You searched for subject:(information theory)
.
Showing records 1 – 30 of
3011 total matches.
◁ [1] [2] [3] [4] [5] … [101] ▶

University of Notre Dame
1.
Kang Gao.
Computation of Mutual Information with Training and Its
Applications in Quantized Large-Scale Systems</h1>.
Degree: Electrical Engineering, 2020, University of Notre Dame
URL: https://curate.nd.edu/show/kw52j676c5n
► This thesis analyzes the effect of training on the mutual information between the input and output of a system with unknown parameters. The work…
(more)
▼ This thesis analyzes the effect of training
on the mutual
information between the input and output of a system
with unknown parameters. The work consists of two parts including a
theory in the computation of mutual
information with training, and
its applications in wireless communication, signal processing, and
machine learning which can be modeled by quantized large-scale
systems and employ training as part of their
operation. In the first part, we develop a
theory
in computing the mutual
information between the input and output
conditioned on training for large-scale systems that do not
necessarily have Gaussianity or linearity in the model, without
considering any particular parameter estimate, and without
resorting to linearization or any worst-case noise analysis. Such
mutual
information can be computed as the difference between two
derivatives of a single function. In the second
part, we show that a quantized large-scale system with unknown
parameters and training signals can be analyzed by examining an
equivalent system with known parameters by modifying the signal
power and noise variance in a prescribed manner. Applications to
training in wireless communications, signal processing, and machine
learning are shown. In wireless communications, we show that the
number of training signals can be significantly smaller than the
number of transmitting elements. Similar conclusions can be drawn
when considering the symbol error rate in signal processing
applications, as long as the number of receiving elements is large
enough. In machine learning, where a linear classifier is
considered, we show that the misclassification rate is not
sensitive to the number of classes when the number of training
examples is large, and is approximately inversely proportional to
the size of the training set. We show that a linear analysis of
this nonlinear training problem can be accurate when the additive
thermal noise power is high.
Advisors/Committee Members: J. Nicholas Laneman, Committee Member, Jonathan Chisum, Committee Member, Bertrand M. Hochwald, Research Director, Thomas Fuja, Committee Member.
Subjects/Keywords: information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Gao, K. (2020). Computation of Mutual Information with Training and Its
Applications in Quantized Large-Scale Systems</h1>. (Thesis). University of Notre Dame. Retrieved from https://curate.nd.edu/show/kw52j676c5n
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Gao, Kang. “Computation of Mutual Information with Training and Its
Applications in Quantized Large-Scale Systems</h1>.” 2020. Thesis, University of Notre Dame. Accessed February 26, 2021.
https://curate.nd.edu/show/kw52j676c5n.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Gao, Kang. “Computation of Mutual Information with Training and Its
Applications in Quantized Large-Scale Systems</h1>.” 2020. Web. 26 Feb 2021.
Vancouver:
Gao K. Computation of Mutual Information with Training and Its
Applications in Quantized Large-Scale Systems</h1>. [Internet] [Thesis]. University of Notre Dame; 2020. [cited 2021 Feb 26].
Available from: https://curate.nd.edu/show/kw52j676c5n.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Gao K. Computation of Mutual Information with Training and Its
Applications in Quantized Large-Scale Systems</h1>. [Thesis]. University of Notre Dame; 2020. Available from: https://curate.nd.edu/show/kw52j676c5n
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Royal Roads University
2.
Hayes, Victor.
From page to practice : communication theory and its value for public relations educators and practitioners
.
Degree: 2011, Royal Roads University
URL: http://hdl.handle.net/10170/466
► A robust scholarly discussion had been conducted for more than 30 years on the professional impact of theory on communication practice, including Vocate‘s important observation…
(more)
▼ A robust scholarly discussion had been conducted for more than 30 years on the professional impact of
theory on communication practice, including Vocate‘s important observation in 1997 that a rigorous education in
theory creates ―learnable intelligence‖ in professional communicators. However, the question of the actual professional impact of studying communication
theory has not been asked of those best positioned to judge—communication practitioners who have rigorously studied communication
theory. This research attempts to determine whether learning
theory actually has affected practice among communication professionals who have explicitly studied
theory in pursuit of a master‘s degree in professional communication. As well, this research examines a linked issue in Canada—whether
theory is being taught in practical post-secondary public relations programs. Following the latter question this research examines a pedagogical approach at the community college level towards teaching
theory relevant to a professional setting. Finally, it examines the link between communication
theory and the evolution of the critical communication professional.
Advisors/Committee Members: Black, David (advisor), Walinga, Jennifer (advisor).
Subjects/Keywords: Information theory;
Education
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hayes, V. (2011). From page to practice : communication theory and its value for public relations educators and practitioners
. (Thesis). Royal Roads University. Retrieved from http://hdl.handle.net/10170/466
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Hayes, Victor. “From page to practice : communication theory and its value for public relations educators and practitioners
.” 2011. Thesis, Royal Roads University. Accessed February 26, 2021.
http://hdl.handle.net/10170/466.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Hayes, Victor. “From page to practice : communication theory and its value for public relations educators and practitioners
.” 2011. Web. 26 Feb 2021.
Vancouver:
Hayes V. From page to practice : communication theory and its value for public relations educators and practitioners
. [Internet] [Thesis]. Royal Roads University; 2011. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/10170/466.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Hayes V. From page to practice : communication theory and its value for public relations educators and practitioners
. [Thesis]. Royal Roads University; 2011. Available from: http://hdl.handle.net/10170/466
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Edinburgh
3.
Vollmer, Lauren N.
Form is Function: Faithful Transmission of Information as a Pressure for Linguistic Structure.
Degree: 2011, University of Edinburgh
URL: http://hdl.handle.net/1842/6087
► We take descriptions of language structure and evolution in terms of information theory as the basis of an investigation of the information-preserving capacity of linguistic…
(more)
▼ We take descriptions of language structure and evolution in terms of
information theory as the basis of an investigation of the
information-preserving capacity of linguistic features. We begin by examining factors affecting the performance of conventional error-correcting codes, which we compare to message construction algorithms designed to replicate basic linguistic features. We then
subject these message construction algorithms to selective pressure maximizing transmission accuracy and examine the structure of the resulting systems. The emergence of structural patterns in the optimized systems points to the centrality of
information preservation as a pressure on emerging linguistic systems.
Advisors/Committee Members: Smith, Kenny, Blythe, Richard.
Subjects/Keywords: linguistics; information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Vollmer, L. N. (2011). Form is Function: Faithful Transmission of Information as a Pressure for Linguistic Structure. (Thesis). University of Edinburgh. Retrieved from http://hdl.handle.net/1842/6087
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Vollmer, Lauren N. “Form is Function: Faithful Transmission of Information as a Pressure for Linguistic Structure.” 2011. Thesis, University of Edinburgh. Accessed February 26, 2021.
http://hdl.handle.net/1842/6087.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Vollmer, Lauren N. “Form is Function: Faithful Transmission of Information as a Pressure for Linguistic Structure.” 2011. Web. 26 Feb 2021.
Vancouver:
Vollmer LN. Form is Function: Faithful Transmission of Information as a Pressure for Linguistic Structure. [Internet] [Thesis]. University of Edinburgh; 2011. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/1842/6087.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Vollmer LN. Form is Function: Faithful Transmission of Information as a Pressure for Linguistic Structure. [Thesis]. University of Edinburgh; 2011. Available from: http://hdl.handle.net/1842/6087
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Anna University
4.
Amshakala K.
Information theory based data dependency extraction and
its application in data integration;.
Degree: Information theory based data dependency extraction
and its application in data integration, 2015, Anna University
URL: http://shodhganga.inflibnet.ac.in/handle/10603/50589
► As a huge volume of data is getting generated every day data integration becomes important to provide a uniform view over the data collected from…
(more)
▼ As a huge volume of data is getting generated every
day data integration becomes important to provide a uniform view
over the data collected from multiple resources Effective data
analysis methods are required to work with such massive integrated
data and efficient data quality tools are also vital to ensure the
correctness of the integrated data The data store for many
organizations is the databases and integrity constraints are the
primary means for ensuring data integrity in databases Functional
Dependencies are the common type of integrity constraints that are
specified by the database designer when the database schema is
designed In the quest for capturing more information from data in
the form of constraints functional dependencies are extended in
several ways Among various data dependencies conditional functional
dependencies fuzzy functional dependencies and matching
dependencies are widely used for data cleaning operations In
addition to the constraints specified by the designer there are
other constraints hidden in data and it becomes essential to mine
dependencies from data Several dependency discovery methods are
proposed in this work to extract functional dependencies and its
extensions newlineThe proposed work also uses information theory
measure to extract various types of data dependencies from data
newline newline
reference p168-180.
Advisors/Committee Members: Nedunchezhian R.
Subjects/Keywords: Information and communication engineering; Information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
K, A. (2015). Information theory based data dependency extraction and
its application in data integration;. (Thesis). Anna University. Retrieved from http://shodhganga.inflibnet.ac.in/handle/10603/50589
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
K, Amshakala. “Information theory based data dependency extraction and
its application in data integration;.” 2015. Thesis, Anna University. Accessed February 26, 2021.
http://shodhganga.inflibnet.ac.in/handle/10603/50589.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
K, Amshakala. “Information theory based data dependency extraction and
its application in data integration;.” 2015. Web. 26 Feb 2021.
Vancouver:
K A. Information theory based data dependency extraction and
its application in data integration;. [Internet] [Thesis]. Anna University; 2015. [cited 2021 Feb 26].
Available from: http://shodhganga.inflibnet.ac.in/handle/10603/50589.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
K A. Information theory based data dependency extraction and
its application in data integration;. [Thesis]. Anna University; 2015. Available from: http://shodhganga.inflibnet.ac.in/handle/10603/50589
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Georgia State University
5.
Adrot, Anouck Virginie Vanessa.
What support does ICT (Information and Communication Technology) offer to organizational improvisation during crisis response?.
Degree: 2012, Georgia State University
URL: http://pqdtopen.proquest.com/#viewpdf?dispub=3490044
► While evidence of the exceedingly important role of technology in organizational life is commonplace, academics have not fully captured the influence of Information and…
(more)
▼ While evidence of the exceedingly important role of technology in organizational life is commonplace, academics have not fully captured the influence of Information and Communication Technology (ICT) on crisis response. A substantive body of knowledge on technology and crisis response already exists and keeps developing. Extensive research is on track to highlight how technology helps to prepare to crisis response and develop service recovery plans. However, some aspects of crisis response remain unknown. Among all the facets of crisis response that have been under investigation for some years, improvisation still challenges academics as a core component of crisis response. In spite of numerous insights on improvisation as a cognitive process and an organizational phenomenon, the question of <i>how improvisers do interact together while improvising</i> remains partly unanswered. As a result, literature falls short of details on whether crisis responders can rely on technology to interact when they have to improvise collectively. This dissertation therefore brings into focus ICT support to organizational improvisation in crisis response in two steps: We first address this question from a general standpoint by reviewing literature. We then propose an in depth and contextualized analysis of the use of a restricted set of technologies - emails, faxes, the Internet, phones - during the organizational crisis provoked by the 2003 French heat wave. Our findings offer a nuanced view of ICT support to organizational improvisation in crisis response. Our theoretical investigation suggests that ICTs, in a large sense, allow crisis responders to improvise collectively. It reports ICT properties - graphical representation, modularity, calculation, many-to-many communication, data centralization and virtuality - that promote the settling of appropriate conditions for interaction during organizational improvisation in crisis response. In the empirical work, we provide a more integrative picture of ICT support to organizational improvisation in crisis response by retrospectively observing crisis responders' interactions during the 2003 French heat wave. Our empirical findings suggest that improvisation enables crisis responders to cope with organizational emptiness that burdens crisis response. However, crisis responders' participation in organizational improvisation depends on their communicative genres. During the 2003 French heat wave crisis, administrative actors who had developed what we call a "dispassionate" communicative genre in relation to their email use, barely participated in organizational improvisation. Conversely, improvisers mainly communicated in what we call a "fervent" communicative genre. Therefore, our findings reveal that the ICT support to organizational improvisation in crisis response is mediated by the communication practices and strategies that groups of crisis responders develop around ICT tools.
Subjects/Keywords: Information Technology; Sociology, Organization Theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Adrot, A. V. V. (2012). What support does ICT (Information and Communication Technology) offer to organizational improvisation during crisis response?. (Thesis). Georgia State University. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=3490044
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Adrot, Anouck Virginie Vanessa. “What support does ICT (Information and Communication Technology) offer to organizational improvisation during crisis response?.” 2012. Thesis, Georgia State University. Accessed February 26, 2021.
http://pqdtopen.proquest.com/#viewpdf?dispub=3490044.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Adrot, Anouck Virginie Vanessa. “What support does ICT (Information and Communication Technology) offer to organizational improvisation during crisis response?.” 2012. Web. 26 Feb 2021.
Vancouver:
Adrot AVV. What support does ICT (Information and Communication Technology) offer to organizational improvisation during crisis response?. [Internet] [Thesis]. Georgia State University; 2012. [cited 2021 Feb 26].
Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=3490044.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Adrot AVV. What support does ICT (Information and Communication Technology) offer to organizational improvisation during crisis response?. [Thesis]. Georgia State University; 2012. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=3490044
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of California – Berkeley
6.
Kamath, Sudeep.
A study of some problems in network information theory.
Degree: Electrical Engineering & Computer Sciences, 2013, University of California – Berkeley
URL: http://www.escholarship.org/uc/item/7df3g43r
► Shannon theory has been very successful in studying fundamental limits of communication in the classical setting, where one sender wishes to communicate a message to…
(more)
▼ Shannon theory has been very successful in studying fundamental limits of communication in the classical setting, where one sender wishes to communicate a message to one receiver over an unreliable medium. The theory has also been successful in studying networks of small to moderate sizes, with multiple senders and multiple receivers. However, it has become well-known recently that understanding the fundamental limits of communication in a general network is a hard problem on numerous accounts.In this dissertation, we suggest that a significant aspect of the difficulty in studying limits of communication over networks lies in the unidirectional aspect of the problem. Under different assumptions that rid the problem of this particular aspect by introducing a suitable symmetry, either in the underlying network or in the traffic model, we find that simple schemes are approximately optimal in achieving these fundamental limits. We demonstrate this as a meta-theorem in the class of wireline networks and Gaussian networks. The key contribution driving these results is a new outer bound that we call the Generalized Network Sharing bound.We also study a problem of simulation of joint distributions in a non-interactive setup. Two agents observe correlated random variables and wish to simulate a certain joint distribution. We consider a non-asymptotic formulation of this problem and study tools that help prove impossibility results. We also study connections of this problem to existing problems in the literature.
Subjects/Keywords: Electrical engineering; information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kamath, S. (2013). A study of some problems in network information theory. (Thesis). University of California – Berkeley. Retrieved from http://www.escholarship.org/uc/item/7df3g43r
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Kamath, Sudeep. “A study of some problems in network information theory.” 2013. Thesis, University of California – Berkeley. Accessed February 26, 2021.
http://www.escholarship.org/uc/item/7df3g43r.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Kamath, Sudeep. “A study of some problems in network information theory.” 2013. Web. 26 Feb 2021.
Vancouver:
Kamath S. A study of some problems in network information theory. [Internet] [Thesis]. University of California – Berkeley; 2013. [cited 2021 Feb 26].
Available from: http://www.escholarship.org/uc/item/7df3g43r.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Kamath S. A study of some problems in network information theory. [Thesis]. University of California – Berkeley; 2013. Available from: http://www.escholarship.org/uc/item/7df3g43r
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Manchester
7.
Antal, Laszlo.
Statistical Disclosure Control for Frequency
Tables.
Degree: 2016, University of Manchester
URL: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:303310
► Disclosure risk assessment of statistical data, such as frequency tables, is a prerequisite for data dissemination. This thesis investigates the problem of disclosure risk assessment…
(more)
▼ Disclosure risk assessment of statistical data,
such as frequency tables, is a prerequisite for data dissemination.
This thesis investigates the problem of disclosure risk assessment
of frequency tables from the perspective of a statistical
institute.In the research reported here, disclosure risk is
measured by a mathematical function designed for the data according
to a disclosure risk scenario. Such functions are called disclosure
risk measures. A disclosure risk measure is defined for frequency
tables based on the entire population using
information theory.If
the disclosure risk of a population based frequency table is high,
a statistical institute will apply a statistical disclosure control
(SDC) method possibly perturbing the table. It is known that the
application of any SDC method lowers the disclosure risk. However,
measuring the disclosure risk of the perturbed frequency table is a
difficult problem. The disclosure risk measure proposed in the
first paper of the thesis is also extended to assess the disclosure
risk of perturbed frequency tables. SDC methods can be applied to
either the microdata from which the frequency table is generated or
directly to the frequency table. The two classes of methods are
called pre- and post-tabular methods accordingly. It is shown that
the two classes are closely related and that the proposed
disclosure risk measure can account for both methods.In the second
paper, the disclosure risk measure is extended to assess the
disclosure risk of sample based frequency tables. Probabilistic
models are used to estimate the population frequencies from sample
frequencies which can then be used in the proposed disclosure risk
measures.In the final paper of the thesis, we investigate an
application of building a flexible table generator where disclosure
risk and data utility measures must be calculated on-the-fly. We
show that the proposed disclosure risk measure and a related
information loss measure are adaptable to these settings. An
example implementation of the disclosure risk and data utility
assessment using the proposed disclosure risk measure is
given.
Advisors/Committee Members: ELLIOT, MARK MJ, Elliot, Mark, Shlomo, Natalie.
Subjects/Keywords: disclosure risk measure; information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Antal, L. (2016). Statistical Disclosure Control for Frequency
Tables. (Doctoral Dissertation). University of Manchester. Retrieved from http://www.manchester.ac.uk/escholar/uk-ac-man-scw:303310
Chicago Manual of Style (16th Edition):
Antal, Laszlo. “Statistical Disclosure Control for Frequency
Tables.” 2016. Doctoral Dissertation, University of Manchester. Accessed February 26, 2021.
http://www.manchester.ac.uk/escholar/uk-ac-man-scw:303310.
MLA Handbook (7th Edition):
Antal, Laszlo. “Statistical Disclosure Control for Frequency
Tables.” 2016. Web. 26 Feb 2021.
Vancouver:
Antal L. Statistical Disclosure Control for Frequency
Tables. [Internet] [Doctoral dissertation]. University of Manchester; 2016. [cited 2021 Feb 26].
Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:303310.
Council of Science Editors:
Antal L. Statistical Disclosure Control for Frequency
Tables. [Doctoral Dissertation]. University of Manchester; 2016. Available from: http://www.manchester.ac.uk/escholar/uk-ac-man-scw:303310

Cornell University
8.
Laourine, Amine.
Selected Topics In Information Theoretic Security And Compression.
Degree: PhD, Electrical Engineering, 2012, Cornell University
URL: http://hdl.handle.net/1813/31395
► The problems studied in this thesis fall within two different topics in network information theory. The first part of this dissertation will be about information…
(more)
▼ The problems studied in this thesis fall within two different topics in network
information theory. The first part of this dissertation will be about
information theoretic security and the second about distributed source coding. In the following a brief description of these problems will be given. In
information theoretic security, we look at two different types of timing channels and we quantify the maximum rate at which a transmitter can communicate
information reliably to a legitimate receiver while keeping an eavesdropper in the dark. The first timing channel that we study is the Poisson channel which is used to model certain direct detection optical communication systems. To transmit a message on this channel, the transmitter encodes
information by modulating the intensity of an optical signal while the legitimate receiver and the eavesdropper use the arrival moments of the individual photons to decide which message was transmitted. The second timing channel studied is the exponential server queue. Here the transmitter encodes a message using a chosen sequence of packets inter-arrival times and both the legitimate receiver and the eavesdropper use the corresponding inter-departures from their respective exponential server queues to decode the transmitted message. In distributed source coding, we consider a rate-distortion problem in which a decoder is interested in estimating two correlated Gaussian random variables with mean-square error distortion constraints on each of the reproductions. The variables to be estimated are the roots of a given Gauss-Markov tree and each encoder observes one of the leaves of that tree. We show that a simple compression architecture that performs separate lossy quantization followed by SlepianWolf binning is sum-rate optimal for this problem.
Advisors/Committee Members: Wagner, Aaron B. (chair), Tong, Lang (committee member), Resnick, Sidney Ira (committee member).
Subjects/Keywords: Information Theory; Securiy; Compression
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Laourine, A. (2012). Selected Topics In Information Theoretic Security And Compression. (Doctoral Dissertation). Cornell University. Retrieved from http://hdl.handle.net/1813/31395
Chicago Manual of Style (16th Edition):
Laourine, Amine. “Selected Topics In Information Theoretic Security And Compression.” 2012. Doctoral Dissertation, Cornell University. Accessed February 26, 2021.
http://hdl.handle.net/1813/31395.
MLA Handbook (7th Edition):
Laourine, Amine. “Selected Topics In Information Theoretic Security And Compression.” 2012. Web. 26 Feb 2021.
Vancouver:
Laourine A. Selected Topics In Information Theoretic Security And Compression. [Internet] [Doctoral dissertation]. Cornell University; 2012. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/1813/31395.
Council of Science Editors:
Laourine A. Selected Topics In Information Theoretic Security And Compression. [Doctoral Dissertation]. Cornell University; 2012. Available from: http://hdl.handle.net/1813/31395

Vanderbilt University
9.
Ehrman, Jonathan David.
Probing Cell Signaling Networks in Microfluidic Devices.
Degree: PhD, Physics, 2016, Vanderbilt University
URL: http://hdl.handle.net/1803/14608
► Detection of signals is critical for the function of eukaryotic cells. D. discoideum cells are particularly adept at responding chemical gradients, sensing single percent concentration…
(more)
▼ Detection of signals is critical for the function of eukaryotic cells. D. discoideum cells are particularly adept at responding chemical gradients, sensing single percent concentration changes across their body. We measure the ability of the cells to sense gradients through this developmental transition as they change their internal machinery. Additionally, we impair the ability of the cells to modulate the speed of the receptors and measure the effect of a single receptor state on gradient sensing over development.
We find a novel link between mechanotransduction and autophagy through the actin-rich microvillar protrusions lining the gut. These protrusions on the apical cell surface share structural similarities to the mechanosensitive stereocilia in the inner hair cells of the ear. Intestinal epithelial monolayers with microvilli, when exposed to persistent fluid shear stress, developed large vacuoles lined with autophagy associated proteins LC3 and LAMP1. The size and number of vacuoles were suppressed by perturbations to the autophagy pathway, including small molecule inhibitors and LC3 knockdown as well as through perturbations to the microvilli. Our results establish a link between apical shear and autophagic trafficking in intestinal epithelial monolayers.
Advisors/Committee Members: Ken S. Lau (committee member), John P . Wikswo (committee member), Shane M. Hutson (committee member), Erin Rericha (Committee Chair).
Subjects/Keywords: information theory; gut; Microfluidic
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Ehrman, J. D. (2016). Probing Cell Signaling Networks in Microfluidic Devices. (Doctoral Dissertation). Vanderbilt University. Retrieved from http://hdl.handle.net/1803/14608
Chicago Manual of Style (16th Edition):
Ehrman, Jonathan David. “Probing Cell Signaling Networks in Microfluidic Devices.” 2016. Doctoral Dissertation, Vanderbilt University. Accessed February 26, 2021.
http://hdl.handle.net/1803/14608.
MLA Handbook (7th Edition):
Ehrman, Jonathan David. “Probing Cell Signaling Networks in Microfluidic Devices.” 2016. Web. 26 Feb 2021.
Vancouver:
Ehrman JD. Probing Cell Signaling Networks in Microfluidic Devices. [Internet] [Doctoral dissertation]. Vanderbilt University; 2016. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/1803/14608.
Council of Science Editors:
Ehrman JD. Probing Cell Signaling Networks in Microfluidic Devices. [Doctoral Dissertation]. Vanderbilt University; 2016. Available from: http://hdl.handle.net/1803/14608

Texas A&M University
10.
Ozgul, Damla.
Direct Information Exchange in Wireless Networks: A Coding Perspective.
Degree: MS, Electrical Engineering, 2011, Texas A&M University
URL: http://hdl.handle.net/1969.1/ETD-TAMU-2010-08-8555
► The rise in the popularity of smartphones such as Blackberry and iPhone creates a strain on the world's mobile networks. The extensive use of these…
(more)
▼ The rise in the popularity of smartphones such as Blackberry and iPhone creates a
strain on the world's mobile networks. The extensive use of these mobile devices leads
to increasing congestion and higher rate of node failures. This increasing demand
of mobile wireless clients forces network providers to upgrade their wireless networks
with more efficient and more reliable services to meet the demands of their customers.
Therefore, there is a growing interest in strategies to resolve the problem and reduce
the stress on the wireless networks.
One strategy to reduce the strain on the wireless networks is to utilize cooperative
communication. The purpose of this thesis is to provide more efficient and reliable
solutions for direct
information exchange problems. First, algorithms are presented to
increase the efficiency of cooperative communication in a network where the clients
can communicate with each other through a broadcast channel. These algorithms
are designed to minimize the total transmission cost so that the communication will
be less expensive and more efficient. Second, we consider a setting in which several
clients exchange data through a relay. Our algorithms have provable performance
guarantees. We also verify the performance of the algorithms in practical settings
through extensive simulations.
Advisors/Committee Members: Sprintson, Alex (advisor), Liu, Tie (committee member), Friesen, Donald K. (committee member), Pfister, Henry D. (committee member).
Subjects/Keywords: Information Theory; Networking; Network Coding
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Ozgul, D. (2011). Direct Information Exchange in Wireless Networks: A Coding Perspective. (Masters Thesis). Texas A&M University. Retrieved from http://hdl.handle.net/1969.1/ETD-TAMU-2010-08-8555
Chicago Manual of Style (16th Edition):
Ozgul, Damla. “Direct Information Exchange in Wireless Networks: A Coding Perspective.” 2011. Masters Thesis, Texas A&M University. Accessed February 26, 2021.
http://hdl.handle.net/1969.1/ETD-TAMU-2010-08-8555.
MLA Handbook (7th Edition):
Ozgul, Damla. “Direct Information Exchange in Wireless Networks: A Coding Perspective.” 2011. Web. 26 Feb 2021.
Vancouver:
Ozgul D. Direct Information Exchange in Wireless Networks: A Coding Perspective. [Internet] [Masters thesis]. Texas A&M University; 2011. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2010-08-8555.
Council of Science Editors:
Ozgul D. Direct Information Exchange in Wireless Networks: A Coding Perspective. [Masters Thesis]. Texas A&M University; 2011. Available from: http://hdl.handle.net/1969.1/ETD-TAMU-2010-08-8555

University of North Texas
11.
Zhang, Yuan.
The Fabric of Entropy: A Discussion on the Meaning of Fractional Information.
Degree: 2019, University of North Texas
URL: https://digital.library.unt.edu/ark:/67531/metadc1538775/
► Why is the term information in English an uncountable noun, whereas in information theory it is a well-defined quantity? Since the amount of information can…
(more)
▼ Why is the term
information in English an uncountable noun, whereas in
information theory it is a well-defined quantity? Since the amount of
information can be quantified, what is the meaning of a fraction of that amount? This dissertation introduces a quasi-entropy matrix which developed from Claude Shannon's
information measure as an analytical tool for behavioral studies. Such matrix emphasizes the role of relative characteristics of individual level data across different collections. The real challenge in the big data era is never the size of the dataset, but how data lead scientists to individuals rather than arbitrarily divided statistical groups. This proposed matrix, when combining with other statistical measures, provides a new and easy-to-do method for identifying pattern in a well-defined system because it is built on the idea that uneven probability distributions lead to decrease in system entropy. Although the matrix is not superior to classical correlation techniques, it allows an interpretation not available with traditional standard statistics. Finally, this matrix connects heterogeneous datasets because it is a frequency-based method and it works on the modes of data rather than the means of values. It also visualizes clustering in data although this type of clustering is not measured by the squared Euclidean distance of the numerical attributes.
Advisors/Committee Members: O’Connor, Brian C., Chang, Hsia-Ching, Anderson, Richard L., 1970-.
Subjects/Keywords: information theory; entropy; data visualization
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share






University of Johannesburg
12.
Clarke, Willem Adriaan.
Application of spectral shaping techniques to synchronization error correcting codes.
Degree: 2015, University of Johannesburg
URL: http://hdl.handle.net/10210/13365
► M.Ing. (Electrical and Electronic Engineering)
In this thesis, spectral shaping techniques are applied to the insertion/deletion error correcting codes. Spectral shaping techniques are introduced and…
(more)
▼ M.Ing. (Electrical and Electronic Engineering)
In this thesis, spectral shaping techniques are applied to the insertion/deletion error correcting codes. Spectral shaping techniques are introduced and applied to insertion/deletion error correcting codes. The attainable rates for subcodes with spectral properties are computed and presented. The theory of comma-free codes is briefly reviewed and a new construction method is given : for comma-free insertion/deletion correcting codes. This method serves as a lower bound on the cardinality of comma-free insertion/deletion codes. The idea of a marker is introduced as an alternative method of finding word boundaries. Rules are given for governing the construction of marker code books that can differentiate between additive and insertion/deletion errors. The marker code books are then used in such: a way as not to violate the spectral properties of the abovementioned insertion/deletion correcting codes. A new class of codes is presented that has higher order spectral zeros at both DC and the Nyquist frequency. It is shown that these codes are insertion/deletion and additive error correcting. Besides this, it is shown that the abovementioned class of codes can correct two adjacent additive errors.
Subjects/Keywords: Error-correcting codes (Information theory)
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Clarke, W. A. (2015). Application of spectral shaping techniques to synchronization error correcting codes. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/13365
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Clarke, Willem Adriaan. “Application of spectral shaping techniques to synchronization error correcting codes.” 2015. Thesis, University of Johannesburg. Accessed February 26, 2021.
http://hdl.handle.net/10210/13365.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Clarke, Willem Adriaan. “Application of spectral shaping techniques to synchronization error correcting codes.” 2015. Web. 26 Feb 2021.
Vancouver:
Clarke WA. Application of spectral shaping techniques to synchronization error correcting codes. [Internet] [Thesis]. University of Johannesburg; 2015. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/10210/13365.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Clarke WA. Application of spectral shaping techniques to synchronization error correcting codes. [Thesis]. University of Johannesburg; 2015. Available from: http://hdl.handle.net/10210/13365
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Johannesburg
13.
Paluncic, Filip.
Moment balancing templates for insertion/deletion correction.
Degree: 2010, University of Johannesburg
URL: http://hdl.handle.net/10210/3042
► M.Ing.
In practice, channels with only insertions and deletions are rare. More commonly, additive errors are also present. Therefore, additional redundancy bits are added to…
(more)
▼ M.Ing.
In practice, channels with only insertions and deletions are rare. More commonly, additive errors are also present. Therefore, additional redundancy bits are added to the encoded data stream to allow for insertion/deletion correction. In this dissertation, moment balancing templates are used to add a single insertion/deletion capability to an arbitrary additive-error-correcting code. Moment balancing can be used for systematic encoding of number-theoretic codes. The selection of a particular additive-error-correcting codebook has potential influence on the moment balancing template. In direct relation to this, partition distributions of linear sets are considered and their connection to moment balancing templates illustrated. As an alternative to fixed length moment balancing templates, a variable length approach to moment balancing is also considered. It is shown that variable length moment balancing templates result in better performance, in terms of redundancy, than the optimal fixed length moment balancing template. It is assumed that the boundaries of variable length Levenshtein codewords are known. To implement the variable length template in practice, multiple markers are needed. The delimitation of variable length codeword boundaries with these markers leads to longer marker sequences as compared with the fixed length templates.
Subjects/Keywords: Error-correcting codes (Information theory)
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Paluncic, F. (2010). Moment balancing templates for insertion/deletion correction. (Thesis). University of Johannesburg. Retrieved from http://hdl.handle.net/10210/3042
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Paluncic, Filip. “Moment balancing templates for insertion/deletion correction.” 2010. Thesis, University of Johannesburg. Accessed February 26, 2021.
http://hdl.handle.net/10210/3042.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Paluncic, Filip. “Moment balancing templates for insertion/deletion correction.” 2010. Web. 26 Feb 2021.
Vancouver:
Paluncic F. Moment balancing templates for insertion/deletion correction. [Internet] [Thesis]. University of Johannesburg; 2010. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/10210/3042.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Paluncic F. Moment balancing templates for insertion/deletion correction. [Thesis]. University of Johannesburg; 2010. Available from: http://hdl.handle.net/10210/3042
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Addis Ababa University
14.
Solomon, Worku.
EFFICIENCY AT MAXIMUM POWER AND OPTIMIZED EFFICIENCY: AN INFORMATION THEORY APPROACH
.
Degree: 2012, Addis Ababa University
URL: http://etd.aau.edu.et/dspace/handle/123456789/1210
► We consider a model heat engine which is based on the concepts of information theory, attributing irreversible energy dissipation to the information transmission channels. The…
(more)
▼ We consider a model heat engine which is based on the concepts of
information theory,
attributing irreversible energy dissipation to the
information transmission channels. The
different communication channels, classical and quantum, are characterized by their channel
capacity. We obtain that the model recovers the Carnot principle in the reversible
limit and the efficiency at maximum power expression of non reversible thermodynamics.
We use optimization criterion to derive the objective function which is a quantity that
help us for the derivation of optimized efficiency. The criterion predicts the performance
regime of the model heat engine lying between efficiency at maximum power and Carnot
efficiency. Such regime should be considered as optimum performance regime of the model
heat engine. We derive the optimized efficiency, which has the same linear term for the
different
information channels in the linear response regime, lying between efficiency at
maximum power and Carnot efficiency. We expect the optimization method we used to
be applicable to any finite-time thermodynamic heat engine which meets Hernandez et al
[1] requirements. Besides it gives clue on the study of high performance thermodynamic
heat engine.
Advisors/Committee Members: Dr. Mulugeta Bekele (advisor).
Subjects/Keywords: MAXIMUM POWER;
INFORMATION THEORY
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Solomon, W. (2012). EFFICIENCY AT MAXIMUM POWER AND OPTIMIZED EFFICIENCY: AN INFORMATION THEORY APPROACH
. (Thesis). Addis Ababa University. Retrieved from http://etd.aau.edu.et/dspace/handle/123456789/1210
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Solomon, Worku. “EFFICIENCY AT MAXIMUM POWER AND OPTIMIZED EFFICIENCY: AN INFORMATION THEORY APPROACH
.” 2012. Thesis, Addis Ababa University. Accessed February 26, 2021.
http://etd.aau.edu.et/dspace/handle/123456789/1210.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Solomon, Worku. “EFFICIENCY AT MAXIMUM POWER AND OPTIMIZED EFFICIENCY: AN INFORMATION THEORY APPROACH
.” 2012. Web. 26 Feb 2021.
Vancouver:
Solomon W. EFFICIENCY AT MAXIMUM POWER AND OPTIMIZED EFFICIENCY: AN INFORMATION THEORY APPROACH
. [Internet] [Thesis]. Addis Ababa University; 2012. [cited 2021 Feb 26].
Available from: http://etd.aau.edu.et/dspace/handle/123456789/1210.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Solomon W. EFFICIENCY AT MAXIMUM POWER AND OPTIMIZED EFFICIENCY: AN INFORMATION THEORY APPROACH
. [Thesis]. Addis Ababa University; 2012. Available from: http://etd.aau.edu.et/dspace/handle/123456789/1210
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Oregon State University
15.
Pierce, Larry A.
Computing entropy for Z²-actions.
Degree: PhD, Mathematics, 2008, Oregon State University
URL: http://hdl.handle.net/1957/9318
► For a certain class of Z²-actions, we provide a proof of a conjecture that the ratio of the Perron eigenvalues of the transfer matrices of…
(more)
▼ For a certain class of Z²-actions, we provide a proof of a
conjecture that the ratio of the Perron eigenvalues of the transfer
matrices of the free boundary restrictions converge to the entropy
of that action. Also, a novel method for computing the entropy of
Z²-actions is conjectured.
Advisors/Committee Members: Burton Jr, Robert M. (advisor), Schmidt, Tom (committee member).
Subjects/Keywords: Entropy; Entropy (Information theory)
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Pierce, L. A. (2008). Computing entropy for Z²-actions. (Doctoral Dissertation). Oregon State University. Retrieved from http://hdl.handle.net/1957/9318
Chicago Manual of Style (16th Edition):
Pierce, Larry A. “Computing entropy for Z²-actions.” 2008. Doctoral Dissertation, Oregon State University. Accessed February 26, 2021.
http://hdl.handle.net/1957/9318.
MLA Handbook (7th Edition):
Pierce, Larry A. “Computing entropy for Z²-actions.” 2008. Web. 26 Feb 2021.
Vancouver:
Pierce LA. Computing entropy for Z²-actions. [Internet] [Doctoral dissertation]. Oregon State University; 2008. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/1957/9318.
Council of Science Editors:
Pierce LA. Computing entropy for Z²-actions. [Doctoral Dissertation]. Oregon State University; 2008. Available from: http://hdl.handle.net/1957/9318

Oregon State University
16.
Shirland, Larry Elwyn.
Multi-factor information theory models and their industrial applications.
Degree: PhD, Industrial Engineering, 1972, Oregon State University
URL: http://hdl.handle.net/1957/45855
► This dissertation treats information theory and its applications to the general area of decision making. Specifically, three areas are covered; (1) information theory applied to…
(more)
▼ This dissertation treats
information theory and its applications
to the general area of decision making. Specifically, three areas are
covered; (1)
information theory applied to Bayesian analysis,
(2) estimation using multi-factor
information channel models, and
(3)
information theory applied to Markov chain analysis.
A major portion of this dissertation concerns the concept of
conditional
information which occurs as the result of the transmission
of
information for an experiment (Z) when the outcomes of another
experiment (Y) are known. The gain in
information is measured by
computing the difference between the
information transmitted when one
set of values is known for an experiment, and another set obtained
when certain experimental parameters are allowed to vary. When
only one set of experimental results is available, the
information gain
is computed as the difference between the transmitted
information
under the experimental conditions and the
information transmitted
assuming complete uncertainty. The latter is characterized by the
condition which results when the events of the experiment are considered
to be equally likely.
The
information theory technique appears to be especially useful
in the area of sampling. The cost of gathering
information may be
balanced against management's willingness to pay for the
information
in order to arrive at an optimal number of events to sample for a
particular experiment.
Utilizing the concept of conditional
information and
information
gain, estimates may be made by applying a multi-factor
information
channel analysis. In order to obtain the maximum amount of
information
from a sampling experiment, it may be desired to predict the
strategies one should use. A case study is presented in which a
research questionnaire was sent to prospective customers of several
manufacturers of crushing and grinding equipment in an attempt to
determine a particular company's standing with respect to its "image"
and "progressiveness." The results of five specific questions were
analyzed by the
information theory approach in an attempt to predict
the market shares for each of five companies. The
information theory
analysis showed that each of the five questions could be used independently
as a market share predictor. This suggests that a person may
subconsciously possess a pre-conceived opinion of a company which affects his answer to a specific question about that company.
A matrix method based on the work of Muroga (1959) is presented
for solving multi-factor
information channel problems. In
order to solve a problem of this type it is easiest to first ignore the
existence of non-positive solutions and solve the
information maximization
equations accordingly. If a non-positive solution occurs, one
or more restrictions may then be imposed in order to force only
positive values on the final solution. Non-positive solutions indicate
that the maximum
information gain occurs outside the realm of permissible
values. The solution, then, involves maximizing…
Advisors/Committee Members: Inoue, M. S. (advisor).
Subjects/Keywords: Information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Shirland, L. E. (1972). Multi-factor information theory models and their industrial applications. (Doctoral Dissertation). Oregon State University. Retrieved from http://hdl.handle.net/1957/45855
Chicago Manual of Style (16th Edition):
Shirland, Larry Elwyn. “Multi-factor information theory models and their industrial applications.” 1972. Doctoral Dissertation, Oregon State University. Accessed February 26, 2021.
http://hdl.handle.net/1957/45855.
MLA Handbook (7th Edition):
Shirland, Larry Elwyn. “Multi-factor information theory models and their industrial applications.” 1972. Web. 26 Feb 2021.
Vancouver:
Shirland LE. Multi-factor information theory models and their industrial applications. [Internet] [Doctoral dissertation]. Oregon State University; 1972. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/1957/45855.
Council of Science Editors:
Shirland LE. Multi-factor information theory models and their industrial applications. [Doctoral Dissertation]. Oregon State University; 1972. Available from: http://hdl.handle.net/1957/45855
17.
Bunch, Trevor.
Advocating for Strategic it| Phenomenological Study of Nonprofit it Leaders.
Degree: 2018, Capella University
URL: http://pqdtopen.proquest.com/#viewpdf?dispub=10746227
► Nonprofit organizations (NPOs) lag behind their for-profit and public-sector peers in leveraging IT to satisfy a growing and diverse set of stakeholder expectations. NPO…
(more)
▼ Nonprofit organizations (NPOs) lag behind their for-profit and public-sector peers in leveraging IT to satisfy a growing and diverse set of stakeholder expectations. NPO technical debt is attributed to a lack of in-house expertise and financial resources. Despite increasing isomorphic pressures, NPOs have not integrated IT into their organizational strategic planning processes. However, how NPO IT leaders advocate for mission-enhancing IT projects remains under-represented in the literature. This phenomenological study explores the life experiences of those NPO IT leaders as they propose and execute projects within a larger portfolio of competing demands. NPO IT leaders were interviewed from 21 international development and relief service organizations. A total of 56 project experiences were extracted to identify dominant stakeholder relationships, isomorphic requirements, and resource demands. Alternating rounds of interview transcript coding and epoché memos resulted in five representative project vignettes and two leading practice stories. There were four major findings. NPO IT leadership roles are rarely filled by dedicated IT professionals; NPO IT leaders are usually dual-hatted executives. As a result, IT is not integrated into organizational strategic planning processes; NPO IT leaders are often placed in passive and reactionary positions as opposed to ones of strong advocacy. They remain dependent on financial and expertise resources, which confirms that resource dependency theory influences IT strategy. The prominence of end-user requirements in the project experiences marks a shift from previous literature; normative expectations were twice as prevalent as coercive control of funding or legitimacy when driving strategic investments. Further research in NPO IT leadership characteristics (e.g., style, dual-hatted responsibilities, and sex) and the elusiveness of measuring mission-enhancing impact of IT projects should be conducted.
Subjects/Keywords: Management; Information technology; Organization theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Bunch, T. (2018). Advocating for Strategic it| Phenomenological Study of Nonprofit it Leaders. (Thesis). Capella University. Retrieved from http://pqdtopen.proquest.com/#viewpdf?dispub=10746227
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Bunch, Trevor. “Advocating for Strategic it| Phenomenological Study of Nonprofit it Leaders.” 2018. Thesis, Capella University. Accessed February 26, 2021.
http://pqdtopen.proquest.com/#viewpdf?dispub=10746227.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Bunch, Trevor. “Advocating for Strategic it| Phenomenological Study of Nonprofit it Leaders.” 2018. Web. 26 Feb 2021.
Vancouver:
Bunch T. Advocating for Strategic it| Phenomenological Study of Nonprofit it Leaders. [Internet] [Thesis]. Capella University; 2018. [cited 2021 Feb 26].
Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10746227.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Bunch T. Advocating for Strategic it| Phenomenological Study of Nonprofit it Leaders. [Thesis]. Capella University; 2018. Available from: http://pqdtopen.proquest.com/#viewpdf?dispub=10746227
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Victoria University of Wellington
18.
Van Kuyk, Steven.
Speech Communication from an Information Theoretical Perspective.
Degree: 2019, Victoria University of Wellington
URL: http://hdl.handle.net/10063/8196
► Throughout the last century, models of human speech communication have been proposed by linguists, psychologists, and engineers. Advancements have been made, but a theory of…
(more)
▼ Throughout the last century, models of human speech communication have been proposed by linguists, psychologists, and engineers. Advancements have been made, but a
theory of human speech communication that is both comprehensive and quantitative is yet to emerge. This thesis hypothesises that a branch of mathematics known as
information theory holds the answer to a more complete
theory.
Information theory has made fundamental contributions to wireless communications, computer science, statistical inference, cryptography, thermodynamics, and biology. There is no reason that
information theory cannot be applied to human speech communication, but thus far, a relatively small effort has been made to do so.
The goal of this research was to develop a quantitative model of speech communication that is consistent with our knowledge of linguistics and that is accurate enough to predict the intelligibility of speech signals. Specifically, this thesis focuses on the following research questions: 1) how does the acoustic
information rate of speech compare to the lexical
information rate of speech? 2) How can
information theory be used to predict the intelligibility of speech-based communication systems? 3) How well do competing models of speech communication predict intelligibility?
To answer the first research question, novel approaches for estimating the
information rate of speech communication are proposed. Unlike existing approaches, the methods proposed in this thesis rely on having a chorus of speech signals where each signal in the chorus contains the same linguistic message, but is spoken by a different talker. The advantage of this approach is that variability inherent in the production of speech can be accounted for. The approach gives an estimate of about 180 b/s. This is three times larger than estimates based on lexical models, but it is an order of magnitude smaller than previous estimates that rely on acoustic signals.
To answer the second research question, a novel instrumental intelligibility metric called speech intelligibility in bits (SIIB) and a variant called SIIBGauss are proposed. SIIB is an estimate of the amount of
information shared between a talker and a listener in bits per second. Unlike existing intelligibility metrics that are based on
information theory, SIIB accounts for talker variability and statistical dependencies between time-frequency units.
Finally, to answer the third research question, a comprehensive evaluation of intrusive intelligibility metrics is provided. The results show that SIIB and SIIBGauss have state-of-the-art performance, that intelligibility metrics tend to perform poorly on data sets that were not used during their development, and show the advantage of reducing statistical dependencies between input features.
Advisors/Committee Members: Kleijn, Bastiaan, Hendriks, Richard.
Subjects/Keywords: Speech; Information theory; Intelligibility
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Van Kuyk, S. (2019). Speech Communication from an Information Theoretical Perspective. (Doctoral Dissertation). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/8196
Chicago Manual of Style (16th Edition):
Van Kuyk, Steven. “Speech Communication from an Information Theoretical Perspective.” 2019. Doctoral Dissertation, Victoria University of Wellington. Accessed February 26, 2021.
http://hdl.handle.net/10063/8196.
MLA Handbook (7th Edition):
Van Kuyk, Steven. “Speech Communication from an Information Theoretical Perspective.” 2019. Web. 26 Feb 2021.
Vancouver:
Van Kuyk S. Speech Communication from an Information Theoretical Perspective. [Internet] [Doctoral dissertation]. Victoria University of Wellington; 2019. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/10063/8196.
Council of Science Editors:
Van Kuyk S. Speech Communication from an Information Theoretical Perspective. [Doctoral Dissertation]. Victoria University of Wellington; 2019. Available from: http://hdl.handle.net/10063/8196
19.
Ireland, Forrest L.
GPU accelerated risk quantification.
Degree: MS, Computer Science, 2018, Eastern Washington University
URL: https://dc.ewu.edu/theses/497
► Factor Analysis of Information Risk (FAIR) is a standard model for quantitatively estimating cybersecurity risks and has been implemented as a sequential Monte Carlo…
(more)
▼ Factor Analysis of Information Risk (FAIR) is a standard model for quantitatively estimating cybersecurity risks and has been implemented as a sequential Monte Carlo simulation in the RiskLens and FAIR-U applications. Monte Carlo simulations employ random sampling techniques to model certain systems through the course of many iterations. Due to their sequential nature, FAIR simulations in these applications are limited in the number of iterations they can perform in a reasonable amount of time. One method that has been extensively used to speed up Monte Carlo simulations is to implement them to take advantage of the massive parallelization available when using modern Graphics Processing Units (GPUs). Such parallelized simulations have been shown to produce significant speedups, in some cases up to 3,000 times faster then the sequential versions. Due to the FAIR simulation's need for many samples from various beta distributions, three methods of generating these samples via inverse transform sampling on the GPU are investigated. One method calculates the inverse incomplete beta function directly, and the other two methods approximate this function - trading accuracy for improved parallelism. This method is then utilized in a GPU accelerated implementation of the FAIR simulation from RiskLens and FAIR-U using NVIDIA's CUDA technology.
Subjects/Keywords: Information Security; Theory and Algorithms
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Ireland, F. L. (2018). GPU accelerated risk quantification. (Thesis). Eastern Washington University. Retrieved from https://dc.ewu.edu/theses/497
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Ireland, Forrest L. “GPU accelerated risk quantification.” 2018. Thesis, Eastern Washington University. Accessed February 26, 2021.
https://dc.ewu.edu/theses/497.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Ireland, Forrest L. “GPU accelerated risk quantification.” 2018. Web. 26 Feb 2021.
Vancouver:
Ireland FL. GPU accelerated risk quantification. [Internet] [Thesis]. Eastern Washington University; 2018. [cited 2021 Feb 26].
Available from: https://dc.ewu.edu/theses/497.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Ireland FL. GPU accelerated risk quantification. [Thesis]. Eastern Washington University; 2018. Available from: https://dc.ewu.edu/theses/497
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Uppsala University
20.
Xiao, Chuye.
Information Quality under the lens of Practice Theory: A Case of Syskonstödjare (Sibling Supporters) in Sweden.
Degree: Information Systems, 2015, Uppsala University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-269823
► The awareness of having a good information quality (IQ) in organizations has been increasing in the past decades. Despite that the well-accepted definition of…
(more)
▼ The awareness of having a good information quality (IQ) in organizations has been increasing in the past decades. Despite that the well-accepted definition of information quality emphasizes the fitness of information to its consumers, IQ itself is known as context sensitive (Wang and Strong, 1996). It may be perceived differently depending on different contexts. This thesis presents a study of investigating IQ under the lens of practice theory. Practice theory intends to reveal the very idea of how the nexuses of human activities are organized (Schatzki, 2001). In this thesis, IQ was interpreted under the lens of Swidler’s perspective on practice theory specifically (2001), who stresses culture as the core that lies behind every aspect of social causation. The purpose of this study is to gain an in-depth knowledge on information quality. The empirical setting in this study is the sibling support system in Sweden, which has a rather unique organizational context as they do not have a classic top-down organizational structure and standard working procedure. The inquiry of this study focuses on three aspects; how IQ is perceived under this particular organizational context and the reasons behind it, also whether IQ is context sensitive in this type of organization. A mixed methods research was performed as the research methodology. A questionnaire was firstly sent out to the participants, and then interviews were followed up in order to obtain more detailed information. The contribution includes an account on a new perception on IQ under this specific organizational setting, and why it is perceived in such a way. Also the answer to whether IQ is context sensitive in this kind of organization is argued. Further secondary findings on the issues raised from the applied questionnaire are presented, as they are unexpectedly uncovered but worth attention for future IQ studies. This study presents a new angle of perceiving IQ, which offers certain reference value to future relevant studies.
Subjects/Keywords: Information Quality; Practice Theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Xiao, C. (2015). Information Quality under the lens of Practice Theory: A Case of Syskonstödjare (Sibling Supporters) in Sweden. (Thesis). Uppsala University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-269823
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Xiao, Chuye. “Information Quality under the lens of Practice Theory: A Case of Syskonstödjare (Sibling Supporters) in Sweden.” 2015. Thesis, Uppsala University. Accessed February 26, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-269823.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Xiao, Chuye. “Information Quality under the lens of Practice Theory: A Case of Syskonstödjare (Sibling Supporters) in Sweden.” 2015. Web. 26 Feb 2021.
Vancouver:
Xiao C. Information Quality under the lens of Practice Theory: A Case of Syskonstödjare (Sibling Supporters) in Sweden. [Internet] [Thesis]. Uppsala University; 2015. [cited 2021 Feb 26].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-269823.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Xiao C. Information Quality under the lens of Practice Theory: A Case of Syskonstödjare (Sibling Supporters) in Sweden. [Thesis]. Uppsala University; 2015. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-269823
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Notre Dame
21.
Krishnan Padmanabhan.
Multi-User Communication over Wireless Channels with Unknown
Fading</h1>.
Degree: Electrical Engineering, 2011, University of Notre Dame
URL: https://curate.nd.edu/show/tb09j388g71
► This dissertation studies different aspects of multi-user wireless communication over channels with unknown fading. The first part of the dissertation presents a practicable successive…
(more)
▼ This dissertation studies different aspects
of multi-user wireless communication over channels with unknown
fading. The first part of the dissertation presents a practicable
successive decoding strategy for a multiple access channel with N
users and K receive antennas and independent Rayleigh flat-fading
between the transmitter receiver pairs. The receiver has access to
the received signals from all the antennas and there is no channel
side
information. An optimal receiver is presented and various
simplified receiver schemes are proposed whose achievable rate is
very close to the constrained capacity for both block fading and
correlated fading models. A rate-splitting algorithm is developed
that equalizes the individual user rates without diminishing the
sum rate of the system. The
second part of the dissertation presents analytical upper and lower
bounds on the
information rate of a multiuser Rayleigh fading
channel with no Channel State
Information (CSI) at the transmitters
or the receivers. These bounds are shown to converge whenever an
individual user’s data rate is small compared with the bandwidth,
e.g., when users can employ CDMA. The amount of spreading required
for a given degree of convergence depends on the number of receive
antennas. The number of users can be sufficient for the aggregate
spectral density to be large. Exact analytical expressions for the
information rates of both the block fading and the continuous
correlated fading channel models in this regime are presented.
Finally, the results are extended to more general channel models.
The third part of the
dissertation presents asymptotic results on the capacity of growing
wireless networks. This part considers a very general system model
for a large wireless network which subsumes a variety of practical
networking scenarios including networks with relays. The
transmitters and receivers are distributed through space (in two or
three dimensions) and the channels between any transmitter receiver
pair are non-coherent Rayleigh block fading channels. The
transmitters are allowed to design their codebooks jointly even
though their data is independent. The received signals are
attenuated by path loss which is polynomial with distance. The
receivers in the system are allowed to cooperate completely by
sending the received signals to a central decoder which can jointly
decode the transmitted symbols. Under this very general system
model, the per user capacity of the growing network is shown to go
to zero unless the system bandwidth or the coherence time is
increasing. We present necessary and sufficient conditions on how
the channel coherence time and the system bandwidth must vary for
capacity to be non vanishing. These results are fundamental and
result from the randomness of the fading present in the network
rather than any peculiarities in the system
model.
Advisors/Committee Members: Dr. Daniel Costello, Committee Member, Dr. Thomas Fuja, Committee Chair, Dr. Ken Sauer, Committee Member, Dr. Yih-Fang Huang, Committee Member.
Subjects/Keywords: information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Padmanabhan, K. (2011). Multi-User Communication over Wireless Channels with Unknown
Fading</h1>. (Thesis). University of Notre Dame. Retrieved from https://curate.nd.edu/show/tb09j388g71
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Padmanabhan, Krishnan. “Multi-User Communication over Wireless Channels with Unknown
Fading</h1>.” 2011. Thesis, University of Notre Dame. Accessed February 26, 2021.
https://curate.nd.edu/show/tb09j388g71.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Padmanabhan, Krishnan. “Multi-User Communication over Wireless Channels with Unknown
Fading</h1>.” 2011. Web. 26 Feb 2021.
Vancouver:
Padmanabhan K. Multi-User Communication over Wireless Channels with Unknown
Fading</h1>. [Internet] [Thesis]. University of Notre Dame; 2011. [cited 2021 Feb 26].
Available from: https://curate.nd.edu/show/tb09j388g71.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Padmanabhan K. Multi-User Communication over Wireless Channels with Unknown
Fading</h1>. [Thesis]. University of Notre Dame; 2011. Available from: https://curate.nd.edu/show/tb09j388g71
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Illinois – Urbana-Champaign
22.
Moon, Jun.
Control and estimation with limited information: a game-theoretic approach.
Degree: PhD, Electrical & Computer Engineering, 2015, University of Illinois – Urbana-Champaign
URL: http://hdl.handle.net/2142/88941
► Modern control systems can be viewed as interconnections of spatially distributed multiple subsystems, where the individual subsystems share their information with each other through an…
(more)
▼ Modern control systems can be viewed as interconnections of spatially distributed multiple subsystems, where the individual subsystems share their
information with each other through an underlying network that inherently introduces limitations on
information flow. Inherent limitations on the flow of
information among individual subsystems may stem from structural constraints of the network and/or communication constraints of the network. Hence, in order to design optimal control and estimation mechanisms for modern control systems, we must answer the following two practical but important questions:
(1) What are the fundamental communication limits to achieve a desired control performance and stability?
(2) What are the approaches one has to adopt to design a decentralized controller for a complex system to deal with structural constraints?
In this thesis, we consider four different problems within a game-theoretic framework to address the above questions.
The first part of the thesis considers problems of control and estimation with limited communication, which correspond to question (1) above.
We first consider the minimax estimation problem with intermittent observations. In this setting, the disturbance in the dynamical system as well as the sensor noise are controlled by adversaries, and the estimator receives the sensor measurements only sporadically, with availability governed by an independent and identically distributed (i.i.d.) Bernoulli process. This problem is cast in the thesis within the framework of stochastic zero-sum dynamic games. First, a corresponding stochastic minimax state estimator (SMSE) is obtained, along with an associated generalized stochastic Riccati equation (GSRE). Then, the asymptotic behavior of the estimation error in terms of the GSRE is analyzed. We obtain threshold-type conditions on the rate of intermittent observations and the disturbance attenuation parameter, above which 1) the expected value of the GSRE is bounded from below and above by deterministic quantities, and 2) the norm of the sequence generated by the GSRE converges weakly to a unique stationary distribution.
We then study the minimax control problem over unreliable communication channels. The transmission of packets from the plant output sensors to the controller, and from the controller to the plant, are over sporadically failing channels governed by two independent i.i.d. Bernoulli processes. Two different scenarios for unreliable communication channels are considered. The first one is when the communication channel provides perfect acknowledgments of successful transmissions of control packets through a clean reverse channel, which is the TCP (Transmission Control Protocol), and the second one is when there is no acknowledgment, which is the UDP (User Datagram Protocol). Under both scenarios, the thesis obtains output feedback minimax controllers; it also identifies a set of explicit existence conditions in terms of the disturbance attenuation parameter and the communication channel loss…
Advisors/Committee Members: Basar, Tamer (advisor), Basar, Tamer (Committee Chair), Belabbas, Mohamed Ali (committee member), Dullerud, Geir (committee member), Hajek, Bruce (committee member).
Subjects/Keywords: Game Theory; Limited Information
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Moon, J. (2015). Control and estimation with limited information: a game-theoretic approach. (Doctoral Dissertation). University of Illinois – Urbana-Champaign. Retrieved from http://hdl.handle.net/2142/88941
Chicago Manual of Style (16th Edition):
Moon, Jun. “Control and estimation with limited information: a game-theoretic approach.” 2015. Doctoral Dissertation, University of Illinois – Urbana-Champaign. Accessed February 26, 2021.
http://hdl.handle.net/2142/88941.
MLA Handbook (7th Edition):
Moon, Jun. “Control and estimation with limited information: a game-theoretic approach.” 2015. Web. 26 Feb 2021.
Vancouver:
Moon J. Control and estimation with limited information: a game-theoretic approach. [Internet] [Doctoral dissertation]. University of Illinois – Urbana-Champaign; 2015. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/2142/88941.
Council of Science Editors:
Moon J. Control and estimation with limited information: a game-theoretic approach. [Doctoral Dissertation]. University of Illinois – Urbana-Champaign; 2015. Available from: http://hdl.handle.net/2142/88941

University of Melbourne
23.
SAMARASINGHE, THARAKA.
Opportunistic beamforming in wireless networks: optimal selective feedback policies and the feedback-capacity tradeoff.
Degree: 2012, University of Melbourne
URL: http://hdl.handle.net/11343/37736
► Opportunistic beamforming is a reduced feedback communication strategy for vector broadcast channels which only requires partial channel state information (CSI) at the base station for…
(more)
▼ Opportunistic beamforming is a reduced feedback communication strategy for vector broadcast channels which only requires partial channel state information (CSI) at the base station for its operation. Although reducing feedback, this strategy, in its plain implementations, displays a linear growth in the feedback load with the total number of users in the system, which can be an onerous requirement for large systems. This impracticality motivates the use of selective feedback techniques in which only the users with good channels are allowed to feedback. In this thesis, we focus on a more stringent but practical finite limit on the feedback load, and we study the structure of the sum-rate maximizing decentralized selective feedback policies, and how the resulting sum-rate compare to the sum-rate without any user selection.
Firstly, we set up the problem of finding the structure of downlink sum-rate maximizing selective decentralized feedback policies for opportunistic beamforming under finite feedback constraints on the average number of mobile users feeding back. We show that any sum-rate maximizing selective decentralized feedback policy must be a threshold feedback policy. This result holds for most practical fading channel models.
Then, the resulting optimum threshold selection problem is analyzed in detail. This is a non-convex optimization problem over finite dimensional Euclidean spaces. By utilizing the theory of majorization, an underlying Schur-concave structure in the sum-rate function is identified, and the sufficient conditions for the optimality of homogenous threshold feedback policies are obtained. Applications of these results are illustrated for well known fading channel models such as Rayleigh, Nakagami and Rician fading channels, along with various engineering and design insights. Rather surprisingly, it is shown that using the same threshold value at all mobile users is not always a rate-wise optimal feedback strategy, even for a network with statistically identical mobile users. For the Rayleigh fading channel model, on the other hand, homogenous threshold feedback policies are proven to be rate-wise optimal if multiple orthonormal data carrying beams are used to communicate with multiple mobile users simultaneously.
Having established the optimality of a homogenous threshold for a multi-beam Rayleigh fading environment, we then analyze the derivation of these optimum policies which ensure a O (1) feedback constraint as the number of users grows large. Starting with a set of statistically identical users, we obtain the tradeoff curve tracing the Pareto optimal boundary between feasible and infeasible feedback-capacity pairs for opportunistic beamforming. Any point on this tradeoff curve can be obtained by means of the derived threshold feedback policies, which are rate-wise optimal. We further show to what extent the O (1) feedback constraint must be relaxed to…
Subjects/Keywords: wireless communications; information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
SAMARASINGHE, T. (2012). Opportunistic beamforming in wireless networks: optimal selective feedback policies and the feedback-capacity tradeoff. (Doctoral Dissertation). University of Melbourne. Retrieved from http://hdl.handle.net/11343/37736
Chicago Manual of Style (16th Edition):
SAMARASINGHE, THARAKA. “Opportunistic beamforming in wireless networks: optimal selective feedback policies and the feedback-capacity tradeoff.” 2012. Doctoral Dissertation, University of Melbourne. Accessed February 26, 2021.
http://hdl.handle.net/11343/37736.
MLA Handbook (7th Edition):
SAMARASINGHE, THARAKA. “Opportunistic beamforming in wireless networks: optimal selective feedback policies and the feedback-capacity tradeoff.” 2012. Web. 26 Feb 2021.
Vancouver:
SAMARASINGHE T. Opportunistic beamforming in wireless networks: optimal selective feedback policies and the feedback-capacity tradeoff. [Internet] [Doctoral dissertation]. University of Melbourne; 2012. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/11343/37736.
Council of Science Editors:
SAMARASINGHE T. Opportunistic beamforming in wireless networks: optimal selective feedback policies and the feedback-capacity tradeoff. [Doctoral Dissertation]. University of Melbourne; 2012. Available from: http://hdl.handle.net/11343/37736

University of Hawaii – Manoa
24.
Perry, Patrick.
The expected value for the probability of an undetected error using a linear code over an unknown binary symmetric channel.
Degree: MS, 2011, University of Hawaii – Manoa
URL: http://hdl.handle.net/10125/20564
► vii, 51 leaves, bound ill. 29 cm
The expected value for the probability of an undetected error for a linear code over the binary symmetric…
(more)
▼ vii, 51 leaves, bound ill. 29 cm
The expected value for the probability of an undetected error for a linear code over the binary symmetric channel, with p being a continuous random variable, is calculated. The random variable p is assumed to be from the interval [0, 1/2] or the interval [0, 1], with uniform distributions and beta distributions being used. Simple conditions on the weight enumerator of the code and its dual code are given to minimize the expected value for the probability of an undetected error. A necessary condition for good error detection is presented based on the expected value for the probability of an undetected error. Several new identities relating the weight enumerators of a code and its dual are obtained. Examples with [23,12] codes, with the family of [22,11] self-dual codes, and with the family of [32,16] self-dual codes are evaluated with respect to error detection.
Subjects/Keywords: Error-correcting codes (Information theory)
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Perry, P. (2011). The expected value for the probability of an undetected error using a linear code over an unknown binary symmetric channel. (Masters Thesis). University of Hawaii – Manoa. Retrieved from http://hdl.handle.net/10125/20564
Chicago Manual of Style (16th Edition):
Perry, Patrick. “The expected value for the probability of an undetected error using a linear code over an unknown binary symmetric channel.” 2011. Masters Thesis, University of Hawaii – Manoa. Accessed February 26, 2021.
http://hdl.handle.net/10125/20564.
MLA Handbook (7th Edition):
Perry, Patrick. “The expected value for the probability of an undetected error using a linear code over an unknown binary symmetric channel.” 2011. Web. 26 Feb 2021.
Vancouver:
Perry P. The expected value for the probability of an undetected error using a linear code over an unknown binary symmetric channel. [Internet] [Masters thesis]. University of Hawaii – Manoa; 2011. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/10125/20564.
Council of Science Editors:
Perry P. The expected value for the probability of an undetected error using a linear code over an unknown binary symmetric channel. [Masters Thesis]. University of Hawaii – Manoa; 2011. Available from: http://hdl.handle.net/10125/20564

Georgia Tech
25.
Stapleton, Morgan Lee.
A methodology utilizing semantic information measures for conversational or dialogue experiments.
Degree: PhD, Information Science, 1974, Georgia Tech
URL: http://hdl.handle.net/1853/8288
Subjects/Keywords: Information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Stapleton, M. L. (1974). A methodology utilizing semantic information measures for conversational or dialogue experiments. (Doctoral Dissertation). Georgia Tech. Retrieved from http://hdl.handle.net/1853/8288
Chicago Manual of Style (16th Edition):
Stapleton, Morgan Lee. “A methodology utilizing semantic information measures for conversational or dialogue experiments.” 1974. Doctoral Dissertation, Georgia Tech. Accessed February 26, 2021.
http://hdl.handle.net/1853/8288.
MLA Handbook (7th Edition):
Stapleton, Morgan Lee. “A methodology utilizing semantic information measures for conversational or dialogue experiments.” 1974. Web. 26 Feb 2021.
Vancouver:
Stapleton ML. A methodology utilizing semantic information measures for conversational or dialogue experiments. [Internet] [Doctoral dissertation]. Georgia Tech; 1974. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/1853/8288.
Council of Science Editors:
Stapleton ML. A methodology utilizing semantic information measures for conversational or dialogue experiments. [Doctoral Dissertation]. Georgia Tech; 1974. Available from: http://hdl.handle.net/1853/8288

University of Waterloo
26.
Moshksar, Kamyar.
On Asynchronous Interference Channels.
Degree: 2016, University of Waterloo
URL: http://hdl.handle.net/10012/11074
► In the first part of the thesis, a decentralized wireless network of separate transmitter-receiver pairs is studied where there is no central controller to assign…
(more)
▼ In the first part of the thesis, a decentralized wireless network of separate transmitter-receiver pairs is studied where there is no central controller to assign the resources to the users and users do not explicitly cooperate. For simplicity, we focus on a
single-burst scenario where each transmitter sends a single codeword upon activation and remains silent afterwards. Users are block-asynchronous meaning there exists a mutual delay between their transmitted codewords.
We show how the receivers learn about the number of active users, channel coefficients and activation times of the transmitters using piecewise linear regression. It is essential that each receiver fi nds the exact arrival time of the codeword sent by its
corresponding transmitter. To achieve this goal, preamble sequences are embedded at the beginning of a transmitted codeword. As different users do not necessarily know each other's preamble sequences, there is no guarantee that a receiver can estimate
the arrival times of interference bursts along its desired data with vanishingly small probability of error. Nevertheless, the estimates are reliable enough to guarantee successful decoding at each receiver.
The second part of the thesis addresses a Gaussian interference channel with two transmitter-receiver (Tx-Rx) pairs under stochastic data arrival (GIC-SDA). Information bits arrive at the transmitters according to independent and asynchronous Bernoulli processes (Tx-Tx~asynchrony). Each information source turns off after generating a given total number of bits. The transmissions are asynchronous (Tx-Rx~asynchrony) in the sense that each Tx sends a codeword to its Rx immediately after there are enough bits available in its buffer. Such asynchronous style of transmission is shown to significantly reduce the transmission delay in comparison with the existing Tx-Rx synchronous transmission schemes. The receivers learn about the activity frames of both transmitters by employing sequential joint-typicality detection. As a consequence, the GIC-SDA under Tx-Rx asynchrony is represented by a standard GIC with state known at the receivers. The cardinality of the state space is \binom{2N1+2N2}{2N2} in which N1, N2 are the numbers of transmitted codewords by the two transmitters. Each realization of the state imposes two sets of constraints on N1, N2 referred to as the geometric and reliability constraints. In a scenario where the transmitters are only aware of the statistics of Tx-Tx~asynchrony, it is shown how one designs N1,N2 to achieve target transmission rates for both users and minimize the probability of unsuccessful decoding. An achievable region is characterized for the codebook rates in a two-user GIC-SDA under the requirements that the transmissions be immediate and the receivers treat interference as noise. This region is described as the union of uncountably many polyhedrons and is in general disconnected and non-convex due to infeasibility of time-sharing. Special attention is given to the symmetric case where…
Subjects/Keywords: Information Theory; Interference Channels; Asynchrony
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Moshksar, K. (2016). On Asynchronous Interference Channels. (Thesis). University of Waterloo. Retrieved from http://hdl.handle.net/10012/11074
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Moshksar, Kamyar. “On Asynchronous Interference Channels.” 2016. Thesis, University of Waterloo. Accessed February 26, 2021.
http://hdl.handle.net/10012/11074.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Moshksar, Kamyar. “On Asynchronous Interference Channels.” 2016. Web. 26 Feb 2021.
Vancouver:
Moshksar K. On Asynchronous Interference Channels. [Internet] [Thesis]. University of Waterloo; 2016. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/10012/11074.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Moshksar K. On Asynchronous Interference Channels. [Thesis]. University of Waterloo; 2016. Available from: http://hdl.handle.net/10012/11074
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Louisiana State University
27.
Roy Bardhan, Bhaskar.
Topics in Quantum Metrology, Control, and Communications.
Degree: PhD, Physical Sciences and Mathematics, 2014, Louisiana State University
URL: etd-10052014-073714
;
https://digitalcommons.lsu.edu/gradschool_dissertations/3752
► Noise present in an environment has significant impacts on a quantum system affecting properties like coherence, entanglement and other metrological features of a quantum state.…
(more)
▼ Noise present in an environment has significant impacts on a quantum system affecting properties like coherence, entanglement and other metrological features of a quantum state. In this dissertation, we address the effects of different types of noise that are present in a communication channel (or medium) and an interferometric setup, and analyze their effects in the contexts of preserving coherence and entanglement, phase sensitivity, and limits on rate of communication through noisy channels. We first consider quantum optical phase estimation in quantum metrology when phase fluctuations are introduced in the system by its interaction with a noisy environment. By considering path-entangled dual-mode photon Fock states in a Mach-Zehnder optical interferometric configuration, we show that such phase fluctuations affect phase sensitivity and visibility by adding noise to the phase to be estimated. We also demonstrate that the optimal detection strategy for estimating a phase in the presence of such phase noise is provided by the parity detection scheme. We then investigate the random birefringent noise present in an optical fiber affecting the coherence properties of a single photon polarization qubit propagating through it. We show that a simple but effective control technique, called dynamical decoupling, can be used to suppress the effects of the dephasing noise, thereby preserving its ability to carry the encoded quantum information in a long-distance optical fiber communication system. Optical amplifiers and attenuators can also add noise to an entangled quantum system, deteriorating the non-classical properties of the state. We show this by considering a two-mode squeezed vacuum state, which is a Gaussian entangled state, propagating through a noisy medium, and characterizing the loss of entanglement in the covariance matrix and the symplectic formalism for this state. Finally, we discuss limits on the rate of communication in the context of sending messages through noisy optical quantum communication channels. In particular, we prove that a strong converse theorem holds under a maximum photon number constraint for these channels, guaranteeing that the success probability in decoding the message vanishes in the asymptotic limit for the rate exceeding the capacity of the channels.
Subjects/Keywords: Quantum optics; Quantum information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Roy Bardhan, B. (2014). Topics in Quantum Metrology, Control, and Communications. (Doctoral Dissertation). Louisiana State University. Retrieved from etd-10052014-073714 ; https://digitalcommons.lsu.edu/gradschool_dissertations/3752
Chicago Manual of Style (16th Edition):
Roy Bardhan, Bhaskar. “Topics in Quantum Metrology, Control, and Communications.” 2014. Doctoral Dissertation, Louisiana State University. Accessed February 26, 2021.
etd-10052014-073714 ; https://digitalcommons.lsu.edu/gradschool_dissertations/3752.
MLA Handbook (7th Edition):
Roy Bardhan, Bhaskar. “Topics in Quantum Metrology, Control, and Communications.” 2014. Web. 26 Feb 2021.
Vancouver:
Roy Bardhan B. Topics in Quantum Metrology, Control, and Communications. [Internet] [Doctoral dissertation]. Louisiana State University; 2014. [cited 2021 Feb 26].
Available from: etd-10052014-073714 ; https://digitalcommons.lsu.edu/gradschool_dissertations/3752.
Council of Science Editors:
Roy Bardhan B. Topics in Quantum Metrology, Control, and Communications. [Doctoral Dissertation]. Louisiana State University; 2014. Available from: etd-10052014-073714 ; https://digitalcommons.lsu.edu/gradschool_dissertations/3752

University of British Columbia
28.
Reader, William Roland.
Coding for signals with occasional transients.
Degree: Master of Applied Science - MASc, Electrical and Computer Engineering, 1962, University of British Columbia
URL: http://hdl.handle.net/2429/38876
► This investigation is concerned with improvements that can be made in communication systems to enable them to transmit efficiently signals containing occasional transient. A method…
(more)
▼ This investigation is concerned with improvements that can be made in communication systems to enable them to transmit efficiently signals containing occasional transient.
A method of improving delta modulation by the use of variable step size is discussed in detail and the design and construction of a suitable coder and step size control unit are described.
The results of tests made on the equipment constructed are given. From these results it is concluded that considerably better response to sudden large changes in input signal can be obtained with only slight deterioration in the performance under normal conditions of input signal. The method used to effect this improvement is applicable to more complex modulation schemes.
Subjects/Keywords: Information theory
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Reader, W. R. (1962). Coding for signals with occasional transients. (Masters Thesis). University of British Columbia. Retrieved from http://hdl.handle.net/2429/38876
Chicago Manual of Style (16th Edition):
Reader, William Roland. “Coding for signals with occasional transients.” 1962. Masters Thesis, University of British Columbia. Accessed February 26, 2021.
http://hdl.handle.net/2429/38876.
MLA Handbook (7th Edition):
Reader, William Roland. “Coding for signals with occasional transients.” 1962. Web. 26 Feb 2021.
Vancouver:
Reader WR. Coding for signals with occasional transients. [Internet] [Masters thesis]. University of British Columbia; 1962. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/2429/38876.
Council of Science Editors:
Reader WR. Coding for signals with occasional transients. [Masters Thesis]. University of British Columbia; 1962. Available from: http://hdl.handle.net/2429/38876

University of Texas – Austin
29.
Sendrowski, Alicia Paige.
Are you part of the network? : characterizing process couplings and feedbacks in a river delta using information theory.
Degree: MSin Engineering, Environmental and Water Resources Engineering, 2015, University of Texas – Austin
URL: http://hdl.handle.net/2152/31782
► River deltas are highly interconnected systems consisting of channels and inter-channel islands. They result from complex interactions between fluxes of water, sediment, nutrients, energy, and…
(more)
▼ River deltas are highly interconnected systems consisting of channels and inter-channel islands. They result from complex interactions between fluxes of water, sediment, nutrients, energy, and biota. Given the importance of deltas in a social, economic, and ecological context, the understanding of delta function and evolution is of utmost importance. This work aims to use statistical methods to gain insights into delta system processes across spatial and temporal scales. Specifically, understanding the effect of discharge, wind, and tidal forcing on delta variables is a key question. An
information theoretic approach was used to identify environmental controls on island and channel inundation, and channel turbidities, in Wax Lake Delta, a naturally prograding delta in coastal Louisiana, USA. Continuous water level data were collected on the islands during summer 2014 and in the channels during winter 2014. Channel turbidities were also collected in winter 2014.
Information theory statistics, such as transfer entropy and mutual
information, were calculated for all variables to characterize controls on depth and turbidity in terms of strength, direction, and scale. Discharge, wind, and tidal forcing were found to be very dependent on spatial location in the delta. The more upstream locations see increasing influence from discharge in both islands and channels, with tidal influence increasing downstream. Channels are less affected by tides than islands. Wind influence is more complex and varies across space and time for both water level and turbidity. Recalculating
information theory metrics under conditions of low and high discharge reveals a higher tidal influence in low flows and a higher wind influence during high flows. The implications for this work are the future construction of a process network, which will show the major flow paths of energy, water, sediments, and nutrients through the system, leading to enhanced metrics that aid in delta system restoration.
Advisors/Committee Members: Passlacqua, Paola (advisor), Gilbert, Robert (committee member).
Subjects/Keywords: Delta; Information theory; Networks
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Sendrowski, A. P. (2015). Are you part of the network? : characterizing process couplings and feedbacks in a river delta using information theory. (Masters Thesis). University of Texas – Austin. Retrieved from http://hdl.handle.net/2152/31782
Chicago Manual of Style (16th Edition):
Sendrowski, Alicia Paige. “Are you part of the network? : characterizing process couplings and feedbacks in a river delta using information theory.” 2015. Masters Thesis, University of Texas – Austin. Accessed February 26, 2021.
http://hdl.handle.net/2152/31782.
MLA Handbook (7th Edition):
Sendrowski, Alicia Paige. “Are you part of the network? : characterizing process couplings and feedbacks in a river delta using information theory.” 2015. Web. 26 Feb 2021.
Vancouver:
Sendrowski AP. Are you part of the network? : characterizing process couplings and feedbacks in a river delta using information theory. [Internet] [Masters thesis]. University of Texas – Austin; 2015. [cited 2021 Feb 26].
Available from: http://hdl.handle.net/2152/31782.
Council of Science Editors:
Sendrowski AP. Are you part of the network? : characterizing process couplings and feedbacks in a river delta using information theory. [Masters Thesis]. University of Texas – Austin; 2015. Available from: http://hdl.handle.net/2152/31782

Delft University of Technology
30.
López Domínguez, Erick (author).
Information as a product: Bridging the gap between BIM technical and social solutions in projects for O&M purposes.
Degree: 2020, Delft University of Technology
URL: http://resolver.tudelft.nl/uuid:04c012e3-38d9-4561-97e9-134cbcc45c8a
► The Architecture, Engineering, Construction and Operations (AECO) industry is in constant need of processes and standards that allow it to deliver projects within budget, time,…
(more)
▼ The Architecture, Engineering, Construction and Operations (AECO) industry is in constant need of processes and standards that allow it to deliver projects within budget, time, and quality. A strategy that has helped to get closer to this goal is the implementation of Building Information Modelling (BIM). Adoption of BIM-related technologies is mostly limited to architecture, engineering, and construction (AEC) actors, who handover the collection of design and construction data for the client but retrieving data from BIM models for operations and maintenance (O&M) activities is not as common as desired but it offers great potential to perform and support activities such as Assessment and Monitoring, Documentation, Emergency Management, Energy and Space Management, and Maintenance of Service Information. Processes, standards, and formats for integrating information about Operations and Maintenance in the design phase have been conceptually developed with a technical dimension approach toward activities, information, and solutions. Given that BIM is a socio-technical system, solutions must also consider a social perspective. For this reason, Activity Theory is used to analyse maintenance activities, their origin, elements related, and processes involved in their performance and, more specifically, their definition. The established theoretical lens considers information as the main product to deliver instead of a by-product of the models’ deliverables. Thus, it was determined, through a literature review, exploratory interviews, semi-structured interviews and the aforementioned analysis, that the integration of O&M personnel is not only usually late along the information lifecycle of an asset’s life, but that the required attributes that provide the necessary information to asset managers to perform their tasks are not even considered early enough in the project, commonly when it is already handed over. Integration of these actors along the already established processes is encouraged to ensure the information will not only be produced and transferred as required, but it will also be useful for other purposes that are included in the documentation of the project.
Civil Engineering | Construction Management and Engineering
Advisors/Committee Members: Chan, P.W.C. (mentor), Lousberg, L.H.M.J. (mentor), LIU, Y. (graduation committee), Delft University of Technology (degree granting institution).
Subjects/Keywords: BIM; information; activity theory; handover
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
López Domínguez, E. (. (2020). Information as a product: Bridging the gap between BIM technical and social solutions in projects for O&M purposes. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:04c012e3-38d9-4561-97e9-134cbcc45c8a
Chicago Manual of Style (16th Edition):
López Domínguez, Erick (author). “Information as a product: Bridging the gap between BIM technical and social solutions in projects for O&M purposes.” 2020. Masters Thesis, Delft University of Technology. Accessed February 26, 2021.
http://resolver.tudelft.nl/uuid:04c012e3-38d9-4561-97e9-134cbcc45c8a.
MLA Handbook (7th Edition):
López Domínguez, Erick (author). “Information as a product: Bridging the gap between BIM technical and social solutions in projects for O&M purposes.” 2020. Web. 26 Feb 2021.
Vancouver:
López Domínguez E(. Information as a product: Bridging the gap between BIM technical and social solutions in projects for O&M purposes. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2021 Feb 26].
Available from: http://resolver.tudelft.nl/uuid:04c012e3-38d9-4561-97e9-134cbcc45c8a.
Council of Science Editors:
López Domínguez E(. Information as a product: Bridging the gap between BIM technical and social solutions in projects for O&M purposes. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:04c012e3-38d9-4561-97e9-134cbcc45c8a
◁ [1] [2] [3] [4] [5] … [101] ▶
.