Dissertations / Theses on the topic 'Telecommunication systems Mathematical models'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Telecommunication systems Mathematical models.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Britton, Matthew Scott. "Stochastic task scheduling in time-critical information delivery systems." Title page, contents and abstract only, 2003. http://web4.library.adelaide.edu.au/theses/09PH/09phb8629.pdf.
Full textHou, Yuen Tan. "Resource management in multimedia communication systems." HKBU Institutional Repository, 2003. http://repository.hkbu.edu.hk/etd_ra/478.
Full textWitosurapot, Suntorn, and wsuntorn@fivedots coe psu ac th. "Resolving competition for resources between multimedia and traditional Internet applications." Swinburne University of Technology, 2004. http://adt.lib.swin.edu.au./public/adt-VSWT20050309.123048.
Full textTomlin, Toby-Daniel. "Analysis and modelling of jitter and phase noise in electronic systems : phase noise in RF amplifiers and jitter in timing recovery circuits." University of Western Australia. School of Electrical, Electronic and Computer Engineering, 2004. http://theses.library.uwa.edu.au/adt-WU2004.0021.
Full textBradley, W. Scott. "Propagation modeling for land mobile satellite communications." Thesis, Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/74511.
Full textMaster of Science
Barreira, Ramiro Roque Antunes. "Modelo mel-cepstral generalizado para envoltória espectral de fala." [s.n.], 2010. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259047.
Full textDissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação
Made available in DSpace on 2018-08-17T02:12:55Z (GMT). No. of bitstreams: 1 Barreira_RamiroRoqueAntunes_M.pdf: 2303475 bytes, checksum: 72e03fe8e41e9e440f2d4a266666763d (MD5) Previous issue date: 2010
Resumo: A análise Mel-Cepstral Generalizada (MGC) corresponde a uma abordagem para estimação de envoltória espectral de fala que unifica as análises LPC, Mel-LPC, Cepstral e Mel-Cepstral. A forma funcional do modelo MGC varia continuamente com dois parâmetros reais ? e ?, possibilitando que o modelo assuma diferentes características. A flexibilidade oferecida pelo modelo MGC aliada à sua estabilidade e bom desempenho sob manipulação de parâmetros tem feito com que os parâmetros MGC sejam empregados com sucesso em codificação de fala e síntese de fala via HMM (Hidden Markov Models). O presente trabalho foca os aspectos matemáticos da análise MGC, abordando e demonstrando, em extensão, a formulação em seus vieses analítico e computacional para a solução do modelo. As propriedades e formulações básicas da análise MGC são tratadas na perspectiva do espectro mel-logarítmico generalizado. Propõe-se um método para a computação dos coeficientes MGC e Mel-Cepstrais que não envolve o uso de fórmulas recursivas de transformação em freqüência. As análises e experimentos relacionados ao método encontram-se em estágio inicial e devem ser completados no sentido de se identificar a relação ganho computacional × qualidade da representação.
Abstract: Mel-Generalized Cepstral analysis (MGC) is an approach for speech spectral envelope estimation that unifies LPC, Mel-LPC, Cepstral and Mel-Cepstral Analysis. The functional form of the MGC model varies continuously with the real parameters ? e ?, enabling the model to acquire different characteristics. The flexibility of MGC model associated with its stability and good performance under parameter manipulation have made MGC parameters to be successfully employed in speech codification and HMM speech synthesis. The present study focuses on mathematical aspects of MGC analysis, treating and proving, in a fairly extended way, analytical and computational formulation for model solution. MGC analysis properties and basic formulation are treated in melgeneralized logarithmic spectrum perspective. A method for the computation of MGC and Mel-Cepstral coefficients that do not require frequency transformation recursion formulas is proposed. Experiments and analysis concerning the method are in their initial stage and needs to be completed in the sense to identify computational × representation performances.
Mestrado
Telecomunicações e Telemática
Mestre em Engenharia Elétrica
Borg, Andreas. "Processes and Models for Capacity Requirements in Telecommunication Systems." Doctoral thesis, Linköping : Department of Computer and Information Science, Linköpings universitet, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-16932.
Full textCoyle, Andrew James. "Some problems in queueing theory." Title page, contents and summary only, 1989. http://web4.library.adelaide.edu.au/theses/09PH/09phc8812.pdf.
Full textPawlowska, Bogna Julia. "Mathematical models of microbial evolution : cooperative systems." Thesis, University of Exeter, 2016. http://hdl.handle.net/10871/26819.
Full textNagarajan, Krishnamurthy. "New resource allocation strategies based on statistical network traffic models." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/33437.
Full text梁慧敏 and Wai-man Wanthy Leung. "Evolutionary optimisation of industrial systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1999. http://hub.hku.hk/bib/B30252994.
Full textDowns, Michael S. "Developing integrated decision support systems from mathematical models." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA303712.
Full textThesis advisor(s): H. Bhargava,R.K. Wood. "September 1995." Bibliography: p. 43. Also available online.
Gómez, Bardón María del Rocío. "Mathematical models and simulations of complex social systems." Thesis, University of Birmingham, 2010. http://etheses.bham.ac.uk//id/eprint/1287/.
Full textMa, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Full text馮達淸 and Tat-ching Fung. "Steady state solutions of nonlinear dynamic systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1989. http://hub.hku.hk/bib/B31231809.
Full textStuk, Stephen Paul. "Multivariable systems theory for Lanchester type models." Diss., Georgia Institute of Technology, 1987. http://hdl.handle.net/1853/24171.
Full textZhou, Wen, and 周雯. "A study of channel estimation for OFDM systems and system capacity forMIMO-OFDM systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B45555850.
Full textLi, Yang. "Models and applications of wireless networks in rural environments." Thesis, University of the Western Cape, 2005. http://etd.uwc.ac.za/index.php?module=etd&.
Full textThe research has set up two independent models, one for the economic need and the other for the technical need of building networks in rural areas. One model was the Impact of Telecommunications Model, which disclosed the importance of building a wireless network in specified rural areas by choosing an economic parameter to forecast the profitability of the network. The other was the Service Model, which collected primitive data from given rural areas and abstracted these data by flowing them through four technical layers to form the predicted technical wireless network. Both of the models had been applied to real-world cases to demonstrate how to use them.
A simulation environment was finally designed and implemented to realize the above two models for the sake of instantiation. This environment could simulate the specified rural network by constructing a wireless network on the invented areas and evaluating its quality and economic efficiency. It was written in Scilab simulation language, which was an open source.
Basak, Rishi. "Environmental management systems and the intra-firm risk relationship." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0034/MQ64316.pdf.
Full textDasci, Abdullah. "Discrete and continuous models for production-distribution systems." Thesis, McGill University, 2001. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=37625.
Full textThe models proposed in this thesis are based on two fundamentally different but equally central approaches. The first approach builds on traditionally popular integer programming formulation in facility location theory, in which two such models presented in this thesis. The first one assumes that there are a number of dedicated production technologies for each product whereas, the second one assumes that a set of flexible technologies is also present. Analytical properties of the models are described, which lead to the development of exact and heuristic solution procedures. Results of several sets of computational experiments are also reported. The second approach is based on continuous approximation (also known as continuum mechanics), which has not been used to its potential in the literature. The third model in this thesis is proposed for a system with single product. It is based on the use of continuous functions in representing spatial distribution of cost parameters and decision variables. In this model, the focus is to compute the service regions leaving the precise plant locations to a subsequent analysis. This model lends itself to closed form solutions and allows derivation of a number of insights on the impact of several cost factors on facility design decisions. Then, it is utilized in an analytical framework to analyze several plant focus decisions of firms in a multi-product environment. The closed form solution is used to analyze several product and market focus strategies, which have provided several insights into more sophisticated plant focus decisions and into the impact of different production technologies on these decisions.
Kröckel, Silke. "Stochastic production-inventory systems with significant setup times." Diss., Georgia Institute of Technology, 2002. http://hdl.handle.net/1853/24367.
Full textYuen, Wai-on, and 袁偉安. "Models and numerical algorithms for re-manufacturing systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B30292931.
Full textLi, Tang, and 李唐. "Markov chain models for re-manufacturing systems and credit risk management." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2008. http://hub.hku.hk/bib/B40203700.
Full text陳立梅 and Lap-mui Ann Chan. "Near optimal lot-sizing policies for multi-stage production/inventory systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1990. http://hub.hku.hk/bib/B31209129.
Full textCong, Yang, and 丛阳. "Optimization models and computational methods for systems biology." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2012. http://hub.hku.hk/bib/B47752841.
Full textpublished_or_final_version
Mathematics
Doctoral
Doctor of Philosophy
Almohri, Hussain. "High Assurance Models for Secure Systems." Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/22030.
Full textComplex attacks on large networks are only possible with the existence of vulnerable intermediate machines, routers, or mobile devices (that we refer to as network components) in the network. Vulnerabilities in highly connected servers and workstations, that compromise the heart of today\'s networks, are inevitable. Also, modern mobile devices with known vulnerabilities cause an increasing risk on large networks. Thus, weak security mechanisms in vulnerable network components open the possibilities for effective network attacks.
On the other hand, lack of systematic methods for an effective static analysis of an overall complex network results in inconsistent and vulnerable configurations at individual network components as well as at the network level. For example, inconsistency and faults in designing firewall rules at a host may result in enabling more attack vector. Further, the dynamic nature of networks with changing network configurations, machine availability and connectivity, make the security analysis a challenging task.
This work presents a hybrid approach to security by providing two solutions for analyzing the overall security of large organizational networks, and a runtime framework for protecting individual network components against misuse of system resources by cyber attackers. We observe that to secure an overall computing environment, a static analysis of a network is not sufficient. Thus, we couple our analysis with a framework to secure individual network components including high performance machines as well as mobile devices that repeatedly enter and leave networks. We also realize the need for advancing the theoretical foundations for analyzing the security of large networks.
To analyze the security of large enterprise network, we present the first scientific attempt to compute an optimized distribution of defensive resources with the objective of minimizing the chances of successful attacks. To achieve this minimization, we develop a rigorous probabilistic model that quantitatively measures the chances of a successful attack on any network component. Our model provides a solid theoretical foundation that enables efficient computation of unknown success probabilities on every stage of a network attack. We design an algorithm that uses the computed attack probabilities for optimizing security configurations of a network. Our optimization algorithm uses state of the art sequential linear programming to approximate the solution to a complex single objective nonlinear minimization problem that formalizes various attack steps and candidate defenses at the granularity of attack stages.
To protect individual network components, we develop a new approach under our novel idea of em process authentication.
We argue that to provide high assurance security, enforcing authorization is necessary but not sufficient. In fact, existing authorization systems lack a strong and reliable process authentication model for preventing the execution of malicious processes (i.e., processes that intentionally contain malicious goals that violate integrity and confidentiality of legitimate processes and data). Authentication is specially critical when malicious processes may use various system vulnerabilities to install on the system and stealthily execute without the user\'s consent.
We design and implement the Application Authentication (A2) framework that is capable of monitoring application executions and ensuring proper authentication of application processes. A2 has the advantage of strong security guarantees, efficient runtime execution, and compatibility with legacy applications. This authentication framework reduces the risk of infection by powerful malicious applications that may disrupt proper execution of legitimate applications, steal users\' private data, and spread across the entire organizational network.
Our process authentication model is extended and applied to the Android platform. As Android imposes its unique challenges (e.g., virtualized application execution model), our design and implementation of process authentication is extended to address these challenges. Per our results, process authentication in Android can protect the system against various critical vulnerabilities such as privilege escalation attacks and drive by downloads.
To demonstrate process authentication in Android, we implement DroidBarrier. As a runtime system, DroidBarrier includes an authentication component and a lightweight permission system to protect legitimate applications and secret authentication information in the file system. Our implementation of DroidBarrier is compatible with the Android runtime (with no need for modifications) and shows efficient performance with negligible penalties in I/O operations and process creations.
Ph. D.
Perry, Stanley Foster. "Distributed Economic Systems with Agents that Learn." PDXScholar, 1992. https://pdxscholar.library.pdx.edu/open_access_etds/1271.
Full textHAMMEL, STEPHEN MARK. "A DISSIPATIVE MAP OF THE PLANE--A MODEL FOR OPTICAL BISTABILITY (DYNAMICAL SYSTEMS)." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/188149.
Full textLuo, Yang. "Stochastic modelling in biological systems." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610145.
Full textGiannessi, Massimo <1982>. "Development of Clinical Decision Support Systems based on Mathematical Models of Physiological Systems." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2010. http://amsdottorato.unibo.it/2655/.
Full text丘杰 and Jie Qiu. "Scheduling flexible manufacturing systems using fuzzy heuristics." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2003. http://hub.hku.hk/bib/B31244671.
Full textAlparslan, Denizhan N. Sohraby Khosrow. "Modeling and analysis of generalized random mobility models for wireless ad hoc networks." Diss., UMK access, 2005.
Find full text"A dissertation in telecommunication networking and computer networking." Advisor: Khosrow Sohraby. Typescript. Vita. Title from "catalog record" of the print edition Description based on contents viewed May 30, 2006. Includes bibliographical references (leaves 119-123). Online version of the print edition.
Doustmohammadi, Ali. "Modeling and analysis of production systems." Diss., Georgia Institute of Technology, 1995. http://hdl.handle.net/1853/15776.
Full textMoi, Adriano. "Mathematical modelling of integrin-like receptors systems." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2016. http://amslaurea.unibo.it/11255/.
Full textBlanding, James Michael. "An analytical study and computer analysis of three-dimensional, steady-state vibration of multishaft geared-rotor systems." Diss., Virginia Polytechnic Institute and State University, 1985. http://hdl.handle.net/10919/54198.
Full textPh. D.
Min, Rui, and 闵瑞. "Channel estimation and data detection of OFDM systems under unknown channel order doppler frequency: from point-to-point to relaying systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2011. http://hub.hku.hk/bib/B47323930.
Full textpublished_or_final_version
Electrical and Electronic Engineering
Master
Master of Philosophy
Coburn, Brian John. "Multi-Species Influenza Models with Recombination." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_dissertations/363.
Full textWan, Frank Lup Ki. "Genetic algorithms, their applications and models in nonlinear systems identification." Thesis, University of British Columbia, 1991. http://hdl.handle.net/2429/30107.
Full textApplied Science, Faculty of
Electrical and Computer Engineering, Department of
Graduate
Hassanli, A. M. "Modelling and optimisation of pressure irrigation systems /." Title page, abstract and contents only, 1996. http://web4.library.adelaide.edu.au/theses/09PH/09phh353.pdf.
Full textZhang, Wenjun. "Waves in mathematical models of intracellular calcium and other excitable systems." Thesis, University of Auckland, 2011. http://hdl.handle.net/2292/14482.
Full textGestrelius, Sara. "Mathematical models for optimising decision support systems in the railway industry." Licentiate thesis, Mälardalens högskola, Inbyggda system, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-27758.
Full textOzcaldiran, Kadri. "Control of descriptor systems." Diss., Georgia Institute of Technology, 1985. http://hdl.handle.net/1853/13531.
Full textNikishkov, Yuri G. "Computational stability analysis of dynamical systems." Diss., Georgia Institute of Technology, 2000. http://hdl.handle.net/1853/12149.
Full textZhao, Ying, and 趙穎. "Optimization of cooperative material handling systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B37837710.
Full textWikström, Gunilla. "Computation of Parameters in some Mathematical Models." Doctoral thesis, Umeå University, Computing Science, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-565.
Full textIn computational science it is common to describe dynamic systems by mathematical models in forms of differential or integral equations. These models may contain parameters that have to be computed for the model to be complete. For the special type of ordinary differential equations studied in this thesis, the resulting parameter estimation problem is a separable nonlinear least squares problem with equality constraints. This problem can be solved by iteration, but due to complicated computations of derivatives and the existence of several local minima, so called short-cut methods may be an alternative. These methods are based on simplified versions of the original problem. An algorithm, called the modified Kaufman algorithm, is proposed and it takes the separability into account. Moreover, different kinds of discretizations and formulations of the optimization problem are discussed as well as the effect of ill-conditioning.
Computation of parameters often includes as a part solution of linear system of equations Ax = b. The corresponding pseudoinverse solution depends on the properties of the matrix A and vector b. The singular value decomposition of A can then be used to construct error propagation matrices and by use of these it is possible to investigate how changes in the input data affect the solution x. Theoretical error bounds based on condition numbers indicate the worst case but the use of experimental error analysis makes it possible to also have information about the effect of a more limited amount of perturbations and in that sense be more realistic. It is shown how the effect of perturbations can be analyzed by a semi-experimental analysis. The analysis combines the theory of the error propagation matrices with an experimental error analysis based on randomly generated perturbations that takes the structure of A into account
El, Didy Sherif Mohamed Ahmed 1951. "Two-dimensional finite element programs for water flow and water quality in multi-aquifer systems." Diss., The University of Arizona, 1986. http://hdl.handle.net/10150/191110.
Full textModarres, Najafabadi Seyed Ali. "Dynamics modelling and analysis of impact in multibody systems." Thesis, McGill University, 2008. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=115886.
Full textFurther, based on the above analysis approach, we introduce a new interpretation of the energetic coefficient of restitution, specially applicable to contact involving multibody systems. This interpretation generalizes the concept of the energetic coefficient of restitution and allows for consideration of simultaneous multiple-point contact scenarios. Moreover, based on the concept of the generalized energetic coefficient of restitution, the contact modes and the post-impact state of planar single-point impact are determined. Further, the problem of simultaneous multiple-point impact is considered, where it is shown that our approach can also be advantageous to characterize the dynamics of interaction in such systems.
The use and applicability of the approach reported are further investigated by conducting an experimental study on a robotic testbed. The open architecture of the testbed allows us to perform various contact experiments, such as single- and multiple-point impact scenarios, with different pre-impact configurations and velocities. The kinematic and dynamic models of the system have been developed and implemented for real-time analysis. It is shown that impact between multibody systems is considerably affected by not only the local dynamics characteristics of the interacting bodies, but also the (global) configuration of the interacting multibody systems. The reported results suggest that the material presented herein offers a useful means to characterize impact in complex systems.
Tai, Hoi-lun Allen, and 戴凱倫. "Quantitative analysis in monitoring and improvement of industrial systems." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2010. http://hub.hku.hk/bib/B4394193X.
Full textChen, Mo. "Data compression for inference tasks in wireless sensor networks." Diss., Online access via UMI:, 2006.
Find full textIncludes bibliographical references.
Clark, O. Grant (Osborne Grant). "Characterization of cyborged ecosystems." Thesis, McGill University, 1999. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=36567.
Full textFirst, in the body of the thesis, a biosystem is defined as a coherent assemblage of entities that is alive to some degree as a whole. The sole criterion for life is considered to be comportment that is somewhat autopoietic , whereby local interactions among the components combine to Continually renew the overall system. Next, concepts related to autonomy, or the formulation and pursuit of proprietary goals, are elaborated. The degree of autonomy of a system is seen to depend on its consciousness, or ability to reason using a model of itself. Hence, a substantially autonomous system requires an ensemble of information storage and processing devices (mind) of the type and sophistication (intelligence ) appropriate for this. The approach that is taken here to the creation of ecocyborgs with such minds is described, and a specific mental architecture is delineated, comprising functionally semidifferentiated, intermediate-scale components arranged according to a semihierarchical control organization. Finally, the characterization of such systems is scrutinized as an epistemic process in which knowledge is generated by an observer, but in which only a limited degree of objectivity is possible. A paradigm appropriate to the engineering of ecocyborgs is defined as an illustration, and associated archetypal concepts and descriptive procedures (such as measures) are given that are useful in this context. Such tools are required by significantly autonomous ecocyborgs because they must characterize themselves. They are also necessary to observers with scientific and engineering agendas.