Digitala Vetenskapliga Arkivet

Change search
Refine search result
1234567 1 - 50 of 6474
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 1.
    A. Mouris, Boules
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering.
    Ghauch, Hadi
    Department of COMELEC, Institut Mines-Telecom, Telecom-ParisTech, Paris, 91120, France.
    Thobaben, Ragnar
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering.
    Jonsson, B. Lars G.
    KTH, School of Electrical Engineering and Computer Science (EECS), Electrical Engineering, Electromagnetic Engineering.
    Multi-tone Signal Optimization for Wireless Power Transfer in the Presence of Wireless Communication Links2020In: IEEE Transactions on Wireless Communications, ISSN 1536-1276, E-ISSN 1558-2248, Vol. 19, no 5, p. 3575-3590Article in journal (Refereed)
    Abstract [en]

    In this paper, we study optimization of multi-tone signals for wireless power transfer (WPT) systems. We investigate different non-linear energy harvesting models. Two of them are adopted to optimize the multi-tone signal according to the channel state information available at the transmitter. We show that a second-order polynomial curve-fitting model can be utilized to optimize the multi-tone signal for any RF energy harvester design. We consider both single-antenna and multi-antenna WPT systems. In-band co-existing communication links are also considered in this work by imposing a constraint on the received power at the nearby information receiver to prevent its RF front end from saturation. We emphasize the importance of imposing such constraint by explaining how inter-modulation products, due to saturation, can cause high interference at the information receiver in the case of multi-tone signals. The multi-tone optimization problem is formulated as a non-convex linearly constrained quadratic program. Two globally optimal solution approaches using mixed-integer linear programming and finite branch-and-bound techniques are proposed to solve the problem. The achieved improvement resulting from applying both solution methods to the multi-tone optimization problem is highlighted through simulations and comparisons with other solutions existing in the literature.

  • 2.
    A. Mouris, Boules
    et al.
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering.
    Kolitsidas, Christos
    Ericsson, Systems and Technology-HW Research, Kista, 164 80, Sweden.
    Thobaben, Ragnar
    KTH, School of Electrical Engineering and Computer Science (EECS), Intelligent systems, Information Science and Engineering.
    A Dual-Polarized Multi-Antenna Structure for Simultaneous Transmission of Wireless Information and Power2019In: 2019 IEEE International Symposium on Antennas and Propagation and USNC-URSI Radio Science Meeting, APSURSI 2019 - Proceedings, IEEE, 2019, p. 1805-1806, article id 8889079Conference paper (Refereed)
    Abstract [en]

    In this paper, a dual-polarized multi-antenna structure is designed at 2.45 GHz with the goal of allowing simultaneous transmission of wireless information and power. Differential feeding was used to minimize the mutual coupling due to radiation leakage in addition to a mushroom-type EBG structure for suppressing the surface waves. Simulation results for the proposed structure show a mutual coupling level lower than -40 dB between the information transmitting antenna and the power transmitting antennas for both polarizations. The isolation level between the antennas is improved by at least 22 dB and 14 dB for the E-plane and H-plane coupling, respectively.

  • 3.
    A. Sani, Negar
    Linköping University, Department of Science and Technology, Physics and Electronics.
    M-PSK and M-QAM Modulation/Demodulation of UWB Signal Using Six-Port Correlator2010Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Nowadays high speed and high data rate communication are highly demanded. Consequently, wideband and high frequency transmitter and receivers should be designed. New transmitters and receivers should also have low power consumption, simple design and low manufacturing price in order to fulfill manufacturers’ requests for mass production. Having all above specifications, six-port correlator is a proper choice to be used as modulator and demodulator in transmitters and receivers.

    In this thesis the six-port correlator is introduced, modeled and simulated using Advanced Design System (ADS) software. A simple six-port transmitter/receiver system with a line of sight link is modeled and analyzed in BER, path length and noise terms. The modulation in this system is QAM, frequency is 7.5 GHz and symbol rate is 500 Msymbol/s.

    Furthermore two methods are proposed for high frequency and high symbol rate M-PSK and M-QAM modulation using six-port correlator. The 7.5 GHz modulators are modeled and simulated in ADS. Data streams generated by pseudo random bit generator with 1 GHz bandwidth are applied to modulators. Common source field effect transistors (FETs) with zero bias are used as controllable impedance termination to apply baseband data to modulator. Both modulators show good performance in M-PSK and M-QAM modulation.

    Download full text (pdf)
    FULLTEXT01
  • 4. Abadal, Sergi
    et al.
    Alarcon, Eduard
    Cabellos-Aparicio, Albert
    Lemme, Max C.
    KTH, School of Information and Communication Technology (ICT), Integrated Devices and Circuits.
    Nemirovsky, Mario
    Graphene-Enabled Wireless Communication for Massive Multicore Architectures2013In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 51, no 11, p. 137-143Article in journal (Refereed)
    Abstract [en]

    Current trends in microprocessor architecture design are leading towards a dramatic increase of core-level parallelization, wherein a given number of independent processors or cores are interconnected. Since the main bottleneck is foreseen to migrate from computation to communication, efficient and scalable means of inter-core communication are crucial for guaranteeing steady performance improvements in many-core processors. As the number of cores grows, it remains unclear whether initial proposals, such as the Network-on-Chip (NoC) paradigm, will meet the stringent requirements of this scenario. This position paper presents a new research area where massive multicore architectures have wireless communication capabilities at the core level. This goal is feasible by using graphene-based planar antennas, which can radiate signals at the Terahertz band while utilizing lower chip area than its metallic counterparts. To the best of our knowledge, this is the first work that discusses the utilization of graphene-enabled wireless communication for massive multicore processors. Such wireless systems enable broadcasting, multicasting, all-to-all communication, as well as significantly reduce many of the issues present in massively multicore environments, such as data coherency, consistency, synchronization and communication problems. Several open research challenges are pointed out related to implementation, communications and multicore architectures, which pave the way for future research in this multidisciplinary area.

  • 5.
    Abarghouyi, Hadis
    et al.
    IUST, Sch Elect Engn, Tehran 1665973561, Iran.;MTNi Co, Tehran 1665973561, Iran..
    Razavizadeh, S. Mohammad
    IUST, Sch Elect Engn, Tehran 1684613114, Iran..
    Björnson, Emil
    Linköping Univ, Dept Elect Engn ISY, S-58183 Linköping, Sweden..
    QoE-Aware Beamforming Design for Massive MIMO Heterogeneous Networks2018In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 67, no 9, p. 8315-8323Article in journal (Refereed)
    Abstract [en]

    One of the main goals of the future wireless networks is improving the users' quality of experience (QoE). In this paper, we consider the problem of the QoE-based resource allocation in the downlink of a massive multiple-input multiple-output heterogeneous network. The network consists of a macrocell with a number of small cells embedded in it. The small cells' base stations (BSs) are equipped with a few antennas, while the macro BS is equipped with a massive number of antennas. We consider the two services Video and Web Browsing and design the beamforming vectors at the BSs. The objective is to maximize the aggregated mean opinion score (MOS) of the users under constraints on the BSs' powers and the required quality of service of the users. We also consider extra constraints on the QoE of users to more strongly enforce the QoE in the beamforming design. To reduce the complexity of the optimization problem, we suggest suboptimal and computationally efficient solutions. Our results illustrate that increasing the number of antennas at the BSs and also increasing the number of small cells' antennas in the network leads to a higher user satisfaction.

  • 6.
    Abbas, Muhammad Tahir
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Improving the Energy Efficiency of Cellular IoT Device2023Licentiate thesis, comprehensive summary (Other academic)
    Abstract [en]

    Cellular Internet of Things (CIoT) has emerged as a promising technology to support applications that generate infrequent data. One requirement on these applications, often battery-powered devices, is low energy consumption to enable extended battery life. Narrowband IoT (NB-IoT) is a promising technology for IoT due to its low power consumption, which is essential for devices that need to run on battery power for extended periods. However, the current battery life of NB-IoT devices is only a few years, which is insufficient for many applications. This thesis investigates the impact of energy-saving mechanisms standardized by 3GPP on battery life of NB-IoT devices. The main research objective is to classify and analyze existing energy-saving solutions for CIoT and examine their limitations, to study the impact of standardized energy-saving mechanisms on the battery life of NB-IoT devices, both in isolation and combined, and to provide guidelines on how to configure NB-IoT devices to reduce energy consumption efficiently. The research aims to provide a deeper understanding of the effect of energy-saving mechanisms and best practices to balance energy efficiency and performance of NB-IoT devices. Applying the proposed solutions makes it possible to achieve a battery life of 10~years or more for CIoT devices.

    Download full text (pdf)
    fulltext-KAPPAN
    Download (jpg)
    preview image
  • 7.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Eklund, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Caso, Giuseppe
    Ericsson Research.
    Kousias, Konstantinos
    Simula Research Laboratory, Norway.
    Alay, Özgü
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). University of Oslo, Norway.
    On the Energy-efficient Use of Discontinuous Reception and Release Assistance in NB-IoT2022Conference paper (Refereed)
    Abstract [en]

    Cellular Internet of Things (CIoT) is a Low-Power Wide-Area Network (LPWAN) technology. It aims for cheap, lowcomplexity IoT devices that enable large-scale deployments and wide-area coverage. Moreover, to make large-scale deployments of CIoT devices in remote and hard-to-access locations possible, a long device battery life is one of the main objectives of these devices. To this end, 3GPP has defined several energysaving mechanisms for CIoT technologies, not least for the Narrow-Band Internet of Things (NB-IoT) technology, one of the major CIoT technologies. Examples of mechanisms defined include CONNECTED-mode DRX (cDRX), Release Assistance Indicator (RAI), and Power Saving Mode (PSM). This paper considers the impact of the essential energy-saving mechanisms on minimizing the energy consumption of NB-IoT devices, especially the cDRX and RAI mechanisms. The paper uses a purpose-built NB-IoT simulator that has been tested in terms of its built-in energy-saving mechanisms and validated with realworld NB-IoT measurements. The simulated results show that it is possible to save 70%-90% in energy consumption by enabling the cDRX and RAI. In fact, the results suggest that a battery life of 10 years is only achievable provided the cDRX, RAI, and PSM energy-saving mechanisms are correctly configured and used

  • 8.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Eklund, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Impact of Tunable Parameters in NB-IoT Stack onthe Energy Consumption2019In: Proceedings of Fifteenth Swedish National Computer Networking Workshop (SNCNW), 2019Conference paper (Refereed)
    Abstract [en]

    This paper studies the impact of tunable parametersin the NB-IoT stack on the energy consumption of a user equipment(UE), e.g., a wireless sensor. NB-IoT is designed to enablemassive machine-type communications for UE while providing abattery lifetime of up to 10 years. To save battery power, most oftime the UE is in dormant state and unreachable. Still, duringthe CONNECTED and IDLE state, correct tuning of criticalparameters, like Discontinuous reception (DRX), and extendedDiscontinuous reception (eDRX), respectively, are essential to savebattery power. Moreover, the DRX and eDRX actions relate tovarious parameters which are needed to be tuned in order toachieve a required UE battery lifetime. The objective of thispaper is to observe the influence of an appropriate tuning ofthese parameters to reduce the risk of an early battery drainage

  • 9.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Eklund, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). Karlstad University, Faculty of Health, Science and Technology (starting 2013), Science, Mathematics and Engineering Education Research.
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Science, Mathematics and Engineering Education Research. Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alay, Özgü
    University of Oslo and Simula Metropolitan, NOR.
    Katona, Sándor
    Ericsson AB.
    Seres, Gergely
    Ericsson AB.
    Rathonyi, Bela
    Ericsson AB.
    Guidelines for an Energy Efficient Tuning of the NB-IoT Stack2020In: 45th IEEE Conference on Local Computer Networks (LCN), IEEE Communications Society, 2020, p. 60-69, article id 9363265Conference paper (Refereed)
    Abstract [en]

    In this paper, we study the energy consumptionof Narrowband IoT devices. The paper suggests that key tosaving energy for NB-IoT devices is the usage of full Discontinuous Reception (DRX), including the use of connected-mode DRX (cDRX): In some cases, cDRX reduced the energy consumption over a 10-year period with as much as 50%. However, the paper also suggests that tunable parameters, such as the inactivity timer, do have a significant impact. On the basis of our findings, guidelines are provided on how to tune the NB-IoT device so that it meets the target of the 3GPP, i.e., a 5-Wh battery should last for at least 10 years. It is further evident from our results that the energy consumption is largely dependent on the intensity and burstiness of the traffic, and thus could be significantly reduced if data is sent in bursts with less intensity,irrespective of cDRX support.

  • 10.
    Abbas, Muhammad Tahir
    et al.
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Grinnemo, Karl-Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Eklund, Johan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Alfredsson, Stefan
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Rajiullah, Mohammad
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Brunström, Anna
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
    Caso, Giuseppe
    Ericsson Research, Sweden.
    Kousias, Konstantinos
    Simula Research Laboratory, Norway.
    Alay, Özgü
    Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013). University of Oslo, Norway.
    Energy-Saving Solutions for Cellular Internet of Things - A Survey2022In: IEEE Access, E-ISSN 2169-3536, Vol. 10, p. 62096-62096Article in journal (Refereed)
    Abstract [en]

    The Cellular Internet of Things (CIoT), a new paradigm, paves the way for a large-scale deployment of IoT devices. CIoT promises enhanced coverage and massive deployment of low-cost IoT devices with an expected battery life of up to 10 years. However, such a long battery life can only be achieved provided the CIoT device is configured with energy efficiency in mind. This paper conducts a comprehensive survey on energy-saving solutions in 3GPP-based CIoT networks. In comparison to current studies, the contribution of this paper is the classification and an extensive analysis of existing energy-saving solutions for CIoT, e.g., the configuration of particular parameter values and software modifications of transport- or radio-layer protocols, while also stressing key parameters impacting the energy consumption such as the frequency of data reporting, discontinuous reception cycles (DRX), and Radio Resource Control (RRC) timers. In addition, we discuss shortcomings, limitations, and possible opportunities which can be investigated in the future to reduce the energy consumption of CIoT devices.

    Download full text (pdf)
    fulltext
  • 11.
    Abbas, Taimoor
    et al.
    Lund Univ, Elect & Informat Technol Dept, S-22100 Lund, Sweden..
    Sjöberg, Katrin
    Halmstad University, School of Information Technology, Halmstad Embedded and Intelligent Systems Research (EIS), Centre for Research on Embedded Systems (CERES).
    Kåredal, Johan
    Lund Univ, Elect & Informat Technol Dept, S-22100 Lund, Sweden..
    Tufvesson, Fredrik
    Lund Univ, Elect & Informat Technol Dept, S-22100 Lund, Sweden..
    A Measurement Based Shadow Fading Model for Vehicle-to-Vehicle Network Simulations2015In: International Journal of Antennas and Propagation, ISSN 1687-5869, E-ISSN 1687-5877, article id 190607Article in journal (Refereed)
    Abstract [en]

    The vehicle-to-vehicle (V2V) propagation channel has significant implications on the design and performance of novel communication protocols for vehicular ad hoc networks (VANETs). Extensive research efforts have been made to develop V2V channel models to be implemented in advanced VANET system simulators for performance evaluation. The impact of shadowing caused by other vehicles has, however, largely been neglected in most of the models, as well as in the system simulations. In this paper we present a shadow fading model targeting system simulations based on real measurements performed in urban and highway scenarios. The measurement data is separated into three categories, line-of-sight (LOS), obstructed line-of-sight (OLOS) by vehicles, and non-line-of-sight due to buildings, with the help of video information recorded during the measurements. It is observed that vehicles obstructing the LOS induce an additional average attenuation of about 10 dB in the received signal power. An approach to incorporate the LOS/OLOS model into existing VANET simulators is also provided. Finally, system level VANET simulation results are presented, showing the difference between the LOS/OLOS model and a channel model based on Nakagami-m fading.

  • 12.
    Abbasi, Abdul Ghafoor
    et al.
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Communication Systems, CoS.
    Muftic, Sead
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Communication Systems, CoS.
    Mumtaz, Shahzad Ahmed
    KTH, School of Information and Communication Technology (ICT), Communication: Services and Infrastucture, Communication Systems, CoS.
    Security extensions of windows environment based on FIPS 201 (PIV) smart card2011In: World Congr. Internet Secur., WorldCIS, 2011, p. 86-92Conference paper (Refereed)
    Abstract [en]

    This paper describes security extensions of various Windows components based on usage of FIPS 201 (PIV) smart cards. Compared to some other similar solutions, this system has two significant advantages: first, smart cards are based on FIPS 201 standard and not on some proprietary technology; second, smart card security extensions represent an integrated solution, so the same card is used for security of several Microsoft products. Furthermore, our smart card system uses FIPS 201 applet and middleware with smart card APIs, so it can also be used by other developers to extend their own applications with smart card functions in a Windows environment. We support the following security features with smart cards: start-up authentication (based on PIN and/or fingerprint), certificate-based domain authentication, strong authentication, and protection of local resources. We also integrated our middleware and smart cards with MS Outlook and MS Internet Explorer.

  • 13.
    Abbasi, Mahdi
    University of Gävle, Department of Technology and Built Environment.
    Characterization of a 5GHz Modular Radio Frontend for WLAN Based on IEEE 802.11p2008Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The number of vehicles has increased significantly in recent years, which causeshigh density in traffic and further problems like accidents and road congestions.A solution regarding to this problem is vehicle-to-vehicle communication, wherevehicles are able to communicate with their neighboring vehicles even in the absenceof a central base station, to provide safer and more efficient roads and toincrease passenger safety.The goal of this thesis is to investigate basic physical layer parameters of ainter-vehicle communication system, like emission power, spectral emission, errorvector magnitude, guard interval, ramp-up/down time, and third order interceptpoint. I also studied the intelligent transportation system’s channel layout inEurope, how the interference of other systems are working in co-channel and adjacentchannels, and some proposals to use the allocated frequency bands. On theother hand, the fundamentals of OFDM transmission and definitions of OFDMkey parameters in IEEE 802.11p are investigated.The focus of this work is on the measurement of transmitter frontend parametersof a new testbed designed and fabricated in order to be used at inter-vehiclecommunication based on IEEE 802.11p.

    Download full text (pdf)
    FULLTEXT01
  • 14.
    Abd-Elmagid, Mohamed A.
    et al.
    Virginia Tech, VA 24061 USA.
    Dhillon, Harpreet S.
    Virginia Tech, VA 24061 USA.
    Pappas, Nikolaos
    Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, Faculty of Science & Engineering.
    AoI-Optimal Joint Sampling and Updating for Wireless Powered Communication Systems2020In: IEEE Transactions on Vehicular Technology, ISSN 0018-9545, E-ISSN 1939-9359, Vol. 69, no 11, p. 14110-14115Article in journal (Refereed)
    Abstract [en]

    This paper characterizes the structure of the Age of Information (AoI)-optimal policy in wireless powered communication systems while accounting for the time and energy costs of generating status updates at the source nodes. In particular, for a single source-destination pair in which a radio frequency (RF)-powered source sends status updates about some physical process to a destination node, we minimize the long-term average AoI at the destination node. The problem is modeled as an average cost Markov Decision Process (MDP) in which, the generation times of status updates at the source, the transmissions of status updates from the source to the destination, and the wireless energy transfer (WET) are jointly optimized. After proving the monotonicity property of the value function associated with the MDP, we analytically demonstrate that the AoI-optimal policy has a threshold-based structure w.r.t. the state variables. Our numerical results verify the analytical findings and reveal the impact of state variables on the structure of the AoI-optimal policy. Our results also demonstrate the impact of system design parameters on the optimal achievable average AoI as well as the superiority of our proposed joint sampling and updating policy w.r.t. the generate-at-will policy.

    Download full text (pdf)
    fulltext
  • 15.
    Abd-Elmagid, Mohamed A.
    et al.
    Virginia Tech, VA 24061 USA.
    Dhillon, Harpreet S.
    Virginia Tech, VA 24061 USA.
    Pappas, Nikolaos
    Linköping University, Department of Science and Technology, Communications and Transport Systems. Linköping University, Faculty of Science & Engineering.
    Online Age-minimal Sampling Policy for RF-powered IoT Networks2019In: 2019 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), IEEE , 2019Conference paper (Refereed)
    Abstract [en]

    In this paper, we study a real-time Internet of Things (IoT)-enabled monitoring system in which a source node (e.g., IoT device or an aggregator located near a group of IoT devices) is responsible for maintaining the freshness of information status at a destination node by sending update packets. Since it may not always be feasible to replace or recharge batteries in all IoT devices, we consider that the source node is powered by wireless energy transfer (WET) by the destination. For this system setup, we investigate the optimal online sampling policy that minimizes the long-term average Age-of-Information (AoI), referred to as the age-optimal policy. The age-optimal policy determines whether each slot should be allocated for WET or update packet transmission while considering the dynamics of battery level, AoI, and channel state information (CSI). To solve this optimization problem, we model this setup as an average cost Markov Decision Process (MDP). After analytically establishing the monotonicity property of the value function associated with the MDP, the age-optimal policy is proven to be a threshold based policy with respect to each of the system state variables. We extend our analysis to characterize the structural properties of the policy that maximizes average throughput for our system setup, referred to as the throughput-optimal policy. Afterwards, we analytically demonstrate that the structures of the age optimal and throughput-optimal policies are different. We also numerically demonstrate these structures as well as the impact of system design parameters on the optimal achievable average AoI.

  • 16.
    Abdelsamad, Deena
    Blekinge Institute of Technology, School of Engineering.
    Video Transmission Jerkiness Measure2013Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    Digital video transmission is widely used nowadays in multimedia. Frame dropping, freeze and reduced number of frames in the transmitted video are common symptoms of bad transmission quality. In order to assess the quality of transmission, a criterion is introduced in a model for a no reference video jerkiness measure [3]. This model is dierent from the former models presented as it depends on viewing conditions and video resolutions, so it is applicable for any frame size from QCIF to HD. The model uses simple mathematical equations of jerkiness and can be used for any video sequence [3]. A model of reduced reference method (Qtransmission) which depends on a pre-measured Jerkiness is introduced as a suggestion of future work.

    Download full text (pdf)
    FULLTEXT01
  • 17.
    Abdsharifi, Mohammad Hossein
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Dhar, Ripan Kumar
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Service Management for P2P Energy Sharing Using Blockchain – Functional Architecture2022Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Blockchain has become the most revolutionary technology in the 21st century. In recent years, one of the concerns of world energy isn't just sustainability yet, in addition, being secure and reliable also. Since information and energy security are the main concern for the present and future services, this thesis is focused on the challenge of how to trade energy securely on the background of using distributed marketplaces that can be applied. The core technology used in this thesis is distributed ledger, specifically blockchain. Since this technology has recently gained much attention because of its functionalities such as transparency, immutability, irreversibility, security, etc, we tried to convey a solution for the implementation of a secure peer-to-peer (P2P) energy trading network over a suitable blockchain platform. Furthermore, blockchain enables traceability of the origin of data which is called data provenience.

    In this work, we applied a secure blockchain technology in peer-to-peer energy sharing or trading system where the prosumer and consumer can trade their energies through a secure channel or network. Furthermore, the service management functionalities such as security, reliability, flexibility, and scalability are achieved through the implementation. \\

    This thesis is focused on the current proposals for p2p energy trading using blockchain and how to select a suitable blockchain technique to implement such a p2p energy trading network. In addition, we provide an implementation of such a secure network under blockchain and proper management functions. The choices of the system models, blockchain technology, and the consensus algorithm are based on literature review, and it carried to an experimental implementation where the feasibility of that system model has been validated through the output results. 

    Download full text (pdf)
    Service Management for P2P Energy Sharing Using Blockchain – Functional Architecture
  • 18.
    Abelsson, Sara
    Blekinge Institute of Technology, School of Engineering, Department of Signal Processing.
    Propagation Measurements at 3.5 GHz for WiMAX2007Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Propagation measurements at the frequency 3.5 GHz for the WiMAX technology have been conducted. The purpose of these measurements is that a coverage analysis should be accomplished. The mathematical software package MATLAB has been used to analyze the collected data from the measurement campaign. Path loss models have also been used and a comparison between these models and the collected data has been performed. An analysis prediction tool from an application called WRAP has also been used in the comparison with the collected data. In this thesis, diff

    Download full text (pdf)
    FULLTEXT01
  • 19. Abeywickrama, Sandu
    et al.
    Furdek, Marija
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Monti, Paolo
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wosinska, Lena
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS, Optical Network Laboratory (ON Lab).
    Wong, Elaine
    Protecting core networks with dual-homing: A study on enhanced network availability, resource efficiency, and energy-savings2016In: Optics Communications, ISSN 0030-4018, E-ISSN 1873-0310, Vol. 381, p. 327-335Article in journal (Refereed)
    Abstract [en]

    Core network survivability affects the reliability performance of telecommunication networks and remains one of the most important network design considerations. This paper critically examines the benefits arising from utilizing dual-homing in the optical access networks to provide resource-efficient protection against link and node failures in the optical core segment. Four novel, heuristic-based RWA algorithms that provide dedicated path protection in networks with dual-homing are proposed and studied. These algorithms protect against different failure scenarios (i.e. single link or node failures) and are implemented with different optimization objectives (i.e., minimization of wavelength usage and path length). Results obtained through simulations and comparison with baseline architectures indicate that exploiting dual-homed architecture in the access segment can bring significant improvements in terms of core network resource usage, connection availability, and power consumption.

  • 20.
    Abougazar, Eman Silmy
    Stockholm University, Faculty of Social Sciences, Department of Public Health Sciences.
      Barriers to equal access to eHealth in Stockholm  : A qualitative study2022Independent thesis Advanced level (degree of Master (Two Years)), 80 credits / 120 HE creditsStudent thesis
    Abstract [en]

    The aim behind this study was to observe and understand barriers to access the eHealth system equally. The study was conducted in Stockholm based on qualitative data in which semi- structured interviews were conducted among 15 interviewees from different localities of Stockholm. The findings from the collected data revealed that language barriers, lack of knowledge about digital literacy, unawareness of Swedish healthcare services, psychological and social barriers, safety and privacy concerns, and the lack of an e-identification are all major barriers to accessing the eHealth system. From the data, it has also been observed that the main causes of the aforementioned hurdles are based on varied socioeconomic levels, literacy conditions of an individual, cultural background, and age. Another important observation shows that highly qualified people with limited language abilities have a difficult time using eHealth services. 

    Keywords 

    Ehealth, Covid-19, nudge approach, digital literacy, linguistic skills, Bank ID, 1177.se, Alltid öppet. 

    Download full text (pdf)
    fulltext
  • 21.
    Abougazar, Eman Silmy
    Stockholm University, Faculty of Social Sciences, Department of Public Health Sciences.
    Barriers to equal access to eHealth in Stockholm: A qualitative study2022Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    The aim behind this study was to observe and understand barriers to access the eHealth system equally. The study was conducted in Stockholm based on qualitative data in which semi- structured interviews were conducted among 15 interviewees from different localities of Stockholm. The findings from the collected data revealed that language barriers, lack of knowledge about digital literacy, unawareness of Swedish healthcare services, psychological and social barriers, safety and privacy concerns, and the lack of an e-identification are all major barriers to accessing the eHealth system. From the data, it has also been observed that the main causes of the aforementioned hurdles are based on varied socioeconomic levels, literacy conditions of an individual, cultural background, and age. Another important observation shows that highly qualified people with limited language abilities have a difficult time using eHealth services. 

    Download full text (pdf)
    fulltext
  • 22. Abrardo, A
    et al.
    Fodor, Gabor
    KTH, School of Electrical Engineering (EES), Automatic Control.
    Tola, B.
    Network coding schemes for Device-To-Device communications based relaying for cellular coverage extension2015In: IEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC, 2015, p. 670-674Conference paper (Refereed)
    Abstract [en]

    In this paper, we study the performance of device-To-device (D2D) based range extension in terms of sum rate and power efficiency when a relaying user equipment (UE) helps to improve the coverage for cell-edge UEs. In our design, the relaying UE has own traffic to transmit and receive to/from the cellular base station (BS) and can operate either in amplify-And-forward (AF) or decode-And-forward (DF) modes and can make use of either digital or analogue (PHY layer) network coding. In this rather general setting, we propose mode selection, resource allocation and power control schemes and study their performance by means of system simulations. We find that the performance of the DF scheme with network coding is superior both to the traditional cellular and the AF based relaying schemes, including AF with two-slot or three-slot PHY layer network coding.

  • 23.
    Abrego peris, Iñaki
    University of Gävle, Faculty of Engineering and Sustainable Development, Department of Electronics, Mathematics and Natural Sciences, Electronics.
    Antenna with medical applications for tumour cancer: hyperthermia function2017Independent thesis Basic level (degree of Bachelor), 10 credits / 15 HE creditsStudent thesis
    Abstract [en]

    The idea is to improve or help the treatments that exist in the market in the medical field. Treatments such as mammography or radiotherapy make use of X-rays. X-rays are electromagnetic radiation in a high frequency band, this type of electromagnetic is dangerous to health because ionizing radiation is used, ionized atoms interact with matter. For this reason, in our work we give alternative solution to these treatments without any risk to health. This project consists in the use of non-harmful frequencies such as microwave. In this way, we will make an antenna with medical applications whose frequency range will be between 300 MHz and 30 GHz, specifically between 950MHz and 2.45GHz (medical range). The first step will be the detection of the tumour and classification of this, but our work is about another technique called hyperthermia. This technique consists in increase the temperature with a value of 40-43 degrees in the tumour area. Tumour resistance decreases when heat is applied to this. When combining a treatment with oncologic hyperthermia, the effect of radiotherapy is most effective (between 1.5-5 times). The most important part is study antenna in body tissues characteristics as SAR, depth penetration and antenna size; this theory part is essential to know the best parameters and what case use this. In work development we will choose and design antennas for the different parts of the body in some specific frequencies and choose circular antennas in frequencies of 915 MHz and 1.8 GHz. Finally, we will take measurements about temperature increase with meat and say some conclusions.

    Download full text (pdf)
    fulltext
  • 24.
    Abualhana, Munther
    et al.
    Blekinge Institute of Technology, School of Computing.
    Tariq, Ubaid
    Blekinge Institute of Technology, School of Computing.
    Improving QoE over IPTV using FEC and Retransmission2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    IPTV (Internet Protocol Television), a new and modern concept of emerging technologies with focus on providing cutting edge high-resolution television, broadcast, and other fascinating services, is now easily available with only requirement of high-speed internet. Everytime a new technology is made local, it faces tremendous problems whether from technological point of view to enhance the performance or when it comes down to satisfy the customers. This cutting edge technology has provided researchers to embark and play with different tools to provide better quality while focusing on existing tools. Our target in dissertation is to provide a few interesting facets of IPTV and come up with a concept of introducing an imaginary cache that can re-collect the packets travelling from streaming server to the end user. In the access node this cache would be fixed and then on the basis of certain pre-assumed research work we can conclude how quick retransmission can take place when the end user responds back using RTCP protocol and asks for the retransmission of corrupted/lost packets. In the last section, we plot our scenario of streaming server on one side and client, end user on the other end and make assumption on the basis of throughput, response time and traffic.

    Download full text (pdf)
    FULLTEXT01
  • 25. Abu-Lebdeh, Mohammad
    et al.
    Sahoo, Jagruti
    Glitho, Roch
    Concordia University.
    Tchouati, Constant Wette
    Cloudifying the 3GPP IP Multimedia Subsystem for 4G and Beyond: A Survey2016In: IEEE Communications Magazine, ISSN 0163-6804, E-ISSN 1558-1896, Vol. 54, no 1, p. 91-97Article in journal (Refereed)
    Abstract [en]

    4G systems have been continuously evolving to cope with the emerging challenges of human-centric and M2M applications. Research has also now started on 5G systems. Scenarios have been proposed and initial requirements derived. 4G and beyond systems are expected to easily deliver a wide range of human-centric and M2M applications and services in a scalable, elastic, and cost-efficient manner. The 3GPP IMS was standardized as the service delivery platform for 3G networks. Unfortunately, it does not meet several requirements for provisioning applications and services in 4G and beyond systems. However, cloudifying it will certainly pave the way for its use as a service delivery platform for 4G and beyond. This article presents a critical overview of the architectures proposed so far for cloudifying the IMS. There are two classes of approaches; the first focuses on the whole IMS system, and the second deals with specific IMS entities. Research directions are also discussed. IMS granularity and a PaaS for the development and management of IMS functional entities are the two key directions we currently foresee.

  • 26.
    Abusubaih, Murad
    et al.
    Telecommun. Networks Group, Technische Univ. Berlin.
    Gross, James
    Telecommun. Networks Group, Technische Univ. Berlin.
    Wiethoelter, Sven
    Telecommun. Networks Group, Technische Univ. Berlin.
    Wolisz, Adam
    Telecommun. Networks Group, Technische Univ. Berlin.
    On Access Point Selection in IEEE 802.11 Wireless Local Area Networks2006In: 31st IEEE Conference on Local Computer Networks, Proceedings 2006, IEEE conference proceedings, 2006, p. 879-886Conference paper (Refereed)
    Abstract [en]

    In wireless local area networks often a station can potentially associate with more than one access point. Therefore, a relevant question is which access point to select "best" from a list of candidate ones. In IEEE 802.11, the user simply associates to the access point with the strongest received signal strength. However, this may result in a significant load imbalance between several access points, as some accommodate a large number of stations while others are lightly loaded or even idle. Moreover, the multi-rate flexibility provided by several IEEE 802.11 variants can cause low bit rate stations to negatively affect high bit rate ones and consequently degrade the overall network throughput. This paper investigates the various aspects of "best" access point selection for IEEE 802.11 systems. In detail, we first derive a decision metric the selection can be based on. Using this metric we propose two new selection mechanisms which are decentralized in the sense that the decision is performed by each station, given appropriate status information of each access point. In fact, only few bytes of status information have to be added to the beacon and probe response frames which does not impose significant overhead. In addition, we show that our mechanism improves station quality of service and better utilizes network resources compared to the conventional one implemented today in IEEE 802.11 devices.

  • 27.
    Abusubaih, Murad
    et al.
    Technische Universit¨at Berlin.
    Gross, James
    Technische Universit¨at Berlin.
    Wolisz, Adam
    Technische Universit¨at Berlin.
    An Inter-Access Point Coordination Protocol for Dynamic Channel Selection in IEEE802.11 Wireless LANs2007Conference paper (Refereed)
    Abstract [en]

    This paper presents and evaluates an Inter-Access Point Coordination protocol for dynamic channel selection in IEEE 802.11 WLANs. It addresses an open issue for the implementation of many distributed and centralized dynamic channel selection policies proposed to mitigate interference problems in Wireless LANs (WLANs). The presented protocol provides services to a wide range of policies that require different levels of coordination among APs by enabling them to actively communicate and exchange information. An Intra-Cell protocol that enables interaction between the AP and its accommodated stations to handle channel switching within the same cell is also presented.

    Download full text (pdf)
    fulltext
  • 28.
    Abusubaih, Murad
    et al.
    TU Berlin.
    Wiethoelter, Sven
    TU Berlin.
    Gross, James
    Wolisz, Adam
    TU Berlin.
    A New Access Point Selection Policy for Multi-Rate IEEE 802.11 WLANs2008In: International Journal of Parallel, Emergent and Distributed Systems, ISSN 1744-5760, E-ISSN 1744-5779, Vol. 23, no 4, p. 291-307Article in journal (Refereed)
    Abstract [en]

    In wireless local area networks, often a station can potentially associate with more than one access point (AP). Therefore, a relevant question is which AP to select 'best' from a list of candidate ones. In IEEE 802.11, the user simply associates to the AP with the strongest received signal strength. However, this may result in a significant load imbalance between several APs. Moreover, the multi-rate flexibility provided by several IEEE 802.11 variants can cause low bit rate stations to negatively affect high bit rate ones and consequently degrade the overall network throughput. This paper investigates the various aspects of 'best' AP selection for IEEE 802.11 systems. In detail, we first derive a new decision metric which can be used for AP selection. Using this metric, we propose two new selection mechanisms which are decentralised in the sense that the decision is performed by each station, given appropriate status information of each AP. In fact, only few bytes of status information have to be added to the Beacon and Probe Response frames which does not impose significant overhead. We show that our mechanism improves mean quality of service of all stations and better utilises network resources compared to the conventional one implemented today in IEEE 802.11 devices. Also, the schemes are appealing in terms of stability and provide their performance improvement even for denser or lighter network configurations.

    Download full text (pdf)
    fulltext
  • 29.
    Adabala, Yashwanth Venkata Sai Kumar
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    Devanaboina, Lakshmi Venkata Raghava Sudheer
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.
    A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application2024Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. This thesis explores the development of a DDoS attack prevention technique in SDN environments using the Ryu controller application. The research aims to address the vulnerabilities in SDN, particularly focusing on flooding and Internet Protocol (IP) spoofing attacks, which are a significant threat to network security. The study employs an experimental approach, utilizing tools like Mininet-VM (VirtualMachine), Oracle VM VirtualBox, and hping3 to simulate a virtual SDN environment and conduct DDoS attack scenarios. Key methodologies include packet sniffing and rule-based detection by integrating Snort IDS (Intrusion Detection System), which is critical for identifying and mitigating such attacks. The experiments demonstrate the effectiveness of the proposed prevention technique, highlighting the importance of proper configuration and integration of network security tools in SDN. This work contributes to enhancing the resilience of SDN architectures against DDoS attacks, offering insights into future developments in network security. 

    Download full text (pdf)
    A_Prevention_Technique_for_DDoS_Attacks_in_SDN_using_Ryu_Controller_Application
  • 30.
    Adam, Constantin
    KTH, School of Electrical Engineering (EES).
    A Middleware for Self-Managing Large-Scale Systems2006Doctoral thesis, monograph (Other scientific)
    Abstract [en]

    This thesis investigates designs that enable individual components of a distributed system to work together and coordinate their actions towards a common goal. While the basic motivation for our research is to develop engineering principles for large-scale autonomous systems, we address the problem in the context of resource management in server clusters that provide web services.

    To this end, we have developed, implemented and evaluated a decentralized design for resource management that follows four principles. First, in order to facilitate scalability, each node has only partial knowledge of the system. Second, each node can adapt and change its role at runtime. Third, each node runs a number of local control mechanisms independently and asynchronously from its peers. Fourth, each node dynamically adapts its local configuration in order to optimize a global utility function.

    The design includes three fundamental building blocks: overlay construction, request routing and application placement. Overlay construction organizes the cluster nodes into a single dynamic overlay. Request routing directs service requests towards nodes with available resources. Application placement partitions the cluster resources between applications, and dynamically adjusts the allocation in response to changes in external load, node failures, etc.

    We have evaluated the design using complexity analysis, simulation and prototype implementation. Using complexity analysis and simulation, we have shown that the system is scalable, operates efficiently in steady state, quickly adapts to external events and allows for effective service differentiation by a system administrator. A prototype has been built using accepted technologies (Java, Tomcat) and evaluated using standard benchmarks (TPC-W and RUBiS). The evaluation results show that the behavior of the prototype matches closely that of the simulated design for key metrics related to adaptability and robustness, therefore validating our design and proving its feasibility.

    Download full text (pdf)
    FULLTEXT01
  • 31.
    Adam, Constantin
    KTH, School of Electrical Engineering (EES).
    Scalable Self-Organizing Server Clusters with Quality of Service Objectives2005Licentiate thesis, comprehensive summary (Other scientific)
    Abstract [en]

    Advanced architectures for cluster-based services that have been recently proposed allow for service differentiation, server overload control and high utilization of resources. These systems, however, rely on centralized functions, which limit their ability to scale and to tolerate faults. In addition, they do not have built-in architectural support for automatic reconfiguration in case of failures or addition/removal of system components.

    Recent research in peer-to-peer systems and distributed management has demonstrated the potential benefits of decentralized over centralized designs: a decentralized design can reduce the configuration complexity of a system and increase its scalability and fault tolerance.

    This research focuses on introducing self-management capabilities into the design of cluster-based services. Its intended benefits are to make service platforms dynamically adapt to the needs of customers and to environment changes, while giving the service providers the capability to adjust operational policies at run-time.

    We have developed a decentralized design that efficiently allocates resources among multiple services inside a server cluster. The design combines the advantages of both centralized and decentralized architectures. It allows associating a set of QoS objectives with each service. In case of overload or failures, the quality of service degrades in a controllable manner. We have evaluated the performance of our design through extensive simulations. The results have been compared with performance characteristics of ideal systems.

    Download full text (pdf)
    FULLTEXT01
  • 32.
    Adam, Constantin
    et al.
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Stadler, Rolf
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    A Middleware Design for Large-scale Clusters offering Multiple Services2006In: IEEE Transactions on Network and Service Management, ISSN 1932-4537, E-ISSN 1932-4537, Vol. 3, no 1, p. 1-12Article in journal (Refereed)
    Abstract [en]

    We present a decentralized design that dynamically allocates resources to multiple services inside a global server cluster. The design supports QoS objectives (maximum response time and maximum loss rate) for each service. A system administrator can modify policies that assign relative importance to services and, in this way, control the resource allocation process. Distinctive features of our design are the use of an epidemic protocol to disseminate state and control information, as well as the decentralized evaluation of utility functions to control resource partitioning among services. Simulation results show that the system operates both effectively and efficiently; it meets the QoS objectives and dynamically adapts to load changes and to failures. In case of overload, the service quality degrades gracefully, controlled by the cluster policies.

  • 33.
    Adam, Constantin
    et al.
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Stadler, Rolf
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Adaptable Server Clusters with QoS Objectives2005In: Integrated Network Management IX - MANAGING NEW NETWORKED WORLDS / [ed] Clemm A, Festor O, Pras A, New York: IEEE , 2005, p. 149-163Conference paper (Refereed)
    Abstract [en]

    We present a decentralized design for a server cluster that supports a single service with response time guarantees. Three distributed mechanisms represent the key elements of our design. Topology construction maintains a dynamic overlay of cluster nodes. Request routing directs service requests towards available servers. Membership control allocates/releases servers to/from the cluster, in response to changes in the external load. We advocate a decentralized approach, because it is scalable, fault-tolerant, and has a lower configuration complexity than a centralized solution. We demonstrate through simulations that our system operates efficiently by comparing it to an ideal centralized system. In addition, we show that our system rapidly adapts to changing load. We found that the interaction of the various mechanisms in the system leads to desirable global properties. More precisely, for a fixed connectivity c (i.e., the number of neighbors of a node in the overlay), the average experienced delay in the cluster is independent of the external load. In addition, increasing c increases the average delay but decreases the system size for a given load. Consequently, the cluster administrator can use c as a management parameter that permits control of the tradeoff between a small system size and a small experienced delay for the service.

  • 34.
    Adam, Constantin
    et al.
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Stadler, Rolf
    KTH, School of Information and Communication Technology (ICT), Microelectronics and Information Technology, IMIT.
    Externally Controllable, Self-Oganizing Server Clusters2005In: Designing a Scalable, Self-organizing Middleware for Server Clusters (NGNM05): in the scope of Networking 2005, 2005, p. 1-12Chapter in book (Other academic)
  • 35.
    Adam, Constantin
    et al.
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Stadler, Rolf
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Implementation and evaluation of a middleware for self-organizing decentralized web services2006In: Integrated Network Management IX: MANAGING NEW NETWORKED WORLDS, 2006, Vol. 3996, p. 1-14Conference paper (Refereed)
    Abstract [en]

    We present the implementation of Chameleon, a peer-to-peer middleware for self-organizing web services, and we provide evaluation results from a test bed. The novel aspect of Chameleon is that key functions, including resource allocation, are decentralized, which facilitates scalability and robustness of the overall system. Chameleon is implemented in Java on the Tomcat web server environment. The implementation is non-intrusive in the sense that it does not require code modifications in Tomcat or in the underlying operating system. We evaluate the system by running the TPC-W benchmark. We show that the middleware dynamically and effectively reconfigures in response to changes in load patterns and server failures, while enforcing operating policies, namely, QoS objectives and service differentiation under overload.

  • 36.
    Adam, Constantin
    et al.
    KTH, Superseded Departments (pre-2005), Microelectronics and Information Technology, IMIT.
    Stadler, Rolf
    KTH, Superseded Departments (pre-2005), Microelectronics and Information Technology, IMIT.
    Patterns for Routing and Self-Stabilization2004In: NOMS 2004: IEEE/IFIP NETWORK OPERATIONS AND MANAGMENT SYMPOSIUM - MANAGING NEXT GENERATION CONVERGENCE NETWORKS AND SERVICES, New York: IEEE , 2004, p. 61-74Conference paper (Refereed)
    Abstract [en]

    This paper contributes towards engineering self-stabilizing networks and Services. We propose the use of navigation patterns, which define how information for state updates is disseminated in the system, as fundamental building blocks for self-stabilizing systems. We present two navigation patterns for self-stabilization: the progaressive wave pattern and the stationary wave pattern. The progressive wave pattern defines the update dissemination in Internet routing systems running the DUAL and OSPF protocols. Similarly, the stationary wave pattern defines the interactions of peer nodes in structured-peer-to-peer systems, including Chord, Pastry, Tapestry, and CAN. It turns out that both patterns are related. They both disseminate information in form of waves, i.e, sets of messages that originate from single events. Patterns can be instrumented to obtain wave statistics, which enables monitoring the process of self-stabilization in a system. We focus on Internet routing and peer-to-peer systems in this work, since we believe that studying these (existing) systems can lead to engineering principles for self-stabilizing system in various application areas.

  • 37.
    Adam, Constantin
    et al.
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Stadler, Rolf
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Service middleware for self-managing large-scale systems2007In: IEEE Transactions on Network and Service Management, ISSN 1932-4537, E-ISSN 1932-4537, Vol. 4, no 3, p. 50-64Article in journal (Refereed)
    Abstract [en]

    Resource management poses particular challenges in large-scale systems, such as server clusters that simultaneously process requests from a large number of clients. A resource management scheme for such systems must scale both in the in the number of cluster nodes and the number of applications the cluster supports. Current solutions do not exhibit both of these properties at the same time. Many are centralized, which limits their scalability in terms of the number of nodes, or they are decentralized but rely on replicated directories, which also reduces their ability to scale. In this paper, we propose novel solutions to request routing and application placementtwo key mechanisms in a scalable resource management scheme. Our solution to request routing is based on selective update propagation, which ensures that the control load on a cluster node is independent of the system size. Application placement is approached in a decentralized manner, by using a distributed algorithm that maximizes resource utilization and allows for service differentiation under overload. The paper demonstrates how the above solutions can be integrated into an overall design for a peer-to-peer management middleware that exhibits properties of self-organization. Through complexity analysis and simulation, we show to which extent the system design is scalable. We have built a prototype using accepted technologies and have evaluated it using a standard benchmark. The testbed measurements show that the implementation, within the parameter range tested, operates efficiently, quickly adapts to a changing environment and allows for effective service differentiation by a system administrator.

  • 38.
    Adam, Constantin
    et al.
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Stadler, Rolf
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Tang, Chunqiang
    Steinder, Malgorzata
    Spreitzer, Michael
    A service middleware that scales in system size and applications2007In: 2007 10TH IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM 2009): VOLS 1 AND 2, NEW YORK: IEEE , 2007, p. 70-79Conference paper (Refereed)
    Abstract [en]

    We present a peer-to-peer service management middleware that dynamically allocates system resources to a large set of applications. The system achieves scalability in number of nodes (1000s or more) through three decentralized mechanisms that run on different time scales. First, overlay construction interconnects all nodes in the system for exchanging control and state information. Second, request routing directs requests to nodes that offer the corresponding applications. Third, application placement controls the set of offered applications on each node, in order to achieve efficient operation and service differentiation. The design supports a large number of applications (100s or more) through selective propagation of configuration information needed for request routing. The control load on a node increases linearly with the number of applications in the system. Service differentiation is achieved through assigning a utility to each application which influences the application placement process. Simulation studies show that the system operates efficiently for different sizes, adapts fast to load changes and failures and effectively differentiates between different applications under overload.

  • 39.
    Adams, David C.
    et al.
    MIT.
    Du, Jinfeng
    KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre. KTH, School of Electrical Engineering (EES), Communication Theory. Massachusetts Institute of Technology, USA.
    Médard, Muriel
    Department of Electrical Engineering and Computer Science, MIT.
    Yu, Christopher C.
    Draper Laboratory.
    Delay constrained throughput-reliability tradeoff in network-coded wireless systems2014Conference paper (Refereed)
    Abstract [en]

    We investigate the performance of delay constrained data transmission over wireless networks without end-to-end feedback. Forward error-correction coding (FEC) is performed at the bit level to combat channel distortions and random linear network coding (RLNC) is performed at the packet level to recover from packet erasures. We focus on the scenario where RLNC re-encoding is performed at intermediate nodes and we assume that any packet that contains bit errors after FEC decoding can be detected and erased. To facilitate explicit characterization of data transmission over network-coded wireless systems, we propose a generic two-layer abstraction of a network that models both bit/symbol-level operations at the lower layer (termed PHY-layer) over several heterogeneous links and packet-level operations at the upper layer (termed NET-layer). Based on this model, we propose a network reduction method to characterize the throughput-reliability function of the end-to-end transmission. Our approach not only reveals an explicit tradeoff between data delivery rate and reliability, but also provides an intuitive visualization of the bottlenecks within the underlying network. We illustrate our approach via a point-to-point link and a relay network and highlight the advantages of this method over capacity-based approaches.

    Download full text (pdf)
    Globecom2014
  • 40.
    Adapa, Sasank Sai Sujan
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    APPLYING LEAN PRINCIPLES FOR PERFORMANCE ORIENTED SERVICE DESIGN OF VIRTUAL NETWORK FUNCTIONS FOR NFV INFRASTRUCTURE: Concepts of Lean2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Context. Network Function Virtualization was recently proposed by European Telecommunications Standards Institute (ETSI) to improve the network service flexibility by virtualization of network services and applications that run on hardware. To virtualize network functions, the software is decoupled from underlying physical hardware. NFV aims to transform industries by reducing capital investments on hardware by using commercial-of-the-shelf (COTS) hardware. NFV makes rapid innovative growth in telecom services through software based service deployment.

    Objectives. This thesis work aims to investigate how business organizations function and the roles in defining a service relationship model. The work also aims to define a service relationship model and to validate it via proof of concept using network function virtualization as a service. For this thesis, we finally apply lean principles for the defined service relationship model to reduce waste and investigate how lean benefits the model to be proven as performance service oriented.

    Methods. The essence of this work is to make a business organization lean by investigating its actions and applying lean principles. To elaborate, this thesis work involves in a research of papers from IEEE, TMF, IETF and Ericsson. It results in modelling of a PoC by following requirement analysis methodology and by applying lean principles to eliminate unnecessary processes which doesn’t add any value.

    Results. The results of the work include a full-fledged service relationship model that include three service levels with roles that can fit in to requirement specifications of NFV infrastructure. The results also show the service levels functionalities and their relationships between the roles. It has also been observed that the services that are needed to be standardized are defined with syntax for ways to describe network functions. It is observed that lean principles benefit the service relationship model from reducing waste factors and hereby providing a PoC which is performance service oriented.

    Conclusions. We conclude that roles defined are fit for the service relationship model designed. Moreover, we conclude that the model can hence contain the flow of service by standardizing the subservices and reducing waste interpreted with lean principles and there is a need for further use case proof of the model in full scale industry trials. It also concludes the ways to describe network functions syntax which follows lean principles that are essential to have them for the sub-services standardization. However, PoC defined can be an assurance to the NFV infrastructure.

    Download full text (pdf)
    fulltext
  • 41.
    Addu, Raj Kiran
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Potuvardanam, Vinod Kumar
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems.
    Effect of Codec Performance on Video QoE for videos encoded with Xvid, H.264 and WebM/VP82014Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    In recent years, there has been a significant growth in multimedia services such as mobile video streaming, Video-on-Demand and video conferencing. This has led to the development of various video coding techniques, aiming to deliver high quality video while using available bandwidth efficiently. This upsurge in the usage of video applications has also resulted in making endusers more quality-conscious. In order to meet the users’ expectations, the Quality of Experience (QoE) studies has gained utmost importance from both researchers and service providers. This thesis aims to compare the performance of H.264/AVC, Xvid and WebM/VP8 video codecs in wired and wireless networks. The codec performance is evaluated for different packet loss and delay variation values. The evaluation of codec performance is done using both subjective and objective assessment methods. In subjective assessment method, the evaluation of video codec performance is done using ITU-T recommended Absolute Category Rating (ACR) method. Using this method the perceptual video quality ratings are taken from the users, which are then averaged to obtain Mean Opinion Score. These obtained scores are used to analyze the performance of encoded videos with respect to users’ perception. In addition to subjective assessment method, the quality of encoded video is also measured using objective assessment method. The objective metric SSIM (Structural Similarity) is used to evaluate the performance of encoded videos. Based on the results, it was found that for lower packet loss and delay variation values H.264 showed better results when compared to Xvid and WebM/VP8 whereas, WebM/VP8 outperformed Xvid and H.264 for higher packet loss and delay variation values. On the whole, H.264 and WebM/VP8 performed better than Xvid. It was also found that all three video codecs performed better in wired network when compared to the wireless network.

    Download full text (pdf)
    FULLTEXT01
  • 42.
    Adebayo, Emmanuel
    Blekinge Institute of Technology.
    Performance Assessment of Networked Immersive Media in Mobile Health Applications with Emphasis on Latency2021Independent thesis Advanced level (degree of Master (One Year)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Cloud VR/AR/MR (Virtual Reality, Augmented Reality, and Mixed Reality) services representa high-level architecture that combines large scale computer resources in a data-center structurestyle set up to render VR/AR/MR services using a combination of very high bandwidth, ultralow latency, high throughput, latest 5G (5th Generation) mobile networks to the end users. 

    VR refers to a three-dimensional computer-generated virtual environment made up ofcomputers, which can be explored by people for real time interaction. AR amplifies humanperception of the real world through overlapping of computer-generated graphics or interactivedata on a real-world image for enhanced experience. 

    According to the Virtual Reality Society’s account of the history of VR, it started from the360-degree murals from the nineteenth century [18]. Historically, live application of AR wasdisplayed when Myron Kruger used a combination of video cameras and projector in aninteractive environment in 1974. In 1998, AR was put into live display with the casting of avirtual yellow line marker during an NFL game. However, personal, and commercial use ofVR/AR was made possible starting with release of a DIY (Do it Yourself) headset calledGoogle Cardboard in 2014 by Google, which made use of a smartphone for the VR experience.In 2014, Samsung also introduced Gear VR which officially started the competition for VRdevices. Subsequently In 2014, Facebook acquired Oculus VR with the major aim ofdominating the high-end spectrum of VR headset [18]. Furthermore, wider adoption of ARbecame enhanced with the introduction of Apple’s ARKit (Augmented Reality Kit) whichserves as a development framework for AR applications for iPhones and iPads [18]. 

    The first application of VR devices in the health industry was made possible due to healthworkers’ need to visualize complex medical data during surgery and planning of surgery in1994. Since then, commercial production of VR devices and availability of advanced networkand faster broadband have increased the adoption of VR services in the healthcare industryespecially in planning of surgery and during surgery itself [16]. Overall, the wide availabilityof VR/AR terminals, displays, controllers, development kits, advanced network, and robustbandwidth have contributed to making VR and AR services to be of valuable and importanttechnologies in the area of digital entertainment, information, games, health, military and soon. However, the solutions or services needed for the technology required an advancedprocessing platform which in most cases is not cost efficient in single-use scenarios. 

    The kind of devices, hardware, software required for the processing and presentation ofimmersive experiences is often expensive and dedicated to the current application itself.Technological improvement in realism and immersion means increase in cost of ownershipwhich often affected cost-benefit consideration, leading to slower adoption of the VR services[14] [15]. This is what has led to development of cloud VR services, a form of data-centerbased system, which serves as a means of providing VR services to end users from the cloudanywhere in the world, using its fast and stable transport networks. The content of the VR isstored in the cloud, after which the output in form of audio-visuals is coded and compressedusing suitable encoding technology, and thereafter transmitted to the terminals. The industrywide acceptance of the cloud VR services, and technology has made available access to payper-use-basis and hence access to high processing capability offered, which is used in iipresenting a more immersive, imaginative, and interactive experience to end users [11] [12].However, cloud VR services has a major challenge in form of network latency introduced fromcloud rendering down to the display terminal itself. This is most often caused by otherperformance indicators such as network bandwidth, coding technology, RTT (Return TripTime) and so on [19]. This is the major problem which this thesis is set to find out. 

    The research methodology used was a combination of empirical and experimental method,using quantitative approach as it entails the generation of data in quantitative form availablefor quantitative analysis. The research questions are:

    Research Question 1 (RQ1): What are the latency related performance indicators ofnetworked immersive media in mobile health applications?

    Research Question 2 (RQ2): What are the suitable network structures to achieve an efficientlow latency VR health application? 

    The answers gotten from the result analysis at the end of the simulation, show thatbandwidth, frame rate, and resolution are very crucial performance indicator to achieve theoptimal latency required for hitch-free cloud VR user experience, while the importance of otherindicators such as resolution and coding standard cannot be overemphasized. Combination ofedge and cloud architecture also proved to more efficient and effective for the achievement ofa low-latency cloud VR application functionality. 

    Conclusively, the answer to research question one was that, the latency relatedperformance indicators of networked immersive media in mobile health applications arebandwidth, frame rate, resolution, coding technology. For research question two, suitablenetwork structures includes edge network, cloud network and combination of cloud and edgenetwork, but in order to achieve an optimally low-latency network for cloud VR mobile healthapplication in education, combination of edge and cloud network architecture is recommended

    Download full text (pdf)
    fulltext
  • 43.
    Adebomi, OYEKANLU Emmanuel
    et al.
    Blekinge Institute of Technology, School of Computing.
    Mwela, JOHN Samson
    Blekinge Institute of Technology, School of Computing.
    Impact of Packet Losses on the Quality of Video Streaming2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    In this thesis, the impact of packet losses on the quality of received videos sent across a network that exhibit normal network perturbations such as jitters, delays, packet drops etc has been examined. Dynamic behavior of a normal network has been simulated using Linux and the Network Emulator (NetEm). Peoples’ perceptions on the quality of the received video were used in rating the qualities of several videos with differing speeds. In accordance with ITU’s guideline of using Mean Opinion Scores (MOS), the effects of packet drops were analyzed. Excel and Matlab were used as tools in analyzing the peoples’ opinions which indicates the impacts that different loss rates has on the transmitted videos. Statistical methods used for evaluation of data are mean and variance. We conclude that people have convergence of opinions when losses become extremely high on videos with highly variable scene changes

    Download full text (pdf)
    FULLTEXT01
  • 44.
    Adeleke, Adesina
    Blekinge Institute of Technology, School of Management.
    How External Forces are influencing the Ebusiness strategy of MTN-Nigeria2009Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The Internet and e-business has had enormous impact on many companies in Nigeria and there has been much research on how e-business influences the environment, but little can be found on how the environment of a developing country like Nigeria influences e-business. In e-business, technology tells the business what can be done in smarter ways. Technology not only can make business more efficient but also can make business more effective in targeting and reaching markets, however technology cannot enhance business in isolation as there are other vital factors that equally impact business. This thesis presents an adapted version of the PESTEL (Political, Economic, Socio cultural, Technology, Environment, and Legal) framework so called e-business PESTEL framework, as a method for structural analysis of macro environment forces in the future. In addition to this PESTEL framework, the Porter’s five forces model was employed to analyse the industrial forces that also influence MTNN e-business strategy. The main goal of this research is to give an overview of industry and macro-environment forces influencing the e-business strategy MTN-Nigeria and the impact of future developments. The research methodology was explorative and descriptive. A further method for future analysis of the macro-environments influences and a suggestion on how to incorporate it in this research work is given. The e-business strategy of MTNN consists of four areas: E-procurement, E-collaboration (CRM), Supply chain management and E-commerce. The influences found on macro-environments level are political and sociocultural forces and in the industry levels are bargaining power of customers and suppliers of its products and services .The most recommendations are that MTN-Nigeria should add e-business PESTEL framework described in this thesis to its e-business strategy check. Furthermore MTNN should include environment analysis more extensively in their e-business strategy approach as the factors in this research work shape the environment in which it carries out its business.

    Download full text (pdf)
    FULLTEXT01
  • 45.
    Adidamu, Naga Shruti
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Bheemisetty, Shanmukha Sai
    Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science and Engineering.
    Assessment of Ixia BreakingPoint Virtual Edition: Evolved Packet Gateway2018Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Download full text (pdf)
    fulltext
  • 46.
    ADIL, MUHAMMAD NAEEM
    KTH, School of Electrical Engineering (EES), Communication Theory. KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre.
    Analysis and Optimization of Transmission Strategies for Two Hop Networks with Multiple Antennas2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Two hop relay based networks consist of three network nodes: source,relay station, and destination in which relay station assists the sourceto communicate reliably and efficiently with the destination. Moreover,these networks provide cost efficient solution for achieving highdata rate via cooperative communication between relays with singleantennas. In two hop relay based networks, communication from a source todestination takes place over two phases, i.e , in first phase from sourceto relay station and in second phase from relay station to the destination.Therefore, it is essential to formulate transmission strategies,i.e, TDMA, SDMA, Hybrid TDMA-SDMA and multicast in terms ofresource allocation, beamforming over two phases so that interferenceis taken into account and high data rates are achieved. In this thesis,some relay selection methods have been proposed to optimize thenetwork performance. Different proposed transmission strategies arecompared in different scenario settings in order to analyse and decidethe best strategy in each setting. Based upon simulation results it is recommended to use adaptivetime split ratio between the two phases. Brute force relay selection givesthe optimal relay assignment but Hungarian assignment algorithm alsoperforms pretty close to brute force performance. SDMA with cooperativerelays connection with multiple antennas at the relays performsmuch better than the other transmission strategies. However, multicaststrategy performs much better if second phase channel knowledge is notavailable at the base station.

    Download full text (pdf)
    fulltext
  • 47.
    Adolfsson, Henrik
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Svensson, Peter
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Design and implementation of the MMS portal2006Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    MMS-enabled terminals on the market today are very complicated to use. It takes several steps to create a multi-slide MMS-message with images and text. This discourages users from using it. To increase usage of MMS, several companies provide web-based or stand-alone programs that allow users to create and send MMS-messages from a regular computer. However these editors have many limitations and are not user-friendly. This thesis describes the design and implementation of a user-friendly web-based MMS-portal where users can create, edit and send MMS-messages. The portal is integrated into Densitet’s system for development of mobile services. Conclusions that can be draw from this work are that problems with MMS interoperability have mostly the poor standardization to blame. Different terminals support different types of images and sound formats, and to make the MMS-portal user-friendly, format conversions of uploaded content had to be implemented. Also the MMS-portal only supports basic MMS-functionality. If the MMS-specification includes more audio and image formats and if the MMS-terminals are upgraded to handle these formats, sending MMS-messages will be easier and mobile messaging will continue to grow.

    Download full text (pdf)
    FULLTEXT01
  • 48.
    Advaita, Advaita
    et al.
    Blekinge Institute of Technology, Faculty of Computing, Department of Creative Technologies.
    Gali, Mani Meghala
    Blekinge Institute of Technology, Faculty of Computing, Department of Creative Technologies.
    Chu, Thi My Chinh
    Blekinge Institute of Technology, Faculty of Computing, Department of Creative Technologies.
    Zepernick, Hans-Juergen
    Blekinge Institute of Technology, Faculty of Computing, Department of Creative Technologies. Blekinge Inst Technol, SE-37179 Karlskrona, Sweden..
    Outage Probability of MIMO Cognitive Cooperative Radio Networks with Multiple AF Relays Using Orthogonal Space-Time Block Codes2017In: 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), IEEE , 2017, p. 84-89Conference paper (Refereed)
    Abstract [en]

    In this paper, we analyze the outage probability of multiple-input multiple-output cognitive cooperative radio networks (CCRNs) with multiple opportunistic amplify-and-forward relays. The CCRN applies underlay spectrum access accounting for the interference power constraint of a primary network and utilizes orthogonal space-time block coding to transmit multiple data streams across a number of antennas over several time slots. As such, the system exploits both time and space diversity to improve the transmission reliability over Nakagami.. fading. The CCRN applies opportunistic relaying in which the relay offering the highest signal-to-noise ratio at the receiver is selected to forward the transmit signal. Furthermore, selection combining is adopted at the secondary receiver to process the signal from the direct and relaying transmissions. To evaluate system performance, we derive an expression for the outage probability which is valid for an arbitrary number of antennas at the source, relays, and receiver of the CCRN. Selected numerical results are provided using Mathematica for analysis and Matlab for simulations, to reveal the effect of network parameters on the outage probability of the system.

  • 49.
    Afaq, Muhammad
    et al.
    Blekinge Institute of Technology, School of Engineering.
    Faheem, Sahibzada Muhammad
    Blekinge Institute of Technology, School of Engineering.
    Performance Analysis of Selected Cooperative Relaying Techniques2010Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Recently, cooperative communication has gained significant interest due to the fact that it exploits spatial diversity and provides capacity/performance gain over conventional single- input single-output (SISO) systems. A mobile node with single antenna can cooperate with a nearby mobile node having single antenna in multi-user environment to create the effect of virtual multiple antenna system. Hence, reducing the complexity associated with actual multiple antenna systems. Despite the small size and power constraints, a mobile node can still benefit from spatial diversity by employing cooperation, thus saving transmission power and increasing the coverage range of the network. In this thesis, we have selected some of relaying protocols, namely, amplify-and-forward, decode-and-forward, detect-and-forward, and selective detect-and-forward that are studied and implemented for two different relaying geometries, i.e. equidistant and collinear. Results are studied and compared with each other to show the performance of each protocol in terms of average symbol error probabilities. The considered system model has three nodes, i.e. source, relay, destination. Communicating nodes are considered to be half-duplex with single antenna for transmission and reception. The source, when communicating with the destination, broadcasts the information, which is heard by the nearby relay. The relay then uses one of the cooperation protocols. Finally, the relayed signal reaches the destination, where it is detected by maximal ratio combiner (MRC) and combined with the direct transmission for possible diversity gains. The transmission path or the channel is modeled as a frequency non-selective Rayleigh fading in the presence additive white Gaussian noise (AWGN). The effect of path loss has been observed on cooperation for collinear arrangement with exponential decay up to four. Considering equidistant arrangement, decode-and-forward shows good performance at high signal-to-noise ratio (SNR) while amplify-and-forward is very promising for very low SNR. A selective relaying scheme called selective detect-and- forward is also presented which outperforms its fixed counterparts for a wide range of SNR.

    Download full text (pdf)
    FULLTEXT01
  • 50.
    Aftab, Adnan
    et al.
    Blekinge Institute of Technology, School of Computing.
    Mufti, Muhammad Nabeel
    Blekinge Institute of Technology, School of Computing.
    Spectrum sensing through implementation of USRP22011Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Scarcity of the wireless spectrum has led to the development of new techniques for better utilization of the wireless spectrum. Demand for high data rates and better voice quality is resulting in the development of new wireless standard making wireless spectrum limited than ever. In this era of wireless communication, service providers and telecom operators are faced with a dilemma where they need a large sum of the wireless spectrum to meet the ever increasing quality of service requirements of consumers. This has led to the development of spectrum sensing techniques to find the unused spectrum in the available frequency band. The results presented in this thesis will help out in developing clear understanding of spectrum sensing techniques. Comparison of different spectrum sensing approaches. The experiments carried out using USRP2 and GNU radio will help the reader to understand the concept of underutilized frequency band and its importance in Cognitive Radios.

    Download full text (pdf)
    FULLTEXT01
1234567 1 - 50 of 6474
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf