2 has the advantage of strong security guarantees, efficient runtime execution, and compatibility with legacy applications. This authentication framework reduces the risk of infection by powerful malicious applications that may disrupt proper execution of legitimate applications, steal users\' private data, and spread across the entire organizational network.
Our process authentication model is extended and applied to the Android platform. As Android imposes its unique challenges (e.g., virtualized application execution model), our design and implementation of process authentication is extended to address these challenges. Per our results, process authentication in Android can protect the system against various critical vulnerabilities such as privilege escalation attacks and drive by downloads.
To demonstrate process authentication in Android, we implement DroidBarrier. As a runtime system, DroidBarrier includes an authentication component and a lightweight permission system to protect legitimate applications and secret authentication information in the file system. Our implementation of DroidBarrier is compatible with the Android runtime (with no need for modifications) and shows efficient performance with negligible penalties in I/O operations and process creations.
Ph. D.
Perry, Stanley Foster. „Distributed Economic Systems with Agents that Learn“. PDXScholar, 1992. https://pdxscholar.library.pdx.edu/open_access_etds/1271.
Der volle Inhalt der QuelleHAMMEL, STEPHEN MARK. „A DISSIPATIVE MAP OF THE PLANE--A MODEL FOR OPTICAL BISTABILITY (DYNAMICAL SYSTEMS)“. Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/188149.
Der volle Inhalt der QuelleLuo, Yang. „Stochastic modelling in biological systems“. Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610145.
Der volle Inhalt der QuelleGiannessi, Massimo <1982>. „Development of Clinical Decision Support Systems based on Mathematical Models of Physiological Systems“. Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amsdottorato.unibo.it/2655/.
Der volle Inhalt der Quelle丘杰 und Jie Qiu. „Scheduling flexible manufacturing systems using fuzzy heuristics“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B31244671.
Der volle Inhalt der QuelleAlparslan, Denizhan N. Sohraby Khosrow. „Modeling and analysis of generalized random mobility models for wireless ad hoc networks“. Diss., UMK access, 2005.
Den vollen Inhalt der Quelle finden"A dissertation in telecommunication networking and computer networking." Advisor: Khosrow Sohraby. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed May 30, 2006. Includes bibliographical references (leaves 119-123). Online version of the print edition.
Doustmohammadi, Ali. „Modeling and analysis of production systems“. Diss., Georgia Institute of Technology, 1995. http://hdl.handle.net/1853/15776.
Der volle Inhalt der QuelleMoi, Adriano. „Mathematical modelling of integrin-like receptors systems“. Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/11255/.
Der volle Inhalt der QuelleBlanding, James Michael. „An analytical study and computer analysis of three-dimensional, steady-state vibration of multishaft geared-rotor systems“. Diss., Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/54198.
Der volle Inhalt der QuellePh. D.
Min, Rui, und 闵瑞. „Channel estimation and data detection of OFDM systems under unknown channel order doppler frequency: from point-to-point to relaying systems“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47323930.
Der volle Inhalt der Quellepublished_or_final_version
Electrical and Electronic Engineering
Master
Master of Philosophy
Coburn, Brian John. „Multi-Species Influenza Models with Recombination“. Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_dissertations/363.
Der volle Inhalt der QuelleWan, Frank Lup Ki. „Genetic algorithms, their applications and models in nonlinear systems identification“. Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/30107.
Der volle Inhalt der QuelleApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Hassanli, A. M. „Modelling and optimisation of pressure irrigation systems /“. Title page, abstract and contents only, 1996. http://web4.library.adelaide.edu.au/theses/09PH/09phh353.pdf.
Der volle Inhalt der QuelleZhang, Wenjun. „Waves in mathematical models of intracellular calcium and other excitable systems“. Thesis, University of Auckland, 2011. http://hdl.handle.net/2292/14482.
Der volle Inhalt der QuelleGestrelius, Sara. „Mathematical models for optimising decision support systems in the railway industry“. Licentiate thesis, Mälardalens högskola, Inbyggda system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-27758.
Der volle Inhalt der QuelleOzcaldiran, Kadri. „Control of descriptor systems“. Diss., Georgia Institute of Technology, 1985. http://hdl.handle.net/1853/13531.
Der volle Inhalt der QuelleNikishkov, Yuri G. „Computational stability analysis of dynamical systems“. Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/12149.
Der volle Inhalt der QuelleZhao, Ying, und 趙穎. „Optimization of cooperative material handling systems“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B37837710.
Der volle Inhalt der QuelleWikström, Gunilla. „Computation of Parameters in some Mathematical Models“. Doctoral thesis, Umeå University, Computing Science, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-565.
Der volle Inhalt der QuelleIn computational science it is common to describe dynamic systems by mathematical models in forms of differential or integral equations. These models may contain parameters that have to be computed for the model to be complete. For the special type of ordinary differential equations studied in this thesis, the resulting parameter estimation problem is a separable nonlinear least squares problem with equality constraints. This problem can be solved by iteration, but due to complicated computations of derivatives and the existence of several local minima, so called short-cut methods may be an alternative. These methods are based on simplified versions of the original problem. An algorithm, called the modified Kaufman algorithm, is proposed and it takes the separability into account. Moreover, different kinds of discretizations and formulations of the optimization problem are discussed as well as the effect of ill-conditioning.
Computation of parameters often includes as a part solution of linear system of equations Ax = b. The corresponding pseudoinverse solution depends on the properties of the matrix A and vector b. The singular value decomposition of A can then be used to construct error propagation matrices and by use of these it is possible to investigate how changes in the input data affect the solution x. Theoretical error bounds based on condition numbers indicate the worst case but the use of experimental error analysis makes it possible to also have information about the effect of a more limited amount of perturbations and in that sense be more realistic. It is shown how the effect of perturbations can be analyzed by a semi-experimental analysis. The analysis combines the theory of the error propagation matrices with an experimental error analysis based on randomly generated perturbations that takes the structure of A into account
El, Didy Sherif Mohamed Ahmed 1951. „Two-dimensional finite element programs for water flow and water quality in multi-aquifer systems“. Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/191110.
Der volle Inhalt der QuelleModarres, Najafabadi Seyed Ali. „Dynamics modelling and analysis of impact in multibody systems“. Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=115886.
Der volle Inhalt der QuelleFurther, based on the above analysis approach, we introduce a new interpretation of the energetic coefficient of restitution, specially applicable to contact involving multibody systems. This interpretation generalizes the concept of the energetic coefficient of restitution and allows for consideration of simultaneous multiple-point contact scenarios. Moreover, based on the concept of the generalized energetic coefficient of restitution, the contact modes and the post-impact state of planar single-point impact are determined. Further, the problem of simultaneous multiple-point impact is considered, where it is shown that our approach can also be advantageous to characterize the dynamics of interaction in such systems.
The use and applicability of the approach reported are further investigated by conducting an experimental study on a robotic testbed. The open architecture of the testbed allows us to perform various contact experiments, such as single- and multiple-point impact scenarios, with different pre-impact configurations and velocities. The kinematic and dynamic models of the system have been developed and implemented for real-time analysis. It is shown that impact between multibody systems is considerably affected by not only the local dynamics characteristics of the interacting bodies, but also the (global) configuration of the interacting multibody systems. The reported results suggest that the material presented herein offers a useful means to characterize impact in complex systems.
Tai, Hoi-lun Allen, und 戴凱倫. „Quantitative analysis in monitoring and improvement of industrial systems“. Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B4394193X.
Der volle Inhalt der QuelleChen, Mo. „Data compression for inference tasks in wireless sensor networks“. Diss., Online access via UMI:, 2006.
Den vollen Inhalt der Quelle findenIncludes bibliographical references.
Clark, O. Grant (Osborne Grant). „Characterization of cyborged ecosystems“. Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=36567.
Der volle Inhalt der QuelleFirst, in the body of the thesis, a biosystem is defined as a coherent assemblage of entities that is alive to some degree as a whole. The sole criterion for life is considered to be comportment that is somewhat autopoietic , whereby local interactions among the components combine to Continually renew the overall system. Next, concepts related to autonomy, or the formulation and pursuit of proprietary goals, are elaborated. The degree of autonomy of a system is seen to depend on its consciousness, or ability to reason using a model of itself. Hence, a substantially autonomous system requires an ensemble of information storage and processing devices (mind) of the type and sophistication (intelligence ) appropriate for this. The approach that is taken here to the creation of ecocyborgs with such minds is described, and a specific mental architecture is delineated, comprising functionally semidifferentiated, intermediate-scale components arranged according to a semihierarchical control organization. Finally, the characterization of such systems is scrutinized as an epistemic process in which knowledge is generated by an observer, but in which only a limited degree of objectivity is possible. A paradigm appropriate to the engineering of ecocyborgs is defined as an illustration, and associated archetypal concepts and descriptive procedures (such as measures) are given that are useful in this context. Such tools are required by significantly autonomous ecocyborgs because they must characterize themselves. They are also necessary to observers with scientific and engineering agendas.