Ändra sökning
Avgränsa sökresultatet
1234567 1 - 50 av 1399
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf
Träffar per sida
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sortering
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
  • Standard (Relevans)
  • Författare A-Ö
  • Författare Ö-A
  • Titel A-Ö
  • Titel Ö-A
  • Publikationstyp A-Ö
  • Publikationstyp Ö-A
  • Äldst först
  • Nyast först
  • Skapad (Äldst först)
  • Skapad (Nyast först)
  • Senast uppdaterad (Äldst först)
  • Senast uppdaterad (Nyast först)
  • Disputationsdatum (tidigaste först)
  • Disputationsdatum (senaste först)
Markera
Maxantalet träffar du kan exportera från sökgränssnittet är 250. Vid större uttag använd dig av utsökningar.
  • 1.
    Abdelsamad, Deena
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Video Transmission Jerkiness Measure2013Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    Digital video transmission is widely used nowadays in multimedia. Frame dropping, freeze and reduced number of frames in the transmitted video are common symptoms of bad transmission quality. In order to assess the quality of transmission, a criterion is introduced in a model for a no reference video jerkiness measure [3]. This model is dierent from the former models presented as it depends on viewing conditions and video resolutions, so it is applicable for any frame size from QCIF to HD. The model uses simple mathematical equations of jerkiness and can be used for any video sequence [3]. A model of reduced reference method (Qtransmission) which depends on a pre-measured Jerkiness is introduced as a suggestion of future work.

  • 2.
    Abelsson, Sara
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för signalbehandling.
    Propagation Measurements at 3.5 GHz for WiMAX2007Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    Propagation measurements at the frequency 3.5 GHz for the WiMAX technology have been conducted. The purpose of these measurements is that a coverage analysis should be accomplished. The mathematical software package MATLAB has been used to analyze the collected data from the measurement campaign. Path loss models have also been used and a comparison between these models and the collected data has been performed. An analysis prediction tool from an application called WRAP has also been used in the comparison with the collected data. In this thesis, diff

  • 3.
    Abualhana, Munther
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Tariq, Ubaid
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Improving QoE over IPTV using FEC and Retransmission2009Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    IPTV (Internet Protocol Television), a new and modern concept of emerging technologies with focus on providing cutting edge high-resolution television, broadcast, and other fascinating services, is now easily available with only requirement of high-speed internet. Everytime a new technology is made local, it faces tremendous problems whether from technological point of view to enhance the performance or when it comes down to satisfy the customers. This cutting edge technology has provided researchers to embark and play with different tools to provide better quality while focusing on existing tools. Our target in dissertation is to provide a few interesting facets of IPTV and come up with a concept of introducing an imaginary cache that can re-collect the packets travelling from streaming server to the end user. In the access node this cache would be fixed and then on the basis of certain pre-assumed research work we can conclude how quick retransmission can take place when the end user responds back using RTCP protocol and asks for the retransmission of corrupted/lost packets. In the last section, we plot our scenario of streaming server on one side and client, end user on the other end and make assumption on the basis of throughput, response time and traffic.

  • 4.
    Adapa, Sasank Sai Sujan
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    APPLYING LEAN PRINCIPLES FOR PERFORMANCE ORIENTED SERVICE DESIGN OF VIRTUAL NETWORK FUNCTIONS FOR NFV INFRASTRUCTURE: Concepts of Lean2016Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Context. Network Function Virtualization was recently proposed by European Telecommunications Standards Institute (ETSI) to improve the network service flexibility by virtualization of network services and applications that run on hardware. To virtualize network functions, the software is decoupled from underlying physical hardware. NFV aims to transform industries by reducing capital investments on hardware by using commercial-of-the-shelf (COTS) hardware. NFV makes rapid innovative growth in telecom services through software based service deployment.

    Objectives. This thesis work aims to investigate how business organizations function and the roles in defining a service relationship model. The work also aims to define a service relationship model and to validate it via proof of concept using network function virtualization as a service. For this thesis, we finally apply lean principles for the defined service relationship model to reduce waste and investigate how lean benefits the model to be proven as performance service oriented.

    Methods. The essence of this work is to make a business organization lean by investigating its actions and applying lean principles. To elaborate, this thesis work involves in a research of papers from IEEE, TMF, IETF and Ericsson. It results in modelling of a PoC by following requirement analysis methodology and by applying lean principles to eliminate unnecessary processes which doesn’t add any value.

    Results. The results of the work include a full-fledged service relationship model that include three service levels with roles that can fit in to requirement specifications of NFV infrastructure. The results also show the service levels functionalities and their relationships between the roles. It has also been observed that the services that are needed to be standardized are defined with syntax for ways to describe network functions. It is observed that lean principles benefit the service relationship model from reducing waste factors and hereby providing a PoC which is performance service oriented.

    Conclusions. We conclude that roles defined are fit for the service relationship model designed. Moreover, we conclude that the model can hence contain the flow of service by standardizing the subservices and reducing waste interpreted with lean principles and there is a need for further use case proof of the model in full scale industry trials. It also concludes the ways to describe network functions syntax which follows lean principles that are essential to have them for the sub-services standardization. However, PoC defined can be an assurance to the NFV infrastructure.

  • 5.
    Addu, Raj Kiran
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Potuvardanam, Vinod Kumar
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Effect of Codec Performance on Video QoE for videos encoded with Xvid, H.264 and WebM/VP82014Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    In recent years, there has been a significant growth in multimedia services such as mobile video streaming, Video-on-Demand and video conferencing. This has led to the development of various video coding techniques, aiming to deliver high quality video while using available bandwidth efficiently. This upsurge in the usage of video applications has also resulted in making endusers more quality-conscious. In order to meet the users’ expectations, the Quality of Experience (QoE) studies has gained utmost importance from both researchers and service providers. This thesis aims to compare the performance of H.264/AVC, Xvid and WebM/VP8 video codecs in wired and wireless networks. The codec performance is evaluated for different packet loss and delay variation values. The evaluation of codec performance is done using both subjective and objective assessment methods. In subjective assessment method, the evaluation of video codec performance is done using ITU-T recommended Absolute Category Rating (ACR) method. Using this method the perceptual video quality ratings are taken from the users, which are then averaged to obtain Mean Opinion Score. These obtained scores are used to analyze the performance of encoded videos with respect to users’ perception. In addition to subjective assessment method, the quality of encoded video is also measured using objective assessment method. The objective metric SSIM (Structural Similarity) is used to evaluate the performance of encoded videos. Based on the results, it was found that for lower packet loss and delay variation values H.264 showed better results when compared to Xvid and WebM/VP8 whereas, WebM/VP8 outperformed Xvid and H.264 for higher packet loss and delay variation values. On the whole, H.264 and WebM/VP8 performed better than Xvid. It was also found that all three video codecs performed better in wired network when compared to the wireless network.

  • 6.
    Adebomi, OYEKANLU Emmanuel
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Mwela, JOHN Samson
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Impact of Packet Losses on the Quality of Video Streaming2010Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    In this thesis, the impact of packet losses on the quality of received videos sent across a network that exhibit normal network perturbations such as jitters, delays, packet drops etc has been examined. Dynamic behavior of a normal network has been simulated using Linux and the Network Emulator (NetEm). Peoples’ perceptions on the quality of the received video were used in rating the qualities of several videos with differing speeds. In accordance with ITU’s guideline of using Mean Opinion Scores (MOS), the effects of packet drops were analyzed. Excel and Matlab were used as tools in analyzing the peoples’ opinions which indicates the impacts that different loss rates has on the transmitted videos. Statistical methods used for evaluation of data are mean and variance. We conclude that people have convergence of opinions when losses become extremely high on videos with highly variable scene changes

  • 7.
    Adeleke, Adesina
    Blekinge Tekniska Högskola, Sektionen för management.
    How External Forces are influencing the Ebusiness strategy of MTN-Nigeria2009Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    The Internet and e-business has had enormous impact on many companies in Nigeria and there has been much research on how e-business influences the environment, but little can be found on how the environment of a developing country like Nigeria influences e-business. In e-business, technology tells the business what can be done in smarter ways. Technology not only can make business more efficient but also can make business more effective in targeting and reaching markets, however technology cannot enhance business in isolation as there are other vital factors that equally impact business. This thesis presents an adapted version of the PESTEL (Political, Economic, Socio cultural, Technology, Environment, and Legal) framework so called e-business PESTEL framework, as a method for structural analysis of macro environment forces in the future. In addition to this PESTEL framework, the Porter’s five forces model was employed to analyse the industrial forces that also influence MTNN e-business strategy. The main goal of this research is to give an overview of industry and macro-environment forces influencing the e-business strategy MTN-Nigeria and the impact of future developments. The research methodology was explorative and descriptive. A further method for future analysis of the macro-environments influences and a suggestion on how to incorporate it in this research work is given. The e-business strategy of MTNN consists of four areas: E-procurement, E-collaboration (CRM), Supply chain management and E-commerce. The influences found on macro-environments level are political and sociocultural forces and in the industry levels are bargaining power of customers and suppliers of its products and services .The most recommendations are that MTN-Nigeria should add e-business PESTEL framework described in this thesis to its e-business strategy check. Furthermore MTNN should include environment analysis more extensively in their e-business strategy approach as the factors in this research work shape the environment in which it carries out its business.

  • 8.
    Adidamu, Naga Shruti
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Bheemisetty, Shanmukha Sai
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Assessment of Ixia BreakingPoint Virtual Edition: Evolved Packet Gateway2018Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
  • 9.
    Adolfsson, Henrik
    et al.
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Svensson, Peter
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Design and implementation of the MMS portal2006Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    MMS-enabled terminals on the market today are very complicated to use. It takes several steps to create a multi-slide MMS-message with images and text. This discourages users from using it. To increase usage of MMS, several companies provide web-based or stand-alone programs that allow users to create and send MMS-messages from a regular computer. However these editors have many limitations and are not user-friendly. This thesis describes the design and implementation of a user-friendly web-based MMS-portal where users can create, edit and send MMS-messages. The portal is integrated into Densitet’s system for development of mobile services. Conclusions that can be draw from this work are that problems with MMS interoperability have mostly the poor standardization to blame. Different terminals support different types of images and sound formats, and to make the MMS-portal user-friendly, format conversions of uploaded content had to be implemented. Also the MMS-portal only supports basic MMS-functionality. If the MMS-specification includes more audio and image formats and if the MMS-terminals are upgraded to handle these formats, sending MMS-messages will be easier and mobile messaging will continue to grow.

  • 10.
    Advaita, Advaita
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kreativa teknologier.
    Gali, Mani Meghala
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kreativa teknologier.
    Chu, Thi My Chinh
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kreativa teknologier.
    Zepernick, Hans-Juergen
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kreativa teknologier. Blekinge Inst Technol, SE-37179 Karlskrona, Sweden..
    Outage Probability of MIMO Cognitive Cooperative Radio Networks with Multiple AF Relays Using Orthogonal Space-Time Block Codes2017Ingår i: 2017 IEEE 13TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), IEEE , 2017, s. 84-89Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper, we analyze the outage probability of multiple-input multiple-output cognitive cooperative radio networks (CCRNs) with multiple opportunistic amplify-and-forward relays. The CCRN applies underlay spectrum access accounting for the interference power constraint of a primary network and utilizes orthogonal space-time block coding to transmit multiple data streams across a number of antennas over several time slots. As such, the system exploits both time and space diversity to improve the transmission reliability over Nakagami.. fading. The CCRN applies opportunistic relaying in which the relay offering the highest signal-to-noise ratio at the receiver is selected to forward the transmit signal. Furthermore, selection combining is adopted at the secondary receiver to process the signal from the direct and relaying transmissions. To evaluate system performance, we derive an expression for the outage probability which is valid for an arbitrary number of antennas at the source, relays, and receiver of the CCRN. Selected numerical results are provided using Mathematica for analysis and Matlab for simulations, to reveal the effect of network parameters on the outage probability of the system.

  • 11.
    Afaq, Muhammad
    et al.
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Faheem, Sahibzada Muhammad
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Performance Analysis of Selected Cooperative Relaying Techniques2010Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    Recently, cooperative communication has gained significant interest due to the fact that it exploits spatial diversity and provides capacity/performance gain over conventional single- input single-output (SISO) systems. A mobile node with single antenna can cooperate with a nearby mobile node having single antenna in multi-user environment to create the effect of virtual multiple antenna system. Hence, reducing the complexity associated with actual multiple antenna systems. Despite the small size and power constraints, a mobile node can still benefit from spatial diversity by employing cooperation, thus saving transmission power and increasing the coverage range of the network. In this thesis, we have selected some of relaying protocols, namely, amplify-and-forward, decode-and-forward, detect-and-forward, and selective detect-and-forward that are studied and implemented for two different relaying geometries, i.e. equidistant and collinear. Results are studied and compared with each other to show the performance of each protocol in terms of average symbol error probabilities. The considered system model has three nodes, i.e. source, relay, destination. Communicating nodes are considered to be half-duplex with single antenna for transmission and reception. The source, when communicating with the destination, broadcasts the information, which is heard by the nearby relay. The relay then uses one of the cooperation protocols. Finally, the relayed signal reaches the destination, where it is detected by maximal ratio combiner (MRC) and combined with the direct transmission for possible diversity gains. The transmission path or the channel is modeled as a frequency non-selective Rayleigh fading in the presence additive white Gaussian noise (AWGN). The effect of path loss has been observed on cooperation for collinear arrangement with exponential decay up to four. Considering equidistant arrangement, decode-and-forward shows good performance at high signal-to-noise ratio (SNR) while amplify-and-forward is very promising for very low SNR. A selective relaying scheme called selective detect-and- forward is also presented which outperforms its fixed counterparts for a wide range of SNR.

  • 12.
    Aftab, Adnan
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Mufti, Muhammad Nabeel
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Spectrum sensing through implementation of USRP22011Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    Scarcity of the wireless spectrum has led to the development of new techniques for better utilization of the wireless spectrum. Demand for high data rates and better voice quality is resulting in the development of new wireless standard making wireless spectrum limited than ever. In this era of wireless communication, service providers and telecom operators are faced with a dilemma where they need a large sum of the wireless spectrum to meet the ever increasing quality of service requirements of consumers. This has led to the development of spectrum sensing techniques to find the unused spectrum in the available frequency band. The results presented in this thesis will help out in developing clear understanding of spectrum sensing techniques. Comparison of different spectrum sensing approaches. The experiments carried out using USRP2 and GNU radio will help the reader to understand the concept of underutilized frequency band and its importance in Cognitive Radios.

  • 13.
    Ahmad, Nadeem
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Habib, M. Kashif
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Analysis of Network Security Threats and Vulnerabilities by Development & Implementation of a Security Network Monitoring Solution2010Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [sv]

    Konfidentiella uppgifter via Internet blir vanligare varje dag. Personer och organisationer skickar sina konfidentiella uppgifter elektroniskt. Det är också vanligt att hackare mot dessa nät. I dagens tider, skydd av data, programvara och hårdvara från virus är, nu mer än någonsin ett behov och inte bara en oro. Vad du behöver veta om nätverk i dessa dagar? Hur säkerheten genomförs för att säkerställa ett nätverk? Hur säkerheten hanteras? I denna skrift kommer vi att försöka ta itu med dessa frågor och ge en uppfattning om var vi nu står med säkerheten för nätet.

  • 14.
    Ahmad, Naseer
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Security Issues in Wireless Systems2009Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    ireless Communication is one of the fields of Telecommunications which is growing with the tremendous speed. With the passage of time wireless communication devices are becoming more and more common. It is not only the technology of business but now people are using it to perform their daily tasks, be it for calling, shopping, checking their emails or transfer their money. Wireless communication devices include cellular phones, cordless phones and satellite phones, smart phones like Personal Digital Assistants (PDA), two way pagers, and lots of their devices are on their way to improve this wireless world. In order to establish two way communications, a wireless link may be using radio waves or Infrared light. The Wireless communication technologies have become increasingly popular in our everyday life. The hand held devices like Personal Digital Assistants (PDA) allow the users to access calendars, mails, addresses, phone number lists and the internet. Personal digital assistants (PDA) and smart phones can store large amounts of data and connect to a broad spectrum of networks, making them as important and sensitive computing platforms as laptop PCs when it comes to an organization’s security plan. Today’s mobile devices offer many benefits to enterprises. Mobile phones, hand held computers and other wireless systems are becoming a tempting target for virus writers. Mobile devices are the new frontier for viruses, spam and other potential security threats. Most viruses, Trojans and worms have already been created that exploit vulnerabilities. With an increasing amount of information being sent through wireless channels, new threats are opening up. Viruses have been growing fast as handsets increasingly resemble small computers that connect with each other and the internet. Hackers have also discovered that many corporate wireless local area networks (WLAN) in major cities were not properly secured. Mobile phone operators say that it is only a matter of time before the wireless world is hit by the same sorts of viruses and worms that attack computer software.

  • 15.
    Ahmad, Waqas
    et al.
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Aslam, Muhammad Kashif
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    An investigation of Routing Protocols in Wireless Mesh Networks (WMNs) under certain Parameters2009Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [sv]

    Wireless Mesh Networks (WMNs) bringar revolutionerande förändring inom området för trådlösa nätverk. Det är en pålitlig teknik i tillämpningar såsom bredband hemma nätverk, nätverkshantering och senaste transportsystem. WMNs består av mesh routrar, kunder mesh och gateways. Det är en speciell typ av trådlöst ad-hoc-nätverk. En av frågorna i WMNs är resurshushållning som inkluderar routing och routing det finns särskilda routingprotokoll som ger bättre prestanda vid kontroll med vissa parametrar. Parametrar i WMNs omfatta dröjsmål, genomströmning, belastningen på nätet etc. Det finns två typer av routingprotokoll dvs reaktiva protokoll och proaktiva protokoll. Tre routingprotokoll AODV, DSR och OLSR har testats i WMNs under vissa parametrar som är försenade, genomströmning och belastningen på nätet. Testning av dessa protokoll kommer att utföras i den optimerade Network Evaluation Tool (OPNET) Modeler 14.5. De erhållna resultaten från OPNET kommer att visas i denna avhandling i form av grafer. Denna uppsats kommer att bidra till att godkänna vilka routingprotokoll kommer att ge bäst resultat enligt den antagna förhållanden. Dessutom kommer denna uppsats rapport kommer att bidra till att göra mer forskning i framtiden på detta område och bidra till att generera nya idéer inom detta forskningsområde som kommer att öka och att nya funktioner i WMNs.

  • 16.
    Ahmadi Mehri, Vida
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datavetenskap.
    Towards Secure Collaborative AI Service Chains2019Licentiatavhandling, sammanläggning (Övrigt vetenskapligt)
    Abstract [en]

    At present, Artificial Intelligence (AI) systems have been adopted in many different domains such as healthcare, robotics, automotive, telecommunication systems, security, and finance for integrating intelligence in their services and applications. The intelligent personal assistant such as Siri and Alexa are examples of AI systems making an impact on our daily lives. Since many AI systems are data-driven systems, they require large volumes of data for training and validation, advanced algorithms, computing power and storage in their development process. Collaboration in the AI development process (AI engineering process) will reduce cost and time for the AI applications in the market. However, collaboration introduces the concern of privacy and piracy of intellectual properties, which can be caused by the actors who collaborate in the engineering process.  This work investigates the non-functional requirements, such as privacy and security, for enabling collaboration in AI service chains. It proposes an architectural design approach for collaborative AI engineering and explores the concept of the pipeline (service chain) for chaining AI functions. In order to enable controlled collaboration between AI artefacts in a pipeline, this work makes use of virtualisation technology to define and implement Virtual Premises (VPs), which act as protection wrappers for AI pipelines. A VP is a virtual policy enforcement point for a pipeline and requires access permission and authenticity for each element in a pipeline before the pipeline can be used.  Furthermore, the proposed architecture is evaluated in use-case approach that enables quick detection of design flaw during the initial stage of implementation. To evaluate the security level and compliance with security requirements, threat modeling was used to identify potential threats and vulnerabilities of the system and analyses their possible effects. The output of threat modeling was used to define countermeasure to threats related to unauthorised access and execution of AI artefacts.

  • 17.
    Ahmadi Mehri, Vida
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik. Blekinge Institute of technology.
    Ilie, Dragos
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Tutschku, Kurt
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Privacy and DRM Requirements for Collaborative Development of AI Application2018Ingår i: ACM International Conference Proceeding Series, Association for Computing Machinery (ACM), 2018, artikel-id 3233268Konferensbidrag (Refereegranskat)
    Abstract [en]

    The use of data is essential for the capabilities of Data-driven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. This data usage, however, raises intrinsically the concerns on data privacy. In addition, supporting collaborative development of AI applications across organisations has become a major need in AI system design. Digital Rights Management (DRM) is required to protect intellectual property in such collaboration. As a consequence of DRM, privacy threats and privacy-enforcing mechanisms will interact with each other.

    This paper describes the privacy and DRM requirements in collaborative AI system design using AI pipelines. It describes the relationships between DRM and privacy and outlines the threats against these non-functional features. Finally, the paper provides first security architecture to protect against the threats on DRM and privacy in collaborative AI design using AI pipelines. 

  • 18.
    Ahmadi Mehri, Vida
    et al.
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Ilie, Dragos
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för datalogi och datorsystemteknik.
    Tutschku, Kurt
    Towards Privacy Requirements for Collaborative Development of AI Applications2018Ingår i: 14th Swedish National Computer Networking Workshop (SNCNW), 2018Konferensbidrag (Refereegranskat)
    Abstract [en]

    The use of data is essential for the capabilities of Data- driven Artificial intelligence (AI), Deep Learning and Big Data analysis techniques. The use of data, however, raises intrinsically the concern of the data privacy, in particular for the individuals that provide data. Hence, data privacy is considered as one of the main non-functional features of the Next Generation Internet. This paper describes the privacy challenges and requirements for collaborative AI application development. We investigate the constraints of using digital right management for supporting collaboration to address the privacy requirements in the regulation.

  • 19.
    ahmed, amar
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Performance and Modeling of SIP Session Setup2009Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    During the recent last years, transport of multimedia sessions, such as audio streams and video conferences, over IP has acquired a lot of attention since most of communication technologies are migrating to work over IP. However, sending media streams over IP networks has encountered some problems related to signaling issues. The ongoing research in this area has produced some solutions to this subject. Internet Engineering Task Force (IETF) has introduced Session Initiation Protocol (SIP), which has proved to be an efficient protocol for controlling sessions over IP. While a great deal of research performed in evaluating the performance of SIP and comparing it with its competent protocols such as H.323, studying the delay caused by initiating the session has acquired less attention. In this document, we have addressed the SIP session setup delay problem. In the lab, we have built up a test bed for running several SIP session scenarios. Using different models for those scenarios, we have measured session setup delays for all used models. The analysis performed for each model showed that we could propose some models to be applied for SIP session setup delay components.

  • 20.
    Ahmed, Ashraf AwadElkarim Widaa
    et al.
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Makki, Ahmed Hamza Ibrahim
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Performance Evaluation of Uplink Multiple Access Techniques in LTE Mobile Communication System2010Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    The User Equipments (UE) nowadays are able to provide various internet applications and services that raise the demand for high speed data transfer and Quality of Service (QoS). Accordingly, next generation mobile communication systems driven by these demands are expected to provide higher data rates and better link quality compared to the existing systems. Orthogonal Frequency Division Multiple Access (OFDMA) and Single Carrier Frequency Division Multiple Access (SC-FDMA) are strong multiple access candidates for the uplink of the International Mobile Telecommunications-Advanced (IMT-Advanced). These multiple access techniques in combination with other promising technologies such as multi-hops transmission and Multiple-Input-Multiple-Output (MIMO) will be utilized to reach the targeted IMT-Advanced system performance. In this thesis, OFDMA and SC-FDMA are adopted and studied in the uplink of Long Term Evolution (LTE). Two transmission scenarios are considered, namely the single hop transmission and the relay assisted transmission (two hops). In addition, a hybrid multiple access technique that combines the advantages of OFDMA and SC-FDMA in term of low Peak-to-Average Power Ratio (PAPR) and better link performance (in terms of Symbol Error Rate (SER)) has been proposed in relay assisted transmission scenario. Simulation results show that the proposed hybrid technique achieves better end-to-end link performance in comparison to the pure SC-FDMA technique and maintains the same PAPR value in access link. In addition, a lower PAPR is achieved compared to OFDMA case, which is an important merit in the uplink transmission due to the UE’s power resources constraint (limited battery power).

  • 21.
    Ahmed, Ishtiaque
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Study of the Local Backprojection Algorithm for Image Formation in Ultra Wideband Synthetic Aperture Radar2008Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    The purpose of this thesis project is to study and evaluate a UWB Synthetic Aperture Radar (SAR) data image formation algorithm, that was previously less familiar and, that has recently got much attention in this field. Certain properties of it made it acquire a status in radar signal processing branch. This is a fast time-domain algorithm named Local Backprojection (LBP). The LBP algorithm has been implemented for SAR image formation. The algorithm has been simulated in MATLAB using standard values of pertinent parameters. Later, an evaluation of the LBP algorithm has been performed and all the comments, estimation and judgment have been done on the basis of the resulting images. The LBP has also been compared with the basic time-domain algorithm Global Backprojection (GBP) with respect to the SAR images. The specialty of LBP algorithm is in its reduced computational load than in GBP. LBP is a two stage algorithm — it forms the beam first for a particular subimage and, in a later stage, forms the image of that subimage area. The signal data collected from the target is processed and backprojected locally for every subimage individually. This is the reason of naming it Local backprojection. After the formation of all subimages, these are arranged and combined coherently to form the full SAR image.

  • 22.
    Ahmed, Mamun
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Adaptive Sub band GSC Beam forming using Linear Microphone-Array for Noise Reduction/Speech Enhancement.2012Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    This project presents the description, design and the implementation of a 4-channel microphone array that is an adaptive sub-band generalized side lobe canceller (GSC) beam former uses for video conferencing, hands-free telephony etc, in a noisy environment for speech enhancement as well as noise suppression. The side lobe canceller evaluated with both Least Mean Square (LMS) and Normalized Least Mean Square (NLMS) adaptation. A testing structure is presented; which involves a linear 4-microphone array connected to collect the data. Tests were done using one target signal source and one noise source. In each microphone’s, data were collected via fractional time delay filtering then it is divided into sub-bands and applied GSC to each of the subsequent sub-bands. The overall Signal to Noise Ratio (SNR) improvement is determined from the main signal and noise input and output powers, with signal-only and noise-only as the input to the GSC. The NLMS algorithm significantly improves the speech quality with noise suppression levels up to 13 dB while LMS algorithm is giving up to 10 dB. All of the processing for this thesis is implemented on a computer using MATLAB and validated by considering different SNR measure under various types of blocking matrix, different step sizes, different noise locations and variable SNR with noise.

  • 23.
    Ahmed, Sabbir
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för signalbehandling.
    Performance of Multi-Channel Medium Access Control Protocol incorporating Opportunistic Cooperative Diversity over Rayleigh Fading Channel2006Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    This thesis paper proposes a Medium Access Control (MAC) protocol for wireless networks, termed as CD-MMAC that utilizes multiple channels and incorporates opportunistic cooperative diversity dynamically to improve its performance. The IEEE 802.11b standard protocol allows the use of multiple channels available at the physical layer but its MAC protocol is designed only for a single channel. The proposed protocol utilizes multiple channels by using single interface and incorporates opportunistic cooperative diversity by using cross-layer MAC. The new protocol leverages the multi-rate capability of IEEE 802.11b and allows wireless nodes far away from destination node to transmit at a higher rate by using intermediate nodes as a relays. The protocol improves network throughput and packet delivery ratio significantly and reduces packet delay. The performance improvement is further evaluated by simulation and analysis.

  • 24. Ahmed, Sabbir
    et al.
    Casas, Christian Ibar
    Coso, Aitor del
    Mohammed, Abbas
    Performance of Multi-Channel MAC incorporating Opportunistic Cooperative Diversity2007Konferensbidrag (Refereegranskat)
  • 25.
    Aida, Horaniet
    et al.
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Isabel, Llorente
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Formation of High Resolution Images in SAR using GNSS2009Självständigt arbete på grundnivå (kandidatexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    The aim of this thesis is to investigate the possibility to form high resolution Synthetic Aperture Radar (SAR) images using the Global Navigation Satellite System (GNSS) Galileo, GPS and Glonas, In particular the thesis study the GPS signal and evaluate its properties for bistatic case. The report is based on the fact that Galileo and GPS are both positioning systems with similar characteristics. The difference is mainly that Galileo System uses a larger number of satellites and a different modulation scheme to improve the efficiency of the system, resulting in a better accuracy. On the topic of GNSS SAR, the report will be described with modes, resolution, geometry and algorithms. It is also explained the Space Surface Bi-static Radar and within two particular cases: parallel and non parallel paths

  • 26.
    Ajayi, Taiwo Seun
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Mobile Satellite Communications: Channel Characterization and Simulation2007Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    Abstract: The channel characterization of a mobile satellite communication which is an important and fast growing arm of wireless communication plays an important role in the transmission of information through a propagation medium from the transmitter to the receiver with minimum barest error rate putting into consideration the channel impairments of different geographical locations like urban, suburban, rural and hilly. The information transmitted from satellite to mobile terminals suffers amplitude attenuation and phase variation which is caused by multipath fading and signal shadowing effects of the environment. These channel impairments are commonly described by three fading phenomena which are Rayleigh fading, Racian fading and Log-normal fading which characterizes signal propagation in different environments. They are mixed in different proportions by different researchers to form a model to describe a particular channel. In the thesis, the general overview of mobile satellite is conducted including the classification of satellite by orbits, the channel impairments, the advantages of mobile satellite communication over terrestrial. Some of the major existing statistical models used in describing different type of channels are looked into and the best out of them which is Lutz model [6] is implemented. By simulating the Lutz model which described all possible type of environments into two states which represent non-shadowed or LOS and shadowed or NLOS conditions, shows that the BER is predominantly affected by shadowing factor.

  • 27.
    Akbar, Zeeshan
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Ali, Asar
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Evaluation of AODV and DSR Routing Protocols of Wireless Sensor Networks for Monitoring Applications2009Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [sv]

    In all the three scenarios of small, large and very large networks AODV gives considerably less delay as compared to DSR. AODV outperforms DSR with prominent difference in delay. In terms of delay the network size has an impact on both AODV and DSR performance.  The throughput rate of AODV in small and large networks exceeds with a little margin than the throughput rate of DSR but in case of large networks the difference is prominent and AODV by far performs better than DSR.

  • 28.
    Akber, Raza
    et al.
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Raza, Syed Aqeel
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Shafique, Usman
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Performance Evaluation of WiMAX2009Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    The advancements in broadband and mobile communication has given many privileges to the subscribers for instance high speed data connectivity, voice and video applications in economical rates with good quality of services. WiMAX is an eminent technology that provides broadband and IP connectivity on “last mile” scenario. It offers both line of sight and non-line of sight wireless communication. Orthogonal frequency division multiple access is used by WiMAX on its physical layer. Orthogonal frequency division multiple access uses adaptive modulation technique on the physical layer of WiMAX and it uses the concept of cyclic prefix that adds additional bits at the transmitter end. The signal is transmitted through the channel and it is received at the receiver end. Then the receiver removes these additional bits in order to minimize the inter symbol interference, to improve the bit error rate and to reduce the power spectrum. In our research work, we investigated the physical layer performance on the basis of bit error rate, signal to noise ratio, power spectral density and error probability. These parameters are discussed in two different models. The first model is a simple OFDM communication model without the cyclic prefix, while the second model includes cyclic prefix.

  • 29.
    Akinwande, Gbenga Segun
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Signaling Over Protocols Gateways in Next-Generation Networks2009Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    In this thesis, I examined various signalling both in wired and mobile networks, with more emphasis on SIGTRAN. The SIGTRAN is the protocol suite applicable in the current new generation and next-generation networks, most especially as it enables service provider to be able to interpolate both wireline and wireless services within the same architecture. This concept is an important component in today’s Triple-play communication, and hence this thesis has provided a broad view on Signalling and Protocol Gateways in Traditional and Next Generations Networks. Signal flow in a typical new generation network was examined by carrying out discrete event simulation of UMTS network using OPNET modeller 14.5. Through both Packet-Switching (PS) and Circuit-Switching (CS) signalling, I was able to examine the QoS on a UMTS. Precisely, I looked at throughput on UMTS network by implementing WFQ and MDRR scheduling schemes.

  • 30.
    Alahari, Yeshwanth
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Buddhiraja, Prashant
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Analysis of packet loss and delay variation on QoE for H.264 andWebM/VP8 Codecs2011Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    The popularity of multimedia services over Internet has increased in the recent years. These services include Video on Demand (VoD) and mobile TV which are predominantly growing, and the user expectations towards the quality of videos are gradually increasing. Different video codec’s are used for encoding and decoding. Recently Google has introduced the VP8 codec which is an open source compression format. It is introduced to compete with existing popular codec namely H.264/AVC developed by ITU-T Video Coding Expert Group (VCEG), as by 2016 there will be a license fee for H.264. In this work we compare the performance of H.264/AVC and WebM/VP8 in an emulated environment. NetEm is used as an emulator to introduce delay/delay variation and packet loss. We have evaluated the user perception of impaired videos using Mean Opinion Score (MOS) by following the International Telecommunication Union (ITU) Recommendations Absolute Category Rating (ACR) and analyzed the results using statistical methods. It was found that both video codec’s exhibit similar performance in packet loss, But in case of delay variation H.264 codec shows better results when compared to WebM/VP8. Moreover along with the MOS ratings we also studied the effect of user feelings and online video watching experience impacts on their perception.

  • 31.
    Alam, Md. Jobayer
    et al.
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Sujan, Shaha Mohammed Goni Abed
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Low Complexity Channel Estimation for OFDM Systems Based on LS and MMSE Estimators’2010Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    In this paper we investigate the block-type pilot channel estimation for orthogonal frequency-division multiplexing (OFDM) systems. The estimation is based on the minimum mean square error (MMSE) estimator and the least square (LS) estimator. We derive the MMSE and LS estimators’ architecture and investigate their performances. We prove that the MMSE estimator performance is better but computational complexity is high, contrary the LS estimator has low complexity but poor performance. For reducing complexity we proposed two different solutions which are the Simplified Least Square (SLS) estimator and the modified MMSE estimator. We evaluate estimator’s performance on basis of mean square error and symbol error rate for 16 QAM systems. We also evaluate estimator’s computational complexity.

  • 32.
    Alam, Md. Khorshed
    Blekinge Tekniska Högskola, Sektionen för teknik, Avdelningen för telekommunikationssystem.
    Linear Unequal Error Protection for Region of Interest Coded Images over Wireless Channels2005Självständigt arbete på avancerad nivå (magisterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    In this thesis, an unequal error protection scheme for transmitting JPEG2000 images over wireless channel is investigated. The rapid growth of wireless communication has resulted in a demand for robust transmission of compressed images over wireless networks. The challenge of robust transmission is to protect the compressed image data against the impairments of the radio channel, in such a way as to maximize the received image quality. However, for highly compressed images, it would be beneficial that regions of interest (ROI) are prioritized for interpretability. The thesis addresses this problem; investigating unequal error protection for transmitting JPEG2000 compressed images. More particularly, the results reported in this thesis provide guidance concerning the implementation of stronger error correction coding schemes (Golay code) for ROI and comparatively weaker coding (Hamming code) for non-ROI image spaces. Such unequal error protection can be utilized by the base station for transmitting JPEG2000-encoded images over next generation wireless networks.

  • 33.
    ALAM, MD. SHAMSER
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    On sphere detection for OFDM based MIMO systems2010Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    The mobile wireless communication systems has been growing fast and continuously over the past two decades. Therefore, in order to fulfill the demand for this rapid growth, the standardization bodies along with wireless researchers and mobile operators around the world have been constantly working on new technical specifications.An important problem in modern communication is known as NP complete problem in the Maximum Likelihood (ML) detection of signals transmitting over Multiple Input Multiple Output channel of the OFDM transceiver system. Development of the Sphere Decoder (SD) as a result of the rapid advancement in signal processing techniques provides ML detection for MIMO channels at polynomial time complexity average case. There are weaknesses in the existing SDs. The sphere decoder performance is very sensitive for the most current proposals in order to choose the search radius parameter. At high spectral efficiencies SNR is low or as the problem dimension is high and the complexity coefficient can become very large too. Digital communications of detecting a vector of symbols has importance as, is encountered in several different applications. These symbols are as the finite alphabet and transmitted over a multiple-input multiple-output (MIMO) channel with Gaussian noise. There are no limitation to the detection of symbols spatially multiplexed over a multiple-antenna channel and the multi user detection problem. Efficient algorithms are considered for the detection problems and have recognized well. The algorithm of sphere decoder, orders has optimal performance considering the error probability and this has proved extremely efficient in terms of computational complexity for moderately sized problems in case of signal to noise ratio. At high SNR the algorithm has a polynomial average complexity and it is understood the algorithm has an exponential worst case complexity. The efficiency of the algorithm is ordered the exponential rate derivation of growth. Complexity is positive for the finite SNR and small in the high SNR. To achieve the sphere decoding solution applying Schnorr-Euchner by Maximum likelihood method , Depth-first Stack-based Sequential decoding is used. This thesis focuses on the receiver part of the transceiver system and takes a good look at the near optimal algorithm for sphere detection of a vector of symbols transmitted over MIMO channel. The analysis and algorithms are general in nature.

  • 34.
    Alam, Tahmid
    et al.
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Irshad, Sharmeen
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    SW features in power systems for telecom equipment2013Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    This thesis report is a research effort with Ericsson’s devices and internal documents. In essence this thesis report contributes with a perspective to understand the power system of Radio Base Station and its features. The overall research aim is to understand the existing power system and its features and to propose new software and hardware features. A lot of investigations have been done with the Functional Specification and Requirement Specification documents for analysis of the present features. The main goal is to identify software features and their benefits to customer. After analysing the present features new features were proposed. For the proposal many steps were taken into consideration including cost and system information. Also some hardware changes have been required. With the new proposed features, the power system will perform better with different environments and also some of the proposals were improvements of the existing features. The proposed features are mostly focused on power saving and cost to benefit the customer.

  • 35.
    Aldalaty, Khalid
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Mobile IP handover delay reduction using seamless handover architecture2009Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    Seamless communication is becoming the main aspect for the next generation of the mobile and wireless networks. Roaming among multiple wireless access networks connected together through one IP core makes the mobility support for the internet is very critical and more important research topics nowadays. Mobile IP is one of the most successful solutions for the mobility support in the IP based networks, but it has poor performance in term of handover delay. Many improvements have been done to reduce the handover delay, which result in two new standards: the Hierarchical MIP (HMIP) and the Fast MIP (FMIP), but the delay still does not match the seamless handover requirements. Finally Seamless MIP (S-MIP) has been suggested by many work groups, which combine between an intelligent handover algorithm and a movement tracking scheme. In This thesis, we show the handover delay reduction approaches, specifically the Seamless Mobile IP. The thesis studies the effects of the S-MIP in the handover delay and the network performance as well. A simulation study takes place to compare between the standard MIP and the new suggested S-MIP protocol in term of handover delay, packet loss and bandwidth requirement. The thesis concludes with the analyzing of the simulation results, evaluating the S-MIP performance and finally gives some suggestions for the future work.

  • 36.
    Al-Delemi, Shahad
    Blekinge Tekniska Högskola, Sektionen för management.
    Virtual Meeting's efficiency2011Studentuppsats (Examensarbete)
    Abstract [sv]

    Many organizations choose to work in a distributed environment in order to be competitive in many locations both nationally and internationally. The new technologi make it possible for organizations to communicate, collaborate and develop at a distance. That means that many projectmeetings that require employees from different locations to meet can be hold virtually. This contributes to significant savings for organizations, temporally and financially. This study will focus on the technical communication tools and meetings’ discipline and how these factors affect the efficiency of virtual meetings. In the company where the study took place their projects are very distributed across the country, which means that employees are dependent on the virtual meetings to develop at a distance. This study was conducted using participant observation and structured interviews. The results of this study show that different factors related to the Technical communication tools and meetings’ discipline has a big impact on the efficiency of virtual meetings.

  • 37.
    Aleti, Mahesh
    et al.
    Blekinge Tekniska Högskola, Fakulteten för teknikvetenskaper, Institutionen för tillämpad signalbehandling.
    Syed, Rahamatulla
    Blekinge Tekniska Högskola, Fakulteten för teknikvetenskaper, Institutionen för tillämpad signalbehandling.
    Chennupati, Rajendra Prasad
    Blekinge Tekniska Högskola, Fakulteten för teknikvetenskaper, Institutionen för tillämpad signalbehandling.
    Fuzzy Based power control system Using ANFIS and MIMO-OFDM Techniques in Cognitive Radio Networks2014Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    Cognitive Radio technology is used for efficient utilization of the spectrum. There are two types of users, one is the Primary user (PU), and the second one is the Secondary user (SU). In those users, PU is having the license to use the spectrum. The SU does not have the license to use the spectrum. Cognitive Radio comprises of Spectrum sensing, Spectrum Management and Spectrum Mobility. In cognitive radio, optimal power control in spectrum sharing is main research issues. In the spectrum, sharing both PU and SU can access the spectrum simultaneously as long as there is no interference to PU’s of Quality of service (QOS). So we have to handle this interference to the PU and we have to improve the performance of the SU. For that power control is the main consternate to improve the performance of SU. In our thesis, we are divided into two parts, the first one is we used ANFIS (Adaptive Neuro Fuzzy Inference System) for optimizing power control in cognitive radio network Users (SU) by optimization of SNR & SINR at Primary User (PU) to maintain QOS of PU and improve the performance of SU and Channel capacity computation for various ISR tolerance levels at PU. In second part, we used implementation of MIMO (Multiple Input Multiple output)-OFDM (Orthogonal Frequency Division Multiplexing) transmission technique in CRN (Cognitive Radio networks) for it is use in emergency conditions where transmission requires reliability and high data rate. Then it is tested BER (Bit error rate) performance on MATLAB. Key words: Cognitive Radio, Power Control, the Fuzzy Interference System (FIS), ANFIS, “MIMO” (“Multiple Input Multiple Output”), “OFDM” (“Orthogonal Frequency Division Multiplexing”), AWGN, BER, SNR, Eb/N0

  • 38.
    Alfallah, Abdulaziz
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Alkaabey, Hieder
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Study the Performance of the Use of SIP for Video Conferencing2011Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    The recent decades have witnessed enormous development in communication world; especially in internet technology that has played an important role in moving forward the human communications, with such development user demands better communication services such as video conferencing. Video conferencing becomes more popular nowadays since it can break the constraints on the communication ways of people who are probably exist in diverse geographical locations in real time. SIP is preferred to be used as signaling protocol for video conferencing, but still using SIP for video conferencing is affected by the delay which reduces the satisfaction of user as it decreases the QoS. This thesis work is aimed to study the performance of SIP signaling for video conferencing, and also describing the causes of the delay in SIP session establishment and termination. The literature review and the two simulations have been carried out in this thesis to examine the effect of specific parameters on the session setup delay. The first study is carried out by using ns-2 to simulate different transport protocols and study their effect on session setup delay. The second study is carried out by using SIPp to achieve two objects. The first object is to study the relationship between number of simultaneous calls on both the session setup delay and call release delay, while the second object is to verify the result of changing transport modes of transport protocol for both session setup delay and call release delay. The results obtained from first simulation showed that utilizing UDP as transport protocol will return less session setup delay than TCP and SCTP. The first objective of the second simulation results clarify the relationship between number of simultaneous calls on both the session setup delay and call release delay which was directly proportional; on the other hand the second object showed that by using UDP in mono socket mode has less session setup delay and call release delay.

  • 39.
    Ali, Hassan
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Yazdani, Talha Moiz
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Measurement Tools for IP Multimedia Subsystems (IMS)2009Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [sv]

    En översikt och utvärdering av mätverktyg för signalieringen inom IMS. En väl fungerande signalering är viktigtför bra tjänstekvalitet.

  • 40.
    Ali, Hazrat
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    A Performance Evaluation of RPL in Contiki2012Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [sv]

    En Wireless Sensor Network består av flera små enheter som omfattar de förmåga avkänning en fysisk egenskap och skicka den hoppa med hopp till en centrala noden via låg effekt och kort sändtagare räckvidd. Det sensornätverk livslängd är starkt beroende av routingprotokoll som används. Routingprotokoll är ansvarar för att vidarebefordra trafik och göra routing beslut. Om dirigeringen beslut som fattas inte är intelligenta, kommer fler återsändningar förekomma på nätverk som förbrukar begränsade resurser trådlösa sensornätverk som energi, bandbredd och bearbetning. Därför är en noggrann och omfattande prestanda analys behövs för routingprotokoll används av alla trådlösa sensornätverk. I denna studie undersöker vi mål Funktioner och den mest inflytelserika parametrar Routing Protokoll för låg effekt och Förstörande nätverk (RPL) prestanda i Contiki (WSN OS) och sedan utvärdera RPL prestanda vad gäller av energi, fördröjning, Packet Delivery Ratio, kontroll overhead och konvergens Dags för nätverket. Vi har genomfört omfattande simuleringar som ger en detaljerad analys av olika RPL parametrar med avseende på de fem resultatstatistik. Studien ger en inblick i de olika RPL inställningar som är lämpliga för olika användningsområden. Experimentella resultat visar ETX är en bättre målsättning och att ContikiRPL ger mycket effektivt nätverk Konvergens (14s), Control trafik overhead (1300 paket), Energiförbrukning (1,5% radio i tid), Latens (0,5 s), och paket Leverans Ratio (98%) i vårt urval RPL simulering av en timme med 80 noder, efter noggrann konfiguration av DIO intervall minimum / dubbleringar, Radio plikt cykling, och frekvensen av ansökan meddelanden.

  • 41.
    Ali, Mohsin
    et al.
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Nasir, Muhammad Jamal
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Echo Cancellation using PMSAF and Compare the performance with NLMS and improved PNLMS under different Impulse responses2013Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    In the field of signal processing adaptive filtering is a major subject which has vast applications in speech processing e.g. speech coding, speech enhancement, echo cancellation and interference. Echo is the major problem in the communication systems. There are two major types of echoes hybrid and acoustic echoes. In order to remove these echoes the most important method for removing these echoes is through cancellation. Adaptive filters are used to estimate the replication of echoes and then subtracted from the infected signal. . We introduced subband filters to improve the performance of adaptive filter (time domain). Due to small adaptive filters in the subband filter banks, we can improve the reduction of complexity, computational and convergence level as compared with others. The major goal of this thesis is to present the echo cancellation using the multiband subband adaptive filtering and also compare the performance with NLMS and Improved PNLMS using different impulse responses. PMSAF algorithm behaves continuously better convergense rate with excitation signal (colored noise and speech signal) for both impulse responses (sparse and dispersive) as compared with IPNLMS and NLMS algorithms.

  • 42.
    Ali, Muhammad Usman
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Cloud Computing as a Tool to Secure and Manage Information Flow in Swedish Armed Forces Networks2012Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    In the last few years cloud computing has created much hype in the IT world. It has provided new strategies to cut down costs and provide better utilization of resources. Apart from all drawbacks, the cloud infrastructure has been long discussed for its vulnerabilities and security issues. There is a long list of service providers and clients, who have implemented different service structures using cloud infrastructure. Despite of all these efforts many organizations especially with higher security concerns have doubts about the data privacy or theft protection in cloud. This thesis aims to encourage Swedish Armed Forces (SWAF) networks to move to cloud infrastructures as this is the technology that will make a huge difference and revolutionize the service delivery models in the IT world. Organizations avoiding it would lag behind but at the same time organizations should consider to adapt a cloud strategy most reliable and compatible with their requirements. This document provides an insight on different technologies and tools implemented specifically for monitoring and security in cloud. Much emphasize is given on virtualization technology because cloud computing highly relies on it. Amazon EC2 cloud is analyzed from security point of view. An intensive survey has also been conducted to understand the market trends and people’s perception about cloud implementation, security threats, cost savings and reliability of different services provided.

  • 43.
    Ali, Sajjad
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Ali, Asad
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Performance Analysis of AODV, DSR and OLSR in MANET2010Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [sv]

    In all the three scenarios of small, large and very large networks OLSR gives considerably less delay and high throughput as compared to AODV and DSR. OLSR outperforms AODV and DSR with prominent difference in delay and throughput. While the AODV puts low load on the network in large and very large networks. OLSR outperforms in our study, but it is not necessary that OLSR always perform better in all the networks, its performance may vary by varying the network.

  • 44.
    Ali, Wajahat
    et al.
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Muhammad, Asad
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Response Time Effects on Quality of Security Experience2012Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    The recent decade has witnessed an enormous development in internet technology worldwide. Initially internet was designed for applications such as Electronic Mail and File Transfer. With technology evolving and becoming popular, people use internet for e-banking, e-shopping, social networking, e-gaming, voice and a lot of other applications. Most of the internet traffic is generated by activities of end users, when they request a specific webpage or web based application. The high demand for internet applications has driven service operators to provide reliable services to the end user and user satisfaction has now become a major challenge. Quality of Service is a measure of the performance of a particular service. Quality of Experience is a subjective measure of user’s perception of the overall performance of network. The high demand for internet usage in everyday life has got people concerned about security of information over web pages that require authentication. User perceived Quality of Security Experience depends on Quality of Experience and Response Time for web page authentication. Different factors such as jitter, packet loss, delay, network speed, supply chains and the type of security algorithm play a vital role in the response time for authentication. In this work we have tried to do qualitative and quantitative analysis of user perceived security and Quality of Experience with increasing and decreasing Response Times towards a web page authentication. We have tried to derive a relationship between Quality of Experience of security and Response Time.

  • 45.
    Alibabaei, Navid
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Wireless Mesh Networks: a comparative study of Ad-Hoc routing protocols toward more efficient routing2015Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Each day, the dream of seamless networking and connectivity everywhere is getting closer to become a reality. In this regard, mobile Ad-Hoc networks (MANETs) have been a hot topic in the last decade; but the amount of MANET usage nowadays confines to a tiny percentage of all our network connectivity in our everyday life, which connectivity through infrastructured networks has the major share. On the other hand, we know that future of networking belongs to Ad-Hocing , so for now we try to give our everyday infrastructure network a taste of Ad-Hocing ability; these types of networks are called Wireless Mesh Networks (WMN) and routing features play a vital role in their functionality. In this thesis we examine the functionality of 3 Ad-Hoc routing protocols known as AODV, OLSR and GRP using simulation method in OPNET17.5. For this goal we set up 4 different scenarios to examine the performance of these routing protocols; these scenarios vary from each other in amount of nodes, background traffic and mobility of the nodes. Performance measurements of these protocols are done by network throughput, end-end delay of the transmitted packets and packet loss ratio as our performance metrics. After the simulation run and gathering the results we study them in a comparative view, first based on each scenario and then based on each protocol. For conclusion, as former studies suggest AODV, OLSR and DRP are among the best routing protocols for WMNs, so in this research we don’t introduce the best RP based on the obtained functionality results, instead we discuss the network conditions that each of these protocols show their best functionality in them and suggest the best routing mechanism for different networks based on the analysis from the former part.  

  • 46.
    AL-MAMUN, ABDULLAH
    et al.
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    ULLAH, MOHAMMAD RAFIQ
    Blekinge Tekniska Högskola, Sektionen för ingenjörsvetenskap.
    Cognitive Radio for Short Range Systems based on Ultra-Wideband2011Självständigt arbete på avancerad nivå (masterexamen)Studentuppsats (Examensarbete)
    Abstract [en]

    Cognitive Radio (CR) has been proposed as a promising and effective technology to improve radio spectrum utilization. It can change its transmitter parameters depending on the environment in which it operate based on interaction. In CR, a number of different methods of spectrum sensing are used to identify the presence of signal transmission. Among them, the multitaper method (MTM), has been investigated in this thesis paper at the same time with other sensing methods, recently seems to be the best choice for spectrum sensing CR because of its accurate identification and estimation, quick computation, and regularization. This thesis paper is examining how CR can be utilized in short range systems based on Ultra-Wideband (UWB). UWB is a promising technology in wireless communication use for high speed data transmission with low power utilization or long distance localization in both military, radar, sensor, data collection, tracking or commercial application. UWB has the ability to move between very low data rate or very high data rate, short range distance or long range distance applications. Impulse radio UWB (IR-UWB) shows some impressive characteristics in short-range communication systems with varieties of throughput option including high data rates. The strong synergy between the aims of CR and features of IR-UWB has been shown in this thesis. Our key objective is to understand how CR can be applied to UWB systems.

  • 47. Al-Mamun, Abdullah
    et al.
    Ullah, Mohammad Rafiq
    Multitaper spectrum: A promising method in spectrum sensing cognitive radio2010Konferensbidrag (Refereegranskat)
    Abstract [en]

    Cognitive radio (CR) has been proposed as a promising and effective technology to improve radio spectrum utilization. The primary objective of the CR is to handle the non-interference rules with any primary users (PUs). Highly sensitive and optimal spectrum sensing detectors are required in order to avoid harmful interference to PUs. Multitaper spectrum seems to be the most appealing one for spectrum sensing CR because of its accurate identification and estimation and low computational complexity. Mulitaper uses small set of tapers and multiple orthogonal prototype filters to reduce the variance. The Fourier transform of a Slepian sequence, originally known as discrete prolate spheroidal sequences (DPSS), gives maximum energy density inside a given bandwidth and less spectral leakage with better specifications has been investigated in this paper and shows that no other window in signal processing can satisfy this property

  • 48. Al-Qahtani, Fawaz S.
    et al.
    Duong, Quang Trung
    Gurung, Arun K.
    Bao, Vo Nguyen Quoc
    Selection Decode-and-Forward Relay Networks with Rectangular QAM in Nakagami-m Fading Channels2010Konferensbidrag (Refereegranskat)
    Abstract [en]

    In this paper, we investigate the average symbol error probability (SEP) of fixed decode-and-forward relay networks over independent but not identically distributed Nakagami-m fading channels. We have derived closed form expression of SEP for general rectangular quadrature amplitude modulation (QAM) under relay selection scheme where only the best relay forwards message from the source to the destination. The expressions are in terms of hypergeometric series which can be efficiently numerically evaluated. The numerical results are validated with Monte-Carlo simulations.

  • 49. Al-Qahtani, Fawaz S.
    et al.
    Duong, Quang Trung
    Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation.
    Zhong, Caijun
    Qaraqe, Khaild A.
    Alnuweiri, Hussein
    Performance Analysis of Dual-Hop AF Systems with Interference in Nakagami-m Fading Channels2011Ingår i: IEEE Signal Processing Letters, ISSN 1070-9908, Vol. 18, nr 8, s. 454-457Artikel i tidskrift (Refereegranskat)
    Abstract [en]

    In this paper, we investigate the performance of dual-hop channel state information-assisted amplify-and-forward relaying systems over Nakagami-m fading channels in the presence of multiple interferers at the relay. Assuming integer fading parameter m, we derive closed-form expressions for the exact outage probability and accurate approximation for symbol error rate of the system. Furthermore, we look into the asymptotical high signal to noise ratio regime, and characterize the diversity order achieved by the system. All the analytical results are validated via Monte Carlo simulations.

  • 50.
    Aluguri, Tarun
    Blekinge Tekniska Högskola, Fakulteten för datavetenskaper, Institutionen för kommunikationssystem.
    Performance Evaluation of OpenStack Deployment Tools2016Självständigt arbete på avancerad nivå (masterexamen), 20 poäng / 30 hpStudentuppsats (Examensarbete)
    Abstract [en]

    Cloud computing enables on-demand access to a shared pool of computing resources, that can beeasily provisioned, configured and released with minimal management cost and effort. OpenStack isan open source cloud management platform aimed at providing private or public IaaS cloud onstandard hardware. Since, deploying OpenStack manually is tedious and time-consuming, there are several tools that automate the deployment of OpenStack. Usually, cloud admins choose a tool basedon its level of automation, ease of use or interoperability with existing tools used by them. However,another desired factor while choosing a deployment tool is its deployment speed. Cloud admins cannot select based on this factor since, there is no previous work on the comparison of deploymenttools based on deployment time. This thesis aims to address this issue.

    The main aim of the thesis is to evaluate the performance of OpenStack deployment tools with respectto operating system provisioning and OpenStack deployment time, on physical servers. Furthermore,the effect of varying number of nodes, OpenStack architecture deployed and resources (cores andRAM) provided to deployment node on provisioning and deployment times, is also analyzed. Also,the tools classified based on stages of deployment and method of deploying OpenStack services. In this thesis we evaluate the performance of MAAS, Foreman, Mirantis Fuel and Canonical Autopilot.

    The performance of the tools is measured via experimental research method. Operating system provisioning time and OpenStack deployment times are measured while varying the number of nodes/OpenStack architecture and resources provided to deployment node i.e. cores and RAM.

    Results show that provisioning time of MAAS is less than Mirantis Fuel, which is less than Foreman.Furthermore, for all 3 tools as number of nodes increases provisioning time increases. However, the amount of increase is lowest for MAAS than Mirantis Fuel and Foreman. Similarly, results for baremetal OpenStack deployment time show that, Canonical Autopilot outperforms Mirantis Fuel by asignificant difference for all OpenStack scenarios considered. Furthermore, as number of nodes in an OpenStack scenario increases, the deployment time for both the tools increases.

    From the research, it is concluded that MAAS and Canonical Autopilot perform better as provisioningand bare metal OpenStack deployment tool respectively, than other tools that have been analyzed.Furthermore, from the analysis it can be concluded that increase in number of nodes/ OpenStackarchitecture, leads to an increase in both provisioning time and OpenStack deployment time for all the tools.

1234567 1 - 50 av 1399
RefereraExporteraLänk till träfflistan
Permanent länk
Referera
Referensformat
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Annat format
Fler format
Språk
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Annat språk
Fler språk
Utmatningsformat
  • html
  • text
  • asciidoc
  • rtf