15 research outputs found

    Software defined radio : a system engineering view of platform architecture and market diffusion

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, System Design & Management Program, 2002.Includes bibliographical references (p. 179-181).As complexity and ambiguity in products and customer needs increase, existing companies are being forced toward new organizational models. New products require integrating knowledge across technologies, architectures, and functions in new ways, building product platforms that can adapt to changes in markets and product design throughout the product development process. In particular, the wireless telecommunications industry is plagued by multiple incompatible dominant second-generation standards, with each with separate migration paths to future third generation functionality. The high initial investments in spectrum and infrastructure, and corresponding switching costs, call out for a technological solution that can both evolve with the rapid advances in technology and potentially operates seamlessly across multiple incompatible networks to unify a highly fragmented system. In a system engineering context, this thesis investigates the use of software define radio technology (SDR) as a potential replacement for hardware solutions to the multiple air interface standard problem. This thesis investigates the role of product platform architectures in product market diffusion by studying the selection of appropriate system and product architectures, product market diffusion, and the formation of a system dominant design. Using software defined radio (SDR) technology in the wireless telecommunications industry as a case study, the emergence of SDR as a potential replacement for multiple mobile phone standards is investigated. Compared with interim compatibility solutions that combine multiple air interfaces through hardware. SDRs are an emerging technology that promises to combine multiple air-interfaces into a single wireless phone platform though software configuration. Market and organizational disruptions are determined, and how platform architecture concepts can be used to mitigate these disruptions. The history of the wireless telecommunications industry is presented to highlight the determinants of product and standards success in the wireless industry. The transition between first-generation (1G) wireless, second-generation (2G) wireless, and the interim high data rate second-generation (2.5 G) system currently being rolled out is discussed. Geographical differences in standards acceptance and the role of government policies are discussed. The strong network effects in the industry are illustrated by the late success of GSM technology in the United States market. The mode of technological standard interaction or competition is determined through the use of the Lotka-Volterra model of technological interaction and lessons learned applied to third generation systems. Plans for third generation (3G) wireless are presented, and the various transition paths from 2G to 3G are discussed. The challenges of transitioning between technologies (technological discontinuities) are highlighted through a discussion of the installed base of legacy equipment. Software defined radio (SDR) technology is presented, and a platform architecture is developed in the context of 3G market penetration. The use of appropriate flexible SDR system architectures in light of rapidly changing technological and market innovations is discussed.by Moise N. Solomon.S.M

    Technology Assessment for the Future Aeronautical Communications System

    Get PDF
    To address emerging saturation in the VHF aeronautical bands allocated internationally for air traffic management communications, the International Civil Aviation Organization (ICAO) has requested development of a common global solution through its Aeronautical Communications Panel (ACP). In response, the Federal Aviation Administration (FAA) and Eurocontrol initiated a joint study, with the support of NASA and U.S. and European contractors, to provide major findings on alternatives and recommendations to the ICAO ACP Working Group C (WG-C). Under an FAA/Eurocontrol cooperative research and development agreement, ACP WG-C Action Plan 17 (AP-17), commonly referred to as the Future Communications Study (FCS), NASA Glenn Research Center is responsible for the investigation of potential communications technologies that support the long-term mobile communication operational concepts of the FCS. This report documents the results of the first phase of the technology assessment and recommendations referred to in the Technology Pre-Screening Task 3.1 of AP-17. The prescreening identifies potential technologies that are under development in the industry and provides an initial assessment against a harmonized set of evaluation criteria that address high level capabilities, projected maturity for the time frame for usage in aviation, and potential applicability to aviation. A wide variety of candidate technologies were evaluated from several communications service categories including: cellular telephony; IEEE-802.xx standards; public safety radio; satellite and over-the-horizon communications; custom narrowband VHF; custom wideband; and military communications

    Multimedia in mobile networks: Streaming techniques, optimization and User Experience

    Get PDF
    1.UMTS overview and User Experience 2.Streaming Service & Streaming Platform 3.Quality of Service 4.Mpeg-4 5.Test Methodology & testing architecture 6.Conclusion

    Non-Intrusive Subscriber Authentication for Next Generation Mobile Communication Systems

    Get PDF
    Merged with duplicate record 10026.1/753 on 14.03.2017 by CS (TIS)The last decade has witnessed massive growth in both the technological development, and the consumer adoption of mobile devices such as mobile handsets and PDAs. The recent introduction of wideband mobile networks has enabled the deployment of new services with access to traditionally well protected personal data, such as banking details or medical records. Secure user access to this data has however remained a function of the mobile device's authentication system, which is only protected from masquerade abuse by the traditional PIN, originally designed to protect against telephony abuse. This thesis presents novel research in relation to advanced subscriber authentication for mobile devices. The research began by assessing the threat of masquerade attacks on such devices by way of a survey of end users. This revealed that the current methods of mobile authentication remain extensively unused, leaving terminals highly vulnerable to masquerade attack. Further investigation revealed that, in the context of the more advanced wideband enabled services, users are receptive to many advanced authentication techniques and principles, including the discipline of biometrics which naturally lends itself to the area of advanced subscriber based authentication. To address the requirement for a more personal authentication capable of being applied in a continuous context, a novel non-intrusive biometric authentication technique was conceived, drawn from the discrete disciplines of biometrics and Auditory Evoked Responses. The technique forms a hybrid multi-modal biometric where variations in the behavioural stimulus of the human voice (due to the propagation effects of acoustic waves within the human head), are used to verify the identity o f a user. The resulting approach is known as the Head Authentication Technique (HAT). Evaluation of the HAT authentication process is realised in two stages. Firstly, the generic authentication procedures of registration and verification are automated within a prototype implementation. Secondly, a HAT demonstrator is used to evaluate the authentication process through a series of experimental trials involving a representative user community. The results from the trials confirm that multiple HAT samples from the same user exhibit a high degree of correlation, yet samples between users exhibit a high degree of discrepancy. Statistical analysis of the prototypes performance realised early system error rates of; FNMR = 6% and FMR = 0.025%. The results clearly demonstrate the authentication capabilities of this novel biometric approach and the contribution this new work can make to the protection of subscriber data in next generation mobile networks.Orange Personal Communication Services Lt

    Evolution and usability of mobile phone interaction styles

    Get PDF
    Over one billion people own or use cellular mobile telephones. Therefore, industry practitioners are faced with a question: how big steps can they take when designing the user interfaces for their new products, or how closely should they stick with the already existing user interface conventions that may already be familiar to the consumers. The objective of this research work is to create and communicate new knowledge for design and usability practitioners about how to design and evolve interaction style conventions in mainstream, voice-centric mobile telephones. In the context of this study, interaction style denotes the framework consisting of the physical interaction objects, the abstract interaction elements, and the associated behavior or interaction conventions that are applied throughout the core functionality of the mobile phone, but excludes the stylistic appearance elements of the user interface. The main research problem — how do mobile phone interaction style changes affect the initial usability of a mobile phone for users with earlier experience with mobile phones — is approached via several methods. A literature study compares the interaction styles applied in mainstream computing domains against the aspects relevant in the mobile phones domain. A heuristic analysis of contemporary mobile phones is used to formulate an understanding of the available interaction styles and analyze whether there is convergence towards specific types of interaction styles in the industry. An empirical usability testing experiment with 38 test users is conducted with a novel mobile phone interaction style to investigate differences between users who are already familiar with different mobile phone interaction styles. The study reveals that interaction styles applied in contemporary mobile telephones are designed around menu navigation, and they implement the three primary operations — Select, Back and Menu access — with dedicated hardkeys, context-sensitive softkeys, or using special control devices like joysticks or jog dials. The control keys in the contemporary interaction styles are converging around various two- and three-softkey conventions. The aspects related to indirect manipulation and small displays pose specific usability and UI design challenges on mobile phone user interfaces. The study shows that the mobile handset manufacturers are applying their usually proprietary interaction styles in a rather consistent manner in their products, with the notable exception of mobile Internet browsers that often break the underlying interaction style consistency. Based on the results from the empirical usability testing, we claim that despite differences between interaction styles in contemporary mobile phones, users do not face significant difficulties when transferring to a novel mobile phone model.reviewe

    Distributed power control in ad hoc networks.

    Get PDF
    Thesis (M.Sc.Eng.)-University of Natal, Durban, 2003.Abstract available in digital copy

    Recent Advances in Wireless Communications and Networks

    Get PDF
    This book focuses on the current hottest issues from the lowest layers to the upper layers of wireless communication networks and provides "real-time" research progress on these issues. The authors have made every effort to systematically organize the information on these topics to make it easily accessible to readers of any level. This book also maintains the balance between current research results and their theoretical support. In this book, a variety of novel techniques in wireless communications and networks are investigated. The authors attempt to present these topics in detail. Insightful and reader-friendly descriptions are presented to nourish readers of any level, from practicing and knowledgeable communication engineers to beginning or professional researchers. All interested readers can easily find noteworthy materials in much greater detail than in previous publications and in the references cited in these chapters

    Semantic discovery and reuse of business process patterns

    Get PDF
    Patterns currently play an important role in modern information systems (IS) development and their use has mainly been restricted to the design and implementation phases of the development lifecycle. Given the increasing significance of business modelling in IS development, patterns have the potential of providing a viable solution for promoting reusability of recurrent generalized models in the very early stages of development. As a statement of research-in-progress this paper focuses on business process patterns and proposes an initial methodological framework for the discovery and reuse of business process patterns within the IS development lifecycle. The framework borrows ideas from the domain engineering literature and proposes the use of semantics to drive both the discovery of patterns as well as their reuse

    Unmanned Aircraft Systems in the Cyber Domain

    Get PDF
    Unmanned Aircraft Systems are an integral part of the US national critical infrastructure. The authors have endeavored to bring a breadth and quality of information to the reader that is unparalleled in the unclassified sphere. This textbook will fully immerse and engage the reader / student in the cyber-security considerations of this rapidly emerging technology that we know as unmanned aircraft systems (UAS). The first edition topics covered National Airspace (NAS) policy issues, information security (INFOSEC), UAS vulnerabilities in key systems (Sense and Avoid / SCADA), navigation and collision avoidance systems, stealth design, intelligence, surveillance and reconnaissance (ISR) platforms; weapons systems security; electronic warfare considerations; data-links, jamming, operational vulnerabilities and still-emerging political scenarios that affect US military / commercial decisions. This second edition discusses state-of-the-art technology issues facing US UAS designers. It focuses on counter unmanned aircraft systems (C-UAS) – especially research designed to mitigate and terminate threats by SWARMS. Topics include high-altitude platforms (HAPS) for wireless communications; C-UAS and large scale threats; acoustic countermeasures against SWARMS and building an Identify Friend or Foe (IFF) acoustic library; updates to the legal / regulatory landscape; UAS proliferation along the Chinese New Silk Road Sea / Land routes; and ethics in this new age of autonomous systems and artificial intelligence (AI).https://newprairiepress.org/ebooks/1027/thumbnail.jp
    corecore