Change search
Refine search result
1234 151 - 161 of 161
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 151.
    Sjökran, Kenneth
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Hallberg, Carl-Frederik
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Möller, Johan
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Mobile wallet payment solution2009Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Practically everyone today own and use a mobile phone, along with numerous credit cards. Paying with cash is getting rarer, and the trend is to pay electronically. Existing mobile payment trials and systems have demonstrated the success of mobile payments. However, they have all been tailored to particular actors and application areas, such as transit tickets or vending machines. This thesis focuses on the design and construction of a generalised mobile payment system able to handle every kind of purchase from a vendor machine purchase to a car sale. It does not matter if the seller’s point of sale is connected to the Internet or not. A working prototype of the mobile payment system was implemented to demonstrate the proof of concept, and to allow testing the premises. The prototype test results show that is it possible to create such a general system by using the latest mobile wireless and security technologies emerging on the market today, and the design shows how it is done in a secure and flexible way.

  • 152.
    Sohail, Imran
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Hayat, Sikandar
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Cooperative Defense Against DDoS Attack using GOSSIP Protocol2009Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    The ability to detect and prevent a network from DDoS attack and to ensure the high quality infrastructure is a back bone of today’s network security issues. In this thesis, we have successfully validated an algorithm using OmNet++ Ver. 4.0 simulation to show how a DDoS attack can be detected and how the nodes can be protected from such an attack using GOSSIP protocol.

  • 153.
    Tran, Hung
    et al.
    Malardalen Univ, S-72123 Vasteras, Sweden..
    Zepernick, Hans-Juergen
    Blekinge Institute of Technology, Faculty of Computing, Department of Communication Systems. Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems. Blekinge Institute of Technology, School of Engineering, Department of Signal Processing. Blekinge Institute of Technology, School of Computing. Blekinge Institute of Technology, School of Engineering, Department of Electrical Engineering.
    Phan, Hoc
    Univ Reading, Reading RG6 6AY, Berks, England..
    On Throughput and Quality of Experience in Cognitive Radio Networks2016In: 2016 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, IEEE , 2016Conference paper (Refereed)
    Abstract [en]

    In this paper, a performance analysis for cognitive radio networks (CRNs) under the outage probability constraint of the primary user and peak transmit power constraint of the secondary user is conducted. Given an automatic repeat request protocol, analytical expressions for the packet delay and throughput of the CRN are derived. Most importantly, these expressions can be used to understand the quality of experience on web services which are assumed to be offered by the considered CRN.

  • 154.
    Vahlgren, Stefan
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Språkstöd i distanslaboratoriet på BTH2004Independent thesis Basic level (degree of Bachelor)Student thesis
    Abstract [en]

    För att kunna studera och laborera på distans krävs att kursmaterialet finns tillgängligt via Internet. Undervisning på fler språk än svenska blir mer och mer viktig, därför behöver kursinnehållet finnas tillgängligt på flera språk. Som lärare behöver man ett sätt att publicera och ändra materialet för en kurs. Samtidigt måste det vara lätt för studenten att hitta informationen. Distanslaboratoriet har tagit fram ett administrativt webbsystem som hanterar program, kurser, lärare och studenter, men saknar möjligheten för lärare att ändra innehåll på sidor och publicera nytt kursmaterial på ett enkelt vis.

  • 155. Vogeleer, Karel De
    et al.
    Ilie, Dragos
    Popescu, Adrian
    Constrained-Path Discovery by Selective Diffusion2008Conference paper (Refereed)
    Abstract [en]

    The demand for live and interactive multimedia services over the Internet raises questions on how well the Internet Protocol (IP)’s best-effort effort service can be adapted to provide adequate end-to-end quality of service (QoS) for the users. Although the Internet community has developed two different IP-based QoS architectures, neither has been widely deployed. Overlay networks are seen as a step to address the demand for end-to-end QoS until a better solution can be obtained. As part of the telecommunication research at Blekinge Institute of Technology (BTH) in Karlskrona, Sweden we are investigating new theories and algorithms concerning QoS routing. We are in the process of developing Overlay Routing Protocol (ORP), a framework for overlay QoS routing consisting of two protocols: Route Discovery Protocol (RDP) and Route Management Protocol (RMP). In this paper we describe RDP and provide preliminary simulation results for it.

  • 156. Wac, Katarzyna
    et al.
    Arlos, Patrik
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Fiedler, Markus
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Chevul, Stefan
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Isaksson, Lennart
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Bults, Richard
    Accuracy Evaluation of Application-level Performance Measurements2007Conference paper (Refereed)
    Abstract [en]

    In many cases, application-level measurements can be the only way for an application to evaluate and adapt to the performance offered by the underlying networks. Applications perceive heterogeneous networking environments spanning over multiple administrative domains as black boxes being inaccessible for lower-level measurement instrumentation. However, application-level measurements can be inaccurate and differ significantly from the lower-level ones, amongst others due to the influence of the protocol stacks. In this paper we quantify and discuss such differences using the DPMI, with Measurement Points instrumented with DAG 3.5E cards for reference link-level measurements. We shed light on various impacts on timestamp accuracy of application-level measurements. Moreover, we quantify the accuracy of generating traffic with constant inter-packet-time. The latter is essential for an accurate emulation of application-level streaming traffic and thus for obtaining realistic end-to-end performance measurements.

  • 157.
    wedissa, abdelrahman mohamed
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    REPROCESSING OF REFLECTION SEISMIC DATA FROM THE SKÅNE AREA, SOUTHERN SWEDEN2006Independent thesis Advanced level (degree of Master (One Year))Student thesis
    Abstract [en]

    Numerous seismic reflection profiles have been acquired both on and offshore in southern Sweden for the purposes of petroleum exploration. No producing fields were discovered in the area, but the data comprise an important scientific asset. They may even prove valuable in the future for purposes such as non-conventional energy storage and production and sequestration. Most of these data were processed using software from the 1970s. This report covers all steps necessary to understand and produce final section for 2-D seismic line, the theory part give the reader brief background about seismic data processing methods, the concepts of deconvolution , F-K filter , digital filters , correction , stack and migration are discuss in this part of the report. Processing gather start with input SEG-Y formatted shot gathers, and then followed by amplitude correction, mute, frequency filtering, F-K Filtering, deconvolution, velocity analysis, NMO correction, stack, migration and view the 2-D slits in 3-D coordinate display. Comparison between the two results the one from 1970s and the new one produced by Claritas (software use to process seismic data) show that new results are more enhance and accurate which improve the geological interpretation result and make it more accurate .

  • 158.
    Yazdani, Tulha Moaiz
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Islam, Munawar
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Design And Fabrication Of A Microstrip Antenna For WI-MAX Applications2008Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    Worldwide Interoperability for Microwave Access (Wi-Max) is a broadband technology enabling the delivery of last mile (final leg of delivering connectivity from a communication provider to customer) wireless broadband access (alternative to cable and DSL). It should be easy to deploy and cheaper to user compared to other technologies. Wi-Max could potentially erase the suburban and rural blackout areas with no broadband Internet access by using an antenna with high gain and reasonable bandwidth Microstrip patch antennas are very popular among Local Area Network (LAN), Metropolitan Area Network (MAN), Wide Area Network (WAN) technologies due to their advantages such as light weight, low volume, low cost, compatibility with integrated circuits and easy to install on rigid surface. The aim is to design and fabricate a Microstrip antenna operating at 3.5GHz to achieve maximum bandwidth for Wi-Max applications. The transmission line model is used for analysis. S-parameters (S11 and S21) are measured for the fabricated Microstrip antenna using network analyzer in a lab environment. The fabricated single patch antenna brings out greater bandwidth than conventional high frequency patch antenna. The developed antenna also is found to have reasonable gain.

  • 159.
    Zafar, Muhammad-Sarfraz
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Gill, Muhammad-Shoaib
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Evaluation of UDP and SCTP for SIP-T and TCP, UDP and SCTP with constant traffic2009Independent thesis Advanced level (degree of Master (Two Years))Student thesis
    Abstract [en]

    In recent years, Voice over IP (VoIP) has gained a lot of popularity. Signaling being an important part of VoIP has been addressed by the (IETF) SIGTRAN working group to meet Quality of Service as given by Public Switched Telephone Network (PSTN), so that both PSTN and VoIP can co-exit and work together in a seamless manner SIP (Session Initiation Protocol) developed by IETF for VoIP signaling is a communication control protocol capable of running on different transport layers, e.g., TCP, UDP or SCTP. Today’s SIP application is mostly operating over the unreliable transport protocol UDP. In lossy environment such as wireless networks and congested Internet networks, SIP messages can be lost or delivered out of sequence. The SIP application then has to retransmit the lost messages and re-order the received packets. This additional processing overhead can degrade the performance of the SIP application. Therefore to solve this problem, the researchers are looking for a more appropriate transport layer for SIP. SCTP, a transport protocol providing acknowledged, error-free, non-duplicated transfer of messages, has been proposed to be an alternative to UDP [1] and TCP [2]. The multi-streaming and multi-homing features of SCTP are especially attractive for applications that have stringent performance and high reliability requirements and an example is the SIP proxy server. In this research, we have analyzed the performance offered by SCTP for SIP message delivery in the perspective of historic research work as well as determined call setup time using UDP and SCTP by simulating SIP traffic in Network Simulator-2 (ns-2). We also evaluate TCP, UDP and SCTP traffic with constant bit rate of traffic through ns-2

  • 160.
    Zepernick, Hans-Jürgen
    et al.
    Blekinge Institute of Technology, School of Engineering, Department of Signal Processing.
    Fiedler, Markus
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Lundberg, Lars
    Blekinge Institute of Technology, School of Engineering, Department of Systems and Software Engineering.
    Pettersson, Mats
    Blekinge Institute of Technology, School of Engineering, Department of Signal Processing.
    Quality of Experience Based Cross-Layer Design of Mobile Video Systems2008Conference paper (Refereed)
    Abstract [en]

    This paper introduces and discusses quality of experience based cross-layer design of mobile video systems as a means of providing technologies for jointly analyzing, adopting, and optimizing system quality. The many benefits of our novel approaches over traditional concepts will range from efficient video processing techniques over advanced real-time scheduling algorithms, to networking and service level management techniques. This will lead to better service quality and resource utilization in mobile video systems.

  • 161. Zhu, Chunsheng
    et al.
    Yang, Laurence T.
    Shu, Lei
    Duong, Quang Trung
    Blekinge Institute of Technology, School of Engineering, Department of Telecommunication Systems.
    Nishio, Shojiro
    Secured Energy-aware Sleep Scheduling Algorithm in Duty-cycled Sensor Networks2012Conference paper (Refereed)
    Abstract [en]

    Sleep scheduling algorithms for duty-cycled sensor networks have received great attention, since sensors should dynamically awake and asleep to save energy consumption. Among all current sleep scheduling algorithms, only the recently proposed energy consumed uniformly-connected k-neighborhood (EC-CKN) algorithm focuses on not only the coverage of the resultant network, but also the network lifetime after sleep scheduling. However, all sleep scheduling processes ignore the fact that potential insider attacks actually can seriously affect or destroy proper sleep scheduling operations and properties. In this paper, we discuss these vulnerabilities and propose corresponding countermeasures for EC-CKN, i.e., secure neighborhood authentication

1234 151 - 161 of 161
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf