To see the other types of publications on this topic, follow the link: MITIGATION ALGORITHM.

Dissertations / Theses on the topic 'MITIGATION ALGORITHM'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 37 dissertations / theses for your research on the topic 'MITIGATION ALGORITHM.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Zubi, Hazem M. "A genetic algorithm approach for three-phase harmonic mitigation filter design." Thesis, University of Bath, 2013. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.604881.

Full text
Abstract:
In industry, adjustable speed drives (ASDs) are widely employed in driving AC motors for variable speed applications due to the high performance and high energy efficiency obtained in such systems. However, ASDs have an impact on the power quality and utilisation of AC power feeds by injecting current harmonics and causing resonances, additional losses, and voltage distortion at the point of common coupling. Due to these problems, electric power utilities have established stringent rules and regulations to limit the effects of this distortion. As a result, efficient, reliable, and economical h
APA, Harvard, Vancouver, ISO, and other styles
2

Ikuma, Takeshi. "Non-Wiener Effects in Narrowband Interference Mitigation Using Adaptive Transversal Equalizers." Diss., Virginia Tech, 2007. http://hdl.handle.net/10919/26772.

Full text
Abstract:
The least mean square (LMS) algorithm is widely expected to operate near the corresponding Wiener filter solution. An exception to this popular perception occurs when the algorithm is used to adapt a transversal equalizer in the presence of additive narrowband interference. The steady-state LMS equalizer behavior does not correspond to that of the fixed Wiener equalizer: the mean of its weights is different from the Wiener weights, and its mean squared error (MSE) performance may be significantly better than the Wiener performance. The contributions of this study serve to better understand thi
APA, Harvard, Vancouver, ISO, and other styles
3

Manmek, Thip Electrical Engineering &amp Telecommunications Faculty of Engineering UNSW. "Real-time power system disturbance identification and its mitigation using an enhanced least squares algorithm." Awarded by:University of New South Wales. Electrical Engineering and Telecommunications, 2006. http://handle.unsw.edu.au/1959.4/26233.

Full text
Abstract:
This thesis proposes, analyses and implements a fast and accurate real-time power system disturbances identification method based on an enhanced linear least squares algorithm for mitigation and monitoring of various power quality problems such as current harmonics, grid unbalances and voltage dips. The enhanced algorithm imposes less real-time computational burden on processing the system and is thus called ???efficient least squares algorithm???. The proposed efficient least squares algorithm does not require matrix inversion operation and contains only real numbers. The number of required r
APA, Harvard, Vancouver, ISO, and other styles
4

Gandhi, Nikhil Tej. "Automatic Dependent Surveillance - Broadcast Enabled, Wake Vortex Mitigation Using Cockpit Display." Ohio University / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1354313600.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Loh, Nolan. "Buildings as urban climate infrastructure: A framework for designing building forms and facades that mitigate urban heat." University of Cincinnati / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1553513750865168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Odat, Zeyad Abdel-Hameed. "Analyses, Mitigation and Applications of Secure Hash Algorithms." Diss., North Dakota State University, 2020. https://hdl.handle.net/10365/32058.

Full text
Abstract:
Cryptographic hash functions are one of the widely used cryptographic primitives with a purpose to ensure the integrity of the system or data. Hash functions are also utilized in conjunction with digital signatures to provide authentication and non-repudiation services. Secure Hash Algorithms are developed over time by the National Institute of Standards and Technology (NIST) for security, optimal performance, and robustness. The most known hash standards are SHA-1, SHA-2, and SHA-3. The secure hash algorithms are considered weak if security requirements have been broken. The main security a
APA, Harvard, Vancouver, ISO, and other styles
7

Kivrikis, Andreas, and Johan Tjernström. "Development and Evaluation of Multiple Objects Collision Mitigation by Braking Algorithms." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2676.

Full text
Abstract:
<p>A CMbB system is a system that with the help of sensors in the front of a car detects when a collision in unavoidable. When a situation like that is detected, the brakes are activated. The decision of whether to activate the brakes or not is taken by a piece of software called a decision maker. This software continuously checks for routes that would avoid an object in front of the car and as long as a path is found nothing is done. Volvo has been investigating several different CMbB-systems, and the research done by Volvo has previously focused on decision makers that only consider one obje
APA, Harvard, Vancouver, ISO, and other styles
8

Santos, Fernando Fernandes dos. "Reliability evaluation and error mitigation in pedestrian detection algorithms for embedded GPUs." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2017. http://hdl.handle.net/10183/159210.

Full text
Abstract:
A confiabilidade de algoritmos para detecção de pedestres é um problema fundamental para carros auto dirigíveis ou com auxílio de direção. Métodos que utilizam algoritmos de detecção de objetos como Histograma de Gradientes Orientados (HOG - Histogram of Oriented Gradients) ou Redes Neurais de Convolução (CNN – Convolutional Neural Network) são muito populares em aplicações automotivas. Unidades de Processamento Gráfico (GPU – Graphics Processing Unit) são exploradas para executar detecção de objetos de uma maneira eficiente. Infelizmente, as arquiteturas das atuais GPUs tem se mostrado partic
APA, Harvard, Vancouver, ISO, and other styles
9

Salomon, Sophie. "Bias Mitigation Techniques and a Cost-Aware Framework for Boosted Ranking Algorithms." Case Western Reserve University School of Graduate Studies / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=case1586450345426827.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bhattacharya, Koustav. "Architectures and algorithms for mitigation of soft errors in nanoscale VLSI circuits." [Tampa, Fla] : University of South Florida, 2009. http://purl.fcla.edu/usf/dc/et/SFE0003280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Fyrvald, Johanna. "Mitigating algorithmic bias in Artificial Intelligence systems." Thesis, Uppsala universitet, Matematiska institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-388627.

Full text
Abstract:
Artificial Intelligence (AI) systems are increasingly used in society to make decisions that can have direct implications on human lives; credit risk assessments, employment decisions and criminal suspects predictions. As public attention has been drawn towards examples of discriminating and biased AI systems, concerns have been raised about the fairness of these systems. Face recognition systems, in particular, are often trained on non-diverse data sets where certain groups often are underrepresented in the data. The focus of this thesis is to provide insights regarding different aspects that
APA, Harvard, Vancouver, ISO, and other styles
12

Ramachandran, Anirudh Vadakkedath. "Mitigating spam using network-level features." Diss., Georgia Institute of Technology, 2011. http://hdl.handle.net/1853/41068.

Full text
Abstract:
Spam is an increasing menace in email: 90% of email is spam, and over 90% of spam is sent by botnets---networks of compromised computers under the control of miscreants. In this dissertation, we introduce email spam filtering using network-level features of spammers. Network-level features are based on lightweight measurements that can be made in the network, often without processing or storing a message. These features stay relevant for longer periods, are harder for criminals to alter at will (e.g., a bot cannot act independently of other bots in the botnet), and afford the unique opportuni
APA, Harvard, Vancouver, ISO, and other styles
13

Ketonen, J. (Johanna). "Equalization and channel estimation algorithms and implementations for cellular MIMO-OFDM downlink." Doctoral thesis, Oulun yliopisto, 2012. http://urn.fi/urn:isbn:9789514298578.

Full text
Abstract:
Abstract The aim of the thesis is to develop algorithms and architectures to meet the high data rate, low complexity requirements of the future mobile communication systems. Algorithms, architectures and implementations for detection, channel estimation and interference mitigation in the multiple-input multiple-output (MIMO) orthogonal frequency division multiplexing (OFDM) receivers are presented. The performance-complexity trade-offs in different receiver algorithms are studied and the results can be utilized in receiver design as well as in system design. Implementation of detectors for spa
APA, Harvard, Vancouver, ISO, and other styles
14

Yao, Sirui. "Evaluating, Understanding, and Mitigating Unfairness in Recommender Systems." Diss., Virginia Tech, 2021. http://hdl.handle.net/10919/103779.

Full text
Abstract:
Recommender systems are information filtering tools that discover potential matchings between users and items and benefit both parties. This benefit can be considered a social resource that should be equitably allocated across users and items, especially in critical domains such as education and employment. Biases and unfairness in recommendations raise both ethical and legal concerns. In this dissertation, we investigate the concept of unfairness in the context of recommender systems. In particular, we study appropriate unfairness evaluation metrics, examine the relation between bias in recom
APA, Harvard, Vancouver, ISO, and other styles
15

Aputis, Artūras. "DDoS (distributed denial of service) atakų atrėmimo algoritmų tyrimas ir modeliavimas." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2013. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2012~D_20131105_095501-14832.

Full text
Abstract:
Šiuo metu yra sukurta nemažai priemonių aptikti įvairiausias DDoS atakas, tačiau siekiant sustabdyti arba bent sušvelninti DDoS atakų poveikį yra nuveikta labai nedaug. Yra labai sunku pasirinkti tinkamą DDoS atakos atrėmimo metodą. DDoS atakų atrėmimo metodų analizė galėtų padėti pasirinkti tinkamiausią metodą. „BGP DDoS Diversion“ atakų atrėmimo metodas yra vienas efektyviausių ir mažiausiai kaštų reikalaujantis metodas. Šis metodas įgyvendinamas panaudojant BGP protokolą. Ataka yra atremiama kuomet BGP protokolo pagalba yra paskelbiama tik dalis tinklo. DDoS atakos duomenų srautas tokiu atv
APA, Harvard, Vancouver, ISO, and other styles
16

Abouzar, Pooyan. "Mitigating the effect of propagation impairments on higher layer protocols and algorithms in wireless sensor networks." Thesis, University of British Columbia, 2016. http://hdl.handle.net/2429/58915.

Full text
Abstract:
Wireless sensor networks (WSNs) range from body area networks (BANs) that involve a relatively small number of nodes, short paths and frequent update rates to precision agriculture wireless sensor networks (PAWSNs) that involve a relatively large number of nodes, long paths and infrequent update rates. They are distinguished from wireless access networks by: 1) their mesh architecture and reliance on higher layer protocols and algorithms to perform routing, scheduling, localization, and node placement, 2) their need to operate for long periods of time with only limited access to battery or sca
APA, Harvard, Vancouver, ISO, and other styles
17

Powell, Keith. "Next generation wavefront controller for the MMT adaptive optics system: Algorithms and techniques for mitigating dynamic wavefront aberrations." Diss., The University of Arizona, 2012. http://hdl.handle.net/10150/222838.

Full text
Abstract:
Wavefront controller optimization is important in achieving the best possible image quality for adaptive optics systems on the current generation of large and very large aperture telescopes. This will become even more critical when we consider the demands of the next generation of extremely large telescopes currently under development. These telescopes will be capable of providing resolution which is significantly greater than the current generation of optical/IR telescopes. However, reaching the full resolving potential of these instruments will require a careful analysis of all disturbanc
APA, Harvard, Vancouver, ISO, and other styles
18

Fang, Yiping. "Critical infrastructure protection by advanced modelling, simulation and optimization for cascading failure mitigation and resilience." Thesis, Châtenay-Malabry, Ecole centrale de Paris, 2015. http://www.theses.fr/2015ECAP0013/document.

Full text
Abstract:
Sans cesse croissante complexité et l'interdépendance des infrastructures critiques modernes, avec des environs de risque plus en plus complexes, posent des défis uniques pour leur exploitation sûre, fiable et efficace. L'objectif de la présente thèse est sur la modélisation, la simulation et l'optimisation des infrastructures critiques (par exemple, les réseaux de transmission de puissance) à l'égard de leur vulnérabilité et la résilience aux défaillances en cascade. Cette étude aborde le problème en modélisant infrastructures critiques à un niveau fondamental, en se concentrant sur la topolo
APA, Harvard, Vancouver, ISO, and other styles
19

Poulsen, Andrew Joseph. "Real-time Adaptive Cancellation of Satellite Interference in Radio Astronomy." Diss., CLICK HERE for online access, 2003. http://contentdm.lib.byu.edu/ETD/image/etd238.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Chen, Min-Pei, and 陳民培. "Multipath Detection and Mitigation Algorithm for Global Positioning System." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/39836204088957373003.

Full text
Abstract:
碩士<br>國立臺灣大學<br>電信工程學研究所<br>97<br>In Global Positioning System (GPS), many positioning errors such as clock error, tropospheric error and ionospheric error can be eliminated by using differential techniques. But characteristics of multipath interference depend on time and environment, which means that it can’t be canceled by differential technique. Therefore, multipath becomes one of the main error sources in GPS. According to the characteristics of multipath, this thesis proposes the multipath detection and multipath mitigation algorithm. The purpose of multipath detector is to determine whet
APA, Harvard, Vancouver, ISO, and other styles
21

Ming-I, Chao, and 趙明義. "Phase noise mitigation algorithm in 60 GHz RoF system." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/13148812948270350252.

Full text
Abstract:
碩士<br>國立交通大學<br>光電系統研究所<br>100<br>The demand for the wireless bandwidth is increasing and in near future a few Gbps over wireless will be needed. The best way to provide the such high capacity wireless is over 60 GHz because of the huge 7 GHz unlicensed bandwidth. The radio-over-fiber (RoF) systems provide efficient ways for transportation and distribution of high frequency signals such as 60 GHz. The phase noise (linewidth) laser light source and fiber dispersion in the RoF system will induce the impairment of the signal and limit the transmission distance and data rate. In this research, the
APA, Harvard, Vancouver, ISO, and other styles
22

Chiang, Hsing-kuo, and 江興國. "Interacting Multiple Model Algorithm for NLOS Mitigation in Wireless Location." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/17914550076557737594.

Full text
Abstract:
碩士<br>國立中山大學<br>電機工程學系研究所<br>97<br>In the thesis, we propose a non-line of sight (NLOS) mitigation approach based on the interacting multiple model (IMM) algorithm. The IMM-based structure, composed of a biased Kalman filter (BKF) and a Kalman filter with NLOS-discarding process (KF-D), is capable of mitigating the ranging error caused by the NLOS effects, and therefore improving the performance and accuracy in wireless location systems. The NLOS effect on signal transmission is one of the major factors that affect the accuracy of the time-based location systems. Effective NLOS identification
APA, Harvard, Vancouver, ISO, and other styles
23

Yen, Chen-Hsu, and 顏晨旭. "Using An Embedded System to Implement STAP Algorithm for GPS Interference Mitigation." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/96376567364072850531.

Full text
Abstract:
碩士<br>國立成功大學<br>電機工程學系碩博士班<br>95<br>The Global Navigation Satellite System (GNSS) signals transmit to the receiver is quite weak. Due to the fact that the signal have been mixed with interference and noise, this weak signal cannot be used to track the trajectories precisely. In accordance with the characteristics of spatial direction of the signal, the result of beampattern of the antenna array can be adjusted by an adaptive algorithm to enhance the GPS signal and to process interference mitigation simultaneously. As the rapid development of electronic technologies, the adaptive algorithm can
APA, Harvard, Vancouver, ISO, and other styles
24

Lu, Shao Hang, and 呂少航. "Design of Cyclostationary Impulsive Noise Mitigation Algorithm for Narrowband Power Line Communications." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/xpshpy.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>自動化及控制研究所<br>106<br>There are many power devices operated in the narrowband power line channel. Therein, the electronic components with switching function will introduce high energy impulsive noise. Therefore, the data are corrupted during transmission and data integrity issue is missed. Research statistics indicate that the periodic impulsive noise with cyclostationary characteristics is one of the most threatening noises in the narrowband channel, and its energy is usually more than 10 times larger than the background noise. In order to overcome the impact of impulsive nois
APA, Harvard, Vancouver, ISO, and other styles
25

CHEN, PO-YU, and 陳柏宇. "Time-Frequency Signal Processing-based Jamming Detection and Mitigation Algorithm for Galileo Receivers." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/dgpxpu.

Full text
Abstract:
碩士<br>國立宜蘭大學<br>電機工程學系碩士班<br>103<br>Due to the increasing demands of location-based services (LBSs), many appliances, such as smart phones, smart wearable devices, unmanned cars, unmanned commercial aircrafts and so on, require high accuracy positioning by using GNSS (Global Navigation Satellite System) receivers. However, malicious users can easily obtain an inexpensive GNSS jammer, which can generate continuous waveform interferences (CWI) and chirp interferences, to paralyze the acquisition operation of GNSS receivers. Therefore, a jamming mitigation mechanism has to be implemented in GNSS
APA, Harvard, Vancouver, ISO, and other styles
26

Chen, Shi-Yao, and 陳仕堯. "An Optimization-Based Algorithm for Mitigation of Starvation in IEEE 802.11 Wireless Networks." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/36624851731355059014.

Full text
Abstract:
碩士<br>國立臺灣大學<br>資訊管理學研究所<br>104<br>Distributed Coordination Function (DCF) is a fundamental MAC mechanism of the IEEE 802.11 based WLAN standard to access the medium and reduce possibility of collisions by Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA). Each flow of sender must check whether the medium is available or not before sending data. However, in some situations, the random access protocol, CSMA/CA, cause serious unfairness or flow starvation. In this research, we focus on mitigating starvation problems in Wi-Fi ad hoc networks for improving the wireless network servi
APA, Harvard, Vancouver, ISO, and other styles
27

GUPTA, ANISHI. "GENERIC FRAMEWORK AND MITIGATION ALGORITHM AGAINST BLACK HOLE ATTACK FOR AODV ROUTING PROTOCOL IN MANET." Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15729.

Full text
Abstract:
Ad hoc On Demand Vector (AODV) is a demand driven route protocol in Mobile Ad hoc Network (MANET). Adhoc Network is always constraint about resources and threat from malicious nodes and hence light solution is preferably needed. Moreover AODV is susceptible to many attacks such as black hole, gray hole, worm hole and so on. There is always a security threat in adhoc network. For this reason, in this thesis, we propose a new method Extended Modified Enhanced AODV (EMEAODV) which is an extended work of our previous work Modified Enhanced AODV (MEAODV). The new proposed method is effective
APA, Harvard, Vancouver, ISO, and other styles
28

Lin, Chien-hung, and 林建宏. "TOA Wireless Location Algorithm with NLOS Mitigation Based on LS-SVM in UWB Systems." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/28tr6a.

Full text
Abstract:
碩士<br>國立中山大學<br>電機工程學系研究所<br>96<br>One of the major problems encountered in wireless location is the effect caused by non-line of sight (NLOS) propagation. When the direct path from the mobile station (MS) to base stations (BSs) is blocked by obstacles or buildings, the signal arrival times will delay. That will make the signal measurements include an error due to the excess path propagation. If we use the NLOS signal measurements for localization, that will make the system localization performance reduce greatly. In the thesis, a time-of-arrival (TOA) based location system with NLOS mitigati
APA, Harvard, Vancouver, ISO, and other styles
29

Wei-FanHsueh and 薛瑋帆. "Mitigation Algorithm for the Memory Impulse Noise in Narrow-band Power Line Communication Systems." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/68tt9c.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Tangtragulwong, Potchara. "Optimal Railroad Rail Grinding for Fatigue Mitigation." Thesis, 2010. http://hdl.handle.net/1969.1/ETD-TAMU-2010-12-8909.

Full text
Abstract:
This dissertation aims to study the benefit of rail grinding on service life of railroad rails, focusing on failures due to rolling contact fatigue (RCF) at the rail head. Assuming a tangent rail with one-point contact at the running surface, a finite element analysis of a full-scale wheel-rail rolling contact with a nonlinear isotropic kinematic hardening material model is performed to simulate the accumulation of residual stresses and strains in the rail head. Using rolling stress and strain results from the sixth loading cycle, in which residual stresses and strains are at their steady-stat
APA, Harvard, Vancouver, ISO, and other styles
31

Lu, Sili. "OFDM interference mitigation algorithms with application to DVB-H /." 2008. http://proquest.umi.com/pqdweb?did=1597607541&sid=1&Fmt=2&clientId=10361&RQT=309&VName=PQD.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Filippone, Giuseppe, William Spataro, Donato D'Ambrosio, Davide Marocco, and Nicola Leone. "Parallel and evolutionary applications to cellular automata models for mitigation of lava flow invasions." Thesis, 2013. http://hdl.handle.net/10955/874.

Full text
Abstract:
Dottorato di Ricerca in Matematica e Informatica, XXVI Ciclo 2013<br>In the lava ow mitigation context, the determination of areas exposed to volcanic risk is crucial for diminishing consequences in terms of human causalities and damages of material properties. In order to mitigate the destructive e ects of lava ows along volcanic slopes, the building and positioning of arti cial barriers is fundamental for controlling and slowing down the lava ow advance. In this thesis, a decision support system for de ning and optimizing volcanic hazard mitigation interventions is proposed. T
APA, Harvard, Vancouver, ISO, and other styles
33

Zafaruddin, S. M. "Algorithms and performance analysis for self d alien crosstalk mitigation in upstream vectored VDSL." Thesis, 2012. http://localhost:8080/xmlui/handle/12345678/6798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Hsu, Chao-Yuan, and 許兆元. "ICI Mitigation for High-mobility SISO/MIMO OFDM Systems: Low-complexity Algorithms and Performance Analysis." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/41881546213151002873.

Full text
Abstract:
博士<br>國立交通大學<br>電信工程系所<br>97<br>In orthogonal frequency-division multiplexing (OFDM) systems, it is generally assumed that the channel response is static in an OFDM symbol period. However, the assumption does not hold in high-mobility environments. As a result, intercarrier interference (ICI) is induced and the system performance is degraded. A simple remedy for this problem is the application of the zero-forcing (ZF) and minimum mean square error (MMSE) equalizers. Unfortunately, the direct ZF method requires the inversion of an NxN ICI matrix, where N is the number of subcarriers. When N is
APA, Harvard, Vancouver, ISO, and other styles
35

CHEN, KAI-HSIANG, and 陳凱翔. "Efficient Pilot Scheduling Using Metaheuristics Algorithms for Mitigating Pilot Contamination in Massive Multiuser MIMO Systems." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/873vj9.

Full text
Abstract:
碩士<br>國立高雄師範大學<br>光電與通訊工程學系<br>105<br>Massive (or large-scale) multiuser, multiple-input and multiple-output (MIMO) system is widely regarded as a promising candidate technology in meeting 5G requirements because of its capacity to provide several significant advantages (such as spectral efficiency, link reliability, and coverage) compared with conventional small-scale MIMOsystems. However, this system suffers from a fundamental bottleneck,that is, the pilot contamination effect, where the channel estimationin a given cell is contaminated by the reuse of the same pilot group in adjacent cells.
APA, Harvard, Vancouver, ISO, and other styles
36

Chaudhry, Mohammad. "Network Coding in Distributed, Dynamic, and Wireless Environments: Algorithms and Applications." Thesis, 2011. http://hdl.handle.net/1969.1/ETD-TAMU-2011-12-10529.

Full text
Abstract:
The network coding is a new paradigm that has been shown to improve throughput, fault tolerance, and other quality of service parameters in communication networks. The basic idea of the network coding techniques is to relish the "mixing" nature of the information flows, i.e., many algebraic operations (e.g., addition, subtraction etc.) can be performed over the data packets. Whereas traditionally information flows are treated as physical commodities (e.g., cars) over which algebraic operations can not be performed. In this dissertation we answer some of the important open questions related to
APA, Harvard, Vancouver, ISO, and other styles
37

Kanta, Lufthansa Rahman. "A Risk-based Optimization Modeling Framework for Mitigating Fire Events for Water and Fire Response Infrastructures." 2009. http://hdl.handle.net/1969.1/ETD-TAMU-2009-12-7367.

Full text
Abstract:
The purpose of this dissertation is to address risk and consequences of and effective mitigation strategies for urban fire events involving two critical infrastructures- water distribution and emergency services. Water systems have been identified as one of the United States' critical infrastructures and are vulnerable to various threats caused by natural disasters or malevolent actions. The primary goals of urban water distribution systems are reliable delivery of water during normal and emergency conditions (such as fires), ensuring this water is of acceptable quality, and accomplishing thes
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!