Dissertations / Theses on the topic 'MITIGATION ALGORITHM'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 37 dissertations / theses for your research on the topic 'MITIGATION ALGORITHM.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Zubi, Hazem M. "A genetic algorithm approach for three-phase harmonic mitigation filter design." Thesis, University of Bath, 2013. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604881.
Full textIkuma, Takeshi. "Non-Wiener Effects in Narrowband Interference Mitigation Using Adaptive Transversal Equalizers." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/26772.
Full textPh. D.
Manmek, Thip Electrical Engineering & Telecommunications Faculty of Engineering UNSW. "Real-time power system disturbance identification and its mitigation using an enhanced least squares algorithm." Awarded by:University of New South Wales. Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/26233.
Full textGandhi, Nikhil Tej. "Automatic Dependent Surveillance - Broadcast Enabled, Wake Vortex Mitigation Using Cockpit Display." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1354313600.
Full textLoh, Nolan. "Buildings as urban climate infrastructure: A framework for designing building forms and facades that mitigate urban heat." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1553513750865168.
Full textAl-Odat, Zeyad Abdel-Hameed. "Analyses, Mitigation and Applications of Secure Hash Algorithms." Diss., North Dakota State University, 2020. https://hdl.handle.net/10365/32058.
Full textKivrikis, Andreas, and Johan Tjernström. "Development and Evaluation of Multiple Objects Collision Mitigation by Braking Algorithms." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2676.
Full textA CMbB system is a system that with the help of sensors in the front of a car detects when a collision in unavoidable. When a situation like that is detected, the brakes are activated. The decision of whether to activate the brakes or not is taken by a piece of software called a decision maker. This software continuously checks for routes that would avoid an object in front of the car and as long as a path is found nothing is done. Volvo has been investigating several different CMbB-systems, and the research done by Volvo has previously focused on decision makers that only consider one object in front of the car. By instead taking all present objects in consideration, it should be possible to detect an imminent collision earlier. Volvo has developed some prototypes but needed help evaluating their performance.
As part of this thesis a testing method was developed. The idea was to test as many cases as possible but as the objects’ possible states increase, the number of test cases quickly becomes huge. Different ways of removing irrelevant test cases were developed and when these ideas were realized in a test bench, it showed that about 98 % of the test cases could be removed.
The test results showed that there is clearly an advantage to consider many objects if the cost of increased complexity in the decision maker is not too big. However, the risk of false alarms is high with the current decision makers and several possible improvements have therefore been suggested.
Santos, Fernando Fernandes dos. "Reliability evaluation and error mitigation in pedestrian detection algorithms for embedded GPUs." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/159210.
Full textPedestrian detection reliability is a fundamental problem for autonomous or aided driving. Methods that use object detection algorithms such as Histogram of Oriented Gradients (HOG) or Convolutional Neural Networks (CNN) are today very popular in automotive applications. Embedded Graphics Processing Units (GPUs) are exploited to make object detection in a very efficient manner. Unfortunately, GPUs architecture has been shown to be particularly vulnerable to radiation-induced failures. This work presents an experimental evaluation and analytical study of the reliability of two types of object detection algorithms: HOG and CNNs. This research aim is not just to quantify but also to qualify the radiation-induced errors on object detection applications executed in embedded GPUs. HOG experimental results were obtained using two different architectures of embedded GPUs (Tegra and AMD APU), each exposed for about 100 hours to a controlled neutron beam at Los Alamos National Lab (LANL). Precision and Recall metrics are considered to evaluate the error criticality. The reported analysis shows that, while being intrinsically resilient (65% to 85% of output errors only slightly impact detection), HOG experienced some particularly critical errors that could result in undetected pedestrians or unnecessary vehicle stops. This works also evaluates the reliability of two Convolutional Neural Networks for object detection: You Only Look Once (YOLO) and Faster RCNN. Three different GPU architectures were exposed to controlled neutron beams (Kepler, Maxwell, and Pascal) detecting objects in both Caltech and Visual Object Classes data sets. By analyzing the neural network corrupted output, it is possible to distinguish between tolerable errors and critical errors, i.e., errors that could impact detection. Additionally, extensive GDB-level and architectural-level fault-injection campaigns were performed to identify HOG and YOLO critical procedures. Results show that not all stages of object detection algorithms are critical to the final classification reliability. Thanks to the fault injection analysis it is possible to identify HOG and Darknet portions that, if hardened, are more likely to increase reliability without introducing unnecessary overhead. The proposed HOG hardening strategy is able to detect up to 70% of errors with a 12% execution time overhead.
Salomon, Sophie. "Bias Mitigation Techniques and a Cost-Aware Framework for Boosted Ranking Algorithms." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1586450345426827.
Full textBhattacharya, Koustav. "Architectures and algorithms for mitigation of soft errors in nanoscale VLSI circuits." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0003280.
Full textFyrvald, Johanna. "Mitigating algorithmic bias in Artificial Intelligence systems." Thesis, Uppsala universitet, Matematiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-388627.
Full textRamachandran, Anirudh Vadakkedath. "Mitigating spam using network-level features." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41068.
Full textKetonen, J. (Johanna). "Equalization and channel estimation algorithms and implementations for cellular MIMO-OFDM downlink." Doctoral thesis, Oulun yliopisto, 2012. http://urn.fi/urn:isbn:9789514298578.
Full textTiivistelmä Tämän väitöskirjatyön tavoitteena on kehittää vastaanotinalgoritmeja ja -arkkitehtuureja, jotka toteuttavat tulevaisuuden langattomien tietoliikennejärjestelmien suuren datanopeuden ja pienen kompleksisuuden tavoitteet. Työssä esitellään algoritmeja, arkkitehtuureja ja toteutuksia ilmaisuun, kanavaestimointiin ja häiriönvaimennukseen monitulo-monilähtötekniikkaa (multiple-input multiple-output, MIMO) ja ortogonaalista taajuusjakokanavointia (orthogonal frequency division multiplexing, OFDM) yhdistäviin vastaanottimiin. Algoritmeista saatavaa suorituskykyhyötyä verrataan vaadittavaan toteutuksen monimutkaisuuteen. Työn tuloksia voidaan hyödyntää sekä vastaanotin- että järjestelmäsuunnittelussa. Lineaarista pienimmän keskineliövirheen (minimum mean square error, MMSE) ilmaisinta ja listapalloilmaisinta (list sphere detector, LSD) verrataan peräkkäiseen häiriönpoistoilmaisimeen (successive interference cancellation, SIC). SIC-ilmaisimella on huonompi suorituskyky kuin LSD-ilmaisimella radiokanavan ollessa korreloitunut. Korrelaation pienentyessä myös ilmaisimien suorituskykyero pienenee. Erot suorituskyvyissä ovat vähäisiä silloinkin, jos järjestelmässä on takaisinkytkentäkanava lähettimelle. Tällöinkin korkean signaali-kohinasuhteen olosuhteissa LSD-ilmaisimet mahdollistavat tilakanavoidun, suuren datanopeuden tiedonsiirron. Radiokanavan muuttuessa uudelleenkonfiguroitava vastaanotin toisi virransäästömahdollisuuden vaihtelemalla kompleksisen ja yksinkertaisen ilmaisimen välillä. Kanavaestimointialgoritmeja ja niiden toteutuksia vertaillaan käyttämällä lähtökohtana nykyisen mobiilin tiedonsiirtostandardin viitesignaalimallia. Tutkittavat algoritmit perustuvat pienimmän neliösumman (least squares, LS) ja pienimmän keskineliövirheen menetelmään, sekä päätöstakaisinkytkettyyn (decision directed, DD) kanavaestimointialgoritmiin. DD-kanavaestimaattori ja MMSE-suodatin parantavat vastaanottimen suorituskykyä korkeissa käyttäjän nopeuksissa, joissa viitesignaaleiden tiheys ei ole riittävä. DD-kanavaestimoinnilla datanopeutta voidaan nostaa viitesignaaleiden määrää laskemalla vaikuttamatta suorituskykyyn. Työssä tarkastellaan myös saman kanavan häiriön vaimennusta. Häiriöstä ja kohinasta koostuvaa kovarianssimatriisia käytetään ilmaisuun ja kanavaestimointiin. Työssä esitetään adaptiivinen algoritmi matriisihajoitelman tarkkuuden ja häiriön vaimennuksen säätämiseen. Algoritmi mahdollistaa hyvän suorituskyvyn kaikissa häiriötilanteissa vähentäen samalla virrankulutusta
Yao, Sirui. "Evaluating, Understanding, and Mitigating Unfairness in Recommender Systems." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103779.
Full textDoctor of Philosophy
Recommender systems are information filtering tools that discover potential matching between users and items. However, a recommender system, if not properly built, may not treat users and items equitably, which raises ethical and legal concerns. In this research, we explore the implication of fairness in the context of recommender systems, study the relation between unfairness in recommender output and inequality in the underlying population, and propose effective unfairness mitigation approaches. We start with finding unfairness metrics appropriate for recommender systems. We focus on the task of rating prediction, which is a crucial step in recommender systems. We propose a set of unfairness metrics measured as the disparity in how much predictions deviate from the ground truth ratings. We also offer a mitigation method to reduce these forms of unfairness in matrix factorization models Next, we look deeper into the factors that contribute to error-based unfairness in matrix factorization models and identify four types of biases that contribute to higher subpopulation error. Then we propose personalized regularization learning (PRL), which is a mitigation strategy that learns personalized regularization parameters to directly addresses data biases. The learned per-user regularization parameters are interpretable and provide insight into how fairness is improved. Third, we conduct a theoretical study on the long-term dynamics of the inequality in the fitting (e.g., interest, qualification, etc.) between users and items. We first mathematically formulate the transition dynamics of user-item fit in one step of recommendation. Then we discuss the existence and uniqueness of system equilibrium as the one-step dynamics repeat. We also show that depending on the relation between item categories and the recommendation policies (unconstrained or fair), recommendations in one item category can reshape the user-item fit in another item category. In summary, we examine different fairness criteria in rating prediction and recommendation, study the dynamics of interactions between recommender systems and users, and propose mitigation methods to promote fairness and equality.
Aputis, Artūras. "DDoS (distributed denial of service) atakų atrėmimo algoritmų tyrimas ir modeliavimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_095501-14832.
Full textNowadays there are lot of ways how to detect various types of DDoS attacks, but in order to stop, or at least to mitigate the impact of such DDoS attacks not enough work is done. It is very difficult to choose the right DDoS mitigation method. The research of DDoS attacks mitigation can provide a good manual how to choose the most appropriate method. „BGP DDoS Diversion“ method is one of the most effective and least cost to deliver DDoS mitigation method. This method is implemented using BGP protocol. BGP diversion mechanism is used to announce a specific part of the provider‘s network to (a part of) the Internet. Announcing a specific part of this network will divert the DDoS traffic and thereby prevent other parts of the provider‘s network becoming unreachable. This gives the provider the ability to continue providing services of the rest of his custumers. This research was based on analyzing the DDoS mitigation methods. For the better analyzes the „BGP DDoS Diversion“ method was chosen. To analyze this method the virtual environment was the best way to accomplish this task. OPNET modeler software was chosen to create the virtual environment. Using OPNET the virtual network was created. Virtual network was based on Internet network standards. „BGP DDoS Diversion“ method was implemented and tested in the virtual network. This research provides the detail analyzes of „BGP DDoS Diversion“ method.
Abouzar, Pooyan. "Mitigating the effect of propagation impairments on higher layer protocols and algorithms in wireless sensor networks." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/58915.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Powell, Keith. "Next generation wavefront controller for the MMT adaptive optics system: Algorithms and techniques for mitigating dynamic wavefront aberrations." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/222838.
Full textFang, Yiping. "Critical infrastructure protection by advanced modelling, simulation and optimization for cascading failure mitigation and resilience." Thesis, Châtenay-Malabry, Ecole centrale de Paris, 2015. http://www.theses.fr/2015ECAP0013/document.
Full textContinuously increasing complexity and interconnectedness of modern critical infrastructures, together with increasingly complex risk environments, pose unique challenges for their secure, reliable, and efficient operation. The focus of the present dissertation is on the modelling, simulation and optimization of critical infrastructures (CIs) (e.g., power transmission networks) with respect to their vulnerability and resilience to cascading failures. This study approaches the problem by firstly modelling CIs at a fundamental level, by focusing on network topology and physical flow patterns within the CIs. A hierarchical network modelling technique is introduced for the management of system complexity. Within these modelling frameworks, advanced optimization techniques (e.g., non-dominated sorting binary differential evolution (NSBDE) algorithm) are utilized to maximize both the robustness and resilience (recovery capacity) of CIs against cascading failures. Specifically, the first problem is taken from a holistic system design perspective, i.e. some system properties, such as its topology and link capacities, are redesigned in an optimal way in order to enhance system’s capacity of resisting to systemic failures. Both topological and physical cascading failure models are applied and their corresponding results are compared. With respect to the second problem, a novel framework is proposed for optimally selecting proper recovery actions in order to maximize the capacity of the CI network of recovery from a disruptive event. A heuristic, computationally cheap optimization algorithm is proposed for the solution of the problem, by integrating foundemental concepts from network flows and project scheduling. Examples of analysis are carried out by referring to several realistic CI systems
Poulsen, Andrew Joseph. "Real-time Adaptive Cancellation of Satellite Interference in Radio Astronomy." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd238.pdf.
Full textChen, Min-Pei, and 陳民培. "Multipath Detection and Mitigation Algorithm for Global Positioning System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/39836204088957373003.
Full text國立臺灣大學
電信工程學研究所
97
In Global Positioning System (GPS), many positioning errors such as clock error, tropospheric error and ionospheric error can be eliminated by using differential techniques. But characteristics of multipath interference depend on time and environment, which means that it can’t be canceled by differential technique. Therefore, multipath becomes one of the main error sources in GPS. According to the characteristics of multipath, this thesis proposes the multipath detection and multipath mitigation algorithm. The purpose of multipath detector is to determine whether a multipath is present. If multipath detector decides that a multipath is present, then the receiver may take some actions to mitigate multipath effect. The design issues of multipath detector contain selection of correlator spacing, taps of moving average filter and threshold setting. The influences of front-end RF filter and fixed-point effect are also analyzed. Simulation results show that the false alarm and miss detection probability of multipath detector are quite low. Moreover, the ability of real-time detection is very robust. For multipath mitigation, this thesis proposes a code discriminator to reduce multipath effect by means of increasing discriminator gain. In comparison with conventional narrow correlator, our proposed discriminator provides a 20% reduction in pseudorange error when the front-end RF bandwidth is 8.184 MHz and 56% when it is 16.368 MHz. However, the jitter when using this proposed discriminator is about 1.6 times larger than narrow correlator.
Ming-I, Chao, and 趙明義. "Phase noise mitigation algorithm in 60 GHz RoF system." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/13148812948270350252.
Full text國立交通大學
光電系統研究所
100
The demand for the wireless bandwidth is increasing and in near future a few Gbps over wireless will be needed. The best way to provide the such high capacity wireless is over 60 GHz because of the huge 7 GHz unlicensed bandwidth. The radio-over-fiber (RoF) systems provide efficient ways for transportation and distribution of high frequency signals such as 60 GHz. The phase noise (linewidth) laser light source and fiber dispersion in the RoF system will induce the impairment of the signal and limit the transmission distance and data rate. In this research, the phase noise model and mitigation algorithm are built up and reduce the bit-error-rate under the FEC limit through over 100 km transmission and DFB laser. Combine with bit-loading, the data rate can improve over 15% with 100 km fiber transmission.
Chiang, Hsing-kuo, and 江興國. "Interacting Multiple Model Algorithm for NLOS Mitigation in Wireless Location." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/17914550076557737594.
Full text國立中山大學
電機工程學系研究所
97
In the thesis, we propose a non-line of sight (NLOS) mitigation approach based on the interacting multiple model (IMM) algorithm. The IMM-based structure, composed of a biased Kalman filter (BKF) and a Kalman filter with NLOS-discarding process (KF-D), is capable of mitigating the ranging error caused by the NLOS effects, and therefore improving the performance and accuracy in wireless location systems. The NLOS effect on signal transmission is one of the major factors that affect the accuracy of the time-based location systems. Effective NLOS identification and mitigation usually count on pre-determined statistic distribution and hypothesis assumption in the signals. Because the variance of the NLOS error is much large than that of measurement noise, hypothesis testing on the LOS/NLOS status can be formulated.The BKF combines the sliding window and decides the status by using hypothesis testing. The calculated variance and the detection result are used in switching between the biased and unbiased modes in the Kalman filter. In the contrast, the KF-D scheme identifies the NLOS status and tries to eliminate the NLOS effects by directly using the estimated results from the LOS stage. The KF-D scheme can achieve reasonably good NLOS mitigation if the estimates in the LOS status are obtained. Due to the discarding process, changes of the state vector within the NLOS stage are possibly ignored, and will cause larger errors in the state estimates. The BKF and KF-D can make up for each other by formulating the filters in an IMM structure, which could tune up the probabilities of BKF and KF-D. In our approach, the measured data are smoothed by sliding window and a BKF. The variance of data and the hypothesis test result are passed to the two filters. The BKF switches between the biased/unbiased modes by using the result. The KF-D may receive the estimated value from BKF based on the results. The probability computation unit changes the weights to get the estimated TOA values. With the simulations in ultra-wideband (UWB) signals, it can be seen that the proposed IMM-based approach can effectively mitigate the NLOS effects and increase the accuracy in wireless position.
Yen, Chen-Hsu, and 顏晨旭. "Using An Embedded System to Implement STAP Algorithm for GPS Interference Mitigation." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/96376567364072850531.
Full text國立成功大學
電機工程學系碩博士班
95
The Global Navigation Satellite System (GNSS) signals transmit to the receiver is quite weak. Due to the fact that the signal have been mixed with interference and noise, this weak signal cannot be used to track the trajectories precisely. In accordance with the characteristics of spatial direction of the signal, the result of beampattern of the antenna array can be adjusted by an adaptive algorithm to enhance the GPS signal and to process interference mitigation simultaneously. As the rapid development of electronic technologies, the adaptive algorithm can be implemented on a programmable logic device. Hence, this thesis utilizes an embedded system to achieve the GPS interference mitigation. The main architecture combines with antenna array and RF front end as the platform for the reception of GPS signals. In order to mitigate the interference on the GPS signal, a spatial-temporal adaptive processing algorithm (STAP) is implemented on the embedded system, DSP development kit Stratix II.
Lu, Shao Hang, and 呂少航. "Design of Cyclostationary Impulsive Noise Mitigation Algorithm for Narrowband Power Line Communications." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/xpshpy.
Full text國立臺灣科技大學
自動化及控制研究所
106
There are many power devices operated in the narrowband power line channel. Therein, the electronic components with switching function will introduce high energy impulsive noise. Therefore, the data are corrupted during transmission and data integrity issue is missed. Research statistics indicate that the periodic impulsive noise with cyclostationary characteristics is one of the most threatening noises in the narrowband channel, and its energy is usually more than 10 times larger than the background noise. In order to overcome the impact of impulsive noise on data transmission quality and to reduce the probability of transmission error, in this thesis, we propose a cyclostationary impulsive noise mitigation algorithm utilizing frequency shift (FRESH) filter to estimate impulsive noise. It can improve the performance of cyclostationary impulsive noise estimation by the conventional linear time-invariant (LTI) filter. Moreover, an adaptive noise predictor is combined to enhance the integrity of reconstructed noise, and to reduce the impact due to signal being interfered by the impulsive noise. Simulation results show that the algorithm proposed in this thesis can effectively estimate and mitigate the cyclostationary impulsive noises in the received signals and it can achieve significantly improved performance in comparison with the conventional blanking method.
CHEN, PO-YU, and 陳柏宇. "Time-Frequency Signal Processing-based Jamming Detection and Mitigation Algorithm for Galileo Receivers." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/dgpxpu.
Full text國立宜蘭大學
電機工程學系碩士班
103
Due to the increasing demands of location-based services (LBSs), many appliances, such as smart phones, smart wearable devices, unmanned cars, unmanned commercial aircrafts and so on, require high accuracy positioning by using GNSS (Global Navigation Satellite System) receivers. However, malicious users can easily obtain an inexpensive GNSS jammer, which can generate continuous waveform interferences (CWI) and chirp interferences, to paralyze the acquisition operation of GNSS receivers. Therefore, a jamming mitigation mechanism has to be implemented in GNSS receivers. In this thesis, we propose a novel algorithm to detect efficacious jammer. Moreover, it can effectively combat chirp jammers, CWI jammers, and the mixedjammer of chirp and CWI for a Galileo receiver. Our proposed anti-jamming algorithm combines wavelet packet transform (WPT) techniques with adaptive predictors. With WPT, we can de-noise the received contaminated signal to generate a reference signal and this referenced signal then input to an adaptive filter to mimic the jamming signals. Simulation results have shown that the proposed jamming detection algorithm can achieve higher than 99% detection rate; for multiple CWIs case, our method outperforms the conventional adaptive notch filters; for chirp interferences with a jamming-to-signal ratio (JSR) of 55 dB, our approach resultes in the acquisition probability of about 80%, which is about zero when adaptive notch filter is used. However, in the mixed jammer case, the threshold of de-noise cannot be correctly estimated. In this case, our method has poor anti-jamming performance.
Chen, Shi-Yao, and 陳仕堯. "An Optimization-Based Algorithm for Mitigation of Starvation in IEEE 802.11 Wireless Networks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/36624851731355059014.
Full text國立臺灣大學
資訊管理學研究所
104
Distributed Coordination Function (DCF) is a fundamental MAC mechanism of the IEEE 802.11 based WLAN standard to access the medium and reduce possibility of collisions by Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). Each flow of sender must check whether the medium is available or not before sending data. However, in some situations, the random access protocol, CSMA/CA, cause serious unfairness or flow starvation. In this research, we focus on mitigating starvation problems in Wi-Fi ad hoc networks for improving the wireless network service. Adapting the transmission power range, carrier sense threshold are used in the work. The objective is to alleviate the starvation problems between nodes in the densely wireless network. In this thesis, we model the optimal mathematical formulation for describing and mitigating the starvation problems with objective function and some constraints. To fast solve the mathematical optimization, we utilize an approach, Lagrangean Relaxation (LR), which approximates another problem of constrained optimization by a similar problem. The feasible solution is derived from information provided by the Lagrangean multipliers. We are going to use Visual Studio 2013 and C/C++ for computational experiments which some scenarios are designed for evaluating the starvation problems. We anticipate that the expectation results with LR-based approach will be within the twenty-percent gap to the real optimum. Finally, we will get the result which minimizes the starvation problems in IEEE 802.11 wireless networks.
GUPTA, ANISHI. "GENERIC FRAMEWORK AND MITIGATION ALGORITHM AGAINST BLACK HOLE ATTACK FOR AODV ROUTING PROTOCOL IN MANET." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15729.
Full textLin, Chien-hung, and 林建宏. "TOA Wireless Location Algorithm with NLOS Mitigation Based on LS-SVM in UWB Systems." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/28tr6a.
Full text國立中山大學
電機工程學系研究所
96
One of the major problems encountered in wireless location is the effect caused by non-line of sight (NLOS) propagation. When the direct path from the mobile station (MS) to base stations (BSs) is blocked by obstacles or buildings, the signal arrival times will delay. That will make the signal measurements include an error due to the excess path propagation. If we use the NLOS signal measurements for localization, that will make the system localization performance reduce greatly. In the thesis, a time-of-arrival (TOA) based location system with NLOS mitigation algorithm is proposed. The proposed method uses least squares-support vector machine (LS-SVM) with optimal parameters selection by particle swarm optimization (PSO) for establishing regression model, which is used in the estimation of propagation distances and reduction of the NLOS propagation errors. By using a weighted objective function, the estimation results of the distances are combined with suitable weight factors, which are derived from the differences between the estimated measurements and the measured measurements. By applying the optimality of the weighted objection function, the method is capable of mitigating the NLOS effects and reducing the propagation range errors. Computer simulation results in ultra-wideband (UWB) environments show that the proposed NLOS mitigation algorithm can reduce the mean and variance of the NLOS measurements efficiently. The proposed method outperforms other methods in improving localization accuracy under different NLOS conditions.
Wei-FanHsueh and 薛瑋帆. "Mitigation Algorithm for the Memory Impulse Noise in Narrow-band Power Line Communication Systems." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/68tt9c.
Full textTangtragulwong, Potchara. "Optimal Railroad Rail Grinding for Fatigue Mitigation." Thesis, 2010. http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8909.
Full textLu, Sili. "OFDM interference mitigation algorithms with application to DVB-H /." 2008. http://proquest.umi.com/pqdweb?did=1597607541&sid=1&Fmt=2&clientId=10361&RQT=309&VName=PQD.
Full textFilippone, Giuseppe, William Spataro, Donato D'Ambrosio, Davide Marocco, and Nicola Leone. "Parallel and evolutionary applications to cellular automata models for mitigation of lava flow invasions." Thesis, 2013. http://hdl.handle.net/10955/874.
Full textIn the lava ow mitigation context, the determination of areas exposed to volcanic risk is crucial for diminishing consequences in terms of human causalities and damages of material properties. In order to mitigate the destructive e ects of lava ows along volcanic slopes, the building and positioning of arti cial barriers is fundamental for controlling and slowing down the lava ow advance. In this thesis, a decision support system for de ning and optimizing volcanic hazard mitigation interventions is proposed. The Cellular Automata numerical model SCIARA-fv2 for simulating lava ows at Mt Etna (Italy) and Parallel Genetic Algorithms (PGA) for optimizing protective measures construction by morphological evolution have been considered. In particular, the PGA application regarded the optimization of the position, orientation and extension of earth barriers built to protect Rifugio Sapienza, a touristic facility located near the summit of the volcano. A preliminary release of the algorithm, called single barrier approach (SBA), was initially considered. Subsequently, a second GA strategy, called Evolutionary Greedy Strategy (EGS), was implemented by introducing multibarrier protection measures in order to improve the e ciency of the nal solution. Finally, a Coevolutionary Cooperative Strategy (CCS), has been introduced where all barriers are encoded in the genotype and, because all the constituents parts of the solution interact with the GA environment, a mechanism of cooperation between individuals has been favored. Solutions provided by CCS were extremely e cient and, in particular, the extent of the barriers in terms of volume used to deviate the ow thus avoiding that the lava reaches the inhabited area was less than 72% respect to the EGS 3and 284% respect to the SBA. It is also worth to note that the best set of interventions provided by CCS was approximately eighteen times more ef- cient than the one applied to divert the lava ow away from the facilities during the 2001 Mt.Etna eruption. Due to the highly intensive computational processes involved, General- Purpose Computation with Graphics Processing Units (GPGPU) is applied to accelerate both single and multiple simultaneous running of SCIARAfv2 model using CUDA (Compute Uni ed Device Architecture). Using four di erent GPGPU devices, the study also illustrates several implementation strategies to speedup the overall process and discusses some numerical results obtained. Carried out experiments show that signi cant performance improvements are achieved with a parallel speedup of 77. Finally, to support the analysis phase of the results, an OpenGL and Qt extensible system for the interactive visualization of lava ows simulations was also developed. The System showed that it can run the combined rendering and simulations at interactive frame rate. The study has produced extremely positive results and represents, to our knowledge, the rst application of morphological evolution for lava flow mitigation.
Università della Calabria
Zafaruddin, S. M. "Algorithms and performance analysis for self d alien crosstalk mitigation in upstream vectored VDSL." Thesis, 2012. http://localhost:8080/xmlui/handle/12345678/6798.
Full textHsu, Chao-Yuan, and 許兆元. "ICI Mitigation for High-mobility SISO/MIMO OFDM Systems: Low-complexity Algorithms and Performance Analysis." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41881546213151002873.
Full text國立交通大學
電信工程系所
97
In orthogonal frequency-division multiplexing (OFDM) systems, it is generally assumed that the channel response is static in an OFDM symbol period. However, the assumption does not hold in high-mobility environments. As a result, intercarrier interference (ICI) is induced and the system performance is degraded. A simple remedy for this problem is the application of the zero-forcing (ZF) and minimum mean square error (MMSE) equalizers. Unfortunately, the direct ZF method requires the inversion of an NxN ICI matrix, where N is the number of subcarriers. When N is large, the computational complexity can become prohibitively high. As for the direct MMSE method, in addition to an NxN matrix inverse, it requires an extra NxN matrix multiplication, making the required computational complexity higher compared to the direct ZF method. In this dissertation, we first propose a low-complexity ZF method to solve the problem in single-input-single-output (SISO) OFDM systems. The main idea is to explore the special structure inherent in the ICI matrix and to apply Newton's iteration for matrix inversion. With our formulation, fast Fourier transforms (FFTs) can be used in the iterative process, reducing the complexity from O(N^3) to O(Nlog_2 N) . Also, the required number of the iteration is typically one or two. We also analyze the convergence behavior of the proposed method and derive the theoretical output signal-to-interference-noise-ratio (SINR). For the MMSE method, we first reformulate the MMSE solution in a way that the extra matrix multiplication can be avoided. Similar to the ZF method, we then exploit the structure of the ICI matrix and apply Newton's iteration to reduce the complexity of the matrix inversion. For a multiple-input-multiple-output (MIMO) OFDM system, the required complexity of the ZF and MMSE methods becomes more intractable. We then manage to extend the proposed ZF and MMSE methods for SISO-OFDM systems to MIMO-OFDM systems. It turns out that the computational complexity can be reduced even more significantly. Simulation results show that the performance of the proposed methods is almost as good as that of the direct ZF and MMSE methods, while the required computational complexity is reduced dramatically. Finally, we explore the application of the proposed methods in mobility-induced ICI mitigation for OFDM multiple access (OFDMA) systems, and in carrier frequency offset (CFO) induced ICI mitigation for OFDMA uplink systems. As that in OFDM systems, the proposed methods can reduce the required computational complexity, effectively.
CHEN, KAI-HSIANG, and 陳凱翔. "Efficient Pilot Scheduling Using Metaheuristics Algorithms for Mitigating Pilot Contamination in Massive Multiuser MIMO Systems." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/873vj9.
Full text國立高雄師範大學
光電與通訊工程學系
105
Massive (or large-scale) multiuser, multiple-input and multiple-output (MIMO) system is widely regarded as a promising candidate technology in meeting 5G requirements because of its capacity to provide several significant advantages (such as spectral efficiency, link reliability, and coverage) compared with conventional small-scale MIMOsystems. However, this system suffers from a fundamental bottleneck,that is, the pilot contamination effect, where the channel estimationin a given cell is contaminated by the reuse of the same pilot group in adjacent cells. Several approaches have been proposed to reduce the pilot contamination effect. Among these methods, resource allocation strategies for pilot decontamination are highly attractive because of their good performance.These resource allocation strategies are motivated by the heavy dependence of pilot contamination on pilot assignment. These strategies aim to intelligently schedule the limited number of orthogonal pilots to different user terminals (UTs) to alleviate the effect of pilot contamination by capitalizing on UT locations and large-scale fading coefficients. Finding optimal pilot scheduling patterns that minimizes the effect of pilot contamination mathematically in multiuser multicell massive MIMO systems can be formulated as a permutation-based optimization problem. However, determining the optimal solution requires a exhaustive search algorithm, which becomes computationally prohibitive even if the numbers of cells or UTs per cell is small. To reduce both search complexity and pilot contamination effect, we propose the application of three metaheuristics algorithms (i.e., the ant colony optimization (ACO), the modified ACO (MACO), and the genetic algorithms (GA)) to tackle this problem. Simulation results demonstrate that the proposed three algorithms significantly outperform the classical random pilot assignment scheme. In particular, when the number of cells is 3 and number of UTs per cell is 5, the average achievable rates per UT obtained by the proposed ACO-based pilot scheduling method are within 99.99% of the optimal result implemented by the exhaustive search algorithm (ESA). Moreover, the proposed ACO-based pilot scheduling method requires approximately only 6.04% of the search complexity of ESA.
Chaudhry, Mohammad. "Network Coding in Distributed, Dynamic, and Wireless Environments: Algorithms and Applications." Thesis, 2011. http://hdl.handle.net/1969.1/ETD-TAMU-2011-12-10529.
Full textKanta, Lufthansa Rahman. "A Risk-based Optimization Modeling Framework for Mitigating Fire Events for Water and Fire Response Infrastructures." 2009. http://hdl.handle.net/1969.1/ETD-TAMU-2009-12-7367.
Full text