Dissertations / Theses on the topic 'Data Communications'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Data Communications.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Lo, Kam Chuen. "Encoding strategies for data communications." Thesis, University of Sunderland, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.310619.
Full textAmornraksa, Thumrongrat. "Data security for multimedia communications." Thesis, University of Surrey, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.298091.
Full textStrock, O. J. (Jud), and Michael (Mike) Witchey. "TELEMETRY DATA VIA COMMUNICATIONS RELAY." International Foundation for Telemetering, 1990. http://hdl.handle.net/10150/613788.
Full textThis paper responds to a test range engineer’s need to relay one or more channels of various types of telemetry data from a remotely-located receiving station to the central telemetry station at range headquarters for real time processing and display. Several types of data are identified, and specific equipment and technology for multiplexing, transmission, and demultiplexing up to eight streams from a variety of sources is discussed. The widely-used T3 communications link, also known as DS-3, can relay data via satellite, microwave link, or other high-speed path at 44.736 megabits per second, of which about 95% can be actual telemetry data; other standard links operate at lower aggregate rates. Several links and rates are discussed, with emphasis in the high-rate T3 link.
Tian, Hai, Tom Trojak, and Charles Jones. "DATA COMMUNICATIONS OVER AIRCRAFT POWER LINES." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604922.
Full textThis paper introduces a study of the feasibility and initial hardware design for transmitting data over aircraft power lines. The intent of this design is to significantly reduce the wiring in the aircraft instrumentation system. The potential usages of this technology include Common Airborne Instrumentation System (CAIS) or clock distribution. Aircraft power lines channel characteristics are presented and Orthogonal Frequency Division Multiplexing (OFDM) is introduced as an attractive modulation scheme for high-speed power line transmission. A design of a full-duplex transceiver with accurate frequency planning is then discussed. A general discussion of what communications protocols are appropriate for this technology is also provided.
FEARING, CHRISTOPHER JAMES. "IMAGING SENSORS WITH DATA COMMUNICATIONS CAPABILITIES." University of Cincinnati / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1141352420.
Full textGonçalves, João Miguel Ribeiro. "Context-awareness privacy in data communications." Doctoral thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/15760.
Full textInternet users consume online targeted advertising based on information collected about them and voluntarily share personal information in social networks. Sensor information and data from smart-phones is collected and used by applications, sometimes in unclear ways. As it happens today with smartphones, in the near future sensors will be shipped in all types of connected devices, enabling ubiquitous information gathering from the physical environment, enabling the vision of Ambient Intelligence. The value of gathered data, if not obvious, can be harnessed through data mining techniques and put to use by enabling personalized and tailored services as well as business intelligence practices, fueling the digital economy. However, the ever-expanding information gathering and use undermines the privacy conceptions of the past. Natural social practices of managing privacy in daily relations are overridden by socially-awkward communication tools, service providers struggle with security issues resulting in harmful data leaks, governments use mass surveillance techniques, the incentives of the digital economy threaten consumer privacy, and the advancement of consumergrade data-gathering technology enables new inter-personal abuses. A wide range of fields attempts to address technology-related privacy problems, however they vary immensely in terms of assumptions, scope and approach. Privacy of future use cases is typically handled vertically, instead of building upon previous work that can be re-contextualized, while current privacy problems are typically addressed per type in a more focused way. Because significant effort was required to make sense of the relations and structure of privacy-related work, this thesis attempts to transmit a structured view of it. It is multi-disciplinary - from cryptography to economics, including distributed systems and information theory - and addresses privacy issues of different natures. As existing work is framed and discussed, the contributions to the state-of-theart done in the scope of this thesis are presented. The contributions add to five distinct areas: 1) identity in distributed systems; 2) future context-aware services; 3) event-based context management; 4) low-latency information flow control; 5) high-dimensional dataset anonymity. Finally, having laid out such landscape of the privacy-preserving work, the current and future privacy challenges are discussed, considering not only technical but also socio-economic perspectives.
Quem usa a Internet vê publicidade direccionada com base nos seus hábitos de navegação, e provavelmente partilha voluntariamente informação pessoal em redes sociais. A informação disponível nos novos telemóveis é amplamente acedida e utilizada por aplicações móveis, por vezes sem razões claras para isso. Tal como acontece hoje com os telemóveis, no futuro muitos tipos de dispositivos elecónicos incluirão sensores que permitirão captar dados do ambiente, possibilitando o surgimento de ambientes inteligentes. O valor dos dados captados, se não for óbvio, pode ser derivado através de técnicas de análise de dados e usado para fornecer serviços personalizados e definir estratégias de negócio, fomentando a economia digital. No entanto estas práticas de recolha de informação criam novas questões de privacidade. As práticas naturais de relações inter-pessoais são dificultadas por novos meios de comunicação que não as contemplam, os problemas de segurança de informação sucedem-se, os estados vigiam os seus cidadãos, a economia digital leva á monitorização dos consumidores, e as capacidades de captação e gravação dos novos dispositivos eletrónicos podem ser usadas abusivamente pelos próprios utilizadores contra outras pessoas. Um grande número de áreas científicas focam problemas de privacidade relacionados com tecnologia, no entanto fazem-no de maneiras diferentes e assumindo pontos de partida distintos. A privacidade de novos cenários é tipicamente tratada verticalmente, em vez de re-contextualizar trabalho existente, enquanto os problemas actuais são tratados de uma forma mais focada. Devido a este fraccionamento no trabalho existente, um exercício muito relevante foi a sua estruturação no âmbito desta tese. O trabalho identificado é multi-disciplinar - da criptografia à economia, incluindo sistemas distribuídos e teoria da informação - e trata de problemas de privacidade de naturezas diferentes. À medida que o trabalho existente é apresentado, as contribuições feitas por esta tese são discutidas. Estas enquadram-se em cinco áreas distintas: 1) identidade em sistemas distribuídos; 2) serviços contextualizados; 3) gestão orientada a eventos de informação de contexto; 4) controlo de fluxo de informação com latência baixa; 5) bases de dados de recomendação anónimas. Tendo descrito o trabalho existente em privacidade, os desafios actuais e futuros da privacidade são discutidos considerando também perspectivas socio-económicas.
Li, Huanlu. "Integrated photonic devices for data communications." Thesis, University of Bristol, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.682683.
Full textChan, Christopher Wing Tai. "Magneto-inductive wave data communications systems." Thesis, University of Oxford, 2014. https://ora.ox.ac.uk/objects/uuid:014605c8-fc15-4166-a382-695042b05312.
Full textFleet, Daniel. "Visualization of data communications in three dimensions." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ38374.pdf.
Full textSingh, Manvinder. "Multi-variate adaptive protocols for data communications." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0021/MQ46276.pdf.
Full textXiao, Shengkuan. "Advances in image modeling and data communications." Access to citation, abstract and download form provided by ProQuest Information and Learning Company; downloadable PDF file, 132 p, 2007. http://proquest.umi.com/pqdweb?did=1331413801&sid=6&Fmt=2&clientId=8331&RQT=309&VName=PQD.
Full textPalmquist, Fredrik. "Satellite data communications as acomplement to GSM." Thesis, KTH, Teleinformatik, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93580.
Full textBennecer, Abdeldjalil. "Low cost integrated lasers for data communications." Thesis, University of Cambridge, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.609254.
Full textDapore, Mark. "High Data Rate X-Band Communications Subsystem." International Foundation for Telemetering, 1995. http://hdl.handle.net/10150/611617.
Full textA Communication Subsystem has been developed capable of 25 Megasymbol per Second (MSPS) data rates. The unit operates in the 8300 to 8400 MHz band and uses shaped QPSK for excellent spectral containment properties. The Communication Subsystem (CSS) has a number of features which make it attractive for many applications: (1) Data is convolutionally encoded inside the transmitter resulting in excellent link performance without using external hardware. (2) Data is encrypted inside the transmitter. The DES standard is currently implemented, however, military encryption is an option which requires minimal changes in the CSS design. (3) Frame Synchronization Sequences and Block Identification Numbers are inserted into the data by the CSS. (4) Cyclic Redundancy Checked Codes for each data block are generated within the CSS. (5) Health and Status of the CSS is formatted into digital words. (6) Mode Control, Key Maintenance, and Health and Status Reporting is easily handled through an RS-422 interface. (7) The CSS is ruggedized for launch environments and is highly reliable for space applications.
Zyambo, Emmanuel Baleke. "High-speed wireless infrared communications." Thesis, University of Oxford, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.275377.
Full textHum, Eddy N. (Eddy Ning) Carleton University Dissertation Engineering Electrical. "Burst-trapping codes for the land mobile data channel." Ottawa, 1988.
Find full textClapp, T. C. "Statistical methods for the processing of communications data." Thesis, University of Cambridge, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.597697.
Full textOnochie, Francis Chukwuemeka. "Digital data communications over voice-band telephone channels." Thesis, Imperial College London, 1989. http://hdl.handle.net/10044/1/47598.
Full textEconomou, Emmanuel. "How institutional pressures influence data-driven corporate communications." Thesis, Queensland University of Technology, 2021. https://eprints.qut.edu.au/209153/1/Emmanuel_Economou_Thesis.pdf.
Full textQureshi, Zihad. "Vertical cavity surface emitting lasers in high speed optical data communications." Thesis, University of Cambridge, 2013. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.608126.
Full textLaaboudi, Younes. "Reactive security of IoT communications." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-249633.
Full textIoT-nätverks sårbarheter kan skyddas genom intrångsdetektering och svarsystem (IDRS). Anomalibaserad intrångsdetektering erbjuder flera fördelar: det kan upptäcka okända attacker och det kan anpassa sig till flera typer av protokoll. Inbrottssvaret är svårare att genomföra i kombination med ett anomalibaserat detekteringssystem, delvis på grund av möjligheten till falska positiva varningar. Det här exjobbet söker sätt att förbättra anomalibaserad detektering och svar genom två implementeringar av IDRS i två distinkta IoT-nätverk. Resultaten visar att anomalibaserad detektering kan användas vid ett ZigBee IoT- nätverk för att upptäcka olika typer av attacker utan tidigare kunskaper om den här attackerna. Dessutom kan mjuka svarmetoder användas för att förbättrar detekteringskvaliteten med låg inverkan på IoT- nätverksbeteendet.
Skidmore, Roger Ray. "A Comprehensive Method and System for the Design and Deployment of Wireless Data Networks." Diss., Virginia Tech, 2003. http://hdl.handle.net/10919/27611.
Full textPh. D.
Yao, Li-Jun. "Real-time communications in token ring networks." Title page, abstract and contents only, 1994. http://web4.library.adelaide.edu.au/theses/09PH/09phy248.pdf.
Full textArgon, Cenk. "Turbo product codes for optical communications and data storage." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/15350.
Full textWalden, Ian Newark. "Data communications security : legislating and contracting for legal security." Thesis, Nottingham Trent University, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314417.
Full textTopham, Debra Ann. "Decentralised wireless data dissemination for vehicle-to-vehicle communications." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3335/.
Full textWatkins, Stan M. "FLEXIBLE SECURE DATA COMMUNICATIONS WITH THE RANGE ENCRYPTION MODULE." International Foundation for Telemetering, 1999. http://hdl.handle.net/10150/608536.
Full textThis paper discusses the design, application and flexibility of the Range Encryption Module (REM) developed by L3 Communications Conic Division for the Range Application Joint Program Office (RAJPO) located at Eglin Air Force Base in Florida. The REM is a burst encrypter that utilizes the National Security Agency Thornton CTIC/DS- 101 Hybrid (CDH) encryption algorithm. The CDH device operates under the control of a Conic-designed digital ASIC. The CDH, ASIC, Power Management and parallel bus interface circuits reside on a single card within the REM called the Common Encryption Core (CEC). The REM and CEC card within the REM offer flexibility in many operational features, as described below.
Gozali, Ran. "Space-Time Codes for High Data Rate Wireless Communications." Diss., Virginia Tech, 2002. http://hdl.handle.net/10919/27193.
Full textPh. D.
Ben, Mahmoud Mohamed Slim. "Addressing Security Challenges in Emerging Data-based Aeronautical Communications." Thesis, Toulouse, INSA, 2012. http://www.theses.fr/2012ISAT0006/document.
Full textThis research work deals with the information and network security in the aeronautical communication domain. Three fundamental research axes are explored. First, a quantitative network security risk assessment methodology is proposed. Our approach is based on the risk propagation within the network nodes. As study cases, the algorithm has been validated in the scope of the European industrial project entitled SESAR (Single European Sky ATM Research) and the Aerospace Valley FAST (Fibrelike Aircraft Satellite Communications). Particularly, experimental results relative to the case study devoted to the FAST project shown that the global network risk in the non secured system architecture is relatively high, meaning the system needs more consideration from a security point of view. To cope with this issue, an adaptive security management framework for a satellite-based aeronauticalcommunication architecture has been proposed as a second contribution. A security manager module has been designed, implemented, then tested in the scope of the FAST project. Finally, as the security primitives used in the adaptive security management framework need to be efficiently exchanged, the last contribution consists in a scalable PKI adapted for the upcoming network-enabled aircraft. The idea is to minimize the air-ground additional overhead induced by the security procedures (keys, digital certificates, revocation/verification procedures). The PKI model we propose is a cross-certified multirooted hierarchical model
SENIGAGLIESI, LINDA. "Information-theoretic security techniques for data communications and storage." Doctoral thesis, Università Politecnica delle Marche, 2019. http://hdl.handle.net/11566/263165.
Full textThe last years have seen a growing need of security and privacy in many aspects of communications, together with the technological progress. Most of the implemented security solutions are based on the notion of computational security, and must be kept continuously updated to face new attacks and technology advancements. To meet the more and more strict requirements, solutions based on the information-theoretic paradigm are gaining interest to support pure cryptographic techniques, thanks to their capacity to achieve security independently on the attacker’s computing resources, also known as unconditional security. In this work we investigate how information-theoretic security can be applied to practical systems in order to ensure data security and privacy. We first start defining information-theoretic metrics to assess the secrecy performance of realistic wireless communication settings under practical conditions, together with a protocol that mixes coding techniques for physical layer security and cryptographic solutions. This scheme is able to achieve some level of semantic security at the presence of a passive attacker. At the same time, multiple scenarios are considered. We provide a security analysis for parallel relay channels, thus finding an optimal resource allocation that maximizes the secrecy rate. Successively, by exploiting a probabilistic model checker, we define the parameters for heterogeneous distributed storage systems that permit us to achieve perfect secrecy in practical conditions. For privacy purposes, we propose a scheme which guarantees private information retrieval of files for caching at the wireless edge against multiple spy nodes. We find the optimal content placement that minimizes the backhaul usage, thus reducing the communication cost of the system.
Davies, Mark Anthony. "Waveform regeneration of voiceband data signals." Thesis, University of Liverpool, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.284259.
Full textDhomeja, Sheyam Lal. "CDMA communications over wireless infrared channels." Thesis, University of Southampton, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287004.
Full textDelaplace, Franck. "Compilation des communications dans un langage data-parallèle pour les architectures à réseau à communications compilées." Paris 11, 1994. http://www.theses.fr/1994PA112168.
Full textZhou, Yiqing, and 周一靑. "Advanced techniques for high speed wireless communications." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B29296080.
Full textSee, Chong Meng Samson. "Space-time processing for wireless mobile communications." Thesis, Loughborough University, 1999. https://dspace.lboro.ac.uk/2134/25284.
Full textMcGinty, Nigel, and nigel mcginty@defence gov au. "Reduced Complexity Equalization for Data Communication." The Australian National University. Research School of Information Sciences and Engineering, 1998. http://thesis.anu.edu.au./public/adt-ANU20050602.122741.
Full textThomas, Charalambos Bob. "Information communications technologies in education : a Faustian bargain?" Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=33934.
Full textAlfredsson, Anders. "XML as a Format for Representation and Manipulation of Data from Radar Communications." Thesis, University of Skövde, Department of Computer Science, 2001. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-591.
Full textXML was designed to be a new standard for marking up data on the web. However, as a result of its extensible and flexible properties, XML is now being used more and more for other purposes than was originally intended. Today XML is prompting an approach more focused on data exchange, between different applications inside companies or even between cooperating businesses.
Businesses are showing interest in using XML as an integral part of their work. Ericsson Microwave Systems (EMW) is a company that sees XML as a conceivable solution to problems in the work with radar communications. An approach towards a solution based on a relational database system has earlier been analysed.
In this project we present an investigation of the work at EMW, and identification and documentation of the problems in the radar communication work. Also, the requirements and expectations that EMW has on XML are presented. Moreover, an analysis has been made to decide to what extent XML could be used to solve the problems of EMW. The analysis was conducted by elucidating the problems and possibilities of XML compared to the previous approach for solving the problems at EMW, which was based on using a relational database management system.
The analysis shows that XML has good features for representing hierarchically structured data, as in the EMW case. It is also shown that XML is good for data integration purposes. Furthermore, the analysis shows that XML, due to its self-describing and weak typing nature, is inappropriate to use in the data semantics and integrity problem context of EMW. However, it also shows that the new XML Schema standard could be used as a complement to the core XML standard, to partially solve the semantics problems.
Whitworth, Timothy. "Channel estimation, data detection and training design for wireless communications." Thesis, University of Leeds, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.493283.
Full textLiu, Enfei. "USB dongles for mobile broadband : Data communications for laptop computers." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169898.
Full textMer än någonsin behöver människan arbeta med bärbara datorer med anslutning till trådlöst Internet. Det finns två vanliga trådlösa Internet-anslutningar: trådlöst lokalt nätverk (WLAN på engelska) via en hotspot, eller höghastighets mobilnät via mobilt bredband som 3G/4G Universal Serial Bus (USB) dongel. USB dongeln var pionjär produkten inom 3G/4G marknaden, och den är fortfarande en populär enhet i många länder. Mobilt bredband kan erbjuda både tillgång till höga hastighet och bra mobilitet. Mobilt bredband tillåter, rent tekniskt, användaren hålla en Internet-anslutning så länge mobilen har tillgång till mobilnätets operatörsnät. Men i praktiken är datahastigheterna, som användaren upplever ha via det mobila bredbandet, inte jämförbar med de datahastigheter som är tillgängliga via WLAN. Dessutom har mobilt bredband implementerats enligt flera olika standarder. Således, för att förutse en användare med en optimal lokal tjänst, krävs det att användaren måste använda heterogena nätverk. Dessutom blir olika nätverk allt större på grund av uppkomsten av olika 4G-nät. Syftet med denna avhandling är att undersöka hur heterogena nätverk skulle kunna utnyttjas för att förutse en laptop användare med optimal lokal nätverksservice, samtidigt dölja komplexiteten för användaren om den heterogena tjänsten. Forskningen fokuserar på konsekvenserna av att integrera flera nätverksgränssnitt till en enda USB-dongel. Vår forskning visar att det fortfarande behövs en multi-mode USB dongel på marknaden, dock existerar det konkurrens från smartphones och mobila WiFi-enheter. Vi påpekar även i avhandlingen att PPP (Point-to-Point Protocol) baserade USB dongeln bör uppdateras till Ethernet USB-protokoll, såsom RNDIS (Remote Network Driver Interface Specification) eller USB CDC (Communications Device Class) protokoll. Vidare föreslår vi att en USB-dongel bör kunna fungera som en kopplingspunkt för att dela Internet med andra mobila enheter, och att den också bör fungera som en WLAN-klient som kan ansluta sig till andra hotspots. Om hotspot operatörer kan autentisera USB-donglar genom SIM-kort, så kan användarna enkelt få tillgång till ett stort antal hotspots som tillhör dessa operatörer.
Wilson, Martin Paul. "Synthesised local oscillator design considerations for satellite data communications systems." Thesis, University of York, 1992. http://etheses.whiterose.ac.uk/2489/.
Full textHooke, Adrian J. "Advanced Orbiting Systems: A Standard Architecture for Space Data Communications." International Foundation for Telemetering, 1989. http://hdl.handle.net/10150/614735.
Full textThe first thirty years of civilian space exploration were characterized by a series of individual missions, focussed towards specific goals and servicing small and close-knit user communities. Spacecraft (constrained by power, weight and volume considerations) were customized towards mission objectives. Their data handling and communications systems were primarily built for simplicity and robustness, and displayed little commonality from mission to mission. All of the easy space missions have now been flown. As we move into the 1990s, requirements exist for complex missions involving Earth observation, exploration and a more permanent human presence in space. Internationalization of these missions is inevitable as a means to distribute and share costs, and to increase their political stability. Automation of their data handling systems is essential to support reliable, low cost operations. Responding to this environment, the Consultative Committee for Space Data Systems (CCSDS) was formed in 1982 to develop and promote a full suite of internationally standardized space data communications protocols. The first set of recommended standards, covering the data handling requirements of conventional free-flying scientific spacecraft, was finalized in 1986. Using the international space station "Freedom" program (a cooperative venture between the US, Europe, Canada and Japan) as a requirements model, the CCSDS has now extended its suite of recommended standards to cover "advanced orbiting systems" such as unmanned and man-tended Earth observation platforms, new space transportation systems, and manned laboratories. These systems, which operate as longterm orbiting facilities and therefore have changing user communities, produce prodigious rates and volumes of data including digitized video and audio. For the first time, the orbiting systems will use local area networks for internal data transfer. On the ground, they will interface with networks designed for worldwide Open Systems Interconnection (OSI). This paper reviews the standard data handling service architecture which has been developed by CCSDS. It describes the communications protocols that are recommended for the networked transfer of space mission data, and focuses on the unique requirements of transmitting many different data types through weak signal, noisy space channels at rates which routinely may reach many hundreds of megabits per second.
Deaves, R. H. "The management of communications in decentralised Bayesian data fusion system." Thesis, University of Bristol, 1998. http://hdl.handle.net/1983/ae6cb4d5-96e8-4af4-90c0-fddb4f188369.
Full textSharakhov, Nikita Igorevich. "Web-Based Data Visualization with 3D Portrayals for Communications Applications." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/50420.
Full textMaster of Science
Sankaran, Mahadevan. "Transparent Asynchronous Transmitter Receiver Interface (TAXI) communications for fiber optic data links." Thesis, This resource online, 1994. http://scholar.lib.vt.edu/theses/available/etd-01102009-063748/.
Full textZhang, Peng. "Energy-efficient Clustering Design for M2M Communications." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-143332.
Full textCox, Criston W. "Optimizing bandwidth of tactical communications systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FCox.pdf.
Full textThesis Advisor(s): William Kemple, John Osmundson. Includes bibliographical references (p. 59-60). Also available online.
Asbery, Christopher W. "SMART GRID COMMUNICATIONS." UKnowledge, 2012. http://uknowledge.uky.edu/ece_etds/10.
Full textStrihagen, Karl. "Evaluation of publish – subscribe protocols for vehicle communications." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-217524.
Full textFordon som är anslutna till ett nätverk är en lovande applikation av sakernas internt (eng.Internet of Things). För företag vars kärnverksamhet involverar användandet av fordonkan den information som fordonen generar användas till att förbättra verksamheten. Föratt kunna använda nätverket krävs en kommunikationslänk som ansluter fordonet, samtett kommunikationsprotokoll för att förmedla information. För fordon är mobilnätet den bästa tillgängliga kommunikationslänken för att ansluta demtill internet. Att använda mobilnätet kostar pengar i proportion till den datamängd somanvänds, därför behandlas i denna rapport dataåtgången för tre protokoll, AMQP, MQTToch MQTT-SN. För dessa testar vi tre olika storlekar på nyttodata för att göra testerna merverklighetstrogna för typiska användningssituationer, testar vi dessa under inverkan avpaketförluster mellan 0% till 30% på nätverket. Resultaten från testerna visar att för små storlekar på nyttodata är MQTT-SN det protokollsom konsumerar minst data. För större storlekar på nyttodata är dataanvändningen förAMQP och MQTT ungefär likvärdiga i dataanvändning medans MQTT-SN användermer. Vid höga nivåer av paketförluster tog testerna lång tid och det var inte ovanligt attTCP anslutningen bröts. AMQP och MQTT hade överlag ganska lika beteenden, dockmed undantaget hantering av TCP:s leveranskvittens.
Mahdavi, Ali Reza. "Data-aided phase control in differential GMSK receivers for narrowband communications." Thesis, University of Hull, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.301633.
Full text