To see the other types of publications on this topic, follow the link: Devito.

Dissertations / Theses on the topic 'Devito'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Devito.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Devito, Aleja Jane Haynie. "Pleasure and nutrient considerations in the household demand for food." Thesis, Montana State University, 1989. http://etd.lib.montana.edu/etd/1989/devito/DeVitoA1989.pdf.

Full text
Abstract:
When considering consumer demand for food, there are two important components: pleasure and nutrient content. It has been recognized that households consume food for the pleasure obtained through taste, odor, and appearance of the food. With increasing awareness about proper nutrition and good health, a second element in consumer demand is added. This study was designed to answer the question: In what ways do pleasure and nutrient content affect consumer food demand? Since the components associated with pleasure and nutrient content of food are somewhat indistinguishable from utility, the assumption that they are linearly related to utility allows household production theory to be used. From household production theory, demand functions for food items and nutrient content can be deduced. Model variables include individual food quantities, prices associated with the food items, nutrients available, shadow prices associated with the nutrients, average age of the population, and expenditures on non-food items. Ideally, a full model which incorporates both pleasure and nutrient content should be compared to more simplified sub-models. The two sub-models developed in this study provide empirical evidence supporting the idea that both pleasure and nutrient content of food are important in household consumption. Since estimation of a full model was beyond the scope of this study, only the results of the two sub-models were obtained. The overall results of both models were strong in some areas and weak in others. Of the four demand properties discussed, the "pleasure" sub model did a reasonable job in terms of logical and significant cross-price, income, and average age effects. The strong points of the "nutrient" sub-model were represented in the own-price and income effects. The research presents evidence that effective food policy must take into account both nutrient and pleasure considerations in household food choice decisions. The results of this study represent an important first step in developing a comprehensive framework and reliable estimates of the household demand for food.
APA, Harvard, Vancouver, ISO, and other styles
2

com, thefishvet@gmail, and Richmond Loh. "The Pathology of Devil Facial Tumour Disease in Tasmanian Devils (Sarcophilus Harrisii)." Murdoch University, 2006. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20061019.131524.

Full text
Abstract:
The pathology of a disfiguring and debilitating fatal disease affecting a high proportion of the wild population of Tasmanian Devils (Sarcophilus harrisii) that was discovered is described. The disease, named devil facial tumour disease (DFTD), has been identified in devils found across 60% of the Tasmanian landscape. The prevalence of this disease was extremely variable, possibly reflecting seasonal trapping success. Between 2001 and 2004, 91 DFTD cases were obtained for pathological description. Grossly, the tumours presented as large, solid, soft tissue masses usually with flattened, centrally ulcerated and exudative surfaces. They were typically multi-centric, appearing first in the oral, face or neck regions. Histologically, the tumours were composed of circumscribed to infiltrative nodular aggregates of round to spindle-shaped cells often within a pseudocapsule and divided into lobules by delicate fibrous septae. They were locally aggressive and metastasised in 65% of cases. There was minimal cytological differentiation amongst the tumour cell population under light and electron microscopy. The diagnostic values of a number of immunohistochemical stains were employed to further characterise up to 50 representative cases. They were negative for cytokeratin, epithelial membrane antigen, von Willebrand factor, desmin, glial fibrillary acid protein, CD16, CD57, CD3 and LSP1. DFTD cells were positive for vimentin, S-100, melan A, neuron specific enolase, chromogranin A and synaptophysin. In conclusion, the morphological and immunohistochemical characteristics together with the primary distribution of the neoplasms indicate that DFTD is an undifferentiated neoplasm of neuroendocrine histogenesis.
APA, Harvard, Vancouver, ISO, and other styles
3

Loh, Richmond Cern-Wan. "The pathology of devil facial tumour disease in Tasmanian devils (Sarcophilus harrisii) /." Access via Murdoch University Digital Theses Project, 2006. http://wwwlib.murdoch.edu.au/adt/browse/view/adt-MU20061019.131524.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Loh, Richmond. "The pathology of devil facial tumour disease in Tasmanian devils (Sarcophilus harrisii)." Thesis, Loh, Richmond (2006) The pathology of devil facial tumour disease in Tasmanian devils (Sarcophilus harrisii). Masters by Research thesis, Murdoch University, 2006. https://researchrepository.murdoch.edu.au/id/eprint/162/.

Full text
Abstract:
The pathology of a disfiguring and debilitating fatal disease affecting a high proportion of the wild population of Tasmanian Devils (Sarcophilus harrisii) that was discovered is described. The disease, named devil facial tumour disease (DFTD), has been identified in devils found across 60% of the Tasmanian landscape. The prevalence of this disease was extremely variable, possibly reflecting seasonal trapping success. Between 2001 and 2004, 91 DFTD cases were obtained for pathological description. Grossly, the tumours presented as large, solid, soft tissue masses usually with flattened, centrally ulcerated and exudative surfaces. They were typically multi-centric, appearing first in the oral, face or neck regions. Histologically, the tumours were composed of circumscribed to infiltrative nodular aggregates of round to spindle-shaped cells often within a pseudocapsule and divided into lobules by delicate fibrous septae. They were locally aggressive and metastasised in 65% of cases. There was minimal cytological differentiation amongst the tumour cell population under light and electron microscopy. The diagnostic values of a number of immunohistochemical stains were employed to further characterise up to 50 representative cases. They were negative for cytokeratin, epithelial membrane antigen, von Willebrand factor, desmin, glial fibrillary acid protein, CD16, CD57, CD3 and LSP1. DFTD cells were positive for vimentin, S-100, melan A, neuron specific enolase, chromogranin A and synaptophysin. In conclusion, the morphological and immunohistochemical characteristics together with the primary distribution of the neoplasms indicate that DFTD is an undifferentiated neoplasm of neuroendocrine histogenesis.
APA, Harvard, Vancouver, ISO, and other styles
5

Loh, Richmond. "The pathology of devil facial tumour disease in Tasmanian devils (Sarcophilus harrisii)." Loh, Richmond (2006) The pathology of devil facial tumour disease in Tasmanian devils (Sarcophilus harrisii). Masters by Research thesis, Murdoch University, 2006. http://researchrepository.murdoch.edu.au/162/.

Full text
Abstract:
The pathology of a disfiguring and debilitating fatal disease affecting a high proportion of the wild population of Tasmanian Devils (Sarcophilus harrisii) that was discovered is described. The disease, named devil facial tumour disease (DFTD), has been identified in devils found across 60% of the Tasmanian landscape. The prevalence of this disease was extremely variable, possibly reflecting seasonal trapping success. Between 2001 and 2004, 91 DFTD cases were obtained for pathological description. Grossly, the tumours presented as large, solid, soft tissue masses usually with flattened, centrally ulcerated and exudative surfaces. They were typically multi-centric, appearing first in the oral, face or neck regions. Histologically, the tumours were composed of circumscribed to infiltrative nodular aggregates of round to spindle-shaped cells often within a pseudocapsule and divided into lobules by delicate fibrous septae. They were locally aggressive and metastasised in 65% of cases. There was minimal cytological differentiation amongst the tumour cell population under light and electron microscopy. The diagnostic values of a number of immunohistochemical stains were employed to further characterise up to 50 representative cases. They were negative for cytokeratin, epithelial membrane antigen, von Willebrand factor, desmin, glial fibrillary acid protein, CD16, CD57, CD3 and LSP1. DFTD cells were positive for vimentin, S-100, melan A, neuron specific enolase, chromogranin A and synaptophysin. In conclusion, the morphological and immunohistochemical characteristics together with the primary distribution of the neoplasms indicate that DFTD is an undifferentiated neoplasm of neuroendocrine histogenesis.
APA, Harvard, Vancouver, ISO, and other styles
6

Peck, Sarah Jane. "Haematology and Serum Biochemistry of Wild Tasmanian Devils with Devil Facial Tumour Disease." Thesis, The University of Sydney, 2015. http://hdl.handle.net/2123/14904.

Full text
Abstract:
The Tasmanian devil (TD) is threatened with extinction by a fatally infectious cancer known as Devil facial tumour disease (DFTD). The objectives of this study were toestablish species reference intervals (RIs) and examine changes that occur in DFTD. Blood samples were collected from wild TDs at multiple sites in Tasmania. Significant age differences were found for ALP, CK, cholesterol, calcium, phosphate, albumin, globulin, albumin: globulin ratio and glucose. Significant differences between sexes were observed for AST, creatinine and potassium. Significant seasonal or reproductive status variation in adult males or breeding females were observed for PCV, haemoglobin, RBC, MCHC, MCH, MCV, neutrophils and lymphocytes, fibrinogen, total plasma protein, AST, ALP, ALT, GLDH, bilirubin, urea, calcium, chloride, total protein, albumin, A:G and glucose. Species RIs and subgroup RIs are provided. Subsequently comparisons were made between clinically healthy, wounded and diseased devils; comparisons among stages of DFTD and between ulcerated and non-ulcerated tumours were made. Increased leukocytes, neutrophils, fibrinogen and platelets as well as decreased lymphocytes, erythrocytes and haemoglobin were observed in DFTD devils. ALP, ALT, GLDH, sodium, Na:K ratio, potassium, albumin and A:G ratio were lower and AST greater in animals with DFTD when compared to clinically healthy animals. No significant differences were found between stages of DFTD or ulcerated and non-ulcerated tumours. Establishing species RIs provides a useful diagnostic tool for health assessment of TDs. The differences with DFTD compared to healthy devils are reflective of inflammation or chronic disease. Similar changes are observed with wounds but to a lesser extent. The lack of significant variation among stages of DFTD and between ulcerated and non-ulcerated tumours was unexpected, and could be due to the lack of information about the extent of tumour necrosis and surface ulceration.
APA, Harvard, Vancouver, ISO, and other styles
7

Martel, Letícia de Campos Velho. "Devido processo legal substantivo." Florianópolis, SC, 2001. http://repositorio.ufsc.br/xmlui/handle/123456789/79998.

Full text
Abstract:
Dissertação (mestrado) - Universidade Federal de Santa Catarina, Centro de Ciências Jurídicas. Programa de Pós-Graduação em Direito.
Made available in DSpace on 2012-10-18T09:28:45Z (GMT). No. of bitstreams: 0Bitstream added on 2014-09-25T23:02:00Z : No. of bitstreams: 1 192087.pdf: 16442020 bytes, checksum: e070ec34be87840f7765cc3092539208 (MD5)
APA, Harvard, Vancouver, ISO, and other styles
8

Mariotti, Alexandre. "Princípio do devido processo legal." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/13555.

Full text
Abstract:
Este trabalho busca uma melhor compreensão do princípio do devido processo legal, positivado pelo art. 5º, LIV, da CRFB. A maior parte da literatura jurídica nacional que o aborda concentra seus esforços em proclamar a importância do princípio ou em buscar explicá-lo com base no seu desenvolvimento no direito constitucional norte-americano. Parece-nos, entretanto, que uma compreensão constitucionalmente adequada do princípio exige uma abordagem diversa, coincidente com a usual apenas no primeiro passo, que é a apreensão de seu funcionamento no ambiente jurídico de origem. Em não se tratando de um trabalho de direito comparado, outros passos devem se seguir. Assim, sua continuação consiste na pesquisa dos antecedentes doutrinários que conduziram ao transplante do due process of law para o direito constitucional brasileiro. Depois, é necessário situá-lo no contexto da Constituição analítica de um Estado que se vincula à família do direito romano-germânico. E, por fim, verificar como o princípio tem sido aplicado na prática jurídica, particularmente pelo STF, tribunal que dá a última palavra em matéria de interpretação constitucional.
This thesis aims to reach a better understanding of the due process of law principle established in the Brazilian Federal Constitution, art. 5º, LIV. Most of brazilian juridical literature on the theme concentrates its efforts on proclaiming the importance of the principle or in trying to provide an explanation on the basis of north-american constitutional experience. But we don’t think any of these approaches are able to provide a constitutionally sound understanding of the principle. We propose a different approach, that also starts by investigating the north-american constitutional experience but goes further. It continues by researching the brazilian juridical literature that dealt with due process of law before the framing of Brazilian Federal Constitution. Next step is to set up the principle in the body of the analytical Constitution of a State which follows the roman-germanic law tradition. Last, but not least, the study examines the way due process of law has been used in juridical practice. We draw particular attention to brazilian Supreme Court’s decisions on that matter, because they state the last and highest constitutional interpretation.
APA, Harvard, Vancouver, ISO, and other styles
9

Sahlström, Nathalie. "Secure device to device communication." Thesis, KTH, Kommunikationsteori, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-146611.

Full text
Abstract:
Since wireless communication has become a standard feature in the daily life, smartphones and tablets among other things are integrated with the Bluetooth technology. While in some parts of the day wireless communication can be used for searching the internet and share information on social networks without the need of having a secure connection, there are some other parts where the security might become of high importance. When the technology gets integrated in companies the security problem becomes more evident. This is because when the radio signals spread in the medium they can be accessed by anyone that is in reach in the network and the information that was sent may not be intended for everyone. To secure the network from unintended users becomes important when handling fragile information, which companies may deal with daily.  This paper gives an introduction on which security features and techniques that already exist in some personal area networks. From this it has been clear that a security feature could be implemented on the baseband layer of Bluetooth to increase the secrecy during the transmission since at the moment security is only implemented on higher layers using encryption algorithms.  This paper proposes a conceptual idea of improving the secrecy in the network by using a wiretap code that is implemented before the error-correction coding in the Bluetooth's baseband. By disabling the ARQ scheme in Bluetooth one can modulate the channel as a Packet Erasure Channel that will lose packet with a certain probability. By using a nested code structure, the message can then be securely sent by using a higher rate than what the eavesdropper can recover due to the amount of errors the received signal will have. The performance of the concept is evaluated with the secrecy throughput, secrecy outage and the leakage.
APA, Harvard, Vancouver, ISO, and other styles
10

Alhalabi, Ashraf S. A. <1985&gt. "Device-To-Device Wireless Communications." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amsdottorato.unibo.it/7845/1/Thesis_%D9%90Ashraf.pdf.

Full text
Abstract:
The main topic investigated in this thesis is related to characterization of the performance of D2D wireless networks. Given this broad objective, analytical framework models based on stochastic geometry have been proposed. One of them deals with the study of the coverage probability of both cellular networks and D2D networks whereas the others are related to dynamic mobility models in which the effects of blockages on the link lifetime have been studied. On the other hand, the experimental activity based on UWB using passive tags has been presented in which a localization system based on the ultra-wideband (UWB) technology and high-level architectures to improve the cyclists safety has been proposed.
APA, Harvard, Vancouver, ISO, and other styles
11

Bastos, Antonio Adonias Aguiar. "Devido processo legal nas demandas repetitivas." Faculdade de Direito, 2012. http://repositorio.ufba.br/ri/handle/ri/15817.

Full text
Abstract:
Submitted by Ana Valéria de Jesus Moura (anavaleria_131@hotmail.com) on 2014-09-08T19:32:37Z No. of bitstreams: 2 FICHA CATALOGRÁFICA - Prof Adonias.pdf: 48707 bytes, checksum: b4c5e2ede2e3412f32fe080e26d2bafe (MD5) Tese com elementos pré-textuais - Adonias - impressão.pdf: 1793767 bytes, checksum: 26a16a6a6832461c09c7a09131f77b8b (MD5)
Approved for entry into archive by Ana Valéria de Jesus Moura (anavaleria_131@hotmail.com) on 2014-09-08T19:33:44Z (GMT) No. of bitstreams: 2 FICHA CATALOGRÁFICA - Prof Adonias.pdf: 48707 bytes, checksum: b4c5e2ede2e3412f32fe080e26d2bafe (MD5) Tese com elementos pré-textuais - Adonias - impressão.pdf: 1793767 bytes, checksum: 26a16a6a6832461c09c7a09131f77b8b (MD5)
Made available in DSpace on 2014-09-08T19:33:44Z (GMT). No. of bitstreams: 2 FICHA CATALOGRÁFICA - Prof Adonias.pdf: 48707 bytes, checksum: b4c5e2ede2e3412f32fe080e26d2bafe (MD5) Tese com elementos pré-textuais - Adonias - impressão.pdf: 1793767 bytes, checksum: 26a16a6a6832461c09c7a09131f77b8b (MD5)
Esta tese busca realizar uma leitura do julgamento das demandas repetitivas...
APA, Harvard, Vancouver, ISO, and other styles
12

Shimotakahara, Kevin. "Device to Device Communications for Smart Grid." Thesis, Université d'Ottawa / University of Ottawa, 2020. http://hdl.handle.net/10393/40656.

Full text
Abstract:
This thesis identifies and addresses two barriers to the adoption of Long Term Evolution (LTE) Device-to-Device (D2D) communication enabled smart grid applications in out of core network coverage regions. The first barrier is the lack of accessible simulation software for engineers to develop and test the feasibility of their D2D LTE enabled smart grid application designs. The second barrier is the lack of a distributed resource allocation algorithm for LTE D2D communications that has been tailored to the needs of smart grid applications. A solution was proposed to the first barrier in the form of a simulator constructed in Matlab/Simulink used to simulate power systems and the underlying communication system, i.e., D2D communication protocol stack of Long Term Evolution (LTE). The simulator is built using Matlab's LTE System Toolbox, SimEvents, and Simscape Power Systems in addition to an in-house developed interface software to facilitate D2D communications in smart grid applications. To test the simulator, a simple fault location, isolation, and restoration (FLISR) application was implemented using the simulator to show that the LTE message timing is consistent with the relay signaling in the power system. A solution was proposed to the second barrier in the form of a multi-agent Q-learning based resource allocation algorithm that allows Long Term Evolution (LTE) enabled device-to-device (D2D) communication agents to generate orthogonal transmission schedules outside of network coverage. This algorithm reduces packet drop rates (PDR) in distributed D2D communication networks to meet the quality of service requirements of microgrid communications. The PDR and latency performance of the proposed algorithm was compared to the existing random self-allocation mechanism introduced under the Third Generation Partnership Project's LTE Release 12. The proposed algorithm outperformed the LTE algorithm for all tested scenarios, demonstrating 20-40% absolute reductions in PDR and 10-20 ms reductions in latency for all microgrid applications.
APA, Harvard, Vancouver, ISO, and other styles
13

Tsai, Shang-Yuan. "Device profiling analysis in Device-Aware Network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FTsai.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, December 2004.
Thesis advisor(s): Singh Gurminder, John Gibson. Includes bibliographical references (p. 65-66). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
14

Daghal, Asaad. "Content delivery through device to device communication." Thesis, University of Kent, 2017. https://kar.kent.ac.uk/65771/.

Full text
Abstract:
Content caching at mobile user devices (UDs) utilizing device to device (D2D) communication has recently been proposed as an exiting and innovative technology to offload network data traffic and enhance the performance of mobile networks, in terms of latency, throughput, energy consumption, and so on. In this thesis, a novel method of content delivery using multiple devices to single device (MDSD) communication through D2D links is presented. In this method, the Zipf distribution with exponent shape parameter is adopted to model the content caching popularity for the analysis of the achievable signal to interference plus noise ratio (SINR). In order to investigate the advantage of the proposed MDSD method, firstly, a closed-form expression of the outage probability is theoretically derived for a single D2D communication to evaluate the success of content delivery to the reference UD. Secondly, the expression of the outage probability for MDSD communication is derived, where the outage probability is analysed as a function of content caching popularity, the density of UDs, and the size of cooperative area. The research work is further extended to address the frequency reuse among different UDs in one cell, where a frequency band factor is introduced, and the optimal radius of the cooperative area is introduced and analysed. The analytical results, validated by the simulation results, show that the outage probability decreases drastically when the popularity of the content increases, or the radius of the cooperative area increases. Using the given closed-form expression of the outage probability, the area spectral efficiency (ASE) of the system is presented. Furthermore, the results show that as the frequency band factor increases, the outage probability decreases, as well as the ASE decreases. Finally, it is shown that the MDSD outperforms the single D2D-based method.
APA, Harvard, Vancouver, ISO, and other styles
15

PARIZ, Ângelo Aurélio Gonçalves. "O Devido processo legal na jurisdição civil." Universidade Federal de Pernambuco, 2002. https://repositorio.ufpe.br/handle/123456789/4650.

Full text
Abstract:
Made available in DSpace on 2014-06-12T17:22:12Z (GMT). No. of bitstreams: 2 arquivo6033_1.pdf: 1183312 bytes, checksum: a175d1b0541239458588a7bcfd6c23d0 (MD5) license.txt: 1748 bytes, checksum: 8a4605be74aa9ea9d79846c1fba20a33 (MD5) Previous issue date: 2002
A cláusula do devido processo legal, inobstante sua amplitude e complexidade, foi estudada com o fim de contribuir para a sua compreensão, levando-se em conta duas premissas básicas: a) o devido processo legal como direito constitucional do cidadão e seu vínculo com o ideal de justiça; b) visão panorâmica da derivação do devido processo legal, com ênfase ao processo civil. O objetivo da dissertação foi demonstrar que a cláusula do devido processo legal é uma garantia fundamental do cidadão ligada ao ideal de justiça. A tese está fundada na análise da origem histórica da cláusula do dues process, da leitura das constituições de alguns países e da abordagem legal, doutrinária e jurisprudencial a respeito do tema, especialmente dos princípios e direitos fundamentais, da cidadania e da justiça. É do due process of law que deriva quase todos os princípios processuais, incorporando um conjunto de garantias fundamentais destinadas a assegurar os mais amplos e fundamentais direitos do cidadão. De forma simples, resume-se o devido processo na aplicação da justiça nos procedimentos e nas decisões. Além da tradicional visão processual, a cláusula ampliou-se para abranger uma acepção substancial, com o fim de inibir o abuso, o exagero e, consequentemente, a injustiça. Na verdade, o devido processo legal exerce função essencial para a concretização da justiça, às vezes até se confundindo com esta (princípio justo). É o princípio dos princípios. Não basta que se assegure o acesso aos tribunais e o direito ao processo. Exige-se a regularidade do direito, com a verificação efetiva de todas as garantias resguardadas ao consumidor da justiça, a um custo acessível e dentro de um tempo justo, para a consecução do objetivo que lhe é reservado. Destaca-se, ainda, o processo eqüitativo (justo), proporcionado pela igualdade na demanda e justiça na decisão, denominado princípio da proibição do excesso (proporcionalidade), verdadeira garantia de justiça e inibidora de abusos. Portanto, lutar pela justiça é respeitar e dar cumprimento efetivo ao devido processo legal, tanto no seu aspecto procedimental, com as garantias inerentes ao processo, como no substancial, inibindo qualquer exagero ou abuso. Em decorrência da própria origem e natureza do devido processo, assegura-se ao cidadão o acesso a uma ordem jurídica útil e justa, de forma plena, livre e eficaz
APA, Harvard, Vancouver, ISO, and other styles
16

Shalmashi, Serveh. "Cooperative Spectrum Sharing and Device-to-Device Communications." Licentiate thesis, KTH, Radio Systems Laboratory (RS Lab), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-145013.

Full text
Abstract:
The steep growth in the mobile data traffic has gained a lot of attention in recent years. This growth is mainly the result of emerging applications, multimedia services, and revolutions in the device technology. With current deployments and radio resources, operators will not be able to cope with the growing demands. Consequently, there is a need to either provide new resources or increase the efficiency of what is available. Proposed solutions for accommodating growing data traffic are based on improvements in three dimensions: efficient use of radio resources especially the spectrum, technology advancements, and densifying the current infrastructure. In this thesis, we focus on the spectrum dimension. Providing more spectrum is a long-term process. However, increasing the spectrum usage and efficiency can be put rapidly in practice. We discuss potential solutions in the area of spectrum sharing. Among enabling technologies to facilitate spectrum sharing, we consider the cognitive radio and device-to-device (D2D) communications. In order to gain from sharing the spectrum, systems need to somehow deal with extra sources of interference. In the first part of the thesis, we consider a primary-secondary sharing model in cognitive radio networks. We employ the cooperative communication method in order to facilitate the access of the secondary system to the licensed spectrum of the primary system, and therefore increase the spectrum usage. The cooperation between the two systems is formed provided that it is beneficial for the primary system. In this way, the primary users' quality-of-service can be preserved while at the same time the secondary users can access the spectrum. This cooperative approach prevents both systems from concurrent transmissions. As a consequence, the need for interference control techniques are eliminated. We evaluate different models and transmission schemes and optimize the corresponding parameters to quantify the gain resulting from cooperative spectrum sharing. In the second part of the thesis, we consider spectrum sharing within one system between different types of users. This is done in the context of D2D communications where close proximity users can transmit directly to each other. For this type of communications, either dedicated resources are allocated or resources of the cellular users are reused. We first study the feasibility of cooperation between D2D and cellular users and identify the scenarios where it can be beneficial. Then we take on a challenging problem which guarantees the gain from the D2D communication, namely the mode selection. For this problem, we characterize the decision criteria that determines if D2D communication is gainful. Next, we focus on the problem of interference in D2D communications underlaying cellular networks, where the same spectrum is reused in the spatial domain. In such scenarios, the potential gain is determined by how the interference is managed, which in turn depends on the amount of available information at the base station. The more information is required, the more signaling is needed. In this part of the thesis, we address the trade-off between the signaling overhead and the performance of the system and propose a novel approach for interference control which requires very little information on the D2D users.

QC 20140509

APA, Harvard, Vancouver, ISO, and other styles
17

Baral, Prashant. "DEVICE IDENTIFICATION USING DEVICE FINGERPRINT AND DEEP LEARNING." OpenSIUC, 2021. https://opensiuc.lib.siu.edu/theses/2866.

Full text
Abstract:
Billions of devices are connected to networks, which share data between them or with the processing device. With the advent of technology, cost-effective hardware can be interface with sensors and can act as an IoT device; This provides them with digital intelligence and communicates by connecting to Network. Like in other network devices, security is of utmost importance in IoT as well. Security in IoT is challenging than in traditional devices because of lower computing power, lower computing resources, small battery, and many IoT devices deployed. Research in cryptography, a lightweight communication protocol is focused. However, there is no substantial research effort for the identity of IoT devices which is the fundamental factor in Security. Traditional devices use MAC address, IP Address, and IMEI for physical identity but these parameters for physical device identification are prone to sniffing and spoofing; Thus, is not that reliable. Relying on these parameters for the security of IoT devices compromises the critical information and IoT device itself.The thesis utilizes the information from the packets used for communication in networks for device identification. We use IAT (Inter Arrival Time) and RTT (Round Trip Time) of packets at the router side to uniquely identify the IoT device. IAT is the time difference between two packets received at Router and RTT is the time from request to response packets at Router. IAT and RTT are different for a device as it depends on the hardware and software of a device. We plot the graph of IAT and RTT separately and use deep learning as a tool to identify a device. We use different deep learning algorithms for identification. We use CNN and LSTM for IAT graphs and RTT graphs. Both deep Learning algorithms achieve good accuracy in the classification of a device using both parameters (IAT and RTT) but to verify using the publicly available dataset, we achieved 97% accuracy in classifying using IAT using CNN in the testing dataset. Using CNN+LSTM we achieve an accuracy of 91.45% in the classification of a device using IAT as a parameter in the testing dataset.
APA, Harvard, Vancouver, ISO, and other styles
18

Gupta, Shruti. "Energy harvesting aided device-to-device communication networks." Thesis, University of Southampton, 2017. https://eprints.soton.ac.uk/415790/.

Full text
Abstract:
With the ever growing demands of power and bandwidth by users, energy and spectral efficiency emanated as key criteria for designing future wireless networks. Therefore, in this thesis energy harvesting (EH) aided device-to-device (D2D) communication is designed for improving both the key design criteria, which is an intricate journey from the realm of individual analysis of EH and D2D communication to that of amalgamating the two techniques. Specifically, with the widespread use of energy hungry smart devices, these devices become dis-functional due to outage of batteries, which can be avoided by introduction of EH capability at these nodes. In this context, an energy efficient successive relaying based network is conceived using rechargeable source and relay nodes having limited buffers for both their energy and data storage. An optimal and sub-optimal transmission policies are designed for the maximisation of the network throughput with non-causal knowledge of energy arrivals by the deadline. On the other hand, for exploiting the spectrum efficiently, D2D communication is invoked which brings in new interference scenarios that may be circumvented by incorporating fractional frequency reuse (FFR) or soft frequency reuse (SFR) in OFDMA cellular networks. By carefully considering the downlink resource reuse of the D2D links, beneficial frequency allocation schemes are proposed, when the macrocell has employed FFR or SFR. The coverage probability and the capacity of D2D links are analytically derived under the proposed schemes. It is imperative to integrate the benefits of EH and D2D communication aided systems for creating unparalleled opportunities in emerging applications. Therefore, a system is designed that comprises of EH aided D2D links relying on downlink resource reuse with the goal of maximizing the sum-rate of the D2D links, without degrading the quality of service (QoS) requirement of the MUs. A pair of joint resource block and power allocation algorithms are proposed for the D2D links, when there is non-causal (off-line) and causal (on-line) knowledge of the EH profiles at the D2D transmitters. For the sake of further accentuating design flexibility and alleviating the demands of increased spectral resources, previously designed EH aided D2D communication is investigated in conjunction with heterogeneous network (HetNet). An algorithmic solution is proposed with the aim of maximising the sum-rate of these D2D links in the downlink of two-tier HetNet without unduly degrading MU’s throughput, when two tiers share spectrum under following regimes: (a) orthogonal, (b) co-channel and (c) the proposed coorthogonal. Low complexity heuristic methods are also proposed, which demonstrate that the optimization of the D2D-MU matching is indeed crucial for the system considered.
APA, Harvard, Vancouver, ISO, and other styles
19

Feng, Junyi. "Device-to-Device Communications in LTE-Advanced Network." Télécom Bretagne, 2013. http://www.telecom-bretagne.eu/publications/publication.php?idpublication=14215.

Full text
Abstract:
La communication device-to-device (D2D) est un nouvel aspect prometteur dans les réseaux LTE-Advanced. Elle est mise en place pour permettre une détection efficace et une communication de proximité entre mobiles. Grâce aux capacités D2D, les mobiles de proximité sont capables de se détecter entre eux en utilisant la technologie radio LTE et de communiquer entre eux via un lien direct. Cette thèse porte sur la conception, la coordination et les tests d'un réseau hybride avec la technologie D2D et les communications cellulaires. Les exigences de conception et les choix des fonctions dans la couche physique et MAC qui permettent la détection D2D et la communication reposant sur les réseaux LTE sont analysés. De plus, une stratégie de planification centralisée dans la station de base est proposée afin de coordonner les communications de données D2D en liaison descendante pour le réseau LTE FDD. Cette stratégie de planification combine de multiple techniques telles que le mode de sélection, l'allocation des ressources et d'énergie, afin d'améliorer les performances des utilisateurs dans une cellule. Enfin, les performances des communications de données D2D reposant sur le système LTE sont mesurées à partir d'un simulateur, au niveau système, avec un scénario comportant de multiples liens de communication
Device-to-device (D2D) communication is a promising new feature in LTE-Advanced networks. It is brought up to enable efficient discovery and communication between proximate devices. With D2D capability, devices in physical proximity could be able to discover each other using LTE radio technology and to communicate with each other via a direct data path. This thesis is concerned with the design, coordination and testing of a hybrid D2D and cellular network. Design requirements and choices in physical and MAC layer functions to support D2D discovery and communication underlaying LTE networks are analyzed. In addition, a centralized scheduling strategy in base station is proposed to coordinate D2D data communication operating in LTE spectrum. The scheduling strategy combines multiple techniques, including mode selection, resource and power allocation, to jointly achieve an overall user performance improvement in a cell. Finally the performances of D2D data communication underlaying LTE system are calibrated in a multi-link scenario via system-level simulation
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Xue. "Efficient Device to Device Communication Underlaying Heterogeneous Networks." DigitalCommons@USU, 2016. https://digitalcommons.usu.edu/etd/4673.

Full text
Abstract:
Device-to-Device communications have the great potential to bring significant performance boost to the conventional heterogeneous network by reusing cellular resources. In cellular networks, Device-to-Device communication is defined as two user equipments in a close range communicating directly with each other without going through the base station, thus offloading cellular traffic from cellular networks. In addition to improve network spectral efficiency, D2D communication can also improve energy efficiency and user experience. However, the co-existence of D2D communication on the same spectrum with cellular users can cause severe interference to the primary cellular users. Thus the performance of cellular users must be assured when supporting underlay D2D users. In this work, we have investigated cross-layer optimization, resource allocation and interference management schemes to improve user experience, system spectral efficiency and energy efficiency for D2D communication underlaying heterogeneous networks. By exploiting frequency reuse and multi-user diversity, this research work aims to design wireless system level algorithms to utilize the spectrum and energy resources efficiently in the next generation wireless heterogeneous network.
APA, Harvard, Vancouver, ISO, and other styles
21

Villanueva, Ballester Rubén, and Martínez Humberto Panella. "Turning device." Thesis, Kristianstad University College, School of Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hkr:diva-4603.

Full text
Abstract:

This degree project tries to give a design solution, a machine for the company “VECTO Materialhantering AB” specialised in total system solutions within internal transport systems and material handling technology. VECTO supply material handling equipment both as stand-alone modules, turn-key plants and complete system solutions with KUKA and ABB robots. The turning device can working with several different weights.

APA, Harvard, Vancouver, ISO, and other styles
22

Furquim, Anali Cristina. "Olhares devotos." [s.n.], 2007. http://repositorio.unicamp.br/jspui/handle/REPOSIP/283985.

Full text
Abstract:
Orientador: Antonio Fernando da Conceição Passos
Acompanha 1 DVD-RW
Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Artes
Made available in DSpace on 2018-08-14T23:13:03Z (GMT). No. of bitstreams: 1 Furquim_AnaliCristina_M.pdf: 8512505 bytes, checksum: fb40ba4c2ecc8566cd3ceacdea14ca62 (MD5) Previous issue date: 2007
Resumo: Broto vital de açucena nascido do imo das entranhas dos elementos imaginais e corporais, após longo período de dormência e boa luta. Testemunho árduo e alegre de um processo criativo artístico - e de vida espiritual - empreendido, resultando no curta metragem em vídeo Natura fulgens, como parte dos frutos, após intensa dedicação e cultivo das paisagens anímicas, aqui trilhados via Imaginação Ativa 1 e Orações Contemplativas 2. O Cântico Espiritual de São João da Cruz e as amorosas qualidades da Virgem Maria Santíssima como Stella Maris, Pulchra ut Luna e Domus Dei 3 foram inestimáveis fontes de inspiração, estrelas guias. Participaram do processo a improvisação em dança, práticas de consciência corporal e a escrita poética de livre curso que reuniu as imagens emergidas. Na produção em vídeo, o tema da jornada da alma em busca do retorno à Presença Divina, verdadeira fonte de Água Viva, labora juntamente com a assunção do corpo criativo, como domus 4 do Coração de Deus no tempo. Nas incursões teóricas, o tema da cruz e da redenção - do humano olhar, das imagens produzidas, e da imaginação - antecede e ilumina a realização. A trama dos Instantes Fecundos de Significado, poéticos, divinos, em imagem e som, revelados aos devotos olhares da alma-e-coração, constituíram o cerne da pesquisa.
Abstract: Vital lily bud born in the inmost entrails of the imaginal and body elements, after long period of dormancy and good fight. Arduous and joyful testimony of an artistic - and spiritual life - creative process undertaken, resulting in the short film on video Natura fulgens, as part of the fruits, after intense dedication and cultivation of the psychic landscapes, here performed via Active Imagination 1 and Contemplative Prayer 2. The Spiritual Canticle of St. John of the Cross and the loving qualities of the Blessed Virgin Mary as Stella Maris, Pulchra ut Luna and Domus Dei 3 have been invaluable sources of inspiration, guiding stars. Improvisation in dance, body awareness practices and free course poetic writing, which gathered the images emerged, were parts of the process. In the short film, the theme of the soul's journey in search of a return to the Divine Presence, true source of Living Water, works together with the assumption of the creative body, like domus 4 of the Heart of God in time. In the theoretical incursions, the theme of the cross and redemption - of the human look, of the produced images, of the imagination - precedes and illuminates the realization. The web of Instants Fertile of Meaning, poetic, divine, in image and sound, revealed to the pious eyes of soul-and-heart, formed the core of the research.
Mestrado
Mestre em Multimeios
APA, Harvard, Vancouver, ISO, and other styles
23

Spizewski, Bartlomiej. "Device Discovery in Device Management Systems for Cellular Networks." Thesis, KTH, Kommunikationssystem, CoS, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92011.

Full text
Abstract:
As mobile phones get increasingly complicated the demands for an effective firmware update service increase. A proposed solution is Firmware Over The Air (FOTA) and the Open Mobile Alliance’s Device Management where mobile phones can be updated and managed via the mobile phone network. However, before these operations can be carried out, all FOTA capable mobile phones that should be served must be discovered and registered with a distributor of updates. The information provided must be sufficient to uniquely identify devices, initiate a Device Management session, and determine if a firmware update is needed. This thesis addresses the problems that a solution in automatically collecting this information. Several solutions are presented and their suitability evaluated on the basis of defined and analyzed requirements. The solutions most thoroughly examined are various manual solutions, retrieval of information from core network nodes, and utilizing the Short Message Service (SMS) or Unstructured Supplementary Service Data (USSD). A phone application has been implemented according to the requirements from the Chinese network operator China Mobile Communications Corporation (CMCC). It is a part of a solution in which the information is delivered via a SMS session. The design and development phase of the application is described, accompanied by a brief description of the Symbian OS and the working environment (tools, devices, etc.) needed to implement this solution. This work took place at the Sony Ericsson office in Beijing, China. The application implemented is robust and it is impossible to avoid registration, furthermore the user can not be exposed to acknowledgement messages. It has been made possible on the cost of decreased phone performance (a few kB of memory) since the application runs all the time. Malfunctioning phone or network may hinder registration.
Mobiltelefoner blir ständigt mer komplicerade vilket medför att efterfrågan av en effektiv lösning för uppdateringar av mjukvaran i mobiltelefonerna ökar. Lösningen är Firmware Over The Air (FOTA) och Device Management; mobiltelefonerna uppdateras och sköts via mobiltelefonnätverket. Men innan förfaranden kan exekveras måste alla mobiltelefoner med FOTA som ska omfattas av tjänsten upptäckas och registreras hos den som distribuerar uppdateringarna. Den information som måste levereras måste vara tillräcklig för att kunna identifiera mobiltelefonen, genomföra en Device Management session och avgöra om en uppdatering av mjukvaran är nödvändig. Detta examensarbete behandlar de problem som en lösning i vilken information tillhandahålls möter. Ett flertal lösningar presenteras och deras lämplighet utvärderas på basis av definierade och analyserade krav. De mest ingående undersökta lösningarna är olika manuella lösningar, insamling av information från noderna av kärnnätverket samt utnyttjande av SMS eller USSD. En telefonapplikation har implementeras enligt krav från den kinesiska operatören CMCC. Applikationen är en del av en lösning i vilken informationen levereras via en SMS-session. Applikationens design och utvecklingsfasen är beskriven, samt en översiktlig beskrivning av Symbian operativsystem och utvecklingsmiljön (verktyg, mobiltelefoner, etc.) som behövdes för att implementera lösningen. Detta arbete genomfördes på Sony Ericssons kontor i Beijing, Kina.
APA, Harvard, Vancouver, ISO, and other styles
24

Verenzuela, Daniel. "Scalability of Device-to-Device Communications in Cellular Networks." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187444.

Full text
Abstract:
In current cellular networks the demand of traffic is rapidly increasing and new techniques need to be developed to accommodate future service requirements. Device-to-Device (D2D) communications is one technique that has been proposed to improve the performance of the system by allowing devices to communicate directly without routing traffic through the base station. This technique has the means to improved performance and support new proximity based services.   Nowadays new applications based on geographical proximity are becoming more and more popular suggesting that D2D communications will have a high de- mand in the near future. Thus the study of the scalability of D2D communications is of paramount importance.   We define the scalability of D2D communications underlay cellular networks as the maximum number of D2D links that can share the cellular resources while assuring QoS to both D2D links and cellular users. In this thesis we study the scalability of D2D communication underlay cellu- lar networks in a multi-cell environment. We propose interference coordination schemes to maximize the number of D2D links while assuring QoS to D2D links and cellular users.   Three interference coordination schemes have been proposed considering dif- ferent levels of available channel state information (CSI). The first scheme is called no CSI centralized (N-CSIC) scheme and it is based on a centralized solution where no CSI is needed. The second is partial CSI distributed (P-CSID) scheme and it is based on a distributed solution where partial CSI is available. The last scheme is named full CSI optimal (F-CSIOp) scheme and it is achieved by formulating an optimization problem considering full CSI to be available.   Extensive mathematical and numerical analysis is conducted to develop and evaluate the proposed schemes. The results show that F-CSIOp scheme offers the best performance followed by the P-CSID and finally N-CSIC, thus a clear relationship is found between complexity and performance.   The P-CSID offers a practical solution for a low complexity interference co- ordination scheme that achieves good scalability and capacity for a wide range of strict QoS requirements. Moreover the results show that further improvement can be achieved if proper selection of the involved parameters is done along with the implementations of closed loop power control (CLPC) schemes.   The N-CSIC scheme provides a good solution for low SINR values of D2D links when the QoS of cellular users is low. Thus it is a good candidate for applications like sensor networks or M2M communications where the SINR requirements are rather low and there are no primary users to impose more interference constraints.   Finally we conclude that good scalability and capacity can be achieved with the proposed low complexity interference coordination schemes for D2D communications and provide interesting topics for future research.
APA, Harvard, Vancouver, ISO, and other styles
25

Shi, Qing. "A first principles investigation of device-to-device variability." Thesis, McGill University, 2014. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=121532.

Full text
Abstract:
In this thesis, we present first principles simulations to investigate the device-todevice variation induced by random discrete dopant (RDD) in Si nanoFET channels. Our simulations are from atomic first principles and parameter-free, by combining nonequilibrium Green's functions (NEGF) with the density functional theory (DFT). To deal with the problem of disorder scattering and configuration averaging, the coherent potential approximation (CPA) and nonequilibrium vertex correction (NVC) theory are employed. To calculate the variance of the conductance due to RDD, a local concentration approximation (LCA) on top and beyond the CPA-NVC theory is applied. Our first principles simulations provide not only the average conductance but also the variance of it. A systematic review of the quantum transport and electronic structure theory is made, including the physics, mathematics and simulation algorithms behind the NEGF-DFT, the CPA-NVC and finally the LCA methods. Our ab initio results show that for uniform doping of the Si nanoFET channel, the variation of the OFFstate leakage current decreases dramatically with increasing doping concentration or channel length; in localized doping, doping close to the channel center can have much smaller current variation than the corresponding uniform doping. Our ab inito results provide a vivid physical picture as why large device-to-device variation is expected in very small structures having small number of impurity atoms. The results also indicate that device-to-device variation induced by RDD in Si nanoFET channels can be suppressed by choosing an appropriate doping strategy. Our numerical data is organized by fitting to the WKB tunneling formula.
Dans ce mémoire, nous présentons des simulations à partir des premiers principes pour l'étude des variations dispositif-à-dispositif induites par dopant ponctuel aléatoire (RDD) dans des canaux nanoFET en Si. Nos simulations sont à partir des premiers principes atomiques et libres de paramètre, en combinant les fonctions de Green hors équilibre (NEFG) avec la théorie de la fonctionnelle de densité (DFT). Afin d'adresser le problème de la dispersion dûe au désordre et aux moyennes de configuration, l'approximation du potentiel cohérent (CPA) et la correction vertex hors équilibre (NVC) sont employées. Afin de calculer la variance de la conductance dûe au RDD, une approximation de la concentration locale (LCA) est appliquée par-dessus et au-delà de la théorie CPA-NVC. Nos simulations à partir des premiers principes fournissent non seulement la conductance moyenne mais aussi sa variance. Une revue systématique de la théorie du transport quantique et de la structure électronique est faite, incluant la physique, les mathématiques et les algorithmes de simulation derrière les méthodes NEFG-DFT, CPA-NVC et finallement LCA. Nos résultats ab initio montrent que pour un dopage uniforme du canal nanoFET en Si, la variation du courant de fuite à l'état OFF diminue de manière dramatique avec l'augmentation de la concentration de dopage ou de la longueur du canal ; dans le cas de dopage localisé, un dopage proche du centre du canal peut avoir une variation du courant plus petite qu'un dopage uniforme. Nos résultats ab inito fournissent une image physique claire de la raison pour laquelle une large variation dispositif-àdispositif peut être attendue dans des structures très petites comportant un petit nombre d'impuretés. Les résultats indiquent aussi que la variation dispositif-à-dispositif induite par RDD dans les canaux nanOFET en Si peut être supprimée en choisissant une stratégie de dopage approprié. Nos données numériques sont organisées par ajustement à la formule d'effet tunnel WKB.
APA, Harvard, Vancouver, ISO, and other styles
26

Idris, Fakrulradzi. "Resource allocation for energy efficient device-to-device communications." Thesis, University of Manchester, 2019. https://www.research.manchester.ac.uk/portal/en/theses/resource-allocation-for-energy-efficient-devicetodevice-communications(fe38ee57-5947-497e-a744-373937f7f9ab).html.

Full text
Abstract:
Device-to-Device (D2D) communication is one of the technologies for next generation communication system. Unlike traditional cellular network, D2D allows proximity users to communicate directly with each other without routing the data through a base station. The main aim of this study is to improve the overall energy efficiency (EE) of D2D communications overlaying cellular system. To reduce the complexity of joint EE optimization, we decompose the main EE problem into two subproblems; resource efficiency (RE) optimization in the first stage and EE optimization for D2D pairs in the second stage. Firstly, we propose an alternative two-stage RE-EE scheme for a single cellular user equipment (CUE) and a D2D pair utilizing uplink spectrum. Later, we extend this work for multiple CUEs and D2D pairs by considering the downlink orthogonal frequency division multiple access (OFDMA). By exploiting a range of optimization tools including the Bisection method, interior point algorithm, fractional programming, Dinkelbach approach, Lagrange dual decomposition, difference of convex functions, and concave-convex procedure, the original non-convex problems are solved and we present iterative two-stage RE-EE solutions. Simulation results demonstrate that the proposed two-stage scheme for uplink scenario outperforms the cellular mode and dedicated mode of communications and the performance is close to the global optimal solution. The results also show that the proposed schemes for downlink resource sharing provide improved system EE performance with significant gain on EE for D2D users compared to a two-stage EE-EE solution, which is obtained numerically. Furthermore, the RE and EE optimization for non-orthogonal multiple access (NOMA) are considered to study the effect of users' access to the whole spectrum. The results indicate that the proposed RE scheme for NOMA with D2D communications achieves higher system EE compared to the OFDMA based schemes.
APA, Harvard, Vancouver, ISO, and other styles
27

Vlachos, Christoforos. "Integrating device-to-device communications in 5G cellular networks." Thesis, King's College London (University of London), 2018. https://kclpure.kcl.ac.uk/portal/en/theses/integrating-devicetodevice-communications-in-5g-cellular-networks(b4700367-dfd1-41df-b880-651bdb3b0b7b).html.

Full text
Abstract:
The evolution of wireless networks towards 5G dictates the integration of a mul-titude of heterogeneous radio access technologies to the traditional macro-cell systems. Equipping the network with numerous small cell nodes, such as fem-tocell and picocell base stations (BSs), implies a spectrum efficient and network performance improving solution to support the rapidly increasing user demands. However, this can be proven to be a cost-inefficient method that increases the capital and operational expenditures of the network operators as well as the power consumption, especially in low-traffic network conditions where a number of BSs should be switched-off. To this end, device-centric solutions that leverage the potentials stemming from the proximity, mobility and increased dynamics of user devices should be considered. To this end, direct, proximity-based Device-to-Device (D2D) communication, where two close-ranged user equipments (UEs) are able to exchange data by bypassing the BS, is expected to play predominant role in improving the overall network welfare and ease part of the traffic developed on the BSs side. This thesis focuses on the soft integration of inband D2D communications in emerging cellular networks where D2D-enabled devices utilize the licensed spec-trum. In the introductory part of the thesis we highlight the merits that this communication paradigm can offer in terms of spectrum utilization, energy sav-ing, delay reduction and data rate improvement. We also provide an overview of the D2D use cases that enable opportunities for new services, its potential in improving the overall network performance as well as its offloading capability that can ease the traffic employed along the network. In the sequel, we proceed with our proposed methodology that aims at easing the coexistence of cellular and D2D users in emerging cellular networks. One of the main contributions of the thesis is the optimization of cell association for D2D UEs (DUEs). Cell association for D2D communications is an unexplored area and a rather fertile ground for research. Following the conventional motif, a user device would preferably couple with a high power macro cell BS that provides the user with the highest signal power. However, with the advent of D2D com-munications, this could be proven to be highly inefficient for users that want to communicate directly and are associated with different BSs because BS intercom-munication complexity and access delay is introduced. To this end, we propose a number of optimization formulations for D2D-based cell association that takes into consideration not only the nature of the inband D2D communications (un-derlay or overlay), but also performance-hindering factors such as user density, interference and so on. Other than the throughput enhancing and power saving attributes of the proposed framework, notable resource efficiency improvement is achieved. Indicatively, for both underlay and overlay D2D communications, more than 12% and 45% radio resource utilization mitigation is ensured compared to baseline methods. On top of optimizing cell association for D2D communications, we further investigate the problem of resource allocation in different D2D underlaying cellu-lar network scenarios where DUEs are permitted to reuse the cellular resources and, therefore, high levels of interference need to be prevented. By consider-ing different deployment scenarios, we propose a set of low-complexity heuristic algorithms with the aim to achieve high data rate performance for D2D com-munications with respect to meeting the cellular users’ quality of service (QoS) requirements. The proposed algorithms are evaluated in high-traffic networking scenarios where D2D communications underlay relay-enabled cellular networks. In aggregate, more than 10% of sum throughput performance is achieved against various resource allocation techniques. In the sequel, we explore the dynamics of virtualizing the radio resources for efficient sharing as, nowadays, we are witnessing higher network heterogeneity and the emergence of multiple stakeholders with the overarching need to significantly reduce deployment costs and achieve a sustainable network operation. Network virtualization has emerged as a promising technique to overcome the complexity of current network operation as well as facilitate inter-operators’ sharing. There-fore, disruptive approaches to manage radio and network-virtualized resources are expected to be a catalyst element of future mobile network architectures. Despite the fact that a number of solutions for radio access network (RAN) virtualization emerged over the last few years, it is worth pointing out that little attention has been placed on issues related to D2D virtualization. Therefore, based on the integration of an inter-tenant controller that enables the radio resource sharing between multiple operators, we devise a set of efficient algorithms to optimize the throughput performance of D2D communications in virtualized environments as well as reduce the utilization levels of the allocated radio resources. More than 12% of sum-rate performance improvement compared to legacy, intra-tenant ap-proaches where the radio resources are assigned based on which device initiates the communication per case. Finally, a summary of the research outcomes along with some future directions for D2D communications concludes this thesis.
APA, Harvard, Vancouver, ISO, and other styles
28

Ali, S. (Samad). "Full duplex device-to-device communication in cellular networks." Master's thesis, University of Oulu, 2014. http://urn.fi/URN:NBN:fi:oulu-201411081977.

Full text
Abstract:
To address the problem of radio spectrum congestion due to increasing demand for wireless communications services, cellular communication systems are going towards small cells with small transmit powers. At the same time, in-band fullduplex (FD) radio design has gained considerable attention due to achievements in signal processing that can make design of full-duplex radios possible for systems with small transmit power. In theory full-duplex radios can double the spectral efficiency of the system. However existing radios still do not provide enough self-interference (SI) cancelation to be used in large transmit power systems. Meanwhile device-to-device communication (D2D) is seen as a promising idea to increase the performance of wireless networks. In D2D, users in vicinity communicate directly without going through base station. So far, very limited work has been carried out to study the applicability of available full-duplex radios in D2D. In this thesis, we investigate full-duplex D2D and amount of self-interference cancelation required in D2D in cellular systems. While D2D users share the same radio resources with cellular users, both cellular and D2D pair will receive interference. Resource allocation and interference management become crucial in D2D communication. Both uplink and downlink resource sharing are considered. In uplink resource sharing, to handle the interference on the base station power control is used in D2D transmitter. To deal with the interference at D2D receivers from cellular user’s uplink transmission, interference-limited-area (ILA) method is used to select users with negligible interference on them. When D2D pair is using downlink resources of cellular users, users receive interference from D2D transmissions. Limiting this interference is also done using ILA method. On the other hand, for the purpose of resource sharing, the user with smallest downlink transmit power is selected to minimize the interference on D2D receivers. Half-duplex (HD) and full-duplex D2D scenarios are considered in both uplink and downlink resource sharing. Simulations show that how much of self-interference cancelation is required in different scenarios. Effects of the numbers of the selected users for resource sharing, distance between D2D users and also inter-cell interference is studied. It can be concluded that using available full-duplex radios in D2D communication can almost reach the theoretical doubling of throughput in full-duplex mode compared to half-duplex mode.
APA, Harvard, Vancouver, ISO, and other styles
29

Chour, Hussein. "Full-Duplex Device-to-Device Communication for 5G Network." Thesis, CentraleSupélec, 2019. http://www.theses.fr/2019CSUP0002.

Full text
Abstract:
Avec la croissance rapide de la demande de trafic de données des clients, l'amélioration de la capacité du système et l'augmentation du débit des utilisateurs sont devenues des préoccupations essentielles pour le futur réseau de communication sans fil de cinquième génération. Dans ce contexte, la communication terminal-à-terminal (Device-to-Device D2D) et le Full Duplex (FD) sont proposés comme solutions potentielles pour augmenter l’efficacité spectrale et le débit des utilisateurs dans un réseau cellulaire. Le D2D permet à deux périphériques proches de communiquer sans participation de la station de base ou avec une participation limitée. D'autre part, la communication en FD permet une transmission et une réception simultanées dans la même bande de fréquence. En raison de la propriété de distance courte des liaisons D2D, exploiter la technologie FD dans la communication D2D est un excellent choix pour améliorer encore plus l’efficacité spectrale cellulaire et le débit des utilisateurs. Cependant, les émetteurs-récepteurs FD constituent de nouveau défis pour la communication D2D. Par exemple, en FD les émetteurs-récepteurs ne peuvent pas supprimer d’une manière parfaite l’auto-interférence (SI) générée au niveau des récepteurs lors de la transmission des données (par le propre émetteur du dispositif cellulaire). Ainsi, l’auto-interférence résiduelle qui est étroitement liée à la valeur de la puissance de l’émetteur affecte fortement les performances de la transmission FD. De plus, la technique en FD crée des interférences supplémentaires dans le réseau, ce qui peut dégrader ses performances par rapport à la transmission en semi-duplex (Half-duplex HD). Ainsi, une bonne gestion des ressources radio est nécessaire pour exploiter les avantages de la FD et garantir la qualité de service (QoS) des utilisateurs. Les travaux de cette thèse portent sur l'allocation de puissance et l'attribution de canaux d'un réseau FD-D2D. En particulier, cette thèse aborde d’abord le problème de l’allocation de puissance et propose une méthode d'allocation de puissance (PA) optimale centralisée simple mais efficace, puis développe le schéma optimal conjoint d’AP et d’AC pour un réseau FD-D2D. Un algorithme de complexité réduite CATPA, basé sur une allocation CA suivie d'une allocation PA, est aussi développée et proposé. La thèse présente à la fin une stratégie efficace d'AP décentralisée en utilisant les outils de la théorie des jeux
With the rapidly growing of the customers' data traffic demand, improving the system capacity and increasing the user throughput have become essential concerns for the future 5G wireless communication network. In this context, D2D communication and FD are proposed as potential solutions to increase the spatial spectrum utilization and the user rate in a cellular network. D2D allows two nearby devices to communicate without BS participation or with limited participation. On the other hand, FD communication enables simultaneous transmission and reception in the same frequency band. Due to the short distance property of D2D links, exploiting the FD technology in D2D communication is an excellent choice to further improve the cellular spectrum efficiency and the users’ throughput. However, practical FD transceivers add new challenges for D2D communication. For instance, the existing FD devices cannot perfectly eliminate the SI imposed on the receiver by the node’s own transmitter. Thus, the RSI which is tightly related to the transmitter power value highly affects the performance of FD transmission. Moreover, the FD technique creates additional interference in the network which may degrade its performance when compared with the half-duplex transmission. Thus, proper radio resource management is needed to exploit the benefits of FD and guarantee the QoS of the users. The works in this dissertation focus on the PA and CA of a FD-D2D network. In particular, this thesis first addresses the PA problem and proposes a simple yet efficient centralized optimal PA framework, and next, it derives the optimal joint PA and CA scheme for an FD-D2D network. A simple sub-optimal algorithm for resource allocation named CATPA, based on CA followed by PA, is also derived and proposed. This dissertation also develops, in the end, an efficient decentralized PA using game theory tools that will be an essential part of future works in the context of distributed radio resource management
APA, Harvard, Vancouver, ISO, and other styles
30

Uyoata, Uyoata Etuk. "Relay assisted device-to-device communication with channel uncertainty." Doctoral thesis, Faculty of Engineering and the Built Environment, 2019. http://hdl.handle.net/11427/31309.

Full text
Abstract:
The gains of direct communication between user equipment in a network may not be fully realised due to the separation between the user equipment and due to the fading that the channel between these user equipment experiences. In order to fully realise the gains that direct (device-to-device) communication promises, idle user equipment can be exploited to serve as relays to enforce device-to-device communication. The availability of potential relay user equipment creates a problem: a way to select the relay user equipment. Moreover, unlike infrastructure relays, user equipment are carried around by people and these users are self-interested. Thus the problem of relay selection goes beyond choosing which device to assist in relayed communication but catering for user self-interest. Another problem in wireless communication is the unavailability of perfect channel state information. This reality creates uncertainty in the channel and so in designing selection algorithms, channel uncertainty awareness needs to be a consideration. Therefore the work in this thesis considers the design of relay user equipment selection algorithms that are not only device centric but that are relay user equipment centric. Furthermore, the designed algorithms are channel uncertainty aware. Firstly, a stable matching based relay user equipment selection algorithm is put forward for underlay device-to-device communication. A channel uncertainty aware approach is proposed to cater to imperfect channel state information at the devices. The algorithm is combined with a rate based mode selection algorithm. Next, to cater to the queue state at the relay user equipment, a cross-layer selection algorithm is proposed for a twoway decode and forward relay set up. The algorithm proposed employs deterministic uncertainty constraint in the interference channel, solving the selection algorithm in a heuristic fashion. Then a cluster head selection algorithm is proposed for device-to-device group communication constrained by channel uncertainty in the interference channel. The formulated rate maximization problem is solved for deterministic and probabilistic constraint scenarios, and the problem extended to a multiple-input single-out scenario for which robust beamforming was designed. Finally, relay utility and social distance based selection algorithms are proposed for full duplex decode and forward device-to-device communication set up. A worst-case approach is proposed for a full channel uncertainty scenario. The results from computer simulations indicate that the proposed algorithms offer spectral efficiency, fairness and energy efficiency gains. The results also showed clearly the deterioration in the performance of networks when perfect channel state information is assumed.
APA, Harvard, Vancouver, ISO, and other styles
31

Han, Yanyan. "Ultra-Large-Scale Crowdsensing in Device-to-Device Networks." Thesis, University of Louisiana at Lafayette, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10266292.

Full text
Abstract:

Crowdsourcing is emerging as a new data-collection, solution-finding, and opinion-seeking model that obtains needed services, ideas, or content by soliciting contributions from a large crowd of public participants. D2D based crowdsensing is particularly desired when the initiator cannot directly reach out to the participants or the conventional approaches for data transportation are costly. This dissertation studies the ultra-large scale crowdsensing applications in such mobile D2D networks. First, I proposed and addressed MCC(Minimum-Cost Crowdsourcing) problem by exploring a multi-dimensional design space to seek an optimal solution that minimizes the total crowdsensing cost while satisfying the coverage probability over the FoI. In particular, three strategies (or options) are in consideration: task allocation strategy, data processing strategy and computation offloading strategy. The difficulty is to determine the three options for each node in order to minimize the overall system cost. Second, there are a class of applications, where the originator is only allowed to recruit a given number of participants. Therefore, from the perspective of limited participants, we proposed a competition based participant recruitment mechanism to wisely choose the set of nodes while achieving the best benefit. I have proposed a dynamic programming algorithm as a first attack to this problem, followed by two distributed alternatives, which prove to be more practical and adaptive. During the above two topics, we find the existing routing protocols cannot efficiently support the ultra-large scale crowdsensing, thus we built a resource constrained routing protocol in D2D, aiming to approach the large-scale, bandwidth-hungry crowdsensing task in a more efficient way. With the requirement of restricted node storage and link bandwidth as well as end-to-end delay, I formulated a non-linear traffic allocation optimization problem with an approximation algorithm and distributed heuristic solution. Finally, I have carried out extensive complexity analysis, simulation, prototyping and implementation, experimentation and performance evaluation. Through the step-by-step exploration and verification, I have demonstrated the efficiency of the proposed heuristics and revealed empirical insights into the design tradeoffs and practical considerations in D2D-based crowdsourcing.

APA, Harvard, Vancouver, ISO, and other styles
32

Bompiani, Brian Anthony. "The development of the concept of Satan." Theological Research Exchange Network (TREN), 2004. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Carvalho, Júnior Odilair. "Dos provimentos antecipatórios e o devido processo legal." Faculdade de Direito de Vitoria, 2007. http://191.252.194.60:8080/handle/fdv/65.

Full text
Abstract:
Submitted by Suelen Santos (suelen@fdv.br) on 2018-08-17T15:57:31Z No. of bitstreams: 1 ODILAIR CARVALHO JUNIOR.pdf: 793424 bytes, checksum: bc1d8296fbb9e34c9674434cc51bf796 (MD5)
Approved for entry into archive by Ana Paula Galdino (repositorio@fdv.br) on 2018-08-17T20:08:21Z (GMT) No. of bitstreams: 1 ODILAIR CARVALHO JUNIOR.pdf: 793424 bytes, checksum: bc1d8296fbb9e34c9674434cc51bf796 (MD5)
Made available in DSpace on 2018-08-17T20:08:21Z (GMT). No. of bitstreams: 1 ODILAIR CARVALHO JUNIOR.pdf: 793424 bytes, checksum: bc1d8296fbb9e34c9674434cc51bf796 (MD5) Previous issue date: 2007-09-27
O presente trabalho tem como objetivo aferir a compatibilidade dos provimentos antecipatórios com a garantia do devido processo legal. A partir da constatação da possibilidade de colisão entre os princípios-garantias constitucionais, verifica que os provimentos antecipatórios consubstanciam a solução dada pelo legislador ao conflito entre a garantia do contraditório e a garantia da inafastabilidade do controle jurisdicional. Busca encontrar critérios objetivos para aferir a validade da escolha do legislador em fazer prevalecer um princípio-garantia constitucional às custas da restrição de outro. Para isso procede à analise da evolução histórica dos direitos e garantias fundamentais. Traça a distinção entre direitos e garantias. Estuda as diversas funções decorrentes da soberania do Estado, com destaque para a Jurisdição. Analisa a aplicação do devido processo legal como fundamento dos critérios a serem utilizados para a solução de eventual conflito entre a garantia constitucional fundamental do contraditório e da ampla defesa e a da inafastabilidade do controle jurisdicional. Procura delimitar a abrangência do devido processo legal em sua dupla dimensão: procedimental e substantiva. Mostra a evolução da garantia do devido processo legal substantivo a partir dos precedentes da Suprema Corte americana. Relata a aplicação do devido processo legal substantivo no direito brasileiro. Demonstra que a garantia do devido processo legal constitui-se em mecanismo a ser aplicado no controle de constitucionalidade dos atos normativos do Poder Público. Define e delimita a abrangência os princípios concretizados do devido processo legal: princípio da razoabilidade e da proporcionalidade. Busca definir o conteúdo da garantia do contraditório e da inafastabilidade do controle jurisdicional. Agrupa as espécies de provimentos jurisdicionais em tutelas de urgência e tutela da evidência. Confronta esses gêneros de tutelas jurisdicionais à luz dos critérios fornecidos pelo devido processo legal. Analisa destacadamente a liminar nos interditos possessórios e no procedimento da alienação fiduciária em garantia.
The goal of this work is to assess the compatibility of anticipatory provisions with the guarantee of due process of law. Starting from the observation of the possibility of collision between constitutional guarantees of principle, it verifies that the anticipatory provisions consolidate the given solution by the legislator upon the conflict between the guarantee of that which is contradictory and the guarantee of that which cannot be removed from jurisdictional control. It also seeks to encounter objective criteria in order to assess the validity of the legislator’s choice to make one constitutional principle prevail at the cost of restricting another. In order for this, the analysis of the historical evolution of fundamental rights and guarantees must be carried out. This work outlines the distinction between rights and guarantees. It studies the diverse functions resulting from the State’s sovereignty with emphasis on Jurisdiction. This paper analyzes the application of due process of law as the basis of criteria to be utilized for the solution of fortuitous conflict between the fundamental constitutional guarantees of that which is contradictory and Legal defense and that which cannot be removed from jurisdictional control. It seeks to delimit the range of due process of law in its two dimensions: procedural and substantive. This work shows the evolution of the guarantee of substantive due process of law starting from the proceedings of the United States Supreme Court. It gives the account of the application of substantive due process in Brazilian law. It demonstrates that the guarantee of due process of law is constituted in mechanism to be applied to the control of constitutionality of the prescriptive acts of Public Authority. It defines and delimits the range of concrete principles of due process of law: the principles of reasonability and of proportionality. It seeks to define the content of the guarantee of that which is contradictory and that which cannot be removed from jurisdictional control. This work groups together the kinds of jurisdictional provisions in guardianships of urgency and of proof. It compares these types of jurisdictional guardianships in light of criteria supplied through due process of law. It emphatically analyzes the preliminary verdict in possessory injunctions and in the proceedings of fiduciary alienation in guarantees.
APA, Harvard, Vancouver, ISO, and other styles
34

Piccina, Fernanda Vasconcelos Fontes. "O devido processo legal no processo administrativo disciplinar." Pontifícia Universidade Católica de São Paulo, 2011. https://tede2.pucsp.br/handle/handle/5612.

Full text
Abstract:
Made available in DSpace on 2016-04-26T20:20:13Z (GMT). No. of bitstreams: 1 Fernanda Vasconcelos Fontes Piccina.pdf: 983394 bytes, checksum: 27a2865b16640cd8382e1db5726924e4 (MD5) Previous issue date: 2011-06-13
The present work aims the study of the Due Process of Law and its implications in administrative disciplinary proceedings. It starts with the background of Due Process in the Brazilian legal and a brief historical description of the principle and its analysis, based on the phenomena of constitutionalization of the law. The study of administrative disciplinary proceedings is made, initially from the general approach of this process at the federal level, from the perspective of Law 8112/90, with the analysis of each of its phases, moving after, the study of principles that give concreteness to the Due Process of Law as well as the consequences of its impact on the process under study. The work contains, therefore, the study in furtherance of the principles of due process of law, namely: contradictory and full defense, natural judge, reasonableness and proportionality and, finally, a reasonable duration of proceedings. In items where the above principles are studied, sought to conceptualize them and examine its foundations, scope and direction in the processes of disciplinary sanctions in order to verify their impact in specific cases, as well as the understanding of the Superior Courts on the matter
O presente trabalho tem por objeto o estudo do devido processo legal e suas implicações no processo administrativo disciplinar. Parte-se da contextualização do Devido Processo Legal no ordenamento jurídico brasileiro e de uma breve descrição histórica do princípio e da sua análise, tomando por base o fenômeno da constitucionalização do Direito. O estudo do processo administrativo disciplinar é feito, inicialmente, a partir de abordagem geral desse processo na esfera federal, sob a ótica da Lei 8112/90, com a análise de cada uma de suas fases, passando-se, após, ao estudo dos princípios que conferem concretude ao Devido Processo Legal, bem como as consequências da sua incidência no processo em estudo. O trabalho compreende, assim, o estudo dos princípios concretizadores do Devido Processo Legal, quais sejam: contraditório e ampla defesa, juiz natural, razoabilidade e proporcionalidade e, por fim, a razoável duração do processo. Nos itens em que os mencionados princípios são estudados, buscou-se conceituá-los e examinar seus fundamentos, sentido e alcance nos processos de aplicação de sanções disciplinares, de modo a constatar a sua incidência nos casos concretos, bem como o entendimento dos Tribunais Superiores sobre a matéria
APA, Harvard, Vancouver, ISO, and other styles
35

Birello, Guilherme Tadeu Pontes. "Devido processo legal substancial e a função administrativa." Pontifícia Universidade Católica de São Paulo, 2014. https://tede2.pucsp.br/handle/handle/6644.

Full text
Abstract:
Made available in DSpace on 2016-04-26T20:23:21Z (GMT). No. of bitstreams: 1 Guilherme Tadeu Pontes Birello.pdf: 675120 bytes, checksum: b484a013694adb12dc781cd4a15202b8 (MD5) Previous issue date: 2014-10-23
The present study had as its scope, the delimitation of the legal concept of the Due Process of Law clause, in its substantial sense and its implication in the exercise of the administrative function. The mentioned clause is one of the oldest and intrinsic institutes of the Rule of Law. In its incipient form, the Due Process of Law clause represented one of the first methods to control the despotic power. Thenceforth, it was the skeleton for the rise of many others institutes that limits the State Power. From the formal procedural aspect procedural instruments (full defense and the right to appeal, motivation of the State decisions duty, among others), up to reaching the merits of the decision control (originally accepted as reasonableness judgment), this last one known as Substantial Due Process of Law. Occurs that this range of principles typically assigned to the Substantial Due Process of Law clause (reasonableness, proportionality, motivation) has express and specific legal provision in the normative text, demonstrating an emptying of its content in the Brazilian legal order. Nevertheless, it‟s a duty for the legal scholar to apply sense and unity to the judicial system. Within the national legal system, the mentioned principle reveals itself as a command to the law enforcer to seek the best ruling. The best ruling is the one, firstly, that promotes the public interest duty (therefore, preceded by a direct judgment of the will of the normative command and not by an arbitrary subjective judgment) and, in front of the actual reality, has been shown as the most effective. As issued by a competent authority, the decision will be considered, a priori, as the best decision, except if proved that other decision is sufficiently more favorable. It was noted that this assertion has harmony with the administrative role and the legal administrative regime. The exercise of the administrative role is, before anything, the common good promotion, the public interest. This implies in the assertion that the exercise of the prerogatives (Power) given to the administration are instrumentals and, therefore, may only be exercised for the achievement of the public interest set forth in its own judicial order (full submission to the principle of legality). Thereby, it is not granted to the legal scholar any freedom of action, as a public agent, in seek for another purpose but the public interest. Thus, the administration role is to always seek for the best solution for the concrete cases that are presented. Throughout the General Theory of Law elements description, it was sought to present means and procedures in order to seek the best decision (worth mentioning, hermeneutical notions of principles that provide an unitary and systemic comprehension of the judicial order, ratio of principles and rules, weighing judgment and enforcement of the proportionality and reasonableness principles
O presente trabalho teve como escopo a delimitação do conceito jurídico da cláusula do Devido Processo Legal em seu sentido substancial e sua implicação no âmbito do exercício da função administrativa. Referida cláusula é um dos institutos mais antigos e afetos ao Estado de Direito. Em sua forma embrionária, a cláusula do Devido Processo Legal representou uma das primeiras maneiras de controle do poder despótico. A partir daí, foi o arcabouço para o surgimento de tantos outros institutos limitadores do Poder Estatal. Seja pelo aspecto processual formal - ferramentas procedimentais (ampla defesa e contraditório, dever de motivação das decisões estatais, entre outros), até chegar ao controle de mérito da decisão (embrionariamente tido como juízo de razoabilidade), este ultimo, conhecido como Devido Processo Legal Substancial. Ocorre que, esta gama de princípios e postulados tipicamente atribuídos à cláusula do Devido Processo Legal substancial (razoabilidade, proporcionalidade, motivação) possui previsão legal expressa e específica no texto normativo, relevando um esvaziamento de seu conteúdo no âmbito do ordenamento jurídico brasileiro. Ainda assim, é obrigação do cientista do direito atribuir sentido e unicidade ao sistema jurídico. A cláusula do Devido Processo Legal é axiologicamente ligada ao controle do mérito das decisões estatais. No âmbito do ordenamento jurídico pátrio, tal princípio revela-se como um comando ao aplicador da norma para que este busque a prolação da melhor decisão. Melhor decisão é aquela que, em primeiro lugar, observa o dever de promoção do interesse público (portanto, precedida de um juízo objetivo da vontade do comando normativo, e não um juízo arbitrário subjetivo) e, diante da realidade fática, tenha se mostrado como a mais eficaz. Enquanto proferida por uma autoridade competente, a decisão será considerada, aprioristicamente, como a melhor decisão, salvo comprovado que outra solução seja suficientemente mais vantajosa. Constatou-se que esta afirmação tem plena harmonia com a função administrativa e regime jurídico-administrativo. O exercício da função administrativa é, antes de mais nada, a promoção do bem comum, do interesse público. Isto implica em afirmar que o exercício das prerrogativas (Poder) conferidas à administração são instrumentais e, portanto, só podem ser exercidos para prossecução do interesse público estabelecido no próprio ordenamento jurídico (submissão plena ao princípio da legalidade). Neste sentido, não é conferido ao operador do direito qualquer margem de ação, na qualidade de agente público, em busca de outra finalidade que não o interesse público. Sendo assim, é função da administração a busca plena sempre da melhor solução para os casos concretos que lhe são apresentadas. Por meio de descrição de elementos de Teoria Geral do Direito, buscou-se apresentar formas e procedimentos capa de que se busque a melhor decisão (vale destacar, noções hermenêuticas de postulados que conferem uma compreensão unitária e sistêmica do ordenamento jurídico, relação de princípios e regras, juízo de ponderação e aplicação dos postulados da proporcionalidade e razoabilidade)
APA, Harvard, Vancouver, ISO, and other styles
36

Costa, Angelo Augusto. "Devido processo legal e redução da discricionariedade administrativa." Pontifícia Universidade Católica de São Paulo, 2008. https://tede2.pucsp.br/handle/handle/8082.

Full text
Abstract:
Made available in DSpace on 2016-04-26T20:27:14Z (GMT). No. of bitstreams: 1 Angelo Augusto Costa.pdf: 2058806 bytes, checksum: 2de38ac3bf800d2685f0bcb29a8f6c55 (MD5) Previous issue date: 2008-05-15
The main goal of this work is to explore normative connections between the due process clause, as stated in the Brazilian Constitution (CF 5º, LIV), and the reduction of administrative discretion when it comes to deciding particular cases. The relevance of the subject lies on the need of defining criteria for judicial review of discretionary administrative action, in order to secure and preserve both administrative decision-making and judicial reviewing powers. The working hypothesis is that due process of law provides a sound normative basis for a rule forbidding arbitrary display of powers in Brazilian law. This is so because due process clause requires in decision-making a kind of cognitive, volitive and argumentative process with the basic attribute of rationality. Thus all the limits imposed by the law on administrative discretion could be placed under the due process clause. Furthermore, due process could be viewed as grounds for a systematic exposition of vicious discretionary actions, including not giving reasons for action and poor correlation of fact-findings and legal norms. Robert Alexy's theory of legal principles was adopted as a landmark. Brazilian and foreign production on administrative discretion was taken into account as well, in an attempt to overcome the loopholes of legal positivism's description of how the law is applied. Whenever it was possible, we managed to use case study methods to uncover legal argumentation structures and the way fact-findings and legal norms correlate. As a result, we built a system of vicious discrectionary actions
O objetivo do trabalho é o de explorar as conexões normativas entre a cláusula do devido processo legal (CF 5º, LIV) e o fenôneno da redução da discricionariedade administrativa nos casos concretos. A importância do tema reside na necessidade de definir critérios sistemáticos para o exercício do controle jurisdicional dos limites da discricionariedade a fim de preservar as competências decisórias da Administração Pública e, ao mesmo tempo, assegurar a plenitude da revisão judicial. A hipótese geral é a de que o devido processo legal proporciona o fundamento normativo da proibição da arbitrariedade no direito brasileiro por exigir a adoção de um processo de cognição, volição e argumentação com o atributo fundamental da racionalidade. Desse modo, todos os limites à discricionariedade administrativa, cuja violação resulta em arbitrariedade proibida, podem ser reconduzidos à cláusula do devido processo. Além disso, o devido processo legal serve de base para a construção de um sistema dos vícios do exercício da discricionariedade administrativa, em especial dos vícios de ausência de motivação e de relacionamento defeituoso entre os elementos fáticos e normativos relevantes. Adotou-se, como referência, a teoria dos princípios de Robert Alexy, assim como a produção nacional e estrangeira sobre discricionariedade administrativa, no marco das tentativas de superação das lacunas do positivismo jurídico na descrição do processo de aplicação do direito. Empregou-se, sempre que possível, a metodologia de estudo de casos para revelar as estruturas de argumentação jurídica e o modo como se relacionam os elementos fáticos e normativos. O resultado foi a construção de um sistema de vícios do exercício da discricionariedade administrativa
APA, Harvard, Vancouver, ISO, and other styles
37

Lima, Felipe Herdem. "Devido processo administrativo no regime de liquidação extrajudicial." reponame:Repositório Institucional do FGV, 2017. http://hdl.handle.net/10438/19792.

Full text
Abstract:
Submitted by Felipe Herdem Lima (fhardem@gmail.com) on 2018-01-08T19:20:01Z No. of bitstreams: 1 Dissertação Felipe Herdem Lima - Devido processo administrativo no regime de liquidação extrajudicial..pdf: 2025783 bytes, checksum: 4a173ff7922fd18f692b2a190ec44d36 (MD5)
Approved for entry into archive by Diego Andrade (diego.andrade@fgv.br) on 2018-01-11T11:33:43Z (GMT) No. of bitstreams: 1 Dissertação Felipe Herdem Lima - Devido processo administrativo no regime de liquidação extrajudicial..pdf: 2025783 bytes, checksum: 4a173ff7922fd18f692b2a190ec44d36 (MD5)
Made available in DSpace on 2018-01-16T13:19:20Z (GMT). No. of bitstreams: 1 Dissertação Felipe Herdem Lima - Devido processo administrativo no regime de liquidação extrajudicial..pdf: 2025783 bytes, checksum: 4a173ff7922fd18f692b2a190ec44d36 (MD5) Previous issue date: 2017-12-19
The present work aims to discuss the obligation to iniciate a previous administrativeproceedings among all interested parties before the commecement of the special proceedingsof extrajudicial liquidation of financial institutions provided for by Law nº 6.024, de13.3.1974. In view of this, Law nº 6.024, de 13.3.1974 framework will be discussed , as wellas financial institutions officers or directors’ constitucional rights to full defense, adversaryproceedings and presumption of innocence, when they violate legal or bylaw rules.
O presente trabalho pretende discutir a obrigatoriedade de instauração de processo administrativo prévio, com a participação de todos os envolvidos, para a aplicação do regime especial de liquidação extrajudicial, disposto na Lei nº 6.024/74 de 13 de março de 1974. Desta forma, se discutirá o tratamento conferido pela referida lei, além das garantias constitucionais da ampla defesa, contraditório e da presunção de inocência, nos casos de decretação da liquidação extrajudicial pela violação de normas legais e estatutárias por seus administradores.
APA, Harvard, Vancouver, ISO, and other styles
38

George, Geordie. "Device-to-device communication and wearable networks harnessing spatial proximity." Doctoral thesis, Universitat Pompeu Fabra, 2017. http://hdl.handle.net/10803/404986.

Full text
Abstract:
Spatially proximal devices wanting to exchange information are expected to become more prevalent in wireless networks, rendering the option for direct device-to-device (D2D) communication increasingly important. On the one hand, within networks where communication via infrastructure has been the convention, enabling such an option for short-range and single-hop communication between co-located devices might potentially bring about performance benefits on several accounts. On the other hand, in the realm of networks where direct interaction between devices has been an obvious option, there is a growing demand for supporting extreme-data-rate applications and much denser deployments of simultaneous transmissions. This dissertation explores these aspects by addressing two main problems: (i) analyzing the performance benefits of D2D communication integrated into cellular mobile networks, and (ii) investigating the feasibility of mmWave (millimeter wave) frequencies for personal networks of wearable (body-born) devices in enclosed settings. Under sufficient spatial locality in wireless traffic within cellular networks, the D2D mode of communication can be leveraged to employ a denser spectral reuse, thereby achieving very high area spectral efficiencies (bits/s/Hz per unit area). Enabling D2D entails a reshaping of the network topology comprising the sources of useful signal and harmful interference from the vantage of each receiver, which is a factor that delimits network performance fundamentally. Therefore, to gauge the performance gains of D2D and to identify the challenges thereof, it is essential to model D2D communication in a large multicellular setting, without missing key features of the ensuing interference environment. In this regard, we develop a robust analytical framework, utilizing tools from stochastic geometry. The dissertation propounds a novel approach to the application of stochastic geometry that is shown to improve the simplicity, accuracy, and generality of wireless network analysis. The performance evaluation conducted using the framework, while demonstrating the potential of D2D, also indicates the need for managing the interference surge. Prompted by this, and to illustrate the flexibility of the framework, we further extended it to incorporate interference protection schemes based on exclusion regions and the benefits thereof are assessed. The presence of multiple wearable networks—each comprising several on-body device-pairs worn by people—in proximity might result in an extreme density of simultaneous wireless transmissions. Such a scenario is expected to become commonplace in enclosed settings, e.g., commuter trains, subways, airplanes, airports or offices, and be further challenging due to an increasing demand for data-rate-intensive wireless applications in wearable technology. This combination of very-short-range communication, high-data-rate applications, and dense spectral reuse seems to render operation at mmWave frequencies a suitable candidate; add to that the possibility of accommodating antenna arrays within devices for directional beamforming. Hence, we investigate the feasibility of enclosed mmWave wearable networks, with a particular focus on appropriately modeling the impact of propagation mechanisms at these frequencies. In the propagation modeling, specular reflections off surfaces are explicitly accounted for, as they are expected to contribute useful signal power while, at the same time, intensify the interference. Recognizing the increased prominence of blocking by obstacles, body-blockages in the direct and reflected propagation paths are also modeled. The impact of these mechanisms on the spectral efficiency of the network is evaluated, aided by the application of stochastic geometry and random shape theory. Under relevant indoor settings, and in the plausible absence of strong direct signal, the reliability of surface reflections in providing useful signal power for efficient communication is investigated and the need for directional antennas is established.
Se espera que los dispositivos espacialmente proximales que desean intercambiar información se vuelvan más frecuentes en redes inalámbricas, lo que hace cada vez más importante la opción para la comunicación directa de dispositivo-a-dispositivo (D2D). Por un lado, dentro de las redes en las que la comunicación a través de la infraestructura ha sido la convención, permitir tal opción para la comunicación de corto alcance y single-hop entre dispositivos ubicados conjuntamente podría potencialmente generar beneficios de rendimiento en varios aspectos. Por otro lado, en el ámbito de las redes en las que la interacción directa entre dispositivos ha sido una opción obvia, existe una demanda creciente de soportar aplicaciones de velocidad extrema de datos e implementaciones mucho más densas de transmisiones simultáneas. Esta disertación explora dichos aspectos abordando dos problemas principales: (i) analizando los beneficios de rendimiento de la comunicación D2D integrada en las redes móviles celulares y (ii) investigando la viabilidad de las frecuencias mmWave (onda milimétrica) para redes personales de dispositivos wearables (usado en el cuerpo) en entornos cerrados. Bajo suficiente localidad espacial en el tráfico inalámbrico en redes celulares, el modo de comunicación D2D puede ser apalancado para emplear una reutilización espectral más densa, logrando así eficiencias espectrales de área muy alta (bits/s/Hz por unidad de área). La habilitación de D2D implica una remodelación de la topología de red que comprende las fuentes de señal útil e interferencia perjudicial desde la ventaja de cada receptor, lo cual es un factor que delimita el funcionamiento de la red de manera fundamental. Por tanto, para medir las ganancias de rendimiento de D2D y para identificar los retos de la misma, es esencial para modelar la comunicación D2D en un gran ajuste multicelular, sin faltar las características clave del entorno de interferencia resultante. En este sentido, se desarrolla un sólido marco analítico, utilizando herramientas de geometría estocástica. La disertación propone un nuevo enfoque para la aplicación de la geometría estocástica para mejorar la simplicidad, precisión y generalidad del análisis de redes inalámbricas. La evaluación realizada utilizando dicho enfoque, al mismo tiempo que demuestra el potencial de D2D, también indica la necesidad de manejar la oleada de interferencia. Impulsado por estos resultados, y para ilustrar la flexibilidad del marco, también se amplía para incorporar esquemas de protección contra interferencias basados en regiones de exclusión y se evalúan sus los beneficios. La presencia de redes wearables múltiples—cada una de las cuales comprende varios pares de dispositivos en el cuerpo desgastados por personas—en proximidad puede dar como resultado una densidad extrema de transmisiones inalámbricas simultáneas. Se espera que este escenario se convierta habitual en entornos cerrados, por ejemplo, trenes de cercanías, subterráneos, aviones, aeropuertos u oficinas, y será un reto adicional debido a la creciente demanda de aplicaciones inalámbricas intensivas en datos en tecnología wearable. Esta combinación de comunicaciones de muy corto alcance, en aplicaciones de alta velocidad de datos y de reutilización espectral densa parece hacer que la operación en las frecuencias mmWave sea un candidato adecuado; se añade la posibilidad de alojar conjuntos de antenas dentro de dispositivos para el beamforming direccionales. Por tanto, también se investiga la viabilidad de las redes wearables mmWave cerradas, con especial énfasis en modelar apropiadamente el impacto de los mecanismos de propagación en estas frecuencias. En el modelado de propagación, las reflexiones especulares de las superficies se explican explícitamente, ya que se espera que contribuyan a la potencia de la señal útil, mientras que, al mismo tiempo, intensificar la interferencia. Reconociendo la mayor prominencia del bloqueo por obstáculos, también se modelan los bloqueos corporales en los caminos de propagación directa y reflejada. El impacto de estos mecanismos en la eficiencia espectral de la red se evalúa, ayudado por la aplicación de la geometría estocástica y la teoría de la forma aleatoria. Bajo configuraciones internas relevantes, y en la ausencia plausible de señal directa fuerte, se investiga la fiabilidad de las reflexiones superficiales proporcionando potencia de señal útil para una comunicación eficiente y se establece la necesidad de antenas direccionales.
APA, Harvard, Vancouver, ISO, and other styles
39

Wu, Yue. "Advanced technologies for device-to-device communications underlaying cellular networks." Thesis, University of Sheffield, 2016. http://etheses.whiterose.ac.uk/15391/.

Full text
Abstract:
The past few years have seen a major change in cellular networks, as explosive growth in data demands requires more and more network capacity and backhaul capability. New wireless technologies have been proposed to tackle these challenges. One of the emerging technologies is device-to-device (D2D) communications. It enables two cellular user equipment (UEs) in proximity to communicate with each other directly reusing cellular radio resources. In this case, D2D is able to offload data traffic from central base stations (BSs) and significantly improve the spectrum efficiency of a cellular network, and thus is one of the key technologies for the next generation cellular systems. Radio resource management (RRM) for D2D communications and how to effectively exploit the potential benefits of D2D are two paramount challenges to D2D communications underlaying cellular networks. In this thesis, we focus on four problems related to these two challenges. In Chapter 2, we utilise the mixed integer non-linear programming (MINLP) to model and solve the RRM optimisation problems for D2D communications. Firstly we consider the RRM optimisation problem for D2D communications underlaying the single carrier frequency division multiple access (SC-FDMA) system and devise a heuristic sub-optimal solution to it. Then we propose an optimised RRM mechanism for multi-hop D2D communications with network coding (NC). NC has been proven as an efficient technique to improve the throughput of ad-hoc networks and thus we apply it to multi-hop D2D communications. We devise an optimal solution to the RRM optimisation problem for multi-hop D2D communications with NC. In Chapter 3, we investigate how the location of the D2D transmitter in a cell may affect the RRM mechanism and the performance of D2D communications. We propose two optimised location-based RRM mechanisms for D2D, which maximise the throughput and the energy efficiency of D2D, respectively. We show that, by considering the location information of the D2D transmitter, the MINLP problem of RRM for D2D communications can be transformed into a convex optimisation problem, which can be efficiently solved by the method of Lagrangian multipliers. In Chapter 4, we propose a D2D-based P2P le sharing system, which is called Iunius. The Iunius system features: 1) a wireless P2P protocol based on Bittorrent protocol in the application layer; 2) a simple centralised routing mechanism for multi-hop D2D communications; 3) an interference cancellation technique for conventional cellular (CC) uplink communications; and 4) a radio resource management scheme to mitigate the interference between CC and D2D communications that share the cellular uplink radio resources while maximising the throughput of D2D communications. We show that with the properly designed application layer protocol and the optimised RRM for D2D communications, Iunius can significantly improve the quality of experience (QoE) of users and offload local traffic from the base station. In Chapter 5, we combine LTE-unlicensed with D2D communications. We utilise LTE-unlicensed to enable the operation of D2D in unlicensed bands. We show that not only can this improve the throughput of D2D communications, but also allow D2D to work in the cell central area, which normally regarded as a “forbidden area” for D2D in existing works. We achieve these results mainly through numerical optimisation and simulations. We utilise a wide range of numerical optimisation theories in our works. Instead of utilising the general numerical optimisation algorithms to solve the optimisation problems, we modify them to be suitable for the specific problems, thereby reducing the computational complexity. Finally, we evaluate our proposed algorithms and systems through sophisticated numerical simulations. We have developed a complete system-level simulation framework for D2D communications and we open-source it in Github: https://github.com/mathwuyue/py- wireless-sys-sim.
APA, Harvard, Vancouver, ISO, and other styles
40

Lin, Charlie. "Photonic device design flow : from mask layout to device measurement." Thesis, University of British Columbia, 2012. http://hdl.handle.net/2429/43510.

Full text
Abstract:
Mask layout design is an important part in silicon photonic device design flow; the space used and the quality of the mask directly affect the cost of fabrication and quality of the outcome. To effectively minimize time spent on drawing masks, fixing design violations, and reducing unused spacings between each structure, we use effective approaches in the mask design process to ensure the listed criteria are met. Using the PCell and the hierarchy drawing methods, GDS files that contain different device parameters can be generated efficiently. As a result, direct GDS modeling efficiency is improved. An experimental setup that is capable of obtaining high quality measurement data is critical to device measurement. The concept of an automated measurement station can effectively reduce work needed from the experimenter while providing quality results. With the implemented fiber-to-fiber and fiber array automated measurement station, multi-device measurement can be set up to run automatically in minutes whereas traditional manual measurement stations require one's presence and constant attention. In this thesis, we have illustrated several mask drawing approaches and showed the drawing steps of two masks in detail. We have described two automated experimental setups, fiber-to-fiber and fiber array, in detail and included various measurement results to show the capabilities of these two stations.
APA, Harvard, Vancouver, ISO, and other styles
41

Hasan, Monowar. "Radio Resource Management for Relay-Aided Device-to-Device Communication." IEEE, 2013. http://hdl.handle.net/1993/30531.

Full text
Abstract:
In this thesis, performance of relay-assisted Device-to-device (D2D) communication is investigated where D2D traffic is carried through relay nodes. I develop resource management schemes to maximize end-to-end rate as well as conversing rate requirements for cellular and D2D UEs under total power constraint. I also develop a low-complexity distributed solution using the concept of message passing. Considering the uncertainties in wireless links (e.g., when interference from other relay nodes and the link gains are not exactly known), I extend the formulation using robust resource allocation techniques. In addition, a distributed solution approach using stable matching is developed to allocate radio resources in an efficient and computationally inexpensive way under the bounded channel uncertainties. Numerical results show that, there is a distance threshold beyond which relay-assisted D2D communication significantly improves network performance at the cost of small increase in end-to-end delay when compared to conventional approach.
APA, Harvard, Vancouver, ISO, and other styles
42

Bashar, A. M. A. Elman. "Online Distributed Depository Selection in Opportunistic Device-to-Device Networks." Thesis, University of Louisiana at Lafayette, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10163336.

Full text
Abstract:

Device-to-device (D2D) is a new paradigm in cellular networks that enhances network performance by introducing increased spectral efficiency and reduced communication delay. Efficient data dissemination is indispensable for supporting many D2D applications such as content distribution and location-aware advertisement. In this work, I investigate a new and interesting data dissemination problem where the receivers are not explicitly known and data must be disseminated to the receivers within a probabilistic delay budget. I propose to exploit data depositories, which can temporarily house data and deliver them to interested receivers upon requests. I formally formulate the delay-constrained profit maximization problem for data deposition in D2D networks and show its NP-hardness. Under the unique mobile opportunistic network setting, a practical solution for such problem must be distributed, localized, and online. To this end, I introduce three algorithms for Direct Online Selection of 1-Depository, Direct Online Selection of L-Depositories, and Mixed Online Selection of L-Depositories. To demonstrate and evaluate the system, I implement a prototype using Google Nexus handsets and conduct experiments for five weeks. I further carry out simulations based on real-world mobility traces for evaluation of large-scale networks and various network settings that are impractical to experiment.

APA, Harvard, Vancouver, ISO, and other styles
43

Hosny, Sameh Shawky Ibrahim. "MOBILITY AND CONTENT TRADING IN DEVICE-TO-DEVICE CACHING NETWORKS." The Ohio State University, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=osu1480629254438794.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Amate, Ahmed Mohammed. "Device-device communication and multihop transmission for future cellular networks." Thesis, University of Hertfordshire, 2015. http://hdl.handle.net/2299/16309.

Full text
Abstract:
The next generation wireless networks i.e. 5G aim to provide multi-Gbps data traffic, in order to satisfy the increasing demand for high-definition video, among other high data rate services, as well as the exponential growth in mobile subscribers. To achieve this dramatic increase in data rates, current research is focused on improving the capacity of current 4G network standards, based on Long Term Evolution (LTE), before radical changes are exploited which could include acquiring additional/new spectrum. The LTE network has a reuse factor of one; hence neighbouring cells/sectors use the same spectrum, therefore making the cell edge users vulnerable to inter-cell interference. In addition, wireless transmission is commonly hindered by fading and pathloss. In this direction, this thesis focuses on improving the performance of cell edge users in LTE and LTE-Advanced (LTE-A) networks by initially implementing a new Coordinated Multi-Point (CoMP) algorithm to mitigate cell edge user interference. Subsequently Device-to-Device (D2D) communication is investigated as the enabling technology for maximising Resource Block (RB) utilisation in current 4G and emerging 5G networks. It is demonstrated that the application, as an extension to the above, of novel power control algorithms, to reduce the required D2D TX power, and multihop transmission for relaying D2D traffic, can further enhance network performance. To be able to develop the aforementioned technologies and evaluate the performance of new algorithms in emerging network scenarios, a beyond-the-state-of-the-art LTE system-level simulator (SLS) was implemented. The new simulator includes Multiple-Input Multiple-Output (MIMO) antenna functionalities, comprehensive channel models (such as Wireless World initiative New Radio II i.e. WINNER II) and adaptive modulation and coding schemes to accurately emulate the LTE and LTE-A network standards. Additionally, a novel interference modelling scheme using the 'wrap around' technique was proposed and implemented that maintained the topology of flat surfaced maps, allowing for use with cell planning tools while obtaining accurate and timely results in the SLS compared to the few existing platforms. For the proposed CoMP algorithm, the adaptive beamforming technique was employed to reduce interference on the cell edge UEs by applying Coordinated Scheduling (CoSH) between cooperating cells. Simulation results show up to 2-fold improvement in terms of throughput, and also shows SINR gain for the cell edge UEs in the cooperating cells. Furthermore, D2D communication underlaying the LTE network (and future generation of wireless networks) was investigated. The technology exploits the proximity of users in a network to achieve higher data rates with maximum RB utilisation (as the technology reuses the cellular RB simultaneously), while taking some load off the Evolved Node B (eNB) i.e. by direct communication between User Equipment (UE). Simulation results show that the proximity and transmission power of D2D transmission yields high performance gains for a D2D receiver, which was demonstrated to be better than that of cellular UEs with better channel conditions or in close proximity to the eNB in the network. The impact of interference from the simultaneous transmission however impedes the achievable data rates of cellular UEs in the network, especially at the cell edge. Thus, a power control algorithm was proposed to mitigate the impact of interference in the hybrid network (network consisting of both cellular and D2D UEs). It was implemented by setting a minimum SINR threshold so that the cellular UEs achieve a minimum performance, and equally a maximum SINR threshold to establish fairness for the D2D transmission as well. Simulation results show an increase in the cell edge throughput and notable improvement in the overall SINR distribution of UEs in the hybrid network. Additionally, multihop transmission for D2D UEs was investigated in the hybrid network: traditionally, the scheme is implemented to relay cellular traffic in a homogenous network. Contrary to most current studies where D2D UEs are employed to relay cellular traffic, the use of idle nodes to relay D2D traffic was implemented uniquely in this thesis. Simulation results show improvement in D2D receiver throughput with multihop transmission, which was significantly better than that of the same UEs performance with equivalent distance between the D2D pair when using single hop transmission.
APA, Harvard, Vancouver, ISO, and other styles
45

Kai, Yuan. "Resource management for cellular-assisted device-to-device (D2D) communications." Thesis, University of Kent, 2018. https://kar.kent.ac.uk/66874/.

Full text
Abstract:
Device-to-Device (D2D) communication has become a promising candidate for future wireless communication systems to improve the system spectral efficiency, while reducing the latency and energy consumption of individual communication. With the assistance of cellular network, D2D communications can greatly reduce the transmit distance by utilizing the spatial dispersive nature of ever increasing user devices. Further, substantial spectrum reuse gain can be achieved due to the short transmit distance of D2D communication. It, however, significantly complicates the resource management and performance analysis of D2D communication underlaid cellular networks. Despite an increasing amount of academic attention and industrial interests, how to evaluate the system performance advantages of D2D communications with resource management remains largely unknown. On account of the proximity requirement of D2D communication, the resource management of D2D communication generally consists of admission access control and resource allocation. Resource allocation of cellular assisted D2D communications is very challenging when frequency reuse is considered among multiple D2D pairs within a cell, as intense inter D2D interference is difficult to tackle and generally causes extremely large amount of signaling overheads for channel state information (CSI) acquisition. Hence, the first part of this thesis is devoted to the resource allocation of cellular assisted D2D communication and the performance analysis. A novel resource allocation scheme for cellular assisted D2D communication is developed with low signaling overhead, while maintaining high spectral efficiency. By utilizing the spatial dispersive nature of D2D pairs, a geography-based sub-cell division strategy is proposed to group the D2D pairs into multiple disjoint clusters, and sub-cell resource allocation is performed independently for the D2D pairs within each sub-cell without the need of any prior knowledge of inter D2D interference. Under the proposed resource allocation scheme, tractable approximation for the inter D2D interference modeling is obtained and a computationally efficient expression for the average ergodic sum capacity of the cell is derived. The expression further allows us to obtain the optimal number of sub-cells that maximizes the average ergodic sum capacity of the cell. It is shown that with small CSI feedback, the system capacity/spectral efficiency can be improved significantly by adopting the proposed resource allocation scheme, especially in dense D2D deployment scenario. The investigation of use cases for cellular assisted D2D communication is another important topic which has direct effect on the performance evaluation of D2D communication. Thanks to the spatial dispersive nature of devices, D2D communication can be utilized to harvest the vast amount of the idle computation power and storage space distributed at the devices, which yields sufficient capacities for performing computation-intensive and latency-critical tasks. Therefore, the second part of this thesis focuses on the D2D communication assisted Mobile Edge Computing (MEC) network. The admission access control of D2D communication is determined by both disciplines of mobile computing and wireless communications. Specifically, the energy minimization problem in D2D assisted MEC networks is addressed with the latency constraint of each individual task and the computing resource constraint of each computing entity. The energy minimization problem is formed as a two-stage optimization problem. At the first stage, an initial feasibility problem is formed to maximize the number of executed tasks, and the global energy minimization problem is tackled in the second stage while maintaining the maximum number of executed tasks. Both of the optimization problems in two stages are NP-hard, therefore a low-complexity algorithm is developed for the initial feasibility problem with a supplementary algorithm further proposed for energy minimization. Simulation results demonstrate the near-optimal performance of the proposed algorithms and the fact that the number of executed tasks is greatly increased and the energy consumption per executed task is significantly reduced with the assistance of D2D communication in MEC networks, especially in dense user scenario.
APA, Harvard, Vancouver, ISO, and other styles
46

Le, Minh. "Universal Mobile Service Execution Framework for Device-To-Device Collaborations." DigitalCommons@USU, 2018. https://digitalcommons.usu.edu/etd/7032.

Full text
Abstract:
There are high demands of effective and high-performance of collaborations between mobile devices in the places where traditional Internet connections are unavailable, unreliable, or significantly overburdened, such as on a battlefield, disaster zones, isolated rural areas, or crowded public venues. To enable collaboration among the devices in opportunistic networks, code offloading and Remote Method Invocation are the two major mechanisms to ensure code portions of applications are successfully transmitted to and executed on the remote platforms. Although these domains are highly enjoyed in research for a decade, the limitations of multi-device connectivity, system error handling or cross platform compatibility prohibit these technologies from being broadly applied in the mobile industry. To address the above problems, we designed and developed UMSEF - an Universal Mobile Service Execution Framework, which is an innovative and radical approach for mobile computing in opportunistic networks. Our solution is built as a component-based mobile middleware architecture that is flexible and adaptive with multiple network topologies, tolerant for network errors and compatible for multiple platforms. We provided an effective algorithm to estimate the resource availability of a device for higher performance and energy consumption and a novel platform for mobile remote method invocation based on declarative annotations over multi-group device networks. The experiments in reality exposes our approach not only achieve the better performance and energy consumption, but can be extended to large-scaled ubiquitous or IoT systems.
APA, Harvard, Vancouver, ISO, and other styles
47

Foe, Owono Guy. "Impact of EU Medical Device Directive on Medical Device Software." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/353.

Full text
Abstract:
Directive 2007/47/EC of the European Parliament amending Medical Device Directive (MDD) provides medical device manufacturers with a compliance framework. However, the effects of the amendments to the MDD on competition in the U.S. medical device software industry are unknown. This study examined the impact of this directive on the competitiveness of U.S. medical device software companies, the safety and efficacy of medical device software, employee training, and recruitment. The conceptual framework for this study included 3 dimensions of medical device regulations: safety, performance, and reliability. The overall research design was a concurrent mixed method study using both quantitative and qualitative techniques. The qualitative techniques involved case studies of 5 purposively selected companies. Data collection involved both surveys and interviews. The sample consisted of 56 employees within medical device firms with markets around the European regions. Qualitative data analysis consisted of descriptive thematic analysis along the study questions and hypotheses and summative evaluation. Quantitative data analysis included descriptive statistics and correlation to test the 4 hypotheses. The results suggested that the MDD has realigned medical device software manufacturing practices, and US medical device companies have gained global competitiveness in improving product safety and increasing sales revenue. Key recommendations to medical device manufacturers include adopting MDD 93/42/EEC, using model-based approaches, and being comprehensive in model use. Adopting the MDD will provide positive social change to patients, as human safety improves with better product quality while companies experience fewer product recalls.
APA, Harvard, Vancouver, ISO, and other styles
48

Baser, Ozgur. "Haptic Device Design." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/3/12607011/index.pdf.

Full text
Abstract:
ABSTRACT Haptic devices are used to provide multi-modal data transfer between haptic users and computers in virtual reality applications. They enable humans to take force and tactile feedback from any virtual or remote objects. Haptic devices also facilitate the use of data collected from a real object in the virtual environment. Usage of the haptic devices increase more and more in industrial, educational and medical applications in parallel with development of virtual reality technology. As virtual reality technology requires interdisciplinary study with related to its application areas, it creates a lot of different specific working areas (Haptic interface design, freeform model, surgical operations in virtual environment etc.). Especially, some complex modifications which require hand-working can be performed with the system having great potential in medical applications (Brain surgery without error and operations which require great skill etc.). This is only one of the implementations of haptic devices in digital environment. Aim of this study is to design and manufacture a 7 DOF (degrees of freedom) haptic device which serves the mentioned application areas. All different haptic devices in literature have maximum 6 DOF. The designed 7 DOF haptic device has about 20% extra working space and more flexible working capability compared to the other haptic devices with the similar link lengths and joint limitations. This study is important in terms of the development of haptic devices in the world as well as spreading of haptic devices and its applications in Turkey.
APA, Harvard, Vancouver, ISO, and other styles
49

Tekgül, Hasan, and Yu Khoon Ng. "Power Measurement Device." Thesis, Högskolan i Halmstad, Sektionen för Informationsvetenskap, Data– och Elektroteknik (IDE), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-15407.

Full text
Abstract:
This thesis project aims to develop an embedded system that can measure real-time power consumption of a house and provide information for the user. System consists of a microcontroller unit, a light sensor, RS232 serial interface, battery and an LED. An 18F series 8bit PIC microcontroller was used for this project because PIC is known to be versatile and very low power-consuming. The goal was to get periodic signal from the sensor mounted on the power meter of a house, calculate the power usage and send this data to serial port for communication purposes. The system is connected to PC through RS232 interface as the first step of the project. The power usage information and a simple user interface sent from the PIC are displayed on the HyperTerminal of the PC. The second step was to communicate with a wireless module which is connected to the central unit of the alarm system in a house. This part of the project requires modification of the communication protocol to suit the one that the company uses in the wireless module. As the power source we chose a 9V battery since the system needs 5V to operate. However it is just the prototype. Therefore the power source choice can be changed in future due to company needs. The LED used in the prototype is for testing purposes and it is also due to changes if not needed. As the result of the project, the first step is finished with minimum requirements. The external hardware is built with all the components and the software is implemented successfully. The system can get signals from the photo sensor; the result is calculated according to the duration between two signals; it is sent to the PC via RS232 serial port and displayed on the PC terminal.
APA, Harvard, Vancouver, ISO, and other styles
50

Reid, Richard A. "Triaxial permeability device." Thesis, Georgia Institute of Technology, 1987. http://hdl.handle.net/1853/20036.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography