Rozprawy doktorskie na temat „Wireless computing”

Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Wireless computing.

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Wireless computing”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.

1

Datla, Dinesh. "Wireless Distributed Computing in Cloud Computing Networks". Diss., Virginia Tech, 2013. http://hdl.handle.net/10919/51729.

Pełny tekst źródła
Streszczenie:
The explosion in growth of smart wireless devices has increased the ubiquitous presence of computational resources and location-based data. This new reality of numerous wireless devices capable of collecting, sharing, and processing information, makes possible an avenue for new enhanced applications. Multiple radio nodes with diverse functionalities can form a wireless cloud computing network (WCCN) and collaborate on executing complex applications using wireless distributed computing (WDC). Such a dynamically composed virtual cloud environment can offer services and resources hosted by individual nodes for consumption by user applications. This dissertation proposes an architectural framework for WCCNs and presents the different phases of its development, namely, development of a mathematical system model of WCCNs, simulation analysis of the performance benefits offered by WCCNs, design of decision-making mechanisms in the architecture, and development of a prototype to validate the proposed architecture. The dissertation presents a system model that captures power consumption, energy consumption, and latency experienced by computational and communication activities in a typical WCCN. In addition, it derives a stochastic model of the response time experienced by a user application when executed in a WCCN. Decision-making and resource allocation play a critical role in the proposed architecture. Two adaptive algorithms are presented, namely, a workload allocation algorithm and a task allocation - scheduling algorithm. The proposed algorithms are analyzed for power efficiency, energy efficiency, and improvement in the execution time of user applications that are achieved by workload distribution. Experimental results gathered from a software-defined radio network prototype of the proposed architecture validate the theoretical analysis and show that it is possible to achieve 80 % improvement in execution time with the help of just three nodes in the network.
Ph. D.
Style APA, Harvard, Vancouver, ISO itp.
2

Yang, Zhimin. "Opportunistic Computing in Wireless Networks". The Ohio State University, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=osu1267743144.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
3

Ergüt, Salih. "Context-aware computing for wireless networks". Diss., [La Jolla] : University of California, San Diego, 2010. http://wwwlib.umi.com/cr/ucsd/fullcit?p3402341.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--University of California, San Diego, 2010.
Title from first page of PDF file (viewed May 14, 2010). Available via ProQuest Digital Dissertations. Vita. Includes bibliographical references.
Style APA, Harvard, Vancouver, ISO itp.
4

Chen, Xuetao. "Resource Allocation for Wireless Distributed Computing Networks". Diss., Virginia Tech, 2012. http://hdl.handle.net/10919/77054.

Pełny tekst źródła
Streszczenie:
Wireless distributed computing networks (WDCNs) will become the next frontier of the wireless industry as the performance of wireless platforms is being increased every year and wireless industries are looking for "killer" applications for increased channel capacity. However, WDCNs have several unique problems compared with currently well-investigated methods for wireless sensor networks and wired distributed computing. For example, it is difficult for WDCNs to be power/energy efficient considering the uncertainty and heterogeneity of the wireless environment. In addition, the service model has to take account of the interference-limited feature of wireless channels to reduce the service delay. Our research proposes a two-phase model for WDCNs including the service provision phase and the service access phase according to different traffic patterns and performance requirements. For the service provision phase, we investigate the impact of communication channel conditions on the average execution time of the computing tasks within WDCNs. We then discuses how to increase the robustness and power efficiency for WDCNs subject to the impact of channel variance and spatial heterogeneity. A resource allocation solution for computation oriented WDCNs is then introduced in detail which mitigates the effects of channel variations with a stochastic programming solution. Stochastic geometry and queue theory are combined to analyze the average performance of service response time and to design optimal access strategies during the service access phase. This access model provides a framework to analyze the service access performance and evaluate whether the channel heterogeneity should be considered. Based on this analysis, optimal strategies to access the service nodes can be determined in order to reduce the service response time. In addition, network initialization and synchronization are investigated in order to build a multiple channel WDCN in dynamic spectrum access (DSA) environments. Further, an efficient primary user detection method is proposed to reduce the channel vacation latency for WDCNs in DSA environments. Finally, this dissertation presents the complete design and implementation of a WDCN on COgnitive Radio Network (CORNET). Based on SDR technologies, software dedicated to WDCNs is designed and implemented across the PHY layer, MAC layer, and application layer. System experiments are carried out to demonstrate the performance issues and solutions presented in this dissertation. Wireless distributed computing networks (WDCNs) will become the next frontier of the wireless industry as the performance of wireless platforms is being increased every year and wireless industries are looking for "killer" applications for increased channel capacity. However, WDCNs have several unique problems compared with currently well-investigated methods for wireless sensor networks and wired distributed computing. For example, it is difficult for WDCNs to be power/energy efficient considering the uncertainty and heterogeneity of the wireless environment. In addition, the service model has to take account of the interference-limited feature of wireless channels to reduce the service delay. Our research proposes a two-phase model for WDCNs including the service provision phase and the service access phase according to different traffic patterns and performance requirements. For the service provision phase, we investigate the impact of communication channel conditions on the average execution time of the computing tasks within WDCNs. We then discuses how to increase the robustness and power efficiency for WDCNs subject to the impact of channel variance and spatial heterogeneity. A resource allocation solution for computation oriented WDCNs is then introduced in detail which mitigates the effects of channel variations with a stochastic programming solution. Stochastic geometry and queue theory are combined to analyze the average performance of service response time and to design optimal access strategies during the service access phase. This access model provides a framework to analyze the service access performance and evaluate whether the channel heterogeneity should be considered. Based on this analysis, optimal strategies to access the service nodes can be determined in order to reduce the service response time. In addition, network initialization and synchronization are investigated in order to build a multiple channel WDCN in dynamic spectrum access (DSA) environments. Further, an efficient primary user detection method is proposed to reduce the channel vacation latency for WDCNs in DSA environments. Finally, this dissertation presents the complete design and implementation of a WDCN on COgnitive Radio Network (CORNET). Based on SDR technologies, software dedicated to WDCNs is designed and implemented across the PHY layer, MAC layer, and application layer. System experiments are carried out to demonstrate the performance issues and solutions presented in this dissertation.
Ph. D.
Style APA, Harvard, Vancouver, ISO itp.
5

Karra, Kiran. "Wireless Distributed Computing on the Android Platform". Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/35256.

Pełny tekst źródła
Streszczenie:
The last couple of years have seen an explosive growth in smartphone sales. Additionally, the computational power of modern smartphones has been increasing at a high rate. For example, the popular iPhone 4S has a 1 GHz processor with 512 MB of RAM [5]. Other popular smartphones such as the Samsung Galaxy Nexus S also have similar specications. These smartphones are as powerful as desktop computers of the 2005 era, and the tight integration of many dierent hardware chipsets in these mobile devices makes for a unique mobile platform that can be exploited for capabilities other than traditional uses of a phone, such as talk and text [4]. In this work, the concept using smartphones that run the Android operating system for distributed computing over a wireless mesh network is explored. This is also known as wireless distributed computing (WDC). The complexities of WDC on mobile devices are different from traditional distributed computing because of, among other things, the unreliable wireless communications channel and the limited power available to each computing node. This thesis develops the theoretical foundations for WDC. A mathematical model representing the total amount of resources required to distribute a task with WDC is developed. It is shown that given a task that is distributable, under certain conditions, there exists a theoretical minimum amount of resources that can be used in order to perform a task using WDC. Finally, the WDC architecture is developed, an Android App implementation of the WDC architecture is tested, and it is shown in a practical application that using WDC to perform a task provides a performance increase over processing the job locally on the Android OS.
Master of Science
Style APA, Harvard, Vancouver, ISO itp.
6

Al-Turkistany, Mohammad. "Adaptation framework for wireless thin-client computing". [Gainesville, Fla.] : University of Florida, 2006. http://purl.fcla.edu/fcla/etd/UFE0013423.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
7

Sen, Sanjoy Kumar. "Efficient Algorithms and Framework for Bandwidth Allocation, Quality-of-Service Provisioning and Location Management in Mobile Wireless Computing". Thesis, University of North Texas, 1997. https://digital.library.unt.edu/ark:/67531/metadc278885/.

Pełny tekst źródła
Streszczenie:
The fusion of computers and communications has promised to herald the age of information super-highway over high speed communication networks where the ultimate goal is to enable a multitude of users at any place, access information from anywhere and at any time. This, in a nutshell, is the goal envisioned by the Personal Communication Services (PCS) and Xerox's ubiquitous computing. In view of the remarkable growth of the mobile communication users in the last few years, the radio frequency spectrum allocated by the FCC (Federal Communications Commission) to this service is still very limited and the usable bandwidth is by far much less than the expected demand, particularly in view of the emergence of the next generation wireless multimedia applications like video-on-demand, WWW browsing, traveler information systems etc. Proper management of available spectrum is necessary not only to accommodate these high bandwidth applications, but also to alleviate problems due to sudden explosion of traffic in so called hot cells. In this dissertation, we have developed simple load balancing techniques to cope with the problem of tele-traffic overloads in one or more hot cells in the system. The objective is to ease out the high channel demand in hot cells by borrowing channels from suitable cold cells and by proper assignment (or, re-assignment) of the channels among the users. We also investigate possible ways of improving system capacity by rescheduling bandwidth in case of wireless multimedia traffic. In our proposed scheme, traffic using multiple channels releases one or more channels to increase the carried traffic or throughput in the system. Two orthogonal QoS parameters, called carried traffic and bandwidth degradation, are identified and a cost function describing the total revenue earned by the system from a bandwidth degradation and call admission policy, is formulated. A channel sharing scheme is proposed for co-existing real-time and non-real-time traffic and analyzed using a Markov modulated Poisson process (MMPP) based queueing model. The location management problem in mobile computing deals with the problem of a combined management of location updates and paging in the network, both of which consume scarce network resources like bandwidth, CPU cycles etc. An easily implementable location update scheme is developed which considers per-user mobility pattern on top of the conventional location area based approach and computes an update strategy for each user by minimizing the average location management cost. The cost optimization problem is elegantly solved using a genetic algorithm.
Style APA, Harvard, Vancouver, ISO itp.
8

Jallad, A. H. M. "Distributed computing in space-based wireless sensor networks". Thesis, University of Surrey, 2008. http://epubs.surrey.ac.uk/773025/.

Pełny tekst źródła
Streszczenie:
This thesis investigates the application of distributed computing in general and wireless sensor networks in particular to space applications. Particularly, the thesis addresses issues related to the design of "space-based wireless sensor networks" that consist of ultra-small satellite nodes flying together in close formations. The design space of space-based wireless sensor networks is explored. Consequently, a methodology for designing space-based wireless sensor networks is proposed that is based on a modular architecture. The hardware modules take the form of 3-D Multi-Chip Modules (MCM). The design of hardware modules is demonstrated by designing a representative on-board computer module. The onboard computer module contains an FPGA which includes a system-on-chip architecture that is based on soft components and provides a degree of flexibility at the later stages of the design of the mission.
Style APA, Harvard, Vancouver, ISO itp.
9

Graylin, William W. (William Wang) 1968. "Addressing the complexity of multimedia wireless computing solutions". Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/80624.

Pełny tekst źródła
Streszczenie:
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.
Includes bibliographical references (leaves 98-100).
by William W. Graylin.
S.M.
M.B.A.
Style APA, Harvard, Vancouver, ISO itp.
10

Gagnon, Jason S. "Wireless communication and computing at the construction jobsite". Thesis, Virginia Tech, 1996. http://hdl.handle.net/10919/44825.

Pełny tekst źródła
Streszczenie:

This thesis explores the information flow at a construction site and examines how wireless communication technology can meet these information needs. The construction industry is dynamic. Therefore, traditional methods of communication have limited applicability to a construction jobsite. However, the advances in the wireless communication field are making that form of communication a viable option for the construction jobsite.

The information flow models in some other industries are examined as point of comparison with the construction industry. People in the construction industry can learn what information transmission methods have worked in other industries. Also, much can be learned from other industries that have already embraced wireless technology into their workplace.

An articulation of information needs at a construction jobsite is made. A large refinery that is under construction in Houston, Texas was the primary a source for articulating the information needs at a construction site. A detailed summary of a data reconnaissance visit to this project is included.

A methodology for identifying determining the applicability of different formats of wireless technology for a set of information needs is included. A second methodology for identifying and classifying information needs by a given company is also included. Finally, two examples of how to use these methodologies are presented.


Master of Science
Style APA, Harvard, Vancouver, ISO itp.
11

Erman, Maria. "Applications of Soft Computing Techniques for Wireless Communications". Licentiate thesis, Blekinge Tekniska Högskola, Institutionen för tillämpad signalbehandling, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-17314.

Pełny tekst źródła
Streszczenie:
This thesis presents methods and applications of Fuzzy Logic and Rough Sets in the domain of Telecommunications at both the network and physical layers. Specifically, the use of a new class of functions, the truncated π functions, for classifying IP traffic by matching datagram size histograms is explored. Furthermore, work on adapting the payoff matrix in multiplayer games by using fuzzy entries as opposed to crisp values that are hard to quantify, is presented. Additionally, applications of fuzzy logic in wireless communications are presented, comprised by a comprehensive review of current trends and applications, followed by work directed towards using it in spectrum sensing and power control in cognitive radio networks. This licentiate thesis represents parts of my work in the fields of Fuzzy Systems and Wireless Communications. The work was done in collaboration between the Departments of Applied Signal Processing and Mathematics at Blekinge Institute of Technology.
Style APA, Harvard, Vancouver, ISO itp.
12

Sheng, Bo. "Building efficient wireless infrastructures for pervasive computing environments". W&M ScholarWorks, 2010. https://scholarworks.wm.edu/etd/1539623557.

Pełny tekst źródła
Streszczenie:
Pervasive computing is an emerging concept that thoroughly brings computing devices and the consequent technology into people's daily life and activities. Most of these computing devices are very small, sometimes even "invisible", and often embedded into the objects surrounding people. In addition, these devices usually are not isolated, but networked with each other through wireless channels so that people can easily control and access them. In the architecture of pervasive computing systems, these small and networked computing devices form a wireless infrastructure layer to support various functionalities in the upper application layer.;In practical applications, the wireless infrastructure often plays a role of data provider in a query/reply model, i.e., applications issue a query requesting certain data and the underlying wireless infrastructure is responsible for replying to the query. This dissertation has focused on the most critical issue of efficiency in designing such a wireless infrastructure. In particular, our problem resides in two domains depending on different definitions of efficiency. The first definition is time efficiency, i.e., how quickly a query can be replied. Many applications, especially real-time applications, require prompt response to a query as the consequent operations may be affected by the prior delay. The second definition is energy efficiency which is extremely important for the pervasive computing devices powered by batteries. Above all, our design goal is to reply to a query from applications quickly and with low energy cost.;This dissertation has investigated two representative wireless infrastructures, sensor networks and RFID systems, both of which can serve applications with useful information about the environments. We have comprehensively explored various important and representative problems from both algorithmic and experimental perspectives including efficient network architecture design and efficient protocols for basic queries and complicated data mining queries. The major design challenges of achieving efficiency are the massive amount of data involved in a query and the extremely limited resources and capability each small device possesses. We have proposed novel and efficient solutions with intensive evaluation. Compared to the prior work, this dissertation has identified a few important new problems and the proposed solutions significantly improve the performance in terms of time efficiency and energy efficiency. Our work also provides referrable insights and appropriate methodology to other similar problems in the research community.
Style APA, Harvard, Vancouver, ISO itp.
13

Olson, Chandra. "Jini an investigation in distributed computing /". [Florida] : State University System of Florida, 2001. http://etd.fcla.edu/etd/uf/2001/ank7122/chandra.PDF.

Pełny tekst źródła
Streszczenie:
Thesis (M.E.)--University of Florida, 2001.
Title from first page of PDF file. Document formatted into pages; contains viii, 71 p.; also contains graphics. Vita. Includes bibliographical references (p. 69-70).
Style APA, Harvard, Vancouver, ISO itp.
14

Paraskelidis, Athanasios. "Wireless network segregation utilising modulo in industrial environments". Thesis, University of Portsmouth, 2010. https://researchportal.port.ac.uk/portal/en/theses/wireless-network-segregation-utilising-modulo-in-industrial-environments(ae94690a-560e-4f7b-93d8-130b4873de96).html.

Pełny tekst źródła
Streszczenie:
With the success of wireless technologies in consumer electronics, standard wireless technologies are envisioned for the deployment in industrial environments as well. Industrial applications involving mobile subsystems or just the desire to save cabling make wireless technologies attractive. In industrial environments, timing and reliability are well catered by the current wired technologies. When wireless links are included, reliability and timing requirements are significantly more difficult to meet, due to the common problems that influence them such as interference, multipath and attenuation. Since the introduction of the IEEE 802.11 standard, researchers have moved from the concept of deploying a single channel and proposed the utilisation of multiple channels within a wireless network. This new scheme posed a new problem, the ability to coordinate the various channels and the majority of the proposed works focus on mechanisms that would reduce the adjacent channel interference caused by the use of partially overlapping channels. These mechanisms are mainly algorithms that define rules to the allocation of the channels for the wireless nodes during each transmission. Many of the approached proposed during the last years have two very common disadvantages, they are hard to implement in real life and they do not take full advantage of the available spectrum, because they use only non-overlapping channels. The industries demand for solutions which would not move away from using proprietary hardware and software and any changes required to be made should not limit the availability of support for their networks. This would keep the cost low as it is the main factor that industries decide to replace their wires with radio links. The proposed idea in this thesis borrows the concept of network segregation, firstly introduced for security purposes in wired networks, by dividing a wireless network into smaller independent subnetworks and in collaboration with a channel assignment, the Modulo. Modulo defines a set of rules that nodes should obey to when they transmit data. The utilization of multiple channels under the guidance of Modulo for each subnetwork, proves to improve the performance of an ad-hoc network even in noisy industrial environments with high levels of interference from external sources.
Style APA, Harvard, Vancouver, ISO itp.
15

Gauger, Matthias. "Integration of wireless sensor networks in pervasive computing scenarios". Berlin Logos-Verl, 2010. http://d-nb.info/1002361559/04.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
16

Wang, Ju. "Multimedia communication with cluster computing and wireless wcdma network". [Gainesville, Fla.] : University of Florida, 2003. http://purl.fcla.edu/fcla/etd/UFE0000944.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
17

Benchi, Abdulkader. "Middleware Systems for Opportunistic Computing in Challenged Wireless Networks". Thesis, Lorient, 2015. http://www.theses.fr/2015LORIS372/document.

Pełny tekst źródła
Streszczenie:
Les réseaux mobiles opportunistes (ou OppNets, pour Opportunistic Networks) constituent une solution séduisante pour compléter les réseaux fixes d’infrastructure, voire compenser leur absence dans des zones sinistrées ou défavorisées. Les recherches menées ces dernières années ont principalement visé à permettre les transmissions dans les OppNets, mais ceci ne peut être qu’un premier pas vers une réelle exploitation de tels environnements contraints. L’informatique opportuniste (Opportunistic Computing) dépasse le cadre des seules transmissions, et introduit un nouveau paradigme d’exécution de tâches collaboratives dans de tels environnements. Dans ce domaine qu’est l’informatique opportuniste, la conception, la mise en œuvre et le déploiement d’applications distribuées sont des objectifs majeurs. Une application pour OppNet doit pouvoir fonctionner et assurer un niveau de service satisfaisant, tout en supportant les diverses contraintes propres aux OppNets, telles qu’une connectivité fluctuante, un partitionnement chronique du réseau, de longs délais de transmissions, de fréquents échecs de transmission, et des équipements hétérogènes offrant des ressources limitées. La complexité et le coût du développement d’applications pour OppNets peuvent être réduits de manière significative en utilisant des modèles de programmation appropriés. De tels modèles peuvent être fournis par des systèmes intergiciels capables de supporter de manière transparente les contraintes évoquées plus haut. Le travail rapporté dans ce mémoire a porté sur l’étude des contraintes inhérentes aux OppNets, et sur la proposition de solutions appropriées. Parmi les modèles de programmation usuels, certains ont été identifiés comme pouvant être utilisés dans le cadre des OppNets. Sur la base de ces divers modèles de programmation, des systèmes intergiciels opportunistes ont été mis en oeuvre. Ces systèmes supportent respectivement le modèle de messagerie distribuée (sur la base de files d’attentes et de "topics"), le modèle du tuple-space, et la résolution de consensus. Des implémentations complètes ont été réalisées, et le code source est distribué sous licence GPL (GNU General Public License). Ces systèmes ont été évalués par le biais d’expérimentations menées en conditions réelles et par simulation
Opportunistic networks (OppNets) constitute an appealing solution to complement fixed network infrastructures –or make up for the lack thereof– in challenged areas. Researches in the last few years have mostly addressed the problem of supporting networking in OppNets, yet this can only be a first step towards getting real benefit from these networks. Opportunistic computing goes beyond the concept of opportunistic networking, and provides a new paradigm to enable collaborative computing tasks in such environments. In the realm of opportunistic computing, properly designing, implementing and deploying distributed applications are important tasks. An OppNet-dedicated application must be able to operate and maintain an acceptable level of service while addressing the many problems that can occur in these networks, such as disconnections, partitioning, long transmission delays, transmission failures, resource constraints, frequent changes in topology, and heterogeneous devices. Much of the complexity and cost of building OppNet-dedicated applications can be alleviated by the use of high-level programming models. Such models can be supported by middleware systems capable of transparently addressing all the above-mentioned problems. The work reported in this dissertation focused on providing insight into the fundamental problems posed by OppNets, so as to analyze and solve the problems faced by application developers while dealing with these environments. The research focused on identifying well-known high-level programming models that can be satisfactorily implemented for OppNets, and that can prove useful for application developers. In order to demonstrate the feasibility of application development for OppNets, while assessing the benefits brought about by carefully designed middleware systems, a couple of such systems have been designed, implemented, and evaluated as part of this work. These middleware systems respectively support distributed messaging (through message queues and topics), the tuple-space model, and consensus solving in OppNets. They are supplemented with fully-functional implementations, that can be used in real settings, and that are all distributed under the terms of the GNU General Public License (GPL). Real-life experiments and simulations have been realized so as to evaluate the effectiveness and efficiency of these systems in real conditions
Style APA, Harvard, Vancouver, ISO itp.
18

Kang, Jong Hee. "Location-aware information access through wireless networks /". Thesis, Connect to this title online; UW restricted, 2006. http://hdl.handle.net/1773/6878.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
19

Perrella, Sil A. "The mobile aircraft maintenance office concept from a wide area perspective". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FPerrella.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Norman F. Schneidewind, Douglas E. Brinkley. Includes bibliographical references (p. 101-102). Also available online.
Style APA, Harvard, Vancouver, ISO itp.
20

Li, Yue. "Edge computing-based access network selection for heterogeneous wireless networks". Thesis, Rennes 1, 2017. http://www.theses.fr/2017REN1S042/document.

Pełny tekst źródła
Streszczenie:
Au cours de ces dernières décennies, les réseaux de télécommunications mobiles ont évolué de la 1G à la 4G. La 4G permet la coexistence de différents réseaux d'accès. Ainsi, les utilisateurs ont la capacité de se connecter à un réseau hétérogène, constitué de plusieurs réseaux d'accès. Toutefois, la sélection du réseau approprié n'est pas une tâche facile pour les utilisateurs mobiles puisque les conditions de chaque réseau d'accès changent rapidement. Par ailleurs, en termes d'usage, le streaming vidéo devient le service principal de transfert de données sur les réseaux mobiles, ce qui amène les fournisseurs de contenu et les opérateurs de réseau à coopérer pour garantir la qualité de la diffusion. Dans ce contexte, la thèse propose la conception d'une approche novatrice pour la prise de décision optimale de sélection de réseau et une architecture améliorant les performances des services de streaming adaptatif dans un réseau hétérogène. En premier lieu, nous introduisons un modèle analytique décrivant la procédure de sélection de réseau en ne considérant déjà qu'une seule classe de trafic. Nous concevons ensuite une stratégie de sélection basée sur des fondements de la théorie du contrôle optimal linéaire. Des simulations sous MATLAB sont effectuées pour valider l'efficacité du mécanisme proposé. Sur ce même principe, nous étendons ce modèle avec un modèle analytique général décrivant les procédures de sélection de réseau dans des environnements de réseaux hétérogènes avec de multiples classes de trafic. Le modèle proposé est ensuite utilisé pour dériver un mécanisme adaptatif basé sur la théorie du contrôle, qui permet non seulement d'aider à piloter dynamiquement le trafic vers l'accès réseau le plus approprié mais aussi de bloquer dynamiquement le trafic résiduel lorsque le réseau est congestionné en ajustant les probabilités d'accès optimales. Nous discutons aussi les avantages d'une intégration transparente du mécanisme proposé avec l'ANDSF, solution fonctionnelle normalisée pour la sélection de réseau. Un prototype est également implémenté dans ns-3. En second lieu, nous nous concentrons sur l'amélioration des performances de DASH pour les utilisateurs mobiles dans un environnement de réseau d'accès 4G uniquement. Nous introduisons une nouvelle architecture basée sur l'utilisation de serveurs distribués en périphérie de réseau suivant le standard MEC. Le mécanisme d'adaptation proposé, fonctionnant en tant que service MEC, peut modifier les fichiers de manifeste en temps réel, en réponse à la congestion du réseau et à la demande dynamique de flux de streaming. Ces modifications conduisent ainsi les clients à sélectionner des représentations vidéo de débit / qualité plus appropriées. Nous avons développé une plateforme de test virtualisée pour l'expérimentation de notre proposition. Les résultats ainsi obtenus démontrent ses avantages en terme de QoE comparés aux approches d'adaptation traditionnelles, purement pilotées par les clients, car notre approche améliore non seulement le MOS mais aussi l'équité face à la congestion. Enfin, nous étendons l'architecture proposée basée sur MEC pour supporter le service de streaming adaptatif DASH dans un réseau hétérogène multi-accès afin de maximiser la QoE et l'équité des utilisateurs mobiles. Dans ce scénario, notre mécanisme doit aider les utilisateurs à sélectionner la qualité vidéo et le réseau et nous le formulons comme un problème d'optimisation. Ce problème d'optimisation peut être résolu par l'outil IBM CPLEX, mais cela prend du temps et ne peut être envisagé à grande échelle. Par conséquent, nous introduisons une heuristique pour aborder la solution optimale avec moins de complexité. Ensuite, nous mettons en œuvre une expérimentation sur notre plateforme de tests. Le résultat démontre que, par rapport à l'outil IBM CPLEX, notre algorithme permet d'obtenir des performances similaires sur la QoE globale et l'équité, avec un gain de temps significatif
Telecommunication network has evolved from 1G to 4G in the past decades. One of the typical characteristics of the 4G network is the coexistence of heterogeneous radio access technologies, which offers end-users the capability to connect them and to switch between them with their mobile devices of the new generation. However, selecting the right network is not an easy task for mobile users since access network condition changes rapidly. Moreover, video streaming is becoming the major data service over the mobile network where content providers and network operators should cooperate to guarantee the quality of video delivery. In order to cope with this context, the thesis concerns the design of a novel approach for making an optimal network selection decision and architecture for improving the performance of adaptive streaming in the context of a heterogeneous network. Firstly, we introduce an analytical model (i.e. linear discrete-time system) to describe the network selection procedure considering one traffic class. Then, we consider the design of a selection strategy based on foundations from linear optimal control theory, with the objective to maximize network resource utilization while meeting the constraints of the supported services. Computer simulations with MATLAB are carried out to validate the efficiency of the proposed mechanism. Based on the same principal we extend this model with a general analytical model describing the network selection procedures in heterogeneous network environments with multiple traffic classes. The proposed model was, then, used to derive a scalable mechanism based on control theory, which allows not only to assist in steering dynamically the traffic to the most appropriate network access but also helps in blocking the residual traffic dynamically when the network is congested by adjusting dynamically the access probabilities. We discuss the advantages of a seamless integration with the ANDSF. A prototype is also implemented into ns-3. Simulation results sort out that the proposed scheme prevents the network congestion and demonstrates the effectiveness of the controller design, which can maximize the network resources allocation by converging the network workload to the targeted network occupancy. Thereafter, we focus on enhancing the performance of DASH in a mobile network environment for the users which has one access network. We introduce a novel architecture based on MEC. The proposed adaptation mechanism, running as an MEC service, can modify the manifest files in real time, responding to network congestion and dynamic demand, thus driving clients towards selecting more appropriate quality/bitrate video representations. We have developed a virtualized testbed to run the experiment with our proposed scheme. The simulation results demonstrate its QoE benefits compared to traditional, purely client-driven, bitrate adaptation approaches since our scheme notably improves both on the achieved MOS and on fairness in the face of congestion. Finally, we extend the proposed the MEC-based architecture to support the DASH service in a multi-access heterogeneous network in order to maximize the QoE and fairness of mobile users. In this scenario, our scheme should help users select both video quality and access network and we formulate it as an optimization problem. This optimization problem can be solved by IBM CPLEX tool. However, this tool is time-consuming and not scalable. Therefore, we introduce a heuristic algorithm to make a sub-optimal solution with less complexity. Then we implement a testbed to conduct the experiment and the result demonstrates that our proposed algorithm notably can achieve similar performance on overall achieved QoE and fairness with much more time-saving compared to the IBM CPLEX tool
Style APA, Harvard, Vancouver, ISO itp.
21

Ireland, David John, i n/a. "Realization of Dielectric Embedded Monopole Radiating Structures For Wireless Computing". Griffith University. School of Microelectronic Engineering, 2006. http://www4.gu.edu.au:8080/adt-root/public/adt-QGU20070117.175717.

Pełny tekst źródła
Streszczenie:
With the rapid of growth of wireless connectivity more demand is placed on the need for innovative technologies capable of satisfying increasing user demand and network capacity. Adaptive antennas systems or most commonly known as Smart Antennas are expected to be implemented in the next generation of wireless systems. Their implementation avails in dynamic adaptation to spatial and temporal conditions affecting the quality of communication, while offering tremendous flexibility to wireless providers. However one of the major challenges facing Smart Antenna technology is the inherent complexity of the antenna structure, associated control algorithm and implemented RF components possibly contributing to the delay of commercial interest. This thesis will present various adaptive antenna configurations that utilize an embedded dielectric in order to achieve significant size reduction and mechanical rigidity while maintaining favorable electromagnetic performance. In order to constrict the lateral ground plane dimension, a cylindrical shaped hollow ground skirt was attached to the antenna structures effectively compromising between effective beam forming in the azimuth plane and physical size. The complexity of these antenna structures requires a more contemporary design approach which involved computer modeling using a commercial available Finite Element software package and optimization using a developed generic Genetic Algorithm based optimization program. A dielectric embedded 7-element monopole array antenna featuring switched parasitic elements is presented and optimized for maximum vertically polarized gain in the horizontal plane, producing an antenna structure with a radial length of less then 0.25λ and total height of 0.4&alamba which was shown to radiate a main lobe beamwidth of 80 degrees with an absolute gain of 4.8dBi at 2.45GHz. Further on a dielectric embedded 7-element monopole array antenna featuring parasitic elements terminated with finite set of terminating reactive loads is presented with a radial length of less then 0.25&alambda and total height of 0.4&alambda. The antenna structure and reactive load combination were optimized for maximum horizontal gain producing a principal main lobe with a measured gain of 5.1dBi and beamwidth of 110 degrees at 2.48GHz. Finally it was shown single and dual radiation lobes maybe produced when active monopoles elements are placed eccentric in a circular shaped dielectric material. A circular array of elements embedded in a dielectric material was realized with measured gains of single and dual beam radiation at 2.45GHz was shown to be 5.18dBi and 3.65Bi respectively with corresponding beamwidths of 78.5 degrees and 53 degrees.
Style APA, Harvard, Vancouver, ISO itp.
22

Lee, Gilsoo. "Online Optimization for Edge Computing under Uncertainty in Wireless Networks". Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/97909.

Pełny tekst źródła
Streszczenie:
Edge computing is an emerging technology that can overcome the limitations of centralized cloud computing by enabling distributed, low-latency computation at a network edge. Particularly, in edge computing, some of the cloud's functionalities such as storage, processing, and computing are migrated to end-user devices called edge nodes so as to reduce the round-trip delay needed to reach the cloud data center. Despite the major benefits and practical applications of using edge computing, one must address many technical challenges that include edge network formation, computational task allocation, and radio resource allocation, while considering the uncertainties innate in edge nodes, such as incomplete future information on their wireless channel gains and computing capabilities. The goal of this dissertation is to develop foundational science for the deployment, performance analysis, and low-complexity optimization of edge computing under the aforementioned uncertainties. First, the problems of edge network formation and task distribution are jointly investigated while considering a hybrid edge-cloud architecture under uncertainty on the arrivals of computing tasks. In particular, a novel online framework is proposed to form an edge network, distribute the computational tasks, and update a target competitive ratio defined as the ratio between the latency achieved by the proposed online algorithm and the optimal latency. The results show that the proposed framework achieves the target competitive ratio that is affected by the wireless data rate and computing speeds of edge nodes. Next, a new notion of ephemeral edge computing is proposed in which edge computing must occur under a stringent requirement on the total computing time period available for the computing process. To maximize the number of computed tasks in ephemeral edge networks under the uncertainty on future task arrivals, a novel online framework is proposed to enable a source edge node to offload computing tasks from sensors and allocate them to neighboring edge nodes for distributed task computing, within the limited total time period. Then, edge computing is applied for mobile blockchain and online caching systems, respectively. First, a mobile blockchain framework is designed to use edge devices as mobile miners, and the performance is analyzed in terms of the probability of forking event and energy consumption. Second, an online computational caching framework is designed to minimize the edge network latency. The proposed caching framework enables each edge node to store intermediate computation results (IRs) from previous computations and download IRs from neighboring nodes under uncertainty on future computation. Subsequently, online optimization is extended to investigate other edge networking applications. In particular, the problem of online ON/OFF scheduling of self-powered small cell base stations is studied, in the presence of energy harvesting uncertainty with the goal of minimizing the operational costs that consist of energy consumption and transmission delay of a network. Such a framework can enable the self-powered base stations to be functioned as energy-efficient edge nodes. Also, the problem of radio resource allocation is studied when a base station is assisted by self-powered reconfigurable intelligent surfaces (RIS). To this end, a deep reinforcement learning approach is proposed to jointly optimize the transmit power, phase shifting, and RIS reflector's ON/OFF states under the uncertainties on the downlink wireless channel information and the harvested energy at the RIS. Finally, the online problem of dynamic channel allocation is studied for full-duplex device-to-device (D2D) networks so that D2D users can share their data with a low communication latency when users dynamically arrive on the network. In conclusion, the analytical foundations and frameworks presented in this dissertation will provide key guidelines for effective design of edge computing in wireless networks.
Doctor of Philosophy
Smart cities will rely on an Internet of Things (IoT) system that interconnects cars, drones, sensors, home appliances, and other digital devices. Modern IoT systems are inherently designed to process real-time information such as temperature, humidity, or even car navigational data, at any time and location. A unique challenge in the design of such an IoT is the need to process large volumes of data over a wireless network that consists of heterogeneous IoT devices such as smartphones, vehicles, home access points, robots, and drones. These devices must perform local (on-device or so-called edge) processing of their data without relying on a remote cloud. This vision of a smart city seen as a mobile computing platform gives rise to the emerging concept of edge computing using which smartphones, sensors, vehicles, and drones can exchange and process data locally on their own devices. Edge computing allows overcoming the limitations of centralized cloud computation by enabling distributed, low-latency computation at the network edge. Despite the promising opportunities of edge computing as an enabler for smart city services such as autonomous vehicles, drones, or smart homes, one must address many challenges related to managing time-varying resources such as energy and storage, in a dynamic way. For instance, managing communication, energy, and computing resources in an IoT requires handling many uncertain factors such as the intermittent availability of wireless connectivity and the fact that the devices do not know a priori what type of tasks they need to process. The goal of this dissertation is to address the fundamental challenges in edge computing under uncertainty in an IoT. In particular, this dissertation introduces novel mathematical algorithms and frameworks that exploit ideas from the fields of online optimization, machine learning, and wireless communication to enable future IoT services such as smart factories, virtual reality, and autonomous systems. In this dissertation, holistic frameworks are developed by designing, analyzing, and optimizing wireless communications systems with an emphasize on emerging IoT applications. To this end, various mathematical frameworks and efficient algorithms are proposed by drawing on tools from wireless communications, online optimization, and machine learning to yield key innovations. The results show that the developed solutions can enable an IoT to operate efficiently in presence of uncertainty stemming from time-varying dynamics such as mobility of vehicles or changes in the wireless networking environment. As such, the outcomes of this research can be used as a building block for the large deployment of smart city technologies that heavily rely on the IoT.
Style APA, Harvard, Vancouver, ISO itp.
23

Jayaram, Rajeev 1971. "Quality-of-Service Provisioning and Resource Reservation Mechanisms for Mobile Wireless Networks". Thesis, University of North Texas, 1998. https://digital.library.unt.edu/ark:/67531/metadc278542/.

Pełny tekst źródła
Streszczenie:
In this thesis, a framework for Quality of Service provisioning in next generation wireless access networks is proposed. The framework aims at providing a differentiated service treatment to real-time (delay-sensitive) and non-real-time (delay-tolerant) multimedia traffic flows at the link layer. Novel techniques such as bandwidth compaction, channel reservation, and channel degradation are proposed. Using these techniques, we develop a call admission control algorithm and a call control block as part of the QoS framework. The performance of the framework is captured through analytical modeling and simulation experiments. By analytical modeling, the average carried traffic and the worst case buffer requirements for real-time and non-real-time calls are estimated. Simulation results show a 21% improvement in call admission probability of real-time calls, and a 17% improvement for non-real-time calls, when bandwidth compaction is employed. The channel reservation technique shows a 12% improvement in call admission probability in comparison with another proposed scheme in the literature.
Style APA, Harvard, Vancouver, ISO itp.
24

Yeung, Kai-ho Mark, i 楊啟豪. "On channel adaptive wireless cache invalidation and game theoretic power a ware wireless data access". Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2004. http://hub.hku.hk/bib/B29797974.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
25

Banitsas, Konstantinos A. "MedLAN : compact mobile computing system for wireless information access in emergency hospital wards". Thesis, Brunel University, 2004. http://bura.brunel.ac.uk/handle/2438/1228.

Pełny tekst źródła
Streszczenie:
As the need for faster, safer and more efficient healthcare delivery increases, medical consultants seek new ways of implementing a high quality telemedical system, using innovative technology. Until today, teleconsultation (the most common application of Telemedicine) was performed by transferring the patient from the Accidents and Emergency ward, to a specially equipped room, or by moving large and heavy machinery to the place where the patient resided. Both these solutions were unpractical, uneconomical and potentially dangerous. At the same time wireless networks became increasingly useful in point-of-care areas such as hospitals, because of their ease of use, low cost of installation and increased flexibility. This thesis presents an integrated system called MedLAN dedicated for use inside the A&E hospital wards. Its purpose is to wirelessly support high-quality live video, audio, high-resolution still images and networks support from anywhere there is WLAN coverage. It is capable of transmitting all of the above to a consultant residing either inside or outside the hospital, or even to an external place, thorough the use of the Internet. To implement that, it makes use of the existing IEEE 802.11b wireless technology. Initially, this thesis demonstrates that for specific scenarios (such as when using WLANs), DICOM specifications should be adjusted to accommodate for the reduced WLAN bandwidth. Near lossless compression has been used to send still images through the WLANs and the results have been evaluated by a number of consultants to decide whether they retain their diagnostic value. The thesis further suggests improvements on the existing 802.11b protocol. In particular, as the typical hospital environment suffers from heavy RF reflections, it suggests that an alternative method of modulation (OFDM) can be embedded in the 802.11b hardware to reduce the multipath effect, increase the throughput and thus the video quality sent by the MedLAN system. Finally, realising that the trust between a patient and a doctor is fundamental this thesis proposes a series of simple actions aiming at securing the MedLAN system. Additionally, a concrete security system is suggested, that encapsulates the existing WEP security protocol, over IPSec.
Style APA, Harvard, Vancouver, ISO itp.
26

Gustafsson, Anders, Mattias Wramsmyr i Mikaela Claesson. "Mobile Financial Services : Opportunities in Electronic Banking from Wireless Computing Technology". Thesis, Jönköping University, Jönköping International Business School, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-221.

Pełny tekst źródła
Streszczenie:

Bankindustrin är ett typiskt exempel på en industri som har tjänat otroligt mycket på information- och kommunikationsteknologiapplikationer. Dessa applikationer tar formen av Internet-baserad banktjänst, som inkluderar transaktioner av värdepapper, kontouppgifter, presentation av räkningar och betalningar samt transfereringar mellan konton och individer.

Mobila banktjänster är den naturliga förlängningen av dessa typer av tjänster. Med utvecklingen av digitala trådlösa teknologier, som mobiltelefonen, är mobil Internettillgänglighet nu förverkligad.

Denna uppsats undersöker den förändrande miljön i finansindustrin som uppkommit till följd av informationteknologier, och vidare de strategiska affärsmässiga överväganden som måste göras inom detta område.

En kvalitativ fallstudie ansågs vara den mest givande metoden att använda i vår forskning. Genom att undersöka marknade, genom att skicka ut en väl strukturerad enkät till tre av de största svenska bankerna (Nordea, SEB och Handelsbanken), med relevanta intervjufrågor angående deras involvering i mobila banktjänster, kunde deras potential avgöras. Intervjuerna utfördes sedan via telefon.

Vi drar slutsatsen att för att bli konkurrenskraftig i dagens värld av avancerade teknologier, är det avgörande att finansiella instutitioner positionerar sig genom att använda sig av sådana applikationer. Banker har de nödvändiga kapitaltillgångarna som krävs för att göra betydande investeringar i teknologisk infrastruktur. Om de inte hade anpassat sig till teknologier som bankomater, kreditkort, telefoner och Internet, skulle de lätt ha kunnat exkluderas från marknaden. Det är troligt att mobila banktjänster kommer att ha samma inverkan.


The banking industry is a typical example of an industry that has benefited tremendously from applications of information and communication technologies. These applications take their form in Internet-based banking, including transactions for equities trading, account enquiry, bill presentment and payments as well as transfers between accounts and people.

Mobile banking is the natural extension of these kinds of services. With the development of digital wireless technologies, such as the mobile phone, mobile Internet access is now enabled.

This thesis examines the changing landscape of the financial industry due to information technologies and the strategic considerations of mobile banking from a business perspective.

For us a single case study with a qualitative approach has been seen as the most rewarding method to apply in our research. By investigating the market, through sending out a well-structured survey to three of the major Swedish banks (Nordea, SEB and Handelsbanken), with relevant interview questions on their involvement in m-banking, their potential could be distinguished. The interviews were then conducted over the phone.

We conclude that in order to achieve a competitive edge in today’s world of advanced technologies, it is crucial that financial institutions position themselves in deploying these applications. Banks have the necessary capital assets in order to make significant invest-ments in technology infrastructure. Without having adapted themselves to technologies such as ATMs, credit cards, phones and the Internet, they would easily have been excluded from the market. It is likely that mobile banking will have the same impact.

Style APA, Harvard, Vancouver, ISO itp.
27

Ball, Raymond T. Jr. "Wireless cloud computing on Guided Missile Destroyers: a business case analysis". Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34622.

Pełny tekst źródła
Streszczenie:
Approved for public release; distribution is unlimited
This is a Business Case Analysis of the cost and benefits of implementing a Wireless Cloud Computing Network (WCCN) onboard Guided Missile Destroyers (DDGs) utilizing tablet computers. It compares the life cycle costs of WCCNs utilizing tablet computers over a mixed network of thin clients and desktop computers. Currently, the Consolidated Afloat Networks and Enterprise Services (CANES) program will install both thin clients and desktops on board new and old DDGs to implement the unclassified portion of its network. The main cost benefits of tablets will be realized through energy savings and an increase in productivity. The net present value of tablets is expected to be considerably better than the current CANES configuration with the initial investment required for tablets breaking-even in five years if each sailor saves 22 seconds a day by having a tablet. Alternatively, the tablet configuration also breaks even in less than 6 years just considering operational costs alone. Sensitivity analysis on the cost of deferent types of tablet devices and the range of different productivity gains shows very limited downside from investing in tablets compared to considerable upside (depending on the productivity gains achieved in practice).
Style APA, Harvard, Vancouver, ISO itp.
28

Bera, Soumava. "Design and Implementation of a MAC protocol for Wireless Distributed Computing". Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/33678.

Pełny tekst źródła
Streszczenie:
The idea of wireless distributed computing (WDC) is rapidly gaining recognition owing to its promising potential in military, public safety and commercial applications. This concept basically entails distributing a computationally intensive task that one radio device is assigned, among its neighboring peer radio devices. The added processing power of multiple radios can be harnessed to significantly reduce the time consumed in obtaining the results of the original complex task. Since the idea of wireless distributed computing depends on a radio device forming a network with its peers, it is imperative and necessary to have a medium access control (MAC) protocol for such networks which is capable of scheduling channel access by multiple radios in the network, ensuring reliable data transfer, incorporating rate adaptation as well as handling link failures. The thesis presented here elaborates the design and implementation of such a MAC protocol for WDC employed in a practical network of radio devices configurable through software. It also brings to light the design and implementation constraints and challenges faced in this endeavor and puts forward viable solutions.
Master of Science
Style APA, Harvard, Vancouver, ISO itp.
29

Huang, Raymond. "A comparative study of mobile internet deployment models in New Zealand a thesis submitted to Auckland University of Technology in partial fulfillment of the requirements for the degree of Master of Computer and Information Sciences (MCIS), June 2007". Click here to access this resource online, 2007. http://repositoryaut.lconz.ac.nz/theses/1362/.

Pełny tekst źródła
Streszczenie:
Thesis (MCIS - Computer and Information Sciences) -- AUT University, 2007.
Primary supervisor: Krassie Petrova. Includes bibliographical references. Also held in print (185 leaves : ill. ; 30 cm.) in City Campus Theses Collection (T 004.6 HUA)
Style APA, Harvard, Vancouver, ISO itp.
30

Long, Men Wu Chwan-Hwa. "Roaming authentication and end-to-end authentication in wireless security". Auburn, Ala., 2005. http://repo.lib.auburn.edu/2005%20Summer/doctoral/LONG_MEN_56.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
31

Zaripov, Behruz. "Analysis of Fog Networking Procedures in Heterogeneous Wireless Networks". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017.

Znajdź pełny tekst źródła
Streszczenie:
The purpose of this study is to provide a general framework of the latest trends of mobile network architectures. The two main architectures treated in this work are Cloud-RAN and Fog-RAN. We give descriptions of both architectures, then show advantages and disadvantages of them. We mainly focus on the performance of Fog-RAN model taking into account only computation and communication latencies. In order to analyse our Fog-RAN architecture, we measure the impact of traffic produced in our network, by using 3 different policies: Random Policy, Maximum Available Capacity Policy and Nearest Node Policy. Furthermore, we measure the impact of delay by fixing the amount of traffic generated by the network. Numerical results of our considered scenarios show that the maximum available capacity policy outperforms two other polices, when the traffic produced in the network is very high. When the traffic is very low, the best policy is the nearest node one. On the other hand, by fixing the amount of traffic we show that when the delay threshold is from 1-3 ms the Maximum capacity policy performs better than two other policies. When the delay threshold is greater than 5 ms the Nearest Node policy shows better results.
Style APA, Harvard, Vancouver, ISO itp.
32

Song, Lanlan Wang Yu. "An indoor wireless LAN location determination system". Auburn, Ala., 2005. http://hdl.handle.net/10415/1265.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
33

Joshi, Parag P. "Performance characterization and reconfiguration of wireless sensor networks". Birmingham, Ala. : University of Alabama at Birmingham, 2007. https://www.mhsl.uab.edu/dt/2008r/joshi.pdf.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--University of Alabama at Birmingham, 2007.
Additional advisors: Dale W. Callahan, Gary J. Grimes, Ian K. Knowles, B. Earl Wells. Description based on contents viewed Feb. 13, 2009; title from PDF t.p. Includes bibliographical references (p. 139-143).
Style APA, Harvard, Vancouver, ISO itp.
34

Samii, Etienne. "Usability design for location based mobile services in wireless metropolitan networks". Hamburg Diplomica-Verl, 2006. http://d-nb.info/987370928/04.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
35

Hansen, Jarle. "An investigation of smartphone applications : exploring usability aspects related to wireless personal area networks, context-awareness, and remote information access". Thesis, Brunel University, 2012. http://bura.brunel.ac.uk/handle/2438/6518.

Pełny tekst źródła
Streszczenie:
In this thesis we look into usability in the context of smartphone applications. We selected three research areas to investigate, namely Wireless Personal Area Networks, Context-awareness, and Remote Information Access. These areas are investigated through a series of experiments, which focuses on important aspects of usability within software applications. Additionally, we mainly use smartphone devices in the experiments. In experiment 1, Multi-Platform Bluetooth Remote Control, we investigated Wireless Personal Area Networks. Specifically, we implemented a system consisting of two clients, which were created for Java ME and Windows Mobile, and integrated with a server application installed on a Bluetooth-enabled laptop. For experiments 2 and 3, Context-aware Meeting Room and PainDroid: an Android Application for Pain Management, we looked closely at the research area of Contextawareness. The Context-aware Meeting Room was created to automatically send meeting participants useful meeting notes during presentations. In experiment 3, we investigated the use of on-device sensors for the Android platform, providing an additional input mechanism for a pain management application, where the accelerometer and magnetometer were used. Finally, the last research area we investigated was Remote Information Access, where we conducted experiment 4, Customised Android Home Screen. We created a system that integrated both a cloud-based server application and a mobile client running on the Android platform. We used the cloud-computing platform to provide context management features, such as the ability to store the user configuration that was automatically pushed to the mobile devices.
Style APA, Harvard, Vancouver, ISO itp.
36

Liu, Huanjin. "Free roaming: A system for ubiquitous computing". CSUSB ScholarWorks, 2006. https://scholarworks.lib.csusb.edu/etd-project/3062.

Pełny tekst źródła
Streszczenie:
Based on the Umbilical Cord system, this project enriches the Ubiquitous Computing system with a Free Roaming system. This Free Roaming consists of a distributed authentication system, a data caching system and a communication system between them. It allows user to roam within this system and access his data everywhere. Together with the Umbilical Cord system, a Ubiquitous Computing system is functionally completed as a prototype, and is ready to be deployed into the Internet.
Style APA, Harvard, Vancouver, ISO itp.
37

Zhang, Fan. "Power-aware scheduling in computing and communications with QoS requirements /". View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?COMP%202005%20ZHANGF.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
38

Coons, Samuel W. "Virtual thin client a scalable service discovery approach for pervasive computing /". [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/anp4316.

Pełny tekst źródła
Streszczenie:
Thesis (M.E.)--University of Florida, 2001.
Title from first page of PDF file. Document formatted into pages; contains xi, 68 p.; also contains graphics. Vita. Includes bibliographical references (p. 66-67).
Style APA, Harvard, Vancouver, ISO itp.
39

Tran-Thi-Thuy, Trang. "Secure data aggregation for wireless sensor network". Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10912.

Pełny tekst źródła
Streszczenie:
Like conventional networks, security is also a big concern in wireless sensor networks. However, security in this type of networks faces not only typical but also new challenges. Constrained devices, changing topology or susceptibility to unprecedented security threats such as node capture and node compromise has refrained developers from applying conventional security solutions into wireless sensor networks. Hence, developing security solutions for wireless sensor networks not only requires well security analysis but also offers a low power and processing consuming.In this thesis, we implemented security solution targeting IRIS sensor motes. In our implementation, a public key-based key exchange is used to establish shared secret keys between sensor nodes. These secret keys are used to provide authenticity, integrity and freshness for transmission data. Our implementation ensures the flexibility in integrating our solution with available TinyOS operating system. Additionally, the thesis work also focuses on evaluating the performance in wireless sensor networks both in memory and energy consuming.
Style APA, Harvard, Vancouver, ISO itp.
40

Zheng, Baihua. "Indexing of location-dependent data in mobile computing environments /". View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?COMP%202003%20ZHENG.

Pełny tekst źródła
Streszczenie:
Thesis (Ph. D.)--Hong Kong University of Science and Technology, 2003.
Vita. Includes bibliographical references (leaves 168-180). Also available in electronic version. Access restricted to campus users.
Style APA, Harvard, Vancouver, ISO itp.
41

Al-Qerem, Ahmad H. "Performance analysis of mixtures of fixed and mobile transactions over wireless computing environments". Thesis, Loughborough University, 2008. https://dspace.lboro.ac.uk/2134/36048.

Pełny tekst źródła
Streszczenie:
As technological advances are made in software and hardware, the feasibility of accessing information "any time, anywhere" is becoming a reality. In a mobile computing environment, a potentially large number of mobile and fixed users may simultaneously access shared data; therefore, there is a need to provide a means to allow concurrent management of transactions. Specific characteristics of mobile environments make traditional transaction management techniques no longer appropriate. This is due to a fact that the ACID properties of transactions are not simply followed, in particular the atomicity property. Thus, transaction management models adopting weaker forms of atomicity are needed. In the first part of this thesis, a performance evaluation of three common execution strategies for mobile transactions, the mobile host strategy (MHS), the fixed host strategy (FHS), and the combined host strategy (CHS), is conducted.
Style APA, Harvard, Vancouver, ISO itp.
42

Liu, Linqian. "A Parallel and Distributed Computing Platform for Neural Networks Using Wireless Sensor Networks". University of Toledo / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1336159164.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
43

Lin, Chit-Kwan. "Coding-Based System Primitives for Airborne Cloud Computing". Thesis, Harvard University, 2011. http://dissertations.umi.com/gsas.harvard:10012.

Pełny tekst źródła
Streszczenie:
The recent proliferation of sensors in inhospitable environments such as disaster or battle zones has not been matched by in situ data processing capabilities due to a lack of computing infrastructure in the field. We envision a solution based on small, low-altitude unmanned aerial vehicles (UAVs) that can deploy elastically-scalable computing infrastructure anywhere, at any time. This airborne compute cloud—essentially, micro-data centers hosted on UAVs—would communicate with terrestrial assets over a bandwidth-constrained wireless network with variable, unpredictable link qualities. Achieving high performance over this ground-to-air mobile radio channel thus requires making full and efficient use of every single transmission opportunity. To this end, this dissertation presents two system primitives that improve throughput and reduce network overhead by using recent distributed coding methods to exploit natural properties of the airborne environment (i.e., antenna beam diversity and anomaly sparsity). We first built and deployed an UAV wireless networking testbed and used it to characterize the ground-to-UAV wireless channel. Our flight experiments revealed that antenna beam diversity from using multiple SISO radios boosts reception range and aggregate throughput. This observation led us to develop our first primitive: ground-to-UAV bulk data transport. We designed and implemented FlowCode, a reliable link layer for uplink data transport that uses network coding to harness antenna beam diversity gains. Via flight experiments, we show that FlowCode can boost reception range and TCP throughput as much as 4.5-fold. Our second primitive permits low-overhead cloud status monitoring. We designed CloudSense, a network switch that compresses cloud status streams in-network via compressive sensing. CloudSense is particularly useful for anomaly detection tasks requiring global relative comparisons (e.g., MapReduce straggler detection) and can achieve up to 16.3-fold compression as well as early detection of the worst anomalies. Our efforts have also shed light on the close relationship between network coding and compressive sensing. Thus, we offer FlowCode and CloudSense not only as first steps toward the airborne compute cloud, but also as exemplars of two classes of applications—approximation intolerant and tolerant—to which network coding and compressive sensing should be judiciously and selectively applied.
Engineering and Applied Sciences
Style APA, Harvard, Vancouver, ISO itp.
44

Wacker, Arno Rüdiger. "Key distribution schemes for resource constrained devices in wireless sensor networks". [S.l. : s.n.], 2007. http://nbn-resolving.de/urn:nbn:de:bsz:93-opus-34332.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
45

Mendoza, Hermie P. "Distributed Localization for Wireless Distributed Networks in Indoor Environments". Thesis, Virginia Tech, 2011. http://hdl.handle.net/10919/33805.

Pełny tekst źródła
Streszczenie:
Positioning systems enable location-awareness for mobile devices, computers, and even tactical radios. From the collected location information, location-based services can be realized. One type of positioning system is based on location fingerprints. Unlike the conventional positioning techniques of time of or time delay of arrival (TOA/TDOA) or even angle of arrival (AOA), fingerprinting associates unique characteristics such as received signal strength (RSS) that differentiates a location from another location. The location-dependent characteristics then can be used to infer a userâ s location. Furthermore, fingerprinting requires no specialized hardware because of its reliance on an existing communications infrastructure. In estimating a userâ s position, fingerprint-based positioning systems are centrally calculated on a mobile computer using either a Euclidean distance algorithm, Bayesian statistics, or neural networks. With large service areas and, subsequently, large radio maps, one mobile computer may not have the adequate resources to locally compute a userâ s position. Wireless distributed computing provides a means for the mobile computer to meet the location-based service requirements and increase its network lifetime. This thesis develops distributed localization algorithms to be used in an indoor fingerprint-based positioning system. Fingerprint calculations are not computed on a single device, but rather on a wireless distributed computing network on Virginia Techâ s Cognitive Radio Network Testbed (CORNET).
Master of Science
Style APA, Harvard, Vancouver, ISO itp.
46

Nordstedt, David Roger. "MicroJini a service discovery and delivery infrastructure for pervasive computing /". [Gainesville, Fla.] : University of Florida, 2001. http://purl.fcla.edu/fcla/etd/UFE0000338.

Pełny tekst źródła
Streszczenie:
Thesis (M.E.)--University of Florida, 2001.
Title from title page of source document. Document formatted into pages; contains xi, 76 p.; also contains graphics. Includes vita. Includes bibliographical references.
Style APA, Harvard, Vancouver, ISO itp.
47

Soto, Garcia Victor. "Mobility-Oriented Data Retrieval for Computation Offloading in Vehicular Edge Computing". Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/38836.

Pełny tekst źródła
Streszczenie:
Vehicular edge computing (VEC) brings the cloud paradigm to the edge of the network, allowing nodes such as Roadside Units (RSUs) and On-Board Units (OBUs) in vehicles to perform services with location awareness and low delay requirements. Furthermore, it alleviates the bandwidth congestion caused by the large amount of data requests in the network. One of the major components of VEC, computation offloading, has gained increasing attention with the emergence of mobile and vehicular applications with high-computing and low-latency demands, such as Intelligent Transportation Systems and IoT-based applications. However, existing challenges need to be addressed for vehicles' resources to be used in an efficient manner. The primary challenge consists of the mobility of the vehicles, followed by intermittent or lack of connectivity. Therefore, the MPR (Mobility Prediction Retrieval) data retrieval protocol proposed in this work allows VEC to efficiently retrieve the output processed data of the offloaded application by using both vehicles and road side units as communication nodes. The developed protocol uses geo-location information of the network infrastructure and the users to accomplish an efficient data retrieval in a Vehicular Edge Computing environment. Moreover, the proposed MPR Protocol relies on both Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communication to achieve a reliable retrieval of data, giving it a higher retrieval rate than methods that use V2I or V2V only. Finally, the experiments performed show the proposed protocol to achieve a more reliable data retrieval with lower communication delay when compared to related techniques.
Style APA, Harvard, Vancouver, ISO itp.
48

Karlsson, Johanna. "Nomadic Computing : Security assessment of remote access to workplace systems". Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-4845.

Pełny tekst źródła
Streszczenie:
Nomadic computing is about communication on an anytime anywhere basis. Security in this area is today not high enough and at the same time nomadic computing is increasing. In this thesis, security in the area of nomadic computing and remote access to company systems is assessed. The purpose is to investigate the security in this area today but also in the future in order to answer the main question of how and when secure nomadic computing can be offered. For this purpose a futuristic scenario has been used as a method to identify challenges within nomadic computing. After looking at the state of the art of wireless communication and security techniques, evaluating the focused techniques and looking at future trends, some preliminary conclusions could be made. A model of technology uptake has been used. The main concept of the model is to show that the uptake is depending on a co-evolution between different parts and not only the technique. One conclusion is therefore that the users must have confidence in the technique, but also in the organisation and the organisational use of the technique or else they will not use it. Security is important in order to create this trust and is thus of decisive importance to the technology uptake. Another conclusion is that the three focused techniques; rule-based access, authentication and policy/contract can be used today, but also in the future to increase the security for remote access. Finally, education and user awareness seems to be important in the future, even though the users interact less in the security management.
Style APA, Harvard, Vancouver, ISO itp.
49

Quintela, Daniel H. "Pervasive sensing and computing for natural disaster mitigation". [Tampa, Fla.] : University of South Florida, 2005. http://purl.fcla.edu/fcla/etd/SFE0001160.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
50

Walkty, Scott D. "A new architecture to support efficient web browsing in a wireless mobile computing environment". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape3/PQDD_0018/MQ53238.pdf.

Pełny tekst źródła
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!

Do bibliografii