657 resultados para Telecommunication.


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Incumbent telecommunication lasers emitting at 1.5 µm are fabricated on InP substrates and consist of multiple strained quantum well layers of the ternary alloy InGaAs, with barriers of InGaAsP or InGaAlAs. These lasers have been seen to exhibit very strong temperature dependence of the threshold current. This strong temperature dependence leads to a situation where external cooling equipment is required to stabilise the optical output power of these lasers. This results in a significant increase in the energy bill associated with telecommunications, as well as a large increase in equipment budgets. If the exponential growth trend of end user bandwidth demand associated with the internet continues, these inefficient lasers could see the telecommunications industry become the dominant consumer of world energy. For this reason there is strong interest in developing new, much more efficient telecommunication lasers. One avenue being investigated is the development of quantum dot lasers on InP. The confinement experienced in these low dimensional structures leads to a strong perturbation of the density of states at the band edge, and has been predicted to result in reduced temperature dependence of the threshold current in these devices. The growth of these structures is difficult due to the large lattice mismatch between InP and InAs; however, recently quantum dots elongated in one dimension, known as quantum dashes, have been demonstrated. Chapter 4 of this thesis provides an experimental analysis of one of these quantum dash lasers emitting at 1.5 µm along with a numerical investigation of threshold dynamics present in this device. Another avenue being explored to increase the efficiency of telecommunications lasers is bandstructure engineering of GaAs-based materials to emit at 1.5 µm. The cause of the strong temperature sensitivity in InP-based quantum well structures has been shown to be CHSH Auger recombination. Calculations have shown and experiments have verified that the addition of bismuth to GaAs strongly reduces the bandgap and increases the spin orbit splitting energy of the alloy GaAs1−xBix. This leads to a bandstructure condition at x = 10 % where not only is 1.5 µm emission achieved on GaAs-based material, but also the bandstructure of the material can naturally suppress the costly CHSH Auger recombination which plagues InP-based quantum-well-based material. It has been predicted that telecommunications lasers based on this material system should operate in the absence of external cooling equipment and offer electrical and optical benefits over the incumbent lasers. Chapters 5, 6, and 7 provide a first analysis of several aspects of this material system relevant to the development of high bismuth content telecommunication lasers.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

As a device, the laser is an elegant conglomerate of elementary physical theories and state-of-the-art techniques ranging from quantum mechanics, thermal and statistical physics, material growth and non-linear mathematics. The laser has been a commercial success in medicine and telecommunication while driving the development of highly optimised devices specifically designed for a plethora of uses. Due to their low-cost and large-scale predictability many aspects of modern life would not function without the lasers. However, the laser is also a window into a system that is strongly emulated by non-linear mathematical systems and are an exceptional apparatus in the development of non-linear dynamics and is often used in the teaching of non-trivial mathematics. While single-mode semiconductor lasers have been well studied, a unified comparison of single and two-mode lasers is still needed to extend the knowledge of semiconductor lasers, as well as testing the limits of current model. Secondly, this work aims to utilise the optically injected semiconductor laser as a tool so study non-linear phenomena in other fields of study, namely ’Rogue waves’ that have been previously witnessed in oceanography and are suspected as having non-linear origins. The first half of this thesis includes a reliable and fast technique to categorise the dynamical state of optically injected two mode and single mode lasers. Analysis of the experimentally obtained time-traces revealed regions of various dynamics and allowed the automatic identification of their respective stability. The impact of this method is also extended to the detection regions containing bi-stabilities. The second half of the thesis presents an investigation into the origins of Rogue Waves in single mode lasers. After confirming their existence in single mode lasers, their distribution in time and sudden appearance in the time-series is studied to justify their name. An examination is also performed into the existence of paths that make Rogue Waves possible and the impact of noise on their distribution is also studied.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, we consider the transmission of confidential information over a κ-μ fading channel in the presence of an eavesdropper who also experiences κ-μ fading. In particular, we obtain novel analytical solutions for the probability of strictly positive secrecy capacity (SPSC) and a lower bound of secure outage probability (SOPL) for independent and non-identically distributed channel coefficients without parameter constraints. We also provide a closed-form expression for the probability of SPSC when the μ parameter is assumed to take positive integer values. Monte-Carlo simulations are performed to verify the derived results. The versatility of the κ-μ fading model means that the results presented in this paper can be used to determine the probability of SPSC and SOPL for a large number of other fading scenarios, such as Rayleigh, Rice (Nakagamin), Nakagami-m, One-Sided Gaussian, and mixtures of these common fading models. In addition, due to the duality of the analysis of secrecy capacity and co-channel interference (CCI), the results presented here will have immediate applicability in the analysis of outage probability in wireless systems affected by CCI and background noise (BN). To demonstrate the efficacy of the novel formulations proposed here, we use the derived equations to provide a useful insight into the probability of SPSC and SOPL for a range of emerging wireless applications, such as cellular device-to-device, peer-to-peer, vehicle-to-vehicle, and body centric communications using data obtained from real channel measurements.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Network security monitoring remains a challenge. As global networks scale up, in terms of traffic, volume and speed, effective attribution of cyber attacks is increasingly difficult. The problem is compounded by a combination of other factors, including the architecture of the Internet, multi-stage attacks and increasing volumes of nonproductive traffic. This paper proposes to shift the focus of security monitoring from the source to the target. Simply put, resources devoted to detection and attribution should be redeployed to efficiently monitor for targeting and prevention of attacks. The effort of detection should aim to determine whether a node is under attack, and if so, effectively prevent the attack. This paper contributes by systematically reviewing the structural, operational and legal reasons underlying this argument, and presents empirical evidence to support a shift away from attribution to favour of a target-centric monitoring approach. A carefully deployed set of experiments are presented and a detailed analysis of the results is achieved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

App collusion refers to two or more apps working together to achieve a malicious goal that they otherwise would not be able to achieve individually. The permissions based security model (PBSM) for Android does not address this threat, as it is rather limited to mitigating risks due to individual apps. This paper presents a technique for assessing the threat of collusion for apps, which is a first step towards quantifying collusion risk, and allows us to narrow down to candidate apps for collusion, which is critical given the high volume of Android apps available. We present our empirical analysis using a classified corpus of over 29000 Android apps provided by Intel Security.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In order to cope up with the ever increasing demand for larger transmission bandwidth, Radio over Fiber technology is a very beneficial solution. These systems are expected to play a major role within future fifth generation wireless networks due to their inherent capillary distribution properties. Nonlinear compensation techniques are becoming increasingly important to improve the performance of telecommunication channels by compensating for channel nonlinearities. Indeed, significant bounds on the technology usability and performance degradation occur due to nonlinear characteristics of optical transmitter, nonlinear generation of spurious frequencies, which, in the case of RoF links exploiting Directly Modulated Lasers , has the combined effect of laser chirp and optical fiber dispersion among its prevailing causes. The purpose of the research is to analyze some of the main causes of harmonic and intermodulation distortion present in Radio over Fiber (RoF) links, and to suggest a solution to reduce their effects, through a digital predistortion technique. Predistortion is an effective and interesting solution to linearize and this allows to demonstrate that the laser’s chirp and the optical fiber’s dispersion are the main causes which generate harmonic distortion. The improvements illustrated are only theoretical, based on a feasibility point of view. The simulations performed lead to significant improvements for short and long distances of radio over fiber link lengths. The algorithm utilized for simulation has been implemented on MATLAB. The effects of chirp and fiber nonlinearity in a directly modulated fiber transmission system are investigated by simulation, and a cost effective and rather simple technique for compensating these effects is discussed. A detailed description of its functional model is given, and its attractive features both in terms of quality improvement of the received signal, and cost effectiveness of the system are illustrated.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This study aims to understand the general model of governance of information technology adopted by telecommunication companies operating in Rio Grande do Norte. The research methodology used involved a theoretical and empirical approach prepared, involving two case studies on companies in the telecommunications industry working in the state of Rio Grande do Norte. The study covered the area of IT organizations, through interviews with managers responsible for the area of Telecommunications / IT. To study in accordance with the approach and address the problem of research, this study was based on qualitative criteria, which enabled the understanding of how companies adopt the governance of information technology. In conclusion, it was found that the governance practices of information technology employees are incipient, but that meet the needs of business and that they intend to implement in specific areas and use other practices of IT governance

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Income decreasing strategies conducted by management could be harmful for various stakeholders. One example is big bath accounting, which could be accomplished in numer- ous ways. This study focus on big baths achieved by recognising impairments of goodwill. Purpose - The purpose of this study is to examine patterns of association between big bath accounting and impairment of goodwill within the telecommunication service industry in Europe. Further, this study aim at contributing to the discussion regarding utilisation of big baths through impairments of goodwill, and takes the perspective of an external stakehold- er. Delimitations - The study is restricted to European telecommunication entities comprised in STOXX Europe 600 Index. Method - This study was conducted using a hybrid of qualitative and quantitative research strategy with a deductive approach. The five indicators used to identify various big bath behaviours were inspired and derived from theory and previous research. Data from 2009 to 2015 was collected from the companies’ annual reports and websites, and analysed by the help of codification of each fulfilled indicator where 2009 merely served as a compara- tive year for 2010. By the use of a scoreboard the collected data was summarised on an ag- gregated yearly basis as the industry, not the specific companies, were analysed. Empirical findings - The results of this study suggests that big baths are executed among tele- communication companies within Europe. These are conducted simultaneously as impair- ments of goodwill are present, facilitated by earning management. A possible explanation is considered to be the room for interpretation inherent in IAS 36, enabling goodwill impair- ments to be recognised on managers’ command. Thereby an impairment could be “saved” for better or worse circumstances, or recognised when there exist an opportunity to max- imise (the manager's) wealth in the future. This study reveal the co-occurrence of goodwill impairments and big bath-indications, however a review of causal relationships are not en- abled by the limitations of the chosen method. 

Relevância:

10.00% 10.00%

Publicador:

Resumo:

A realização desta dissertação tem como principal objetivo a análise de indicadores chave de desempenho numa rede celular de terceira geração - Universal Mobile Telecommunication System (UMTS), bem como a aplicação de técnicas matemáticas de previsão como apoio ao respetivo planeamento e otimização. Para o efeito, foi inicialmente efetuado um estudo sobre a evolução das comunicações de uma forma generalista, até às redes de nova geração, abordando individualmente, as de voz, as de dados e as comunicações móveis, assim como, uma breve descrição das organizações envolvidas nestas mudanças. No seguimento do estudo inicial, dando enfoque à tecnologia UMTS, foram expostas as suas características, a sua estrutura e arquitetura. Foram ainda elaboradas, duas comparações, com base em diferentes parâmetros, uma com a tecnologia da geração anterior e outra, com a de última geração. Com base nos conhecimentos adquiridos em diferentes pesquisas, foram estudados, os indicadores chave de desempenho (KPIs), as técnicas de planeamento e otimização, apresentando propostas de prevenção e soluções para problemas existentes na rede.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Los desarrollos tecnológicos y las siempre cambiantes realidades de la organización se han convertido en agentes que han obligado a los diseñadores a repensar la estructura de la red. El incremento en el número de usuarios y en el número de aplicaciones que utilizan la red incrementó el tráfico a volúmenes nunca antes sospechados, se hizo entonces necesario concebir su estructura como una estructura jerárquica y modular, con diferentes requerimientos de capacidad y desempeño en cada nivel, y obligó a entender su diseño como un proceso. En este artículo nos proponemos presentar la evolución que ha tenido la arquitectura de una red para responder a los frecuentes cambios a los que se ven expuestas las organizaciones en las que existen.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En este trabajo el término arquitectura se refiere principalmente a la estructura lógica de sus componentes de software. Sin embargo, cuando se requiera, otros aspectos tales como elhardware y el sistema operativo se tienen en cuenta. El objeto del sistema resultante es brindar dos servicios de telemedicina otorrinolaringológica a practicantes en medicina o a doctores en locaciones remotas. En general, el difícil acceso a la prácticay la dificultad de acceder a servicios médicos en locaciones geográficamente remotas son situaciones comunes en América Latina. De acuerdo con esto, un sistema de soporte sería degran ayuda. Los servicios sugeridos, entrenamiento remoto utilizando simulación virtual y soporte remoto a la toma de decisiones, deben estar soportados por una arquitecturaapropiada a la internet. Este documento presenta primero una introducción al proyecto. Seguidamente se describe la novedad del trabajo. A continuación se detallan los servicios y la arquitectura propuestos. Finalmente, se presentan los resultados y una serie de conclusiones y pasos a seguir.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Dada la gran importancia que ha tomado el paradigma orientado a objetos en la ingeniería de software y al papel central que juega la reusabilidad dentro de éste, se hacen necesarias la precisión y formalización de conceptos claves como cohesión, acoplamiento y modularidad. En este trabajo se propone una formalización matemática de esos conceptos claves basada en la topología algebraica y que nos conduce a unos criterios formales de diseño modular que facilitan la medición de los conceptos.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Método para la gestión y control de aparcamientos regulados para discapacitados. La gestión necesaria por parte de los usuarios mediante dispositivos móviles hace necesaria la transferencia de la información por redes General Packet Radio Service (GPRS), Universal Mobile Telecommunication System, High Speed Downlink Packet Access (HSDPA). En el sistema guiado de localización de aparcamiento para personas discapacitadas, el usuario activa en un dispositivo móvil la petición de parking. Remitiendo la identificación del vehículo, posición GPS, -opcionalmente- tiempo estimado de ocupación. Recibiendo en su dispositivo un mapa con aparcamientos codificados en color así como cualquier dato de interés. La información de ocupación está disponible a controladores de tráfico, que reciben en su dispositivo, periódicamente o bajo demanda, información de ocupación de estacionamientos en su zona, de modo que puede controlar el parking (vehículos sin licencia o licencia falsa). Los controladores pueden actualizar la información de ocupación, usando sus dispositivos.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

En este artículo se presentan los mecanismos y procesos necesarios que realizan los enrutadores para ofrecer calidad de servicio en redes de paquetes y se hace especial énfasis en el estudio del estado del arte en lo referente a los algoritmos de planificación utilizados en este tipo de redes.