61 resultados para Data-communication


Relevância:

30.00% 30.00%

Publicador:

Resumo:

As wireless network technologies evolve towards an All-IP framework, Next Generation Wireless Communication Devices demand better use of spectral resources by employing advanced techniques of silence suppression. This paper presents an analysis of VoIP call data and compares the statistical results based on observed patterns of talk spurts and silence lengths to those achieved by a modified on-off voice model for silence suppression in wireless networks. As talk spurts and silence lengths are sensitive to varying word lengths, temporal structure and other prosodic aspects of speech, the impact of the use of various languages, dialects and gender of speakers on these results is also assessed.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Error free propagation of a single polarisation optical time division multiplexed 40 Gbit/s dispersion managed pulsed data stream over dispersion (non-shifted) fibre. This distance is twice the previous record at this data rate.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The WDM properties of dispersion managed (DM) solitons and the reduction in Gordon-Haus jitter means that it is possible to contemplate multiple channels each at 10 Gbit/s for transoceanic distances without the need for elaborate soliton control. This paper will concentrate on fundamental principles of DM solitons, but will use these principles to indicate optimum maps for future high-speed soliton systems.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

High-speed optical clock recovery, demultiplexing and data regeneration will be integral parts of any future photonic network based on high bit-rate OTDM. Much research has been conducted on devices that perform these functions, however to date each process has been demonstrated independently. A very promising method of all-optical switching is that of a semiconductor optical amplifier-based nonlinear optical loop mirror (SOA-NOLM). This has various advantages compared with the standard fiber NOLM, most notably low switching power, compact size and stability. We use the SOA-NOLM as an all-optical mixer in a classical phase-locked loop arrangement to achieve optical clock recovery, while at the same time achieving data regeneration in a single compact device

Relevância:

30.00% 30.00%

Publicador:

Resumo:

As information and communications technology (ICT) involves both traditional capital and knowledge capital, potential spillovers through various mechanisms can occur. We posit that ICT capital may boost productivity growth, not only in the home country, but also in other countries. In this paper, we provide empirical evidence of such spillovers using panel data on 37 countries from 1996 to 2004. Our results support the existence of ICT spillovers across country borders. Furthermore, we find that developing countries could reap more benefits from ICT spillovers than developed countries. This is particularly important for policy decisions regarding national trade liberalization and economic integration. Developing economies that are more open to foreign trade may have an economic advantage and may develop knowledge-intensive activities, which will lead to economic development in the long run.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Using panel data for 41 developed and developing countries over the period 1998-2004, this paper examines the links between ICT diffusion and human development. We conducted a panel regression analysis of the investments in healthcare, education and information and communication technology (ICT) against human development index (HDI). The results show that these variables can be used to predict HDI scores. In agreement with findings of previous research, it is clear from our analysis that the central focus on ICT as a solution for development will not bring the results that the promoters of ICT as an ‘engine of growth’ are expecting. It is unwise to disaggregate the issues of education and healthcare infrastructure from ICT infrastructure development. ICT policies should be integrated with other national policies in order to find a holistic and structural solution to development.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Our study investigated the impact of ICT expansion on economic freedom in the Middle East (Bahrain, Iran, Jordan, Kuwait, Lebanon, Oman, Qatar, Saudi Arabia, Syria, United Arab Emirates, and Yemen). Our empirical analysis used archival data from 1995 to 2005; it showed that ICT expansion in the Middle East has been effective both in bridging the digital divide and also in promoting economic freedom in a region that was vulnerable to political, social, and global conflict. However, differences between countries, such as the educational attainment of their citizens and institutional resistance to technology acceptance, both enhanced and restricted the relationship between ICT and economic freedom.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Third Generation cellular communication systems are expected to support mixed cell architecture in which picocells, microcells and macrocells are used to achieve full coverage and increase the spectral capacity. Supporting higher numbers of mobile terminals and the use of smaller cells will result in an increase in the number of handovers, and consequently an increase in the time delays required to perform these handovers. Higher time delays will generate call interruptions and forced terminations, particularly for time sensitive applications like real-time multimedia and data services. Currently in the Global System for Mobile communications (GSM), the handover procedure is initiated and performed by the fixed part of the Public Land Mobile Network (PLMN). The mobile terminal is only capable of detecting candidate base stations suitable for the handover; it is the role of the network to interrogate a candidate base station for a free channel. Handover signalling is exchanged via the fixed network and the time delay required to perform the handover is greatly affected by the levels of teletraffic handled by the network. In this thesis, a new handover strategy is developed to reduce the total time delay for handovers in a microcellular system. The handover signalling is diverted from the fixed network to the air interface to prevent extra delays due to teletraffic congestion, and to allow the mobile terminal to exchange signalling directly with the candidate base station. The new strategy utilises Packet Reservation Multiple Access (PRMA) technique as a mechanism to transfer the control of the handover procedure from the fixed network to the mobile terminal. Simulation results are presented to show a dramatic reduction in the handover delay as compared to those obtained using fixed channel allocation and dynamic channel allocation schemes.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This thesis presents experimental and theoretical work on the use of dark optical solitons as data carriers in communications systems. The background chapters provide an introduction to nonlinear optics, and to dark solitons, described as intensity dips in a bright background, with an asymmetrical phase profile. The motivation for the work is explained, considering both the superior stability of dark solitons and the need for a soliton solution suitable for the normal, rather than the anomalous (bright soliton) dispersion regime. The first chapters present two generation techniques, producing packets of dark solitons via bright pulse interaction, and generating continuous trains of dark pulses using a fibre laser. The latter were not dark solitons, but were suitable for imposition of the required phase shift by virtue of their extreme stability. The later chapters focus on the propagation and control of dark solitons. Their response to periodic loss and gain is shown to result in the exponential growth of spectral sidebands. This may be suppressed by reducing the periodicity of the loss/gain cycle or using periodic filtering. A general study of the response of dark solitons to spectral filtering is undertaken, showing dramatic differences in the behaviour of black and 99.9% grey solitons. The importance of this result is highlighted by simulations of propagation in noisy systems, where the timing jitter resulting from random noise is actually enhanced by filtering. The results of using sinusoidal phase modulation to control pulse position are presented, showing that the control is at the expense of serious modulation of the bright background. It is concluded that in almost every case, dark and bright solitons have very different properties, and to continue to make comparisons would not be so productive as to develop a deeper understanding of the interactions between the dark soliton and its bright background.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Spread spectrum systems make use of radio frequency bandwidths which far exceed the minimum bandwidth necessary to transmit the basic message information.These systems are designed to provide satisfactory communication of the message information under difficult transmission conditions. Frequency-hopped multilevel frequency shift keying (FH-MFSK) is one of the many techniques used in spread spectrum systems. It is a combination of frequency hopping and time hopping. In this system many users share a common frequency band using code division multiplexing. Each user is assigned an address and the message is modulated into the address. The receiver, knowing the address, decodes the received signal and extracts the message. This technique is suggested for digital mobile telephony. This thesis is concerned with an investigation of the possibility of utilising FH-MFSK for data transmission corrupted by additive white gaussian noise (A.W.G.N.). Work related to FH-MFSK has so far been mostly confined to its validity, and its performance in the presence of A.W.G.N. has not been reported before. An experimental system was therefore constructed which utilised combined hardware and software and operated under the supervision of a microprocessor system. The experimental system was used to develop an error-rate model for the system under investigation. The performance of FH-MFSK for data transmission was established in the presence of A.W.G.N. and with deleted and delayed sample effects. Its capability for multiuser applications was determined theoretically. The results show that FH-MFSK is a suitable technique for data transmission in the presence of A.W.G.N.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The advent of personal communication systems within the last decade has depended upon the utilization of advanced digital schemes for source and channel coding and for modulation. The inherent digital nature of the communications processing has allowed the convenient incorporation of cryptographic techniques to implement security in these communications systems. There are various security requirements, of both the service provider and the mobile subscriber, which may be provided for in a personal communications system. Such security provisions include the privacy of user data, the authentication of communicating parties, the provision for data integrity, and the provision for both location confidentiality and party anonymity. This thesis is concerned with an investigation of the private-key and public-key cryptographic techniques pertinent to the security requirements of personal communication systems and an analysis of the security provisions of Second-Generation personal communication systems is presented. Particular attention has been paid to the properties of the cryptographic protocols which have been employed in current Second-Generation systems. It has been found that certain security-related protocols implemented in the Second-Generation systems have specific weaknesses. A theoretical evaluation of these protocols has been performed using formal analysis techniques and certain assumptions made during the development of the systems are shown to contribute to the security weaknesses. Various attack scenarios which exploit these protocol weaknesses are presented. The Fiat-Sharmir zero-knowledge cryptosystem is presented as an example of how asymmetric algorithm cryptography may be employed as part of an improved security solution. Various modifications to this cryptosystem have been evaluated and their critical parameters are shown to be capable of being optimized to suit a particular applications. The implementation of such a system using current smart card technology has been evaluated.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The adaptation of profit sharing creates a fundamental change in employee compensation by making a portion of total compensation directly dependent upon the total profits of the firm and the performance of the employee. The major goal of this study is to test for and measure the impact of the independent variable, a profit sharing plan implemented at Shahvand Industrial Company, upon communication behaviour, communication outcomes, and organisational outcomes as dependent variables. A quasi-experimental non-equivalent control group design with pre and posttest was the research design used to test the effects of profit sharing participation on permanent-part-time operative employees implemented by SIC. Several conclusions were reached as a result of the statistical analysis of the data collected in this study. Overall, few of the hypothesised effects of profit sharing participation appeared to have been realised according to the empirical results of this study. The finding that certain communication behaviours were more favourable for profit sharing participants than for non-participants support the general hypothesis of the integrated profit sharing model. The observed changes in communication behaviours indicate that information sharing and idea generation are important components of the profit sharing process. The results of this study did not reveal any changes in either communication or organisational outcomes. A significant finding of this study is that the implementation of profit sharing plans require a relatively long period of time. Patience is required to achieve high levels of success and management must make long-term commitment to profit sharing. Findings of this study should be interpreted with caution, taking into consideration that most of the previo.us researches on profit sharing have been conducted in Western European or American countries, while the current study was based on data collected from an organisation in a developing country. This implies that the findings reported in this thesis may not be comparable in certain respects to results derived from companies in major industrialised economies.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

We present the first experimental implementation of a recently designed quasi-lossless fibre span with strongly reduced signal power excursion. The resulting fibre waveguide medium can be advantageously used both in lightwave communications and in all-optical nonlinear data processing.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

This is a study of specific aspects of classroom interaction primary school level in Kenya. The study entailed the identification of the sources of particular communication problems during the change-over period from Kiswahili to English medium teaching in two primary schools. There was subsequently an examination of the language resources which were employed by teachers to maintain pupil participation in communication in the light of the occurrence of possibility of occurrence of specific communication problems. The language resources which were found to be significant in this regard concerned firstly the use of different elicitation types by teachers to stimulate pupils into giving responses and secondly teachers' recourse to code-switching from English to Kiswahili and vice-versa. It was also found in this study that although the use of English as the medium of instruction in the classrooms which were observed resulted in certain communication problems, some of these problems need not have arisen if teachers had been more careful in their use of language. The consideration of this finding, after taking into account the role of different elicitation types and code-switching as interpretable from data samples had certain implications which are specified in the study for teaching in Kenyan primary schools. The corpus for the study consisted of audio-recordings of English, Science and Number-Work lessons which were later transcribed. Relevant data samples were subsequently extracted from transcripts for analysis. Many of the samples have examples of cases of communication breakdowns, but they also illustrate how teachers maintained interaction with pupils who had yet to acquire an operational mastery of English. This study thus differs from most studies on classroom interaction because of its basic concern with the examination of the resources available to teachers for overcoming the problem areas of classroom communication.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Firstly, we numerically model a practical 20 Gb/s undersea configuration employing the Return-to-Zero Differential Phase Shift Keying data format. The modelling is completed using the Split-Step Fourier Method to solve the Generalised Nonlinear Schrdinger Equation. We optimise the dispersion map and per-channel launch power of these channels and investigate how the choice of pre/post compensation can influence the performance. After obtaining these optimal configurations, we investigate the Bit Error Rate estimation of these systems and we see that estimation based on Gaussian electrical current systems is appropriate for systems of this type, indicating quasi-linear behaviour. The introduction of narrower pulses due to the deployment of quasi-linear transmission decreases the tolerance to chromatic dispersion and intra-channel nonlinearity. We used tools from Mathematical Statistics to study the behaviour of these channels in order to develop new methods to estimate Bit Error Rate. In the final section, we consider the estimation of Eye Closure Penalty, a popular measure of signal distortion. Using a numerical example and assuming the symmetry of eye closure, we see that we can simply estimate Eye Closure Penalty using Gaussian statistics. We also see that the statistics of the logical ones dominates the statistics of the logical ones dominates the statistics of signal distortion in the case of Return-to-Zero On-Off Keying configurations.