Зміст
Добірка наукової літератури з теми "6G (téléphonie mobile)"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "6G (téléphonie mobile)".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Дисертації з теми "6G (téléphonie mobile)"
Mohammadi, Alireza. "Cloud Native MANO for Next Generation Mobile Networks." Electronic Thesis or Diss., Sorbonne université, 2023. https://accesdistant.sorbonne-universite.fr/login?url=https://theses-intra.sorbonne-universite.fr/2023SORUS633.pdf.
Повний текст джерелаThis thesis crystallizes significant contributions pivoted around integral concepts such as Consistent DevOps and Declarative Automation to realize the envisioned cloud-native MANO. These principles are applied in the context of multi-x systems, where ‘x’ represents various dimensions such as RAN vendor, OS, and cloud, addressing the level of heterogeneity and diversity in the modern networks. Interpreting multi-x as a cloud-native extension to the Open RAN ecosystem, the thesis is conceived and validated through a concrete proof-of-concept prototype for multi-vendor 5G networks. This addresses the complexities of next generation private and public cloud-native MANO systems by incorporating advanced technologies such as eBPF and recent developments in the cloud-native domain, including Kubernetes
Ferrer, Pierre. "Contribution à l'étude et à la réalisation d'un frontal radiofréquence à base de séquences de Walsh pour le standard 5G et au delà." Electronic Thesis or Diss., Bordeaux, 2024. http://www.theses.fr/2024BORD0442.
Повний текст джерелаMobile telecommunications services require a continuous and exponential increase of their capacities. To meet this demand, transceivers must be highly digital and flexible. A promising solution to achieve this goal is to use Walsh sequences to generate arbitrary waveforms. This is based on the principle of a "software defined radio" transmitter comprising a high-speed, high-resolution DAC. Thus, the studied architecture consists of a very wide band DAC (0 to 6 GHz) very efficient for a direct RF amplification with 5G phase 1 applications as target and a Hilbert Transform based signal shaping for a millimetric frequency upconversion (beyond 20GHz) without resorting to complex filtering techniques with 5G phase 2 or 6G applications as target. The objective of this work is to propose a new transmitter topology that responds to issues such as: massive data conversion (very high throughput), carrier aggregation and dynamic linearization of an RF front end. The candidate will demonstrate the proposed architecture using ST Microelectronics 28nm FDSOI technology. The work will include high level simulations (MatLab), architecture sizing, schematic simulations, mask designs, circuit fabrication, design of a suitable measurement environment and comprehensive measurements
Bounhar, Abdelaziz. "Information theory and reinforcement learning of mixed covert and non-covert wireless networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2024. http://www.theses.fr/2024IPPAT005.
Повний текст джерелаWhile cryptographic methods offer security, they are often impractical for Internet of Things (IoT) devices due to their limited computational resources and battery life. In light of these challenges, physical layer security techniques, particularly covert communication, seems to be an adequate solution for securing IoT communications. Existing research on covert communication has predominantly focused on systems with solely covert users. This thesis addresses this gap and pioneers the characterization of the information-theoretic fundamental limits of communication systems involving both covert and non-covert users, demonstrating how and when non-covert users can enhance covert communication. It also advances previous findings on the single and multi-users setup by characterizing the exact secret-key rate needed to communicate at a given covert data rate.In another line of work, we address the central approach to modern semantic and goal-oriented communication systems. Specifically, we address the joint source-channel coding problem under a covertness constraints, identifying optimal coding schemes that meet the covertness requirement. These theoretical insights are validated through deep learning techniques, showing that covert semantic communication is only guaranteed when the established theoretical constraints are met. Lastly, to further enrich our research, we extend our work to setups that encompass both covert and non-covert users operating using Non-Orthogonal Multiple Access in an Additive White Gaussian Noise channel. By leveraging reinforcement learning techniques, we develop efficient resource allocation policies that effectively optimize performance in these intricate environments, accounting for real-world constraints such as imperfect channel state information and energy limitations
Книги з теми "6G (téléphonie mobile)"
Arslan, Hüseyin, and Ertuğrul Başar. Flexible and Cognitive Radio Access Technologies for 5G and Beyond. Institution of Engineering & Technology, 2020.
Знайти повний текст джерелаFlexible and Cognitive Radio Access Technologies for 5G and Beyond. Institution of Engineering & Technology, 2020.
Знайти повний текст джерела