Capacity Estimation of Non-Synchronous Covert Channels

Size: px
Start display at page:

Download "Capacity Estimation of Non-Synchronous Covert Channels"

Transcription

1 Capacty Estmaton of on-ynchronous s Zhenghong Wang and uby B. Lee Department of Electrcal Engneerng Prnceton Unversty {zhenghon,rblee}@prnceton.edu Abstract Capacty estmaton s an mportant part of covert channel analyss. It measures the severty of a covert channel by estmatng the maxmum nformaton rate attanable over t. Tradtonal capacty estmaton methods usually calculate the channel capacty based on a synchronous model, assumng that the channel s synchronous or there are mechansms that can be utlzed to synchronze the transmsson. The overhead for synchronzaton s gnored. In ths paper we argue that covert channels n general are non-synchronous and the overhead for synchronzaton s not neglgble. Instead of assumng a synchronous model, we propose to use the deletonnserton channel as a more general bass of capacty estmaton. Capacty estmaton s extended to be able to evaluate the overhead for overcomng nonsynchronous effects. Our study shows that relable communcaton over a non-synchronous channel s stll possble even wthout synchronzaton mechansms. uch non-synchronzed communcatons, however, are not as effectve as the synchronzed ones. The capacty degradaton due to the non-synchronous effects s derved. A tght upper bound of the capacty of synchronzed channels s also gven.. Introducton A covert channel s a communcaton channel that s nether desgned nor ntended to transfer nformaton at all []. Wth "legtmate" use of shared resources and operatons of a system, t allows leakage of senstve or prvate nformaton. Though usually slow, covert channels have been regarded as a serous rsk to data securty n computer systems and networks. The atonal Computer ecurty Center (CC) has ncluded the Analyss (CCA) as an mportant set n ts Trusted Computer ystem Evaluaton Crtera (TCEC). The severty of a covert channel s often measured n terms of how fast t can transmt nformaton. Mllen frst establshed a connecton between hannon s theory of communcatons and nformaton flow models [5]. The term capacty s borrowed from hannon s theory and s used as a synonym of the maxmum nformaton rate that could be acheved over a covert channel. Usng hannon s theory, a communcaton channel s often modeled as a mappng from the nput symbol space to the output symbol space. The capacty s then derved by maxmzng the mutual nformaton over the dstrbuton of the nput symbol space. uch a model however, mples a synchronous channel model: for each nput symbol, the channel always generates an output symbol n response. In other words, a transmtted symbol may be corrupted by nose, but t wll never get lost and the recever wll never receve extra symbols. There are also other ways to measure the capacty of a covert channel, e.g., the nformal method descrbed n [3]. Although dfferent methods other than hannon s nformaton theory are used n these methods, the synchronous property s also assumed ether explctly or mplctly. Assumng a synchronous model n communcaton systems s usually not a problem. Most communcaton systems are desgned to avod symbol loss and/or nserton wth lttle or no overhead. Ths concluson s not true for covert channels, however. Frst, there s usually no handy mechansm avalable for synchronzaton snce t s not desgned for nformaton transfer. econd, n systems where covert channels are a concern, the ncreasng awareness of covert channels has pushed the desgners to make the covert channels harder to explot. Ths may make the synchronzaton problem more severe. In ths paper, we focus our dscusson on capacty estmaton based on a non-synchronous channel model. We try to answer questons on the exstence, capacty and mechansms for covert communcatons over nonsynchronous channels. The rest of ths paper s organzed as follows. elated past work are revewed n secton. In secton 3, we model non-synchronous channels as deletonnserton channels. Capacty bounds of deleton-

2 Fgure. ynchronzaton mechansm usng two synchronzaton varables nserton channels are gven n secton 4. The synchronzed form of communcaton and possble synchronzaton mechansms are studed. Capacty degradaton due to synchronzaton overhead s also shown. In secton 5 we draw our conclusons.. elated work The noton of covert communcaton was frst ntroduced n []. It was then defned and analyzed n [][6]-[9]. Currently research n covert channels focuses on four dscplnes: covert channel dentfcaton, covert channel capacty estmaton, covert channel handlng and covert channel mtgaton. In measurng the sgnfcance of a covert channel, Mllen frst establshed a connecton between hannon s theory of communcatons and nformaton flow models [5]. The term channel capacty s borrowed from hannon s theory whch stands for the maxmum nformaton rate that could be acheved over a covert channel. In 989, Mllen modeled an mportant class of covert channels as fnte state machnes [5]. The covert channels that are noseless and have nonunform transton tmes are studed. Usng hannon s theory, he derved the channel capacty of such covert channels. Moskowtz [0] studed a class of covert channels that s dscrete, noseless and memoryless, called the mple Tmng Channels (TC) n 994. The capactes of such covert channels can be regarded as an upper bound for more complcated channels and may gve a worst case scenaro. The bounds of capactes of such channels were derved. In 996, he analyzed a class of covert tmng channel, called the tmed Z-channel, and showed the bound on ts capacty []. Comprehensve nformaton and examples about covert channel analyss can be found n Vrgl Glgor s Analyss gudelne [3] and McHugh s Analyss chapter [4]. Fgure. Inserton-Deleton channel wth probabltes P d, P, P t and P s, of deletons, nsertons, transmssons and substtutons. 3. on-synchronous covert channels 3.. Overvew Covert channels are often very dfferent from normal communcaton channels. Frst of all, unlke communcaton systems where synchronzaton s often specfcally desgned for relable and effcent communcaton, synchronzaton mechansms are usually not avalable for covert channels. econdly, n covert channels the communcatng partes often have lmted or even no control n choosng the proper tme to perform an operaton, e.g., send a symbol to the channel or sample the channel to receve a symbol, whch s not a problem n normal communcaton channels. Below s an example. Consder a unprocessor system where the communcatng subjects are processes. To transmt a symbol, the sender has to make a change n the system and the recever receves t by detectng the change. As there s only one CPU n the system, at any tme only one of the two processes can be actve. In other words, the sender has to relnqush the CPU after t sends a symbol so that the recever can get the CPU to read the symbol. In most operatng systems, the scheduler determnes when and who can gan the CPU. Dependng on the schedulng algorthm, t s very lkely that the sender s woken up twce wthout the recever beng able to run n between, or the recever s woken up twce wthout the sender beng able to run n between. In the former case a symbol s dropped whle n the later case an extra symbol s nserted. Fnally, coherent tme references are often unavalable n covert channels. Tme references are known as key components n explotng many covert tmng channels. Furthermore, as long as the local tmers at the two sdes of the channel are coherent enough, t s not dffcult to synchronze operatons performed by the sender and the recever. Beng aware of these facts, hgh assurance systems have made efforts to remove event sources that can serve as such tme references to user processes.

3 In summary, covert channels are nherently nonsynchronous n general, although there may be some exceptons. 3.. Capacty degradaton Though the operatons of sendng and recevng symbols are non-synchronous n most covert channels, one may stll synchronze the symbol transmsson wth certan technques. Fgure shows an example. The sender makes a change on the - varable once a symbol s sent; the recever checks the - varable and reads the symbol when ready; the recever then makes a change on the - varable to nform the sender; the sender checks the - varable and sends the next symbol once the last symbol has been receved. There may be other methods that can mantan the correct order of operatons, but n essence they do the same thng: let the sender know f the recever has read the prevous symbol and let the recever know f a symbol has arrved. Wth such nformaton, each tme when the sender s able to perform an operaton t can determne whether a new symbol can be sent. However, due to the non-synchronous nature of the covert channels, t s very lkely that the sender fnds that the prevous symbol has not been read by the recever and t has to gve up the CPU and wat for the next chance. In other words, some tme s wasted for watng and therefore the channel capacty s reduced. In prevous work, the synchronous model excludes ths part of the tme n symbol transmsson. Only the tme assocated wth transmtted symbols s taken nto account. In contrast, our method consders such wasted tme and gves more accurate estmatons. It can be regarded as a more general form of capacty estmaton where the methods based on a synchronous model are specal cases. Furthermore, unlke tradtonal methods whch calculate a sngle upper bound of the capacty, our method reflects the non-synchronous behavors whch are determned by the system mplementatons. Our method can be used to evaluate the effectveness of canddate system mplementatons, e.g., the scheduler, n reducng covert channel capactes Deleton-nserton channel on-synchronous operatons at the two sdes of the channel may lead to loss of real symbols and nserton of false symbols. uch a channel can be modeled as a deleton-nserton channel. We adapt the defnton n [3] as follows: Defnton : A bnary deleton-nserton channel s a channel wth four parameters: P d, P, P t and P s, whch denote the rates of deletons, nsertons, transmssons and substtutons, respectvely. The symbols to be transmtted are magned enterng a queue, watng to be transmtted by the channel. Each tme the channel s used, one of four events occurs: wth probablty P d the next queued bt s deleted; wth probablty P an extra bt s nserted; wth probablty P t the next queued bt s transmtted,.e., s receved by the recever, wth probablty P s of sufferng a substtuton error (see Fgure ). A deleton-nserton channel should not be confused wth an erasure channel. In an erasure channel, channel symbols may be corrupted or lost, whch s smlar to the substtuton or deleton n a deleton-nserton channel. However, the recever of an erasure channel knows exactly whch symbols are corrupted or dropped whle n a deleton-nserton channel, the recever knows nothng about any deleton, nserton or substtuton (corrupton) of symbols. Ths makes the recovery of a message much harder. 4. Capacty estmaton Our dscussons focus on two sets of questons:. Exstence and capacty: Wthout any form of synchronzaton, s relable communcaton stll possble? If the answer s yes, what s the capacty of such channels?. Constructon and capacty: How can relable synchronzaton mechansms be constructed for non-synchronous covert channels? What s the maxmum nformaton rate one can acheve over such channels? Compared wth the capacty of an nherently synchronous channel, what s the degradaton of nformaton rate due to the nonsynchronous effect? The frst queston s a theoretcal exstence or feasblty one, whle the second set of questons shows how such a covert channel can actually be constructed. It s worth notng that the frst queston ndeed s askng f synchronzaton s always necessary. Prevous work all assumes a synchronzed form of communcaton. But t s not clear f t s the only way for relable communcaton. In fact, another nterestng queston s: can a non-synchronous form of communcaton have hgher nformaton rate than the synchronous one as the overhead assocated wth synchronzaton s totally avoded? 4.. Capacty of deleton-nserton channels Intutvely a channel wth symbol nsertons and drop-outs s hard to use and not effcent. But as mantanng synchronzed communcaton also ntroduces overhead, we wsh to know how fast the nformaton can be delvered over such channels, compared to the synchronzed channels.

4 ender ecever ender ecever (a) Feedback Doburshn [7] frst showed that the fundamental theorem of nformaton theory concernng the exstence of an upper bound for the transmsson rate, for whch error probablty can be made arbtrarly small, holds. Ths mples that relable communcaton s possble even f no relable synchronzaton mechansms are avalable. However, explct expresson of the capacty of such a channel s generally not avalable. A varety of approxmatons of the capactes and numercal bounds can be found n [8][9]. The accurate capacty of a deleton-nserton channel s stll unavalable, accordng to the state-of-the-art research n ths area. Despte the unavalablty of an accurate capacty, we can gve an upper bound of the capacty for the purpose of comparson wth synchronzed channels. Consder a deleton-nserton channel and an erasure channel whch are dentcal except that n the erasure channel the locaton of symbol drop-outs and nsertons are known. It s not dffcult to show that the capacty of the deleton-nserton channel s no greater than the capacty of the erasure channel. Theorem. An upper bound of the capacty of a deleton-nserton channel s the capacty of the erasure channel: C max = (-P d ) () where s the number of bts per symbol and P d s the deleton probablty The dervaton of the capacty of a bnary erasure channel can be found n many nformaton theory textbooks such as [6] and t s straght-forward to generalze t to non-bnary cases. ote that here we use the term erasure channel to refer to the one that s dentcal to the correspondng deleton-nserton channel except that the locatons of symbol nsertons/drop-outs are known. In the rest of the paper, unless otherwse specfed, we wll use erasure channel to refer to ths specfc erasure channel. ather than gvng a formal proof of theorem, we gve a more ntutve explanaton. The two channels have the same symbol drop-outs and nsertons, but the erasure channel knows more nformaton: t knows whch symbols are deleted or nserted. The erasure channel therefore has equal or hgher capacty than that of the deleton-nserton channel. Fgure 3. Two general synchronzaton mechansms E (b) Common Events The above capactes are only upper bounds of the channel capacty. They are very hard, f not mpossble, to acheve n practce. Usng exstng codng schemes such as convolutonal code and watermark code, some work [-4] have shown relable communcaton over such channels. However, they all showed that the capacty s qute low and n practce sophstcated codng technques are requred. 4.. ynchronzaton and capacty estmatons Unlke our frst queston on theoretcal exstence and capacty, past lterature does not provde any clues to answerng our second set of questons. We present new work on how synchronzaton mechansms can be constructed for nherently non-synchronous covert channels and what capacty can be acheved. We wll consder two general ways to acheve synchronzaton: usng feedback or usng common events, as shown n Fgure 3. We assume that the feedback path and the two paths from the event source E to the sender and the recever are perfect. Ths smplfes the analyss, and s also a requrement for dervng the maxmum nformaton rate. To focus on the synchronzaton problem, we assume that the channel s noseless. Let p d and p denote the probablty of deleton and nserton respectvely Channels wth feedback We now show that the capacty of a channel wth deletons can acheve the capacty of an erasure channel by utlzng feedback. We then extend the result to a channel wth nsertons. Theorem. The upper bound of the capacty of a deleton channel wth perfect feedback s the capacty of the erasure channel. Proof: Consder a deleton channel wth a deleton probablty p d and ts correspondng erasure channel. Add perfect feedback path to both of them. nce the erasure channel knows where the symbol drop-outs occurs whch the deleton channel does not know, the erasure channel knows more nformaton than the deleton channel. Therefore the erasure channel wth feedback wll gan equal or hgher capacty than the deleton channel wth feedback. nce an erasure

5 ender ecever ender ecever E (a) Common Events Fgure 4. Usng common events won t get better capacty than usng feedback channel s a memoryless channel and t s well known that addng feedback wll not ncrease the capacty of a memoryless channel [6], the upper bound of the capacty of a deleton channel wth perfect feedback s the capacty of the erasure channel. In theorem we only show an upper bound of the capacty, we now show that the bound s tght. Theorem 3. The capacty of a deleton channel wth perfect feedback equals the capacty of the erasure channel. Proof: Here we construct a protocol by whch the capacty of the erasure channel can be acheved. The protocol s as follows: let the recever notfy the sender va the feedback path once t receves a symbol. The sender wll keep resendng the symbol untl t knows that the symbol has been receved. Therefore no dropouts wll occur. Whle the probablty of deleton s p d, a symbol gets through wth probablty of - p d, therefore the effectve nformaton rate s (-p d ), whch s the capacty of an erasure channel wth an erasure probablty p d. nce the upper bound of the capacty can be acheved, t s the actual capacty. When symbol nsertons are present n the channel, a theorem smlar to theorem can be proved. We frst defne an extended erasure channel as follows: Defnton : An extended erasure channel s a channel where symbols may be nserted and/or dropped but the locatons of all nsertons and dropouts are known. Theorem 4. The upper bound of the capacty of a deleton-nserton channel wth perfect feed back s the capacty of the equvalent extended erasure channel,.e., C upper-bound = (-P d ). The proof s smlar to that for Theorem. A lower bound of the capacty can also be derved wth a constructve protocol. It can be shown that under certan condtons, ths lower bound and the upper bound shown n Theorem 4 asymptotcally converge. Theorem 5. A lower bound of the capacty of a deleton-nserton channel wth perfect feed back s: Pd Clower bound = C () conv P where Cconv = αp log ( ) H ( αp ) (3) α = (4) H( p) = p log p ( p) log ( p) (5) s the number of bts contaned n each symbol. A smple protocol s constructed to prove Theorem 5. The above capacty can be acheved usng ths protocol and therefore s a lower-bound of the actual capacty. A detaled proof can be found n Appendx A. To show the asymptotcal convergence, let P = P d and!, we then have Clower bound = Cconv ( Pd ) H ( Pd ) (6) C lower bound ( Pd ) H ( Pd ) lm = = (7) C ( P ) lupper bound 4... Channels wth common event source There may be several ways to explot a common event E for synchronzaton. For example, E can be a self-ncrementng counter whch serves as a common clock for the sender and recever. However, as we show below, explotng E wll not get hgher capacty than usng a feedback path n general. If one more path from to E s added, as shown n Fgure 4(b), E may gan more nformaton. Therefore an equal or hgher nformaton rate may be acheved than wthout the added path. In the best case, E and communcate wth each other wthout any overhead,.e., they ndeed can be regarded as one sngle party and such a confguraton actually becomes the synchronzaton method usng feedback. Therefore a smlar system usng feedback wll get equal or better performance for channel capacty emarks (b) Common Events + Feedback We have answered the two sets of questons we posed: () elable communcaton over nonsynchronous channels wthout synchronzaton s possble, but t s not as effectve as synchronzed communcaton and requres complcated codng schemes. () The capacty degradaton due to nonsynchronous effects s roughly proportonal to P d, the probablty of deletons. Accordng to the above dscusson, wth a good feedback path, synchronzaton s not a problem for a covert channel n general. Furthermore, wth the help d E

6 of the feedback, the theoretcal capacty of the channel can be practcally acheved usng a very smple protocol. Ths has nterestng mplcatons for a multlevel securty (ML) system. nce the legal nformaton flow (from low to hgh) can serve as a perfect feedback path, one may always explot t to acheve the channel capacty. In other words, covert channels n ML systems are relatvely easy to explot n general and tend to be fast. ote that the capacty (-P d ) we derved above s not a physcal nformaton rate. It s a relatve rato of the physcal capacty estmated usng tradtonal methods. Therefore for a gven covert channel, one could frst use tradtonal methods to estmate the physcal capacty C. The probablty of deleton P d should then be estmated. The real capacty can then be estmated as C(-P d ). ote also that the capacty degradaton modeled n our method s ndependent of the synchronzaton mechansms used and does not nclude any specfc overhead ntroduced by such mechansms. uch degradaton s nherent due to the non-synchronous nature of operatons. It s unavodable even f effcent mechansms are deployed. Fnally, although our results are derved n the context of capacty estmaton of covert channels, t may provde meanngful nsghts to researchers n other areas. ecently some ongong work [0] n the communcaton communty also shows nterest n the capacty bounds of channels wth asynchronous behavors. Although the problems and models are dfferent, smlar nsghts may apply. It would be nterestng to study the connectons n our future work. 5. Conclusons In ths paper we consdered the effect of nonsynchronous operatons n the capacty estmaton of covert channels. We argue that covert channels n general are non-synchronous and the tme taken for synchronzaton s not neglgble. To model such effect n capacty estmaton, we propose usng the deletonnserton channel as a more general bass for covert channel capacty estmatons. Our study shows that relable communcaton over a non-synchronous channel s stll possble, though such non-synchronzed communcatons are not as effectve as the synchronzed ones. In the case of synchronzed communcaton, we show that the capacty degradaton due to the non-synchronous effects s roughly proportonal to the probablty of synchronzaton errors. 6. eferences [].A. Kemmerer, hared esource Matrx Methodology: An Approach to Identfyng storage and Tmng Channels, ACM Transactons on Computer ystems, vol., ssue 3, pp , August 983. [] B.W. Lampson, A ote on the Confnement Problem, Communcatons of the ACM, vol. 6, ssue 0, pp , October 973. [3] atonal Computer ecurty Center, A Gude to Understandng Analyss of Trusted ystems, CC-TG-30, ovember 993, avalable at [4] John McHugh, Analyss: A Chapter of the Handbook for the Computer ecurty Certfcaton of Trusted ystems, December 995, avalable at [5] J.K. Mllen, Capacty, Proceedngs of the IEEE ymposum on esearch n ecurty and Prvacy, pp , Aprl 987. [6].B. Lpner, A Comment on the Confnement Problem, Operatng ystems evew, vol. 9, ssue 5, pp. 9-96, ovember 975. [7] M. chaefer, B. Gold,. Lnde, and J. ched, Program Confnement n KVM/370, Proceedngs of the 977 Annual ACM Conference, pp , October 977. [8] J.C. Huskamp, Covert Communcaton Channels n Tmesharng ystems, Techncal eport UCB-C-78-0, Ph.D. Thess, Unversty of Calforna, Berkeley, CA, 978. [9] D.E. Dennng, Cryptography and Data ecurty, Addson-Wesley, eadng, Massachusetts, 983. [0] I.. Moskowtz and A.. Mller, mple Tmng Channels, Proceedngs of IEEE Computer ymposum on esearch n ecurty and Prvacy, pp , May 994. [] I.. Moskowtz,.J. Greenwald, and M.H. Kang, An Analyss of the Tmed-Z Channel, Proceedngs of IEEE Computer ymposum on ecurty and Prvacy, pp. -, May 996. [] K.h. Zgangrov, equental Decodng for A Bnary Channel wth Drop Outs and Insertons, Problemy Peredach Informats, vol. 5, ssue, pp. -30, 969. [3] M.C. Davey and D.J.C. Mackey, elable Communcaton over Channels wth Insertons, Deletons, and ubsttutons, IEEE Trans. on Informaton Theory, vol. 47, no., pp , February 00. [4] Dave Legh, Capacty of Inserton and Deleton Channels, Project eport, 00, avalable at [5] J.K. Mllen, Fnte-tate oseless s, Proceedngs of the Computer ecurty Foundatons Workshop II, pp. 8-86, June 989. [6] T. Cover and J. Thomas, Elements of Informaton Theory, John Wley & ons Inc., ew York, 99.

7 [7].L. Doburshn, hannon s Theorems for Channels wth ynchronzaton Errors, Problemy Peredach Informats, vol.3, o.4, pp.8-36, 967 [8].D. Vvedenskaya and.l. Doburshn, The Computaton on a Computer of The Channel Capacty of a Lne wth ymbol Drop-out, Problemy Peredach Informats, vol.4, o.3, pp.9-95, 968. [9] A.. Dolgopolov, Capacty Bounds for a Channel wth ynchronzaton Errors, Problemy Peredach Informats, vol.6, o., pp.7-37, 990. [0] J. Luo, A. Ephremdes, "On the Throughput, Capacty and tablty egons of andom Multple Access", submtted to IEEE Trans. on Informaton Theory, February 005. Appendx A: A Proof of Theorem 5 A protocol s constructed based on whch a capacty can be derved. The recever keeps a counter that records the number of symbols that t has receved. Each tme when the recever gets the chance to perform an operaton, t reads the channel and beleves that a symbol s receved. It then updates the counter and nforms the sender how many symbols t has receved. At the sender sde, the sender keeps a counter that records how many symbols of the message have been sent or skpped. Each tme when the sender gets a chance to perform an operaton, t checks the number of symbols the recever has receved. If the number s smaller than ts own counter, t means that a symbol sent n the sender s last operaton has not been receved by the recever. The sender then does nothng and wats for the next opportunty. If the two numbers are equal, t means that last symbol has been receved. The sender then sends the next symbol and updates ts own counter. If the number s larger than the sender s counter, t means that some symbols have been nserted. To synchronze the transmsson, the sender skps some symbols n the message so that the next symbol to be sent wll appear n the same locaton n the receved message at the recever s sde as n the orgnal message. The sender then sends ths symbol and updates the counter wth the locaton of the symbol next to the one that was just sent. Usng such a protocol, the sender can always ensure that the number of symbols receved by the recever equals the number of symbols t sent. For symbol nsertons, snce the sender skps the same number of symbols to be sent, n the receved symbol sequence the skpped symbols are replaced by those nserted Fgure 5. Converted channel model ones. Also, snce the sender wll not send a new symbol untl at least one symbol s receved, no symbol deleton can occur. Therefore the resultng channel s a synchronous channel, but wth some symbols replaced. To calculate the capacty of such a channel, hannon s theory can be used. For the sake of smplcty, we assume that the data channel s noseless,.e., P s = 0. We also assume the channel s memoryless. Fgure 5 shows the channel model. It s ndeed an M- ary symmetrc DMC (dscrete memoryless channel) wth the followng transton probabltes: ( p when x = y P( y x) = ) () p when x y where s the number of bts of the data channel and P s the nserton probablty. It s straght forward to get the followng capacty: Cconv = αp log ( ) H ( αp ) () where α = (3) ( p) p log p ( p) log ( p H = ) (4) when s large, C p ) H ( p ) (5) conv X -p( ) p(y x) ( ote that the above calculaton s based on the synchronous model where the tme wasted for watng s not taken nto account and the tme for skpped symbols ndeed should be 0, we need to adjust the above results wth a coeffcent. It s not dffcult to show that ths coeffcent should be (- P d )/(- P ), therefore the actual capacty should be P C = d C (6) conv P where C conv s gven n () and (5). As the above capacty can be acheved wth a real protocol, t s the lower bound of the actual capacty. Y

Secure Transmission of Sensitive data using multiple channels

Secure Transmission of Sensitive data using multiple channels Secure Transmsson of Senstve data usng multple channels Ahmed A. Belal, Ph.D. Department of computer scence and automatc control Faculty of Engneerng Unversty of Alexandra Alexandra, Egypt. aabelal@hotmal.com

More information

Calculation of the received voltage due to the radiation from multiple co-frequency sources

Calculation of the received voltage due to the radiation from multiple co-frequency sources Rec. ITU-R SM.1271-0 1 RECOMMENDATION ITU-R SM.1271-0 * EFFICIENT SPECTRUM UTILIZATION USING PROBABILISTIC METHODS Rec. ITU-R SM.1271 (1997) The ITU Radocommuncaton Assembly, consderng a) that communcatons

More information

Digital Transmission

Digital Transmission Dgtal Transmsson Most modern communcaton systems are dgtal, meanng that the transmtted normaton sgnal carres bts and symbols rather than an analog sgnal. The eect o C/N rato ncrease or decrease on dgtal

More information

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation

Parameter Free Iterative Decoding Metrics for Non-Coherent Orthogonal Modulation 1 Parameter Free Iteratve Decodng Metrcs for Non-Coherent Orthogonal Modulaton Albert Gullén Fàbregas and Alex Grant Abstract We study decoder metrcs suted for teratve decodng of non-coherently detected

More information

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel

To: Professor Avitabile Date: February 4, 2003 From: Mechanical Student Subject: Experiment #1 Numerical Methods Using Excel To: Professor Avtable Date: February 4, 3 From: Mechancal Student Subject:.3 Experment # Numercal Methods Usng Excel Introducton Mcrosoft Excel s a spreadsheet program that can be used for data analyss,

More information

Review: Our Approach 2. CSC310 Information Theory

Review: Our Approach 2. CSC310 Information Theory CSC30 Informaton Theory Sam Rowes Lecture 3: Provng the Kraft-McMllan Inequaltes September 8, 6 Revew: Our Approach The study of both compresson and transmsson requres that we abstract data and messages

More information

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht

PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION. Evgeny Artyomov and Orly Yadid-Pecht 68 Internatonal Journal "Informaton Theores & Applcatons" Vol.11 PRACTICAL, COMPUTATION EFFICIENT HIGH-ORDER NEURAL NETWORK FOR ROTATION AND SHIFT INVARIANT PATTERN RECOGNITION Evgeny Artyomov and Orly

More information

Uncertainty in measurements of power and energy on power networks

Uncertainty in measurements of power and energy on power networks Uncertanty n measurements of power and energy on power networks E. Manov, N. Kolev Department of Measurement and Instrumentaton, Techncal Unversty Sofa, bul. Klment Ohrdsk No8, bl., 000 Sofa, Bulgara Tel./fax:

More information

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme

Performance Analysis of Multi User MIMO System with Block-Diagonalization Precoding Scheme Performance Analyss of Mult User MIMO System wth Block-Dagonalzaton Precodng Scheme Yoon Hyun m and Jn Young m, wanwoon Unversty, Department of Electroncs Convergence Engneerng, Wolgye-Dong, Nowon-Gu,

More information

Adaptive Modulation for Multiple Antenna Channels

Adaptive Modulation for Multiple Antenna Channels Adaptve Modulaton for Multple Antenna Channels June Chul Roh and Bhaskar D. Rao Department of Electrcal and Computer Engneerng Unversty of Calforna, San Dego La Jolla, CA 993-7 E-mal: jroh@ece.ucsd.edu,

More information

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985

NATIONAL RADIO ASTRONOMY OBSERVATORY Green Bank, West Virginia SPECTRAL PROCESSOR MEMO NO. 25. MEMORANDUM February 13, 1985 NATONAL RADO ASTRONOMY OBSERVATORY Green Bank, West Vrgna SPECTRAL PROCESSOR MEMO NO. 25 MEMORANDUM February 13, 1985 To: Spectral Processor Group From: R. Fsher Subj: Some Experments wth an nteger FFT

More information

Prevention of Sequential Message Loss in CAN Systems

Prevention of Sequential Message Loss in CAN Systems Preventon of Sequental Message Loss n CAN Systems Shengbng Jang Electrcal & Controls Integraton Lab GM R&D Center, MC: 480-106-390 30500 Mound Road, Warren, MI 48090 shengbng.jang@gm.com Ratnesh Kumar

More information

A study of turbo codes for multilevel modulations in Gaussian and mobile channels

A study of turbo codes for multilevel modulations in Gaussian and mobile channels A study of turbo codes for multlevel modulatons n Gaussan and moble channels Lamne Sylla and Paul Forter (sylla, forter)@gel.ulaval.ca Department of Electrcal and Computer Engneerng Laval Unversty, Ste-Foy,

More information

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf

TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS TN TERMINATON FOR POINT-TO-POINT SYSTEMS. Zo = L C. ω - angular frequency = 2πf TECHNICAL NOTE TERMINATION FOR POINT- TO-POINT SYSTEMS INTRODUCTION Because dgtal sgnal rates n computng systems are ncreasng at an astonshng rate, sgnal ntegrty ssues have become far more mportant to

More information

Chaotic Filter Bank for Computer Cryptography

Chaotic Filter Bank for Computer Cryptography Chaotc Flter Bank for Computer Cryptography Bngo Wng-uen Lng Telephone: 44 () 784894 Fax: 44 () 784893 Emal: HTwng-kuen.lng@kcl.ac.ukTH Department of Electronc Engneerng, Dvson of Engneerng, ng s College

More information

Information-Theoretic Comparison of Channel Capacity for FDMA and DS-CDMA in a Rayleigh Fading Environment

Information-Theoretic Comparison of Channel Capacity for FDMA and DS-CDMA in a Rayleigh Fading Environment WSEAS TRANSATIONS on OMMUNIATIONS Informaton-Theoretc omparson of hannel apacty for FDMA and DS-DMA n a Raylegh Fadng Envronment PANAGIOTIS VARZAAS Department of Electroncs Technologcal Educatonal Insttute

More information

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6)

Passive Filters. References: Barbow (pp ), Hayes & Horowitz (pp 32-60), Rizzoni (Chap. 6) Passve Flters eferences: Barbow (pp 6575), Hayes & Horowtz (pp 360), zzon (Chap. 6) Frequencyselectve or flter crcuts pass to the output only those nput sgnals that are n a desred range of frequences (called

More information

High Speed ADC Sampling Transients

High Speed ADC Sampling Transients Hgh Speed ADC Samplng Transents Doug Stuetzle Hgh speed analog to dgtal converters (ADCs) are, at the analog sgnal nterface, track and hold devces. As such, they nclude samplng capactors and samplng swtches.

More information

Space Time Equalization-space time codes System Model for STCM

Space Time Equalization-space time codes System Model for STCM Space Tme Eualzaton-space tme codes System Model for STCM The system under consderaton conssts of ST encoder, fadng channel model wth AWGN, two transmt antennas, one receve antenna, Vterb eualzer wth deal

More information

antenna antenna (4.139)

antenna antenna (4.139) .6.6 The Lmts of Usable Input Levels for LNAs The sgnal voltage level delvered to the nput of an LNA from the antenna may vary n a very wde nterval, from very weak sgnals comparable to the nose level,

More information

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems

Throughput Maximization by Adaptive Threshold Adjustment for AMC Systems APSIPA ASC 2011 X an Throughput Maxmzaton by Adaptve Threshold Adjustment for AMC Systems We-Shun Lao and Hsuan-Jung Su Graduate Insttute of Communcaton Engneerng Department of Electrcal Engneerng Natonal

More information

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES

IEE Electronics Letters, vol 34, no 17, August 1998, pp ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES IEE Electroncs Letters, vol 34, no 17, August 1998, pp. 1622-1624. ESTIMATING STARTING POINT OF CONDUCTION OF CMOS GATES A. Chatzgeorgou, S. Nkolads 1 and I. Tsoukalas Computer Scence Department, 1 Department

More information

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter

Walsh Function Based Synthesis Method of PWM Pattern for Full-Bridge Inverter Walsh Functon Based Synthess Method of PWM Pattern for Full-Brdge Inverter Sej Kondo and Krt Choesa Nagaoka Unversty of Technology 63-, Kamtomoka-cho, Nagaoka 9-, JAPAN Fax: +8-58-7-95, Phone: +8-58-7-957

More information

Traffic balancing over licensed and unlicensed bands in heterogeneous networks

Traffic balancing over licensed and unlicensed bands in heterogeneous networks Correspondence letter Traffc balancng over lcensed and unlcensed bands n heterogeneous networks LI Zhen, CUI Qme, CUI Zhyan, ZHENG We Natonal Engneerng Laboratory for Moble Network Securty, Bejng Unversty

More information

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate

Comparative Analysis of Reuse 1 and 3 in Cellular Network Based On SIR Distribution and Rate Comparatve Analyss of Reuse and 3 n ular Network Based On IR Dstrbuton and Rate Chandra Thapa M.Tech. II, DEC V College of Engneerng & Technology R.V.. Nagar, Chttoor-5727, A.P. Inda Emal: chandra2thapa@gmal.com

More information

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1

HUAWEI TECHNOLOGIES CO., LTD. Huawei Proprietary Page 1 Project Ttle Date Submtted IEEE 802.16 Broadband Wreless Access Workng Group Double-Stage DL MU-MIMO Scheme 2008-05-05 Source(s) Yang Tang, Young Hoon Kwon, Yajun Kou, Shahab Sanaye,

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 12, DECEMBER

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 13, NO. 12, DECEMBER IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 3, NO. 2, DECEMBER 204 695 On Spatal Capacty of Wreless Ad Hoc Networks wth Threshold Based Schedulng Yue Lng Che, Student Member, IEEE, Ru Zhang, Member,

More information

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques

Efficient Large Integers Arithmetic by Adopting Squaring and Complement Recoding Techniques The th Worshop on Combnatoral Mathematcs and Computaton Theory Effcent Large Integers Arthmetc by Adoptng Squarng and Complement Recodng Technques Cha-Long Wu*, Der-Chyuan Lou, and Te-Jen Chang *Department

More information

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014

Guidelines for CCPR and RMO Bilateral Key Comparisons CCPR Working Group on Key Comparison CCPR-G5 October 10 th, 2014 Gudelnes for CCPR and RMO Blateral Key Comparsons CCPR Workng Group on Key Comparson CCPR-G5 October 10 th, 2014 These gudelnes are prepared by CCPR WG-KC and RMO P&R representatves, and approved by CCPR,

More information

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart

Control Chart. Control Chart - history. Process in control. Developed in 1920 s. By Dr. Walter A. Shewhart Control Chart - hstory Control Chart Developed n 920 s By Dr. Walter A. Shewhart 2 Process n control A phenomenon s sad to be controlled when, through the use of past experence, we can predct, at least

More information

1 GSW Multipath Channel Models

1 GSW Multipath Channel Models In the general case, the moble rado channel s pretty unpleasant: there are a lot of echoes dstortng the receved sgnal, and the mpulse response keeps changng. Fortunately, there are some smplfyng assumptons

More information

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13

Figure.1. Basic model of an impedance source converter JCHPS Special Issue 12: August Page 13 A Hgh Gan DC - DC Converter wth Soft Swtchng and Power actor Correcton for Renewable Energy Applcaton T. Selvakumaran* and. Svachdambaranathan Department of EEE, Sathyabama Unversty, Chenna, Inda. *Correspondng

More information

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson

Analysis of Time Delays in Synchronous and. Asynchronous Control Loops. Bj rn Wittenmark, Ben Bastian, and Johan Nilsson 37th CDC, Tampa, December 1998 Analyss of Delays n Synchronous and Asynchronous Control Loops Bj rn Wttenmark, Ben Bastan, and Johan Nlsson emal: bjorn@control.lth.se, ben@control.lth.se, and johan@control.lth.se

More information

Keywords LTE, Uplink, Power Control, Fractional Power Control.

Keywords LTE, Uplink, Power Control, Fractional Power Control. Volume 3, Issue 6, June 2013 ISSN: 2277 128X Internatonal Journal of Advanced Research n Computer Scence and Software Engneerng Research Paper Avalable onlne at: www.jarcsse.com Uplnk Power Control Schemes

More information

Graph Method for Solving Switched Capacitors Circuits

Graph Method for Solving Switched Capacitors Circuits Recent Advances n rcuts, ystems, gnal and Telecommuncatons Graph Method for olvng wtched apactors rcuts BHUMIL BRTNÍ Department of lectroncs and Informatcs ollege of Polytechncs Jhlava Tolstého 6, 586

More information

The Stability Region of the Two-User Broadcast Channel

The Stability Region of the Two-User Broadcast Channel The Stablty Regon of the Two-User Broadcast Channel Nkolaos appas *, Maros Kountours, * Department of Scence and Technology, Lnköpng Unversty, Campus Norrköpng, 60 74, Sweden Mathematcal and Algorthmc

More information

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results

A Comparison of Two Equivalent Real Formulations for Complex-Valued Linear Systems Part 2: Results AMERICAN JOURNAL OF UNDERGRADUATE RESEARCH VOL. 1 NO. () A Comparson of Two Equvalent Real Formulatons for Complex-Valued Lnear Systems Part : Results Abnta Munankarmy and Mchael A. Heroux Department of

More information

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks

Resource Allocation Optimization for Device-to- Device Communication Underlaying Cellular Networks Resource Allocaton Optmzaton for Devce-to- Devce Communcaton Underlayng Cellular Networks Bn Wang, L Chen, Xaohang Chen, Xn Zhang, and Dacheng Yang Wreless Theores and Technologes (WT&T) Bejng Unversty

More information

Distributed Uplink Scheduling in EV-DO Rev. A Networks

Distributed Uplink Scheduling in EV-DO Rev. A Networks Dstrbuted Uplnk Schedulng n EV-DO ev. A Networks Ashwn Srdharan (Sprnt Nextel) amesh Subbaraman, och Guérn (ESE, Unversty of Pennsylvana) Overvew of Problem Most modern wreless systems Delver hgh performance

More information

COOPERATIVE COMMUNICATIONS FOR WIRELESS INFORMATION ASSURANCE

COOPERATIVE COMMUNICATIONS FOR WIRELESS INFORMATION ASSURANCE AFRL-IF-RS-TR-005-79 Fnal Techncal Report July 005 COOPERATIVE COMMUNICATIONS FOR WIRELESS INFORMATION ASSURANCE State Unversty of New York at Bnghamton APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED.

More information

Noisy Channel-Output Feedback Capacity of the Linear Deterministic Interference Channel

Noisy Channel-Output Feedback Capacity of the Linear Deterministic Interference Channel Nosy Channel-Output Feedback Capacty of the Lnear Determnstc Interference Channel Vctor Quntero, Samr M. Perlaza, Jean-Mare Gorce arxv:.4649v6 [cs.it] Jan 6 Abstract In ths paper, the capacty regon of

More information

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION

NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION NOVEL ITERATIVE TECHNIQUES FOR RADAR TARGET DISCRIMINATION Phaneendra R.Venkata, Nathan A. Goodman Department of Electrcal and Computer Engneerng, Unversty of Arzona, 30 E. Speedway Blvd, Tucson, Arzona

More information

Phasor Representation of Sinusoidal Signals

Phasor Representation of Sinusoidal Signals Phasor Representaton of Snusodal Sgnals COSC 44: Dgtal Communcatons Instructor: Dr. Amr Asf Department of Computer Scence and Engneerng York Unversty Handout # 6: Bandpass odulaton Usng Euler dentty e

More information

MTBF PREDICTION REPORT

MTBF PREDICTION REPORT MTBF PREDICTION REPORT PRODUCT NAME: BLE112-A-V2 Issued date: 01-23-2015 Rev:1.0 Copyrght@2015 Bluegga Technologes. All rghts reserved. 1 MTBF PREDICTION REPORT... 1 PRODUCT NAME: BLE112-A-V2... 1 1.0

More information

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS

A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS A TWO-PLAYER MODEL FOR THE SIMULTANEOUS LOCATION OF FRANCHISING SERVICES WITH PREFERENTIAL RIGHTS Pedro Godnho and oana Das Faculdade de Economa and GEMF Unversdade de Combra Av. Das da Slva 65 3004-5

More information

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding

Joint Power Control and Scheduling for Two-Cell Energy Efficient Broadcasting with Network Coding Communcatons and Network, 2013, 5, 312-318 http://dx.do.org/10.4236/cn.2013.53b2058 Publshed Onlne September 2013 (http://www.scrp.org/journal/cn) Jont Power Control and Schedulng for Two-Cell Energy Effcent

More information

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator

Evaluate the Effective of Annular Aperture on the OTF for Fractal Optical Modulator Global Advanced Research Journal of Management and Busness Studes (ISSN: 2315-5086) Vol. 4(3) pp. 082-086, March, 2015 Avalable onlne http://garj.org/garjmbs/ndex.htm Copyrght 2015 Global Advanced Research

More information

A Simple Satellite Exclusion Algorithm for Advanced RAIM

A Simple Satellite Exclusion Algorithm for Advanced RAIM A Smple Satellte Excluson Algorthm for Advanced RAIM Juan Blanch, Todd Walter, Per Enge Stanford Unversty ABSTRACT Advanced Recever Autonomous Integrty Montorng s a concept that extends RAIM to mult-constellaton

More information

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University

Dynamic Optimization. Assignment 1. Sasanka Nagavalli January 29, 2013 Robotics Institute Carnegie Mellon University Dynamc Optmzaton Assgnment 1 Sasanka Nagavall snagaval@andrew.cmu.edu 16-745 January 29, 213 Robotcs Insttute Carnege Mellon Unversty Table of Contents 1. Problem and Approach... 1 2. Optmzaton wthout

More information

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks

A Fuzzy-based Routing Strategy for Multihop Cognitive Radio Networks 74 Internatonal Journal of Communcaton Networks and Informaton Securty (IJCNIS) Vol. 3, No., Aprl 0 A Fuzzy-based Routng Strategy for Multhop Cogntve Rado Networks Al El Masr, Naceur Malouch and Hcham

More information

Understanding the Spike Algorithm

Understanding the Spike Algorithm Understandng the Spke Algorthm Vctor Ejkhout and Robert van de Gejn May, ntroducton The parallel soluton of lnear systems has a long hstory, spannng both drect and teratve methods Whle drect methods exst

More information

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality.

Define Y = # of mobiles from M total mobiles that have an adequate link. Measure of average portion of mobiles allocated a link of adequate quality. Wreless Communcatons Technologes 6::559 (Advanced Topcs n Communcatons) Lecture 5 (Aprl th ) and Lecture 6 (May st ) Instructor: Professor Narayan Mandayam Summarzed by: Steve Leung (leungs@ece.rutgers.edu)

More information

Distributed Resource Allocation and Scheduling in OFDMA Wireless Networks

Distributed Resource Allocation and Scheduling in OFDMA Wireless Networks Southern Illnos Unversty Carbondale OpenSIUC Conference Proceedngs Department of Electrcal and Computer Engneerng 11-2006 Dstrbuted Resource Allocaton and Schedulng n OFDMA Wreless Networks Xangpng Qn

More information

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION

A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION A MODIFIED DIRECTIONAL FREQUENCY REUSE PLAN BASED ON CHANNEL ALTERNATION AND ROTATION Vncent A. Nguyen Peng-Jun Wan Ophr Freder Computer Scence Department Illnos Insttute of Technology Chcago, Illnos vnguyen@t.edu,

More information

N( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( )

N( E) ( ) That is, if the outcomes in sample space S are equally likely, then ( ) Stat 400, secton 2.2 Axoms, Interpretatons and Propertes of Probablty notes by Tm Plachowsk In secton 2., we constructed sample spaces by askng, What could happen? Now, n secton 2.2, we begn askng and

More information

Revision of Lecture Twenty-One

Revision of Lecture Twenty-One Revson of Lecture Twenty-One FFT / IFFT most wdely found operatons n communcaton systems Important to know what are gong on nsde a FFT / IFFT algorthm Wth the ad of FFT / IFFT, ths lecture looks nto OFDM

More information

Energy Efficiency Analysis of a Multichannel Wireless Access Protocol

Energy Efficiency Analysis of a Multichannel Wireless Access Protocol Energy Effcency Analyss of a Multchannel Wreless Access Protocol A. Chockalngam y, Wepng u, Mchele Zorz, and Laurence B. Mlsten Department of Electrcal and Computer Engneerng, Unversty of Calforna, San

More information

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks

Joint Adaptive Modulation and Power Allocation in Cognitive Radio Networks I. J. Communcatons, etwork and System Scences, 8, 3, 7-83 Publshed Onlne August 8 n ScRes (http://www.scrp.org/journal/jcns/). Jont Adaptve Modulaton and Power Allocaton n Cogntve Rado etworks Dong LI,

More information

High Speed, Low Power And Area Efficient Carry-Select Adder

High Speed, Low Power And Area Efficient Carry-Select Adder Internatonal Journal of Scence, Engneerng and Technology Research (IJSETR), Volume 5, Issue 3, March 2016 Hgh Speed, Low Power And Area Effcent Carry-Select Adder Nelant Harsh M.tech.VLSI Desgn Electroncs

More information

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System

The Performance Improvement of BASK System for Giga-Bit MODEM Using the Fuzzy System Int. J. Communcatons, Network and System Scences, 10, 3, 1-5 do:10.36/jcns.10.358 Publshed Onlne May 10 (http://www.scrp.org/journal/jcns/) The Performance Improvement of BASK System for Gga-Bt MODEM Usng

More information

Design of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network

Design of Shunt Active Filter for Harmonic Compensation in a 3 Phase 3 Wire Distribution Network Internatonal Journal of Research n Electrcal & Electroncs Engneerng olume 1, Issue 1, July-September, 2013, pp. 85-92, IASTER 2013 www.aster.com, Onlne: 2347-5439, Prnt: 2348-0025 Desgn of Shunt Actve

More information

Customer witness testing guide

Customer witness testing guide Customer wtness testng gude Ths gude s amed at explanng why we need to wtness test equpment whch s beng connected to our network, what we actually do when we complete ths testng, and what you can do to

More information

Power Control for Wireless Data

Power Control for Wireless Data Power Control for Wreless Data Davd Goodman Narayan Mandayam Electrcal Engneerng WINLAB Polytechnc Unversty Rutgers Unversty 6 Metrotech Center 73 Brett Road Brooklyn, NY, 11201, USA Pscataway, NJ 08854

More information

Hierarchical Generalized Cantor Set Modulation

Hierarchical Generalized Cantor Set Modulation 8th Internatonal Symposum on Wreless Communcaton Systems, Aachen Herarchcal Generalzed Cantor Set Modulaton Smon Görtzen, Lars Schefler, Anke Schmenk Informaton Theory and Systematc Desgn of Communcaton

More information

Learning Ensembles of Convolutional Neural Networks

Learning Ensembles of Convolutional Neural Networks Learnng Ensembles of Convolutonal Neural Networks Lran Chen The Unversty of Chcago Faculty Mentor: Greg Shakhnarovch Toyota Technologcal Insttute at Chcago 1 Introducton Convolutonal Neural Networks (CNN)

More information

Multi-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments

Multi-Robot Map-Merging-Free Connectivity-Based Positioning and Tethering in Unknown Environments Mult-Robot Map-Mergng-Free Connectvty-Based Postonng and Tetherng n Unknown Envronments Somchaya Lemhetcharat and Manuela Veloso February 16, 2012 Abstract We consder a set of statc towers out of communcaton

More information

Robust Image Transmission Performed by SPIHT and Turbo-Codes

Robust Image Transmission Performed by SPIHT and Turbo-Codes SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 5, No.2, November 2008, 353-360 Robust Image Transmsson Performed by SPIHT and Turbo-Codes Abdelmounam Moulay Lakhdar, Rachda Mélan 2, Malka Kandouc 2 Abstract:

More information

BER Performance Analysis of Multiuser Diversity with Antenna Selection in MRC MIMO Systems

BER Performance Analysis of Multiuser Diversity with Antenna Selection in MRC MIMO Systems Performance Analyss of ultuser Dversty wth Antenna Selecton n RC IO Systems ohammad Torab 1, Davd Haccoun 1 and Wessam Ajb 2 1 Department of Electrcal Engneerng, École Polytechnque de ontréal, ontréal,

More information

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas

Impact of Interference Model on Capacity in CDMA Cellular Networks. Robert Akl, D.Sc. Asad Parvez University of North Texas Impact of Interference Model on Capacty n CDMA Cellular Networks Robert Akl, D.Sc. Asad Parvez Unversty of North Texas Outlne Introducton to CDMA networks Average nterference model Actual nterference model

More information

Uplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment

Uplink User Selection Scheme for Multiuser MIMO Systems in a Multicell Environment Uplnk User Selecton Scheme for Multuser MIMO Systems n a Multcell Envronment Byong Ok Lee School of Electrcal Engneerng and Computer Scence and INMC Seoul Natonal Unversty leebo@moble.snu.ac.kr Oh-Soon

More information

California, 4 University of California, Berkeley

California, 4 University of California, Berkeley Dversty Processng WCDMA Cell earcher Implementaton Ahmed M. Eltawl, Eugene Grayver 2, Alreza Targhat, Jean Francos Frgon, Kambz hoarnejad, Hanl Zou 3 and Danjela Cabrc 4 Unversty of Calforna, Los Angeles,

More information

A Current Differential Line Protection Using a Synchronous Reference Frame Approach

A Current Differential Line Protection Using a Synchronous Reference Frame Approach A Current Dfferental Lne rotecton Usng a Synchronous Reference Frame Approach L. Sousa Martns *, Carlos Fortunato *, and V.Fernão res * * Escola Sup. Tecnologa Setúbal / Inst. oltécnco Setúbal, Setúbal,

More information

Application of Intelligent Voltage Control System to Korean Power Systems

Application of Intelligent Voltage Control System to Korean Power Systems Applcaton of Intellgent Voltage Control System to Korean Power Systems WonKun Yu a,1 and HeungJae Lee b, *,2 a Department of Power System, Seol Unversty, South Korea. b Department of Power System, Kwangwoon

More information

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method

A Novel GNSS Weak Signal Acquisition Using Wavelet Denoising Method A Novel GNSS Weak Sgnal Acquston Usng Wavelet Denosng Method Jn Tan, Lu Yang, BeHang Unversty, P.R.Chna BIOGRAPHY Jn Tan s a post-doctor n School of Electronc and Informaton Engneerng, BeHang Unversty,

More information

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation

Rejection of PSK Interference in DS-SS/PSK System Using Adaptive Transversal Filter with Conditional Response Recalculation SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol., No., November 23, 3-9 Rejecton of PSK Interference n DS-SS/PSK System Usng Adaptve Transversal Flter wth Condtonal Response Recalculaton Zorca Nkolć, Bojan

More information

4.3- Modeling the Diode Forward Characteristic

4.3- Modeling the Diode Forward Characteristic 2/8/2012 3_3 Modelng the ode Forward Characterstcs 1/3 4.3- Modelng the ode Forward Characterstc Readng Assgnment: pp. 179-188 How do we analyze crcuts wth juncton dodes? 2 ways: Exact Solutons ffcult!

More information

29. Network Functions for Circuits Containing Op Amps

29. Network Functions for Circuits Containing Op Amps 9. Network Functons for Crcuts Contanng Op Amps Introducton Each of the crcuts n ths problem set contans at least one op amp. Also each crcut s represented by a gven network functon. These problems can

More information

On Sensor Fusion in the Presence of Packet-dropping Communication Channels

On Sensor Fusion in the Presence of Packet-dropping Communication Channels On Sensor Fuson n the Presence of Packet-droppng Communcaton Channels Vjay Gupta, Babak Hassb, Rchard M Murray Abstract In ths paper we look at the problem of multsensor data fuson when data s beng communcated

More information

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems

A NSGA-II algorithm to solve a bi-objective optimization of the redundancy allocation problem for series-parallel systems 0 nd Internatonal Conference on Industral Technology and Management (ICITM 0) IPCSIT vol. 49 (0) (0) IACSIT Press, Sngapore DOI: 0.776/IPCSIT.0.V49.8 A NSGA-II algorthm to solve a b-obectve optmzaton of

More information

Performance Analysis of Scheduling Policies for Delay-Tolerant Applications in Centralized Wireless Networks

Performance Analysis of Scheduling Policies for Delay-Tolerant Applications in Centralized Wireless Networks Performance Analyss of Schedulng Polces for Delay-Tolerant Applcatons n Centralzed Wreless Networks Mohamed Shaqfeh and Norbert Goertz Insttute for Dgtal Communcatons Jont Research Insttute for Sgnal &

More information

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b

Research of Dispatching Method in Elevator Group Control System Based on Fuzzy Neural Network. Yufeng Dai a, Yun Du b 2nd Internatonal Conference on Computer Engneerng, Informaton Scence & Applcaton Technology (ICCIA 207) Research of Dspatchng Method n Elevator Group Control System Based on Fuzzy Neural Network Yufeng

More information

Pulse Extraction for Radar Emitter Location

Pulse Extraction for Radar Emitter Location 00 Conference on Informaton Scences and Systems, The Johns opkns Unversty, March 3, 00 Pulse Extracton for Radar Emtter Locaton Mark L. Fowler, Zhen Zhou, and Anupama Shvaprasad Department of Electrcal

More information

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER

THE ARCHITECTURE OF THE BROADBAND AMPLIFIERS WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON EMITTER VOL. 0, NO. 8, OCTOBE 205 ISSN 89-6608 2006-205 Asan esearch Publshng Network (APN. All rghts reserved. THE ACHITECTUE OF THE BOADBAND AMPLIFIES WITHOUT CLASSICAL STAGES WITH A COMMON BASE AND A COMMON

More information

location-awareness of mobile wireless systems in indoor areas, which require accurate

location-awareness of mobile wireless systems in indoor areas, which require accurate To my wfe Abstract Recently, there are great nterests n the locaton-based applcatons and the locaton-awareness of moble wreless systems n ndoor areas, whch requre accurate locaton estmaton n ndoor envronments.

More information

Multicarrier Modulation

Multicarrier Modulation Multcarrer Modulaton Wha Sook Jeon Moble Computng & Communcatons Lab Contents Concept of multcarrer modulaton Data transmsson over multple carrers Multcarrer modulaton wth overlappng Chap. subchannels

More information

Exact Probabilistic Analysis of the Limited Scheduling Algorithm for Symmetrical Bluetooth Piconets

Exact Probabilistic Analysis of the Limited Scheduling Algorithm for Symmetrical Bluetooth Piconets Exact Probablstc Analyss of the Lmted Schedulng Algorthm for Symmetrcal Bluetooth Pconets Gl Zussman *, Ur Yechal 2, and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology,

More information

Utility-based Routing

Utility-based Routing Utlty-based Routng Je Wu Dept. of Computer and Informaton Scences Temple Unversty Roadmap Introducton Why Another Routng Scheme Utlty-Based Routng Implementatons Extensons Some Fnal Thoughts 2 . Introducton

More information

Estimation of spectrum requirements for mobile networks with self-similar traffic, handover, and frequency reuse

Estimation of spectrum requirements for mobile networks with self-similar traffic, handover, and frequency reuse Moble Informaton Systems 6 (2010) 281 291 281 DOI 10.3233/MIS-2010-0104 IOS Press Estmaton of spectrum requrements for moble networks wth self-smlar traffc, handover, and frequency reuse Won Seok Yang

More information

Optimizing Transmission Lengths for Limited Feedback with Non-Binary LDPC Examples

Optimizing Transmission Lengths for Limited Feedback with Non-Binary LDPC Examples Optmzng Transmsson Lengths for Lmted Feedbac wth on-bnary LDPC Examples Kasra Valna, Sudarsan V. S. Ranganathan, Darush Dvsalar*, and Rchard D. Wesel Department of Electrcal Engneerng, Unversty of Calforna,

More information

Tile Values of Information in Some Nonzero Sum Games

Tile Values of Information in Some Nonzero Sum Games lnt. ournal of Game Theory, Vot. 6, ssue 4, page 221-229. Physca- Verlag, Venna. Tle Values of Informaton n Some Nonzero Sum Games By P. Levne, Pars I ), and ZP, Ponssard, Pars 2 ) Abstract: The paper

More information

A Predictive QoS Control Strategy for Wireless Sensor Networks

A Predictive QoS Control Strategy for Wireless Sensor Networks The 1st Worshop on Resource Provsonng and Management n Sensor Networs (RPMSN '5) n conjuncton wth the 2nd IEEE MASS, Washngton, DC, Nov. 25 A Predctve QoS Control Strategy for Wreless Sensor Networs Byu

More information

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability

The Dynamic Utilization of Substation Measurements to Maintain Power System Observability 1 The Dynamc Utlzaton of Substaton Measurements to Mantan Power System Observablty Y. Wu, Student Member, IEEE, M. Kezunovc, Fellow, IEEE and T. Kostc, Member, IEEE Abstract-- In a power system State Estmator

More information

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame

Ensemble Evolution of Checkers Players with Knowledge of Opening, Middle and Endgame Ensemble Evoluton of Checkers Players wth Knowledge of Openng, Mddle and Endgame Kyung-Joong Km and Sung-Bae Cho Department of Computer Scence, Yonse Unversty 134 Shnchon-dong, Sudaemoon-ku, Seoul 120-749

More information

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme

Inverse Halftoning Method Using Pattern Substitution Based Data Hiding Scheme Proceedngs of the World Congress on Engneerng 2011 Vol II, July 6-8, 2011, London, U.K. Inverse Halftonng Method Usng Pattern Substtuton Based Data Hdng Scheme Me-Y Wu, Ja-Hong Lee and Hong-Je Wu Abstract

More information

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d

Research on Controller of Micro-hydro Power System Nan XIE 1,a, Dezhi QI 2,b,Weimin CHEN 2,c, Wei WANG 2,d Advanced Materals Research Submtted: 2014-05-13 ISSN: 1662-8985, Vols. 986-987, pp 1121-1124 Accepted: 2014-05-19 do:10.4028/www.scentfc.net/amr.986-987.1121 Onlne: 2014-07-18 2014 Trans Tech Publcatons,

More information

Comparison of Two Measurement Devices I. Fundamental Ideas.

Comparison of Two Measurement Devices I. Fundamental Ideas. Comparson of Two Measurement Devces I. Fundamental Ideas. ASQ-RS Qualty Conference March 16, 005 Joseph G. Voelkel, COE, RIT Bruce Sskowsk Rechert, Inc. Topcs The Problem, Eample, Mathematcal Model One

More information

Two-Phase Cooperative Broadcasting Based on Batched Network Code

Two-Phase Cooperative Broadcasting Based on Batched Network Code Two-Phase Cooperatve Broadcastng Based on Batched Network Code Xaol Xu, Praveen Kumar M. Gandh, Yong Lang Guan, and Peter Han Joo Chong 1 arxv:1504.04464v1 [cs.it] 17 Apr 2015 Abstract In ths paper, we

More information

On High Spatial Reuse Broadcast Scheduling in STDMA Wireless Ad Hoc Networks

On High Spatial Reuse Broadcast Scheduling in STDMA Wireless Ad Hoc Networks On Hgh Spatal Reuse Broadcast Schedulng n STDMA Wreless Ad Hoc Networks Ashutosh Deepak Gore and Abhay Karandkar Informaton Networks Laboratory Department of Electrcal Engneerng Indan Insttute of Technology

More information

Approximating User Distributions in WCDMA Networks Using 2-D Gaussian

Approximating User Distributions in WCDMA Networks Using 2-D Gaussian CCCT 05: INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS, AND CONTROL TECHNOLOGIES 1 Approxmatng User Dstrbutons n CDMA Networks Usng 2-D Gaussan Son NGUYEN and Robert AKL Department of Computer

More information